article thumbnail

53 Questions Developers Should Ask Innovators

TechEmpower

Do you have legal (Founder Agreement, IP, etc.) Do you have a custom algorithm or other technology? Tell me about the business. How are you funding this? What level of funding do you currently have? Who’s helping you with fundraising? What are your big milestones? Where are you today, and what’s happening right now?

Developer 520
article thumbnail

Someone Stole My Startup Idea – Part 3: The Best Defense is a Good IP Strategy

Steve Blank

Early on in my career I took a “we’re moving too fast to deal with lawyers” attitude to patents and Intellectual Property (IP.) Type of IP. _. Just about anything can be patented : circuits, hardware, software, applied algorithms, formulas, designs, user interfaces, applications, systems. What is Protectable. _. Examples. _.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Can FinTech Industry Successfully Navigate the Complex Web of Cybersecurity

The Startup Magazine

Rate limiters govern the frequency or quantity of user or IP requests, which helps to prevent distributed denial of service attacks. On the other hand, encryption creates algorithms that convert data into code that can only be seen by the intended receiver. They are highly detrimental to FinTechs because many APIs lack rate limiters.

article thumbnail

What Google's Penguin Algorithm Means for Your Business

mashable.com

What Google’s Penguin Algorithm Means for Your Business. Ever since Google started naming its algorithm updates after furry black and white creatures, we’ve been inundated with talks of pandas and penguins, and how they’re taking down websites one ranking at a time. Google changes its algorithm about 500 times a year.

article thumbnail

How To Work Online Safely

YoungUpstarts

Business is attacked not only by machines but also by people: there is no single algorithm or antidote to neutralize them. IPvanish perfectly masks your IP protecting you against hackers, as well as has a NAT firewall. None of them register your Internet traffic, so no one can identify you by IP address.

article thumbnail

NDA Stealth Mode and Sharing Your Startup Concept

SoCal CTO

What you will convey in your conversations What protections you will place on those communications For example, you might decide that portions of your concept will be controlled more closely (a secret algorithm). I may decide to hold back some detailed specifics around algorithms. How Stealthy Should You Be? False Confidence.

NDA 211
article thumbnail

NDA Stealth Mode and Sharing Your Startup Concept

SoCal CTO

What you will convey in your conversations What protections you will place on those communications For example, you might decide that portions of your concept will be controlled more closely (a secret algorithm). I may decide to hold back some detailed specifics around algorithms. How Stealthy Should You Be? False Confidence.

NDA 198