This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
2014 will be remembered for many reasons, one of them being the rise of cyber crime by sophisticated hackers who managed to breach startups, international corporations, and government agencies to steal sensitive data , inject malware in corporate servers, and cause other types of damage.
The number of patents filed in 2021 is more than 30 times higher than in 2015 as companies and countries across the world have realized that AI and Machine Learning will be a major disruptor and potentially change the balance of military power. These technologies will transform businesses and government agencies. Carpe Diem.
With this approach to establishing and tracking milestones, ReadyTalk launched its beta of UbiMeet.com in March 2015. The United States Digital Service, a federal government agency, is building a ‘stealth startup.’ Come hear about them live at the 2015 Lean Startup Conference. You can read more about 18F here.
In Mexico’s 2015 elections , citizens’ responses to the governing party ads were often recorded without their knowledge. One example is so-called “ stealth neuromarketing ,” which tries to manipulate consumer behavior without their being aware of its influence, threatening consumer autonomy. These aren’t hypothetical concerns.
Well done Guy Flechter and team Sola Security on coming out of stealth with $30M in seed funding to offer cybersecurity protection to small and medium businesses! Kudos Alon Cohen and team QuamCore on coming out of stealth with a $9 million seed round to enable the implementation of a million-qubit computer in a 50 cm cube! on your $7.5M
I realized that working for large companies who were fighting each other, or fighting the government, was never going to scratch that itch. Thanks to Teo Vanyo, Stealth Agents ! #18- My side-hustle started in 2015 on a whim. So, I left the firm and started my own one that focuses on helping whistleblowers report corporate crime.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content