Blog of the website «TechCrunch» Прогноз погоды


John Smith

John Smith, 48

Joined: 28 January 2014

Interests: No data

Jonnathan Coleman

Jonnathan Coleman, 32

Joined: 18 June 2014

About myself: You may say I'm a dreamer

Interests: Snowboarding, Cycling, Beer

Andrey II

Andrey II, 41

Joined: 08 January 2014

Interests: No data



Joined: 05 August 2014

Interests: No data

David Markham

David Markham, 65

Joined: 13 November 2014

Interests: No data

Michelle Li

Michelle Li, 41

Joined: 13 August 2014

Interests: No data

Max Almenas

Max Almenas, 53

Joined: 10 August 2014

Interests: No data


29Jan, 32

Joined: 29 January 2014

Interests: No data

s82 s82

s82 s82, 26

Joined: 16 April 2014

Interests: No data


Wicca, 37

Joined: 18 June 2014

Interests: No data

Phebe Paul

Phebe Paul, 27

Joined: 08 September 2014

Interests: No data

Артем Ступаков

Артем Ступаков, 93

Joined: 29 January 2014

About myself: Радуюсь жизни!

Interests: No data

sergei jkovlev

sergei jkovlev, 59

Joined: 03 November 2019

Interests: музыка, кино, автомобили

Алексей Гено

Алексей Гено, 8

Joined: 25 June 2015

About myself: Хай

Interests: Интерес1daasdfasf,



Joined: 24 January 2019

Interests: No data

Main article: Security

<< Back Forward >>
Topics from 1 to 10 | in all: 468

Microsoft says it will fix an Internet Explorer security bug under active attack

18:35 | 18 January

Microsoft has confirmed a security flaw affecting Internet Explorer is currently being used by hackers, but that it has no immediate plans to fix.

In a late-evening tweet, US-CERT, the division of Homeland Security tasked with reporting on major security flaws, tweeted

to a security advisory detailing the bug, describing it as “being exploited in the wild.”

Microsoft said all supported versions of Windows are affected by the flaw, including Windows 7, which after this week no longer receives security updates.

The vulnerability was found in how Internet Explorer handles memory. An attacker could use the flaw to remotely run malicious code on an affected computer, such as tricking a user into opening a malicious website from a search query or a link sent by email.

It’s believed to be a similar vulnerability as one disclosed by Mozilla, the maker of the Firefox browser, earlier this week. Both Microsoft and Mozilla credited Qihoo 360, a China-based security research team, with finding flaws under active attack. Earlier in the week, Qihoo 360 reportedly deleted a tweet referencing a similar flaw in Internet Explorer.

Microsoft told TechCrunch that it was was “aware of limited targeted attacks” and was “working on a fix,” but that it was unlikely to release a patch until its next round of monthly security fixes — scheduled for February 11.

Neither Qihoo, Microsoft nor Mozilla said how attackers were exploiting the bug, who the attackers were, or who was being targeted. The U.S. government’s cybersecurity advisory unit also issued a warning about current exploitation.

Microsoft assigned the bug with a common vulnerability identifier, CVE-2020-0674, but specific details of the bug have yet to be released.

When reached, a Microsoft spokesperson did provide comment.



Identifying opportunities in today’s saturated cybersecurity market

19:36 | 12 January

Yoav Leitersdorf is the founder of YL Ventures, a 12-year-old, Mill Valley, California.-based seed-stage venture firm that invests narrowly in Israeli cybersecurity startups and closed its fourth fund with $120 million in capital commitments last summer — a vehicle that brings the capital it now manages to $260 million.

The outfit takes a concentrated approach to investing that has seemingly been paying off. YL Ventures was the biggest shareholder in the container security startup Twistlock, for example, which sold to Palo Alto Networks last year for $410 million after raising $63 million altogether. (YL Ventures had plugged $12 million into the company over four years.) It was also the biggest outside shareholder in Hexadite, an Israeli startup that used AI to identify and protect against attacks and that sold in 2017 to Microsoft for a reported $100 million.

Still, the firm sees a lot of cybersecurity startups. It also has an advisory board that’s comprised of more than 50 security pros from heavyweight companies. For insight into what they’re shopping for this year — and how startups might grab their attention — we reached out to Leitersdorf last week to ask what he’s hearing.



Amazon has fired an employee for leaking user email addresses and phone numbers

01:22 | 11 January

Amazon has emailed an unknown number of customers saying that their email address and phone number was obtained by an Amazon employee and shared with a third-party “in violation of our policies.”

The email, seen by TechCrunch, said the employee was “terminated” and is supporting law enforcement in its prosecution.

“No other information related to your account was shared. This is not a result of anything you have done, and there is no need for you to take any action,” the email read to customers.

But little else is known about the employee, when the information was shared and with whom, and how many customers are affected.

Amazon confirmed the authenticity of the email it sent to customers on Friday, but did not comment beyond what was in the email.

It’s not the first time it’s happened. Amazon was just as vague about a similar breach of email addresses last year, which Amazon declined to comment further.

In a separate incident, Amazon said this week that it fired four employee were fired at Ring, one of its smart camera and door bell subsidiaries. Ring said it fired the employees for improperly viewing video footage from customer cameras.




A billion medical images are exposed online, as doctors ignore warnings

01:00 | 11 January

This story was reported in partnership with health news site The Mighty

Every day, millions of new medical images containing the personal health information of patients are spilling out onto the internet.

Hundreds of hospitals, medical offices and imaging centers are running insecure storage systems, allowing anyone with an internet connection and free-to-download software to access over 1 billion medical images of patients across the world.

About half of all the exposed images, which include X-rays, ultrasounds and CT scans, belong to patients in the United States.

Yet despite warnings from security researchers who have spent weeks alerting hospitals and doctors’ offices to the problem, many have ignored their warnings and continue to expose their patients’ private health information.

“It seems to get worse every day,” said Dirk Schrader, who led the research at Germany-based security firm Greenbone Networks, which has been monitoring the number of exposed servers for the past year.

The problem is well-documented. Greenbone found 24 million patient exams storing more than 720 million medical images in September, which first unearthed the scale of the problem as reported by ProPublica. Two months later, the number of exposed servers had increased by more than half to 35 million patient exams, exposing 1.19 billion scans, and representing a considerable violation of patient privacy.

But the problem shows little sign of abating. “The amount of data exposed is still rising, even considering the amount of data taken offline due to our disclosures,” said Schrader.

If doctors fail to take action, he said the number of exposed medical images will hit a new high “in no time.”

Over a billion medical images remain exposed. Experts say the number is getting worse, not better. (Image: supplied)

Researchers say the problem is caused by a common weakness found on the servers used by hospitals, doctors’ offices and radiology centers to store patient medical images.

A decades-old file format and industry standard known as DICOM was designed to make it easier for medical practitioners to store medical images in a single file and share them with other medical practices. DICOM images can be viewed using any of the free-to-use apps, as would any radiologist. DICOM images are typically stored in a picture archiving and communications system, known as a PACS server, allowing for easy storage and sharing. But many doctors’ offices disregard security best practices and connect their PACS server directly to the internet without a password.

These unprotected servers not only expose medical imaging but also patient personal health information. Many patient scans include cover sheets baked into the DICOM file, including the patient’s name, dates-of-birth, and sensitive information about their diagnoses. In some cases, hospitals use a patient’s Social Security number to identify patients in these systems.

Lucas Lundgren, a Sweden-based security researcher, spent part of last year looking at the extent of exposed medical image data. In November, he demonstrated to TechCrunch how easy it was for anyone to view medical data from exposed servers. In just a few minutes, he found one of the largest hospitals in Los Angeles exposing tens of thousands of patients’ scans dating back several years. The server was later secured.

Some of the largest hospitals and imaging centers in the United States are the biggest culprits of exposing medical data. Schrader said the exposed data puts patients at risk of becoming “perfect victims for medical insurance fraud.”

Yet, patients are unaware that their data could be exposed on the internet for anyone to find.

The Mighty, which examined the effect on patients, found exposed medical information puts patients at a greater risk of insurance fraud and identity theft. Exposed data can also erode the relationship between patients and their doctors, leading to patients becoming less willing to share potentially pertinent information.

As part of our investigation, we found a number of U.S. imaging centers storing decades of patient scans.

One patient, whose information was exposed following a visit to an emergency room in Florida last year, described her exposed medical data as “scary” and “uncomfortable.” Another with a chronic illness had regular scans at a hospital in California over a period of 30 years. And one unprotected server at one of the largest military hospitals in the United States exposed the names of military personnel and medical images.

But even in cases of patients with only one or a handful of medical images, the exposed data can be used to infer a picture of a person’s health, including illnesses and injuries.

Many patient scans include cover sheets containing personal health information baked into the file. (Image: supplied)

In an effort to get the servers secured, Greenbone contacted more than a hundred organizations last month about their exposed servers. Many of the smaller organizations subsequently secured their systems, resulting in a small drop in the overall number of exposed images. But when the security company contacted the 10 largest organizations, which accounted for about one-in-five of all exposed medical images, Schrader said there was “no response at all.”

Greenbone privately shared with names of the organizations to allow TechCrunch to follow up with each medical office, including a health provider with three hospital in New York, a radiology company in Florida with a dozen locations, and a major California-based hospital. (We’re not naming the affected organizations to limit the risk of exposing patient data.)

Only one organization secured its servers. Northeast Radiology, a partner of Alliance Radiology, had the largest cache of exposed medical data in the U.S., according to Greenbone’s data, with more than 61 million images on about 1.2 million patients across its five offices. The server was secured only after TechCrunch followed up a month after Greenbone first warned the organization of the exposure.

Alliance spokesperson Tracy Weise declined to comment.

Schrader said if the remaining affected organizations took their exposed systems off the internet, almost 600 million images would “disappear” from the internet.

Experts who have warned about exposed servers for years say medical practices have few excuses. Yisroel Mirsky, a security researcher who has studied security vulnerabilities in medical equipment, said last year that security features set out by the standards body that created and maintains the DICOM standard have “largely been ignored” by the device manufacturers.

Schrader did not lay blame on the device manufacturers. Instead, he said it was “pure negligence” that doctor’s offices failed to properly configure and secure their servers.

Lucia Savage, a former senior privacy official at the U.S. Department of Health and Human Services, said more has to be done to improve security across the healthcare industry — especially at the level of smaller organizations who lack resources.

“If the data is personal health information, it is required to be secured from unauthorized access, which includes finding it on the internet,” said Savage. “There is an equal obligation to lock the file room that contains your paper medical records as there is to secure digital health information,” she said.

Medical records and personal health data are highly protected under U.S. law. The Health Insurance Portability and Accountability Act (HIPAA) created the “security rule,” which included technical and physical safeguards designed to protect electronic personal health information by ensuring the data is kept private and secure. The law also holds healthcare providers accountable for any security lapses. Running afoul of the law can lead to severe penalties.

“As Health and Human Services aggressively pushes to permit a wider range of parties to have access to the sensitive health information of American patients without traditional privacy protections attaching to that information, HHS’s inattention to this particular incident becomes even more troubling.”
Sen. Mark Warner (D-VA)

The government last year fined one Tennessee-based medical imaging company $3 million for inadvertently exposing a server containing over 300,000 protected patient data.

Deven McGraw, who was the top privacy official in the Health and Human Services’ enforcement arm — the Office of Civil Rights, said if security assistance was more available to smaller providers, the government could focus its enforcement efforts on providers who willfully ignore their security obligations.

“Government enforcement is important, as is guidance and support for lower resourced providers and easy-to-deploy solutions that are built into the technology,” said McGraw. “It may be too big of a problem for any single law enforcement agency to truly put a dent in.”

Since the scale of exposed medical servers was first revealed in September, Sen. Mark Warner (D-VA) called for answers from Health and Human Services. Warner acknowledged that the number of U.S.-based exposed servers had decreased — 16 servers storing 31 million images — but told TechCrunch that “more needs to be done.”

“To my knowledge, Health and Human Services has done nothing about it,” Warner told TechCrunch. “As Health and Human Services aggressively pushes to permit a wider range of parties to have access to the sensitive health information of American patients without traditional privacy protections attached to that information, HHS’s inattention to this particular incident becomes even more troubling,” he added.

Health and Human Services’ Office for Civil Rights said it does not comment on individual cases but defended its enforcement actions.

“OCR has taken enforcement action in the past to address violations concerning unprotected storage servers, and continues robust enforcement of the HIPAA rules,” said the spokesperson.

“We will continue doing our best to improve the global situation of unprotected systems,” said Schrader. But he said there was not much more he can do beyond warn organizations of their exposed servers.

“Then it’s a question for the regulators,” he said.



Cloudflare acquires stealthy startup S2 Systems, announces Cloudflare for Teams

17:00 | 7 January

Cloudflare announced that it has acquired S2 Systems, a browser isolation startup started by former Microsoft execs. The two companies did not reveal the acquisition price.

Matthew Prince, co-founder and CEO at Cloudflare, says that this acquisition is part of a new suite of products called Cloudflare for Teams, which has been designed to protect an organization from threats on the internet. S2 developed a solution specifically to help prevent browser-based code attacks.

Prince said the company had been thinking about how to incorporate this kind of technology into the Cloudflare family of products for some time. As with many companies, it had to decide if it should partner, build or acquire a company. Prince says that when he met the founding team from S2 and tested its technology, he was impressed with the speed and execution.

The team felt like a good fit, so Cloudflare made an offer. It had to bid against some other companies (whom he did not name), but in the end S2 chose Cloudflare. He sees technology like this helping to even the playing field for internet users around the world.

“We’re super excited to have them on board, and we think that combining their better browser isolation technology with our ubiquitous network, we can really redefine how enterprises protect their employees, and over the long term how people generally browse the internet, where we can make it so that a low-end phone can have a similar experience as a brand new modern iPhone,” Prince said. He says that’s due to the tremendous processing power that can take place on its network across 200 cities worldwide, taking that processing burden off of the phone or other device.

The acquisition does not stand in isolation though. It’s part of a broader announcement around a new product category called Cloudflare for Teams. This is designed to provide a set of protections that includes S2 browser isolation as well as VPN and identity protection.

There are two main pieces to Cloudflare for Teams: Cloudflare Access and Cloudflare Gateway. Access is a Zero Trust identity and access management tool designed to help companies ensure their employees are using the most up-to-date software on their devices.

Gateway is designed to protect companies and individuals from threats on the Internet, which is were S2 fits in. The company offers three versions: Gateway, which includes DNS-based filtering and audit logging; Gateway Pro, which secures all Internet-bound traffic; and Gateway Enterprise, which helps prevent data loss and includes the browser isolation tech from S2.

The S2 acquisition closed on December 31st. S2’s 10 employees are now part of the Cloudflare team, and will remain in Kirkland, WA to establish a Cloudflare office there. The company was in stealth prior to the acquisition.



Homeland Security warns businesses to brace for Iranian cyberattacks

06:04 | 7 January

Homeland Security is warning U.S. companies to “consider and assess” the possible impacts and threat of a cyberattack on their businesses following heightened tensions with Iran.

It’s its first official guidance published the government’s dedicated cyber advisory unit, the Cybersecurity and Infrastructure Security Agency, just days after the killing of a leading Iranian military commander, Qasem Soleimani, which the U.S. government has accused of targeting and killing U.S. personnel across the Middle East.

Soleimani, an Iranian general who was slated as second-in-command in Iran’s leadership, was killed on Friday by a U.S drone strike authorized by President Trump. The same drone strike killed Abu Mahdi al-Muhandis, a deputy in a coalition of Iran-backed militias in neighboring Iraq.

CISA said in its latest advisory, posted late Monday, that the increased geopolitical tensions “may result in cyber and physical attacks against the homeland and also destructive hybrid attacks by proxies against U.S. targets and interests abroad.”

The agency said Iran and its allies could launch “disruptive and destructive cyber operations” against strategic targets, such as phone and energy companies, and also carry out “cyber-enabled espionage” that aim to better understand U.S. foreign policy decision making.

CISA also warned of disinformation campaigns, as well as kinetic attacks — including bombings. Companies should take precautions in the event of cyberattacks — such as setting up offline backups, the agency advised.

The warnings come shortly after security experts in the private sector warned of the possibility of retaliatory action following the drone strikes.

“We will probably see an uptick in espionage, primarily focused on government systems, as Iranian actors seek to gather intelligence and better understand the dynamic geopolitical environment,” said John Hultquist, director of intelligence analysis at cybersecurity firm FireEye. “We also anticipate disruptive and destructive cyberattacks against the private sphere,” he said.

Iran is one of the world’s most powerful adversaries in cyberspace, experts say.

Tehran has a considerable arsenal of offensive cyber tools, including wipers — malware designed to infiltrate computers and destroy data. Hackers associated with Iran have been active in targeting facilities in the Middle East in recent years. Dmitri Alperovitch, who co-founded security firm Crowdstrike, said

that Iran may target critical infrastructure, such as energy grids and financial institutions.

More recently, Microsoft said it had notified thousands of customers over the past year who have been targeted by nation-state attackers, including hackers associated with Iran. The software and services giant previously took legal action against Iranian-controlled domains in an effort to disrupt their cyber activities. In October, Microsoft said Iranian hackers targeted a 2020 presidential candidate, which Reuters later confirmed was President Trump’s reelection campaign.

The move to assassinate Soleimani was widely panned by both opponents and allies of the Trump administration. Critics say the government had not thought of the consequences of the strike, including both Iranian retaliation with kinetic force but also cyberattacks.

Sen. Ron Wyden, a senior lawmaker on the Senate Intelligence Committee, said the killing was “a reckless escalation that will take us further down the road to ruinous war.” Meanwhile in a

, Rep. Elissa Slotkin, a former CIA analyst who served under President Bush, also criticized the action.



BigID bags another $50M round as data privacy laws proliferate

16:30 | 6 January

Almost exactly 4 months to the day after BigID announced a $50 million Series C, the company was back today with another $50 million round. The Series D came entirely from Tiger Global Management. The company has raised a total of $144 million.

What warrants $100 million in interest from investors in just four months is BigID’s mission to understand the data a company has and manage that in the context of increasing privacy regulation including GDPR in Europe and CCPA in California, which went into effect this month.

BigID CEO and co-founder Dimitri Sirota admits that his company formed at the right moment when it launched in 2016, but says he and his co-founders had an inkling that there would be a shift in how governments view data privacy.

“Fortunately for us, some of the requirements that we said were going to be critical, like being able to understand what data you collect on each individual across your entire data landscape, have come to [pass],” Sirota told TechCrunch. While he understands that there are lots of competing companies going after this market, he believes that being early helped his startup establish a brand identity earlier than most.

Meanwhile, the privacy regulation landscape continues to evolve. Even as California privacy legislation is taking effect, many other states and countries are looking at similar regulations. Canada is looking at overhauling its existing privacy regulations.

Sirota says that he wasn’t actually looking to raise either the C or the D, and in fact still has B money in the bank, but when big investors want to give you money on decent terms, you take it while the money is there. These investors clearly see the data privacy landscape expanding and want to get involved. He recognizes that economic conditions can change quickly, and it can’t hurt to have money in the bank for when that happens.

That said, Sirota says you don’t raise money to keep it in the bank. At some point, you put it to work. The company has big plans to expand beyond its privacy roots and into other areas of security in the coming year. Although he wouldn’t go into too much detail about that, he said to expect some announcements soon.

For a company that is only four years old, it has been amazingly proficient at raising money with a $14 million Series A and a $30 million Series B in 2018, followed by the $50 million Series C last year, and the $50 million round today. And Sirota said, he didn’t have to even go looking for the latest funding. Investors came to him — no trips to Sand Hill Road, no pitch decks. Sirota wasn’t willing to discuss the company’s valuation, only saying the investment was minimally diluted.

BigID, which is based in New York City, already has some employees in Europe and Asia, but he expects additional international expansion in 2020. Overall the company has around 165 employees at the moment and he sees that going up to 200 by mid-year as they make a push into some new adjacencies.



Twitter offers more support to researchers — to ‘keep us accountable’

13:07 | 6 January

Twitter has kicked off the New Year by taking the wraps off a new hub for academic researchers to more easily access information and support around its APIs — saying the move is in response to feedback from the research community.

The new page — which it’s called ‘Twitter data for academic researchers’ — can be found here.

It includes links to apply for a developer account to access Twitter’s APIs; details of the different APIs offered and links to additional tools for researchers, covering data integration and access; analysis; visualization; and infrastructure and hosting.

“Over the past year, we’ve worked with many of you in the academic research community. We’ve learned about the challenges you face, and how Twitter can better support you in your efforts to advance understanding of the public conversation,” the social network writes, saying it wants to “make it even easier to learn from the public conversation”.

Twitter is also promising “more enhancements and resources” for researchers this year.

It’s likely no accident the platform is putting a fresh lick of paint on its offerings for academics given that 2020 is a key election year in the U.S. — and concerns about the risk of fresh election meddling are riding high.

Tracking conversation flow on Twitter also still means playing a game of ‘bot or not’ — one that has major implications for the health of democracies. And in Europe Twitter is one of a number of platform giants which, in 2018, signed up to a voluntary Code of Practice on disinformation that commits it to addressing fake accounts and online bots, as well as to empowering the research community to monitor online disinformation via “privacy-compliant” access to platform data.

“At Twitter, we value the contributions of academic researchers and see the potential for them to help us better understand our platform, keeping us accountable, while helping us tackle new challenges through discoveries and innovations,” the company writes on the new landing page for researchers while also taking the opportunity to big up the value of its platform — claiming that “if it exists, it’s probably been talked about on Twitter”.

If Twitter lives up to its promises of active engagement with researchers and their needs, it could smartly capitalism on rival Facebook’s parallel missteps in support for academics.

Last year Facebook was accused of ‘transparency-washing’ with its own API for researchers, with a group of sixty academics slamming the ad archive API as as much a hinderance as a help.

Months later Facebook was still being reported to have done little to improve the offering.



Plenty of Fish app was leaking users’ hidden names and postal codes

20:37 | 23 December

Dating app Plenty of Fish has pushed out a fix for its apps after a security researcher found they were leaking information that users had set to “private” on their profiles.

The app was always silently returning users’ first names and Zip postal codes to the app, according to The App Analyst, a mobile expert who writes about his analyses of popular apps on his eponymous blog.

The leaking data was not immediately visible to app users, and the data was scrambled to make it difficult to read. But using freely available tools designed to analyze network traffic, the researcher found it was possible to reveal the information about users as their profiles appeared on his phone.

In one case, the App Analyst found enough information to identify where a particular user lived, he told TechCrunch.

Plenty of Fish has more than 150 million registered users, according to its parent company IAC. In recent years, law enforcement have warned about the threats some people face on dating apps, like Plenty of Fish. Reports suggest sex attacks involving dating apps have risen in the past five years. And those in the LGBTQ+ community on these apps also face safety threats from both individuals and governments, prompting apps like Tinder to proactively warn their LGBTQ+ users when they visit regions and states with restrictive and oppressive laws against same-sex partners.

A fix is said to have rolled out for the information leakage bug earlier this month. A spokesperson for Plenty of Fish did not immediately comment.



Medigate partners with Cerner to secure medical devices and networks

17:00 | 19 December

Medigate, an Israeli startup working to secure medical devices and manage assets inside a hospital, has partnered with the medical information technology juggernaut Cerner on services and support for the Israli company’s security software.

Under the agreement, if customers work with Medigate, they’ll receive support from Cerner’s cybersecurity team to help with inventory of the devices in a location. Cerner will also offer remediation services to limit attacks if an organization has a security breach.

“With IDC estimating about 41.6 billion IoT devices in the field by 2025, it is extremely important that healthcare organizations have more visibility and control over what’s going on in their clinical network – and that needs to include medical devices and IoT devices,” said Medigate chief executive Jonathan Langer, in a statement. “Cerner has spent the last 40 years connecting people and systems within the healthcare industry. Working together will help thousands of health systems establish and maintain better control, to protect their data, ongoing operations and, ultimately, patient care.”

The security risks associated with increasingly networked healthcare technologies is an increasing area of concern for security professionals and a growing area of interest among venture investors and large corporation in the healthcare space alike.

“It’s important that the healthcare industry proactively work to prevent data breaches and cyberthreats rather than wait to react after the damage has been done, ,” said Jay Savaiano, Senior Director of Security Solutions at Cerner. “Our work with Medigate is a critical step in the right direction towards effective medical device security across healthcare organizations. We’re committed to helping our clients discover, manage and protect operations from today’s attacks and tomorrow’s threats.”

Medigate has a number of competitors looking at medical device and network security in the healthcare industry. Medcrypt, a recent graduate of the Y Combinator accelerator, raised $5.3 million earlier this year to tackle the problem and other companies, like Elektra Labs, are also looking at the security profiles of devices and therapies as part of an overall assessment of their efficacy.


<< Back Forward >>
Topics from 1 to 10 | in all: 468

Site search

Last comments

Walmart retreats from its UK Asda business to hone its focus on competing with Amazon
Peter Short
Good luck
Peter Short

Evolve Foundation launches a $100 million fund to find startups working to relieve human suffering
Peter Short
Money will give hope
Peter Short

Boeing will build DARPA’s XS-1 experimental spaceplane
Peter Short
Peter Short

Is a “robot tax” really an “innovation penalty”?
Peter Short
It need to be taxed also any organic substance ie food than is used as a calorie transfer needs tax…
Peter Short

Twitter Is Testing A Dedicated GIF Button On Mobile
Peter Short
Sounds great Facebook got a button a few years ago
Then it disappeared Twitter needs a bottom maybe…
Peter Short

Apple’s Next iPhone Rumored To Debut On September 9th
Peter Short
Looks like a nice cycle of a round year;)
Peter Short

AncestryDNA And Google’s Calico Team Up To Study Genetic Longevity
Peter Short
I'm still fascinated by DNA though I favour pure chemistry what could be
Offered is for future gen…
Peter Short

U.K. Push For Better Broadband For Startups
Verg Matthews
There has to an email option icon to send to the clowns in MTNL ... the govt of India's service pro…
Verg Matthews

CrunchWeek: Apple Makes Music, Oculus Aims For Mainstream, Twitter CEO Shakeup
Peter Short
Noted Google maybe grooming Twitter as a partner in Social Media but with whistle blowing coming to…
Peter Short

CrunchWeek: Apple Makes Music, Oculus Aims For Mainstream, Twitter CEO Shakeup
Peter Short
Noted Google maybe grooming Twitter as a partner in Social Media but with whistle blowing coming to…
Peter Short