en
Join our growing site,
& meet dozens of singles today!

User blogs

Alex Mike

Twitter says it’s running a test with a small subset of iOS and Android users to “give people an accurate preview” of what an image will look like without the trial and error that process involves now. As it stands now, the platform automatically crops images to make them display in a more condensed way in the timeline, where users often scroll through without clicking on an image preview. But that approach has created some problems.

Today we’re launching a test to a small group on iOS and Android to give people an accurate preview of how their images will appear when they Tweet a photo. pic.twitter.com/cxu7wv3Khs

— Dantley Davis (@dantley) March 10, 2021

The biggest one, historically, is that Twitter’s algorithm that decides which part of an image gets the focus was demonstrated to have baked-in racial bias. The algorithm prioritized white faces over Black ones in its image preview, even cropping out the former president of the United States in one person’s tests.

Twitter’s automatic image handling is also hassle for photographers and artists, who generally prefer to have total control over how an image is presented. If the crop is off, that small misfire can be the difference between a photo attracting a ton of attention or getting ignored outright. It also ruins narrative tweets, as Twitter notes in its example of the tweet about a dog who is conspicuously absent from one of its crops.

It sounds like Twitter is also trying out showing more full images in the timeline. In tweets, Twitter’s Chief Design Officer Dantley Davis said that anyone testing the new image cropping system will find that most single image tweets in normal aspect ratios won’t get a crop at all, though super wide or super tall images will get a crop weighted around the center.

For photographers (present company included) tired of toggling between Instagram’s preference for portrait-oriented images and Twitter’s insistence on landscape crops, that’s good news too. As you can see in the sample image, the change could actually make Twitter a richer visual platform. That would likely mean more scrolling past images that take up multiple tweets worth of vertical space, but we’d be happy to trade the time spent clicking through images for a prettier Twitter timeline.

Alex Mike Mar 10 '21
Alex Mike

This morning Arist, a startup that sells software allowing other organizations to offer SMS-based training to staff, announced that it has extended its seed round to $3.9 million after adding $2 million to its prior raise.

TechCrunch has covered the company modestly before this seed-extension, noting that it was part of the CRV-backed Liftoff List, and reporting on some of its business details when it took part in a recent Y Combinator demo day.

Something that stood out in our notes on the company when it presented at the accelerator’s graduation event was its economics, with our piece noting that the startup “already [has] several big ticket clients and [says it] will soon be profitable.” Profitable is just not a word TechCrunch hears often when it comes to early-stage, high-growth companies.

So, when the company picked up more capital, we picked up the phone. TechCrunch spoke with the company’s founding team, including Maxine Anderson, the company’s current COO; Ryan Laverty, its president; and Michael Ioffe, its CEO, about its latest round.

According to the trio, Arist raised its initial $1.9 million around the time it left Y Combinator, a round that was led by Craft Ventures at a $15 million valuation. Following that early investment, the company’s business with large clients performed well, leading to it closing $2 million more last December. The founders said that the new funds were raised at a higher price-point than its previous seed tranche.

The second deal was led by Global Founders Capital.

The company’s enterprise adoption makes sense, as all large companies have regular training requirements for their workers; and as anyone who has worked for a megacorp knows, current training, while improved in recent years, is far from perfect. Arist is a bet that lots of corporate training — and the training that emanates from governments, nonprofits and the like — can be sliced into small pieces and ingested via text-message.

For that the company charges around $1,000 per month, minimum.

Arist did catch something of a COVID wave, with its founding team telling TechCrunch that pitching its service to large companies got easier after the pandemic hit. Many concerns better realized how busy their staff was when they moved to working from home, the trio explained, and with some folks suffering from limited internet connectivity, text-based training helped pick up slack.

We were also curious about how the startup onboards customers to the somewhat new text-based learning world; is there a steep learning curve to be managed? As it turns out, the startup helps new customers build their first course. And, in response to our question about the expense of that effort, the Arist crew said that they use freelancers for the task, keeping costs low.

Recently Arist has expanded its engineering staff, and plans to scale from around 11 people today to around 30 by the end of the year. And while Anderson, Laverty and Ioffe are based in Boston, they are hiring remotely. The startup serves global customers via a WhatsApp integration. So Arist should be able to scale its staff and customer base around the world effectively from birth. (This is the new normal, we reckon.)

What’s ahead? Arist wants to grow its revenues by 5x to 10x by the end of the year, hire, and might share if it wants to raise more capital around the end of the year.

Oh, and it partners with Twilio to some degree, though the group was coy on just what sort of discounts it may receive; the founding team merely noted that they liked the SMS giant and deferred further commentary.

All told, Arist is what we look for in an early-stage startup in terms of growth, vision and potential market scale — the startup thinks that 80% of training should be via SMS or Slack and Teams, the latter two of which are a hint about its product direction. But Arist feels a bit more mature financially than some of its peers, perhaps due to its price point. Regardless, we’ll check back in at the mid-point of the year and see how growth is ticking along at the company.

Alex Mike Mar 10 '21
Alex Mike

As the U.S. reportedly readies for retaliation against Russia for hacking into some of the government’s most sensitive federal networks, the U.S. is facing another old adversary in cyberspace: China.

Microsoft last week revealed a new hacking group it calls Hafnium, which operates in, and is backed by, China. Hafnium used four previously unreported vulnerabilities — or zero-days — to break into at least tens of thousands of organizations running vulnerable Microsoft Exchange email servers and steal email mailboxes and address books.

It’s not clear what Hafnium’s motives are. Some liken the activity to espionage — a nation-state gathering intelligence or industrial secrets from larger corporations and governments.

But what makes this particular hacking campaign so damaging is not only the ease with which the flaws can be exploited, but also how many — and how widespread — the victims are.

Security experts say the hackers automated their attacks by scanning the internet for vulnerable servers, hitting a broad range of targets and industries — law firms and policy think tanks, but also defense contractors and infectious disease researchers. Schools, religious institutions, and local governments are among the victims running vulnerable Exchange email servers and caught up by the Hafnium attacks.

While Microsoft has published patches, the U.S. federal cybersecurity advisory agency CISA said the patches only fix the vulnerabilities — and won’t close any backdoors left behind by the hackers.

CISA is aware of widespread domestic and international exploitation of Microsoft Exchange Server vulnerabilities and urges scanning Exchange Server logs with Microsoft's IOC detection tool to help determine compromise. https://t.co/khgCR2LAs0. #Cyber #Cybersecurity #InfoSec

— US-CERT (@USCERT_gov) March 6, 2021

There is little doubt that larger, well-resourced organizations have a better shot at investigating if their systems were compromised, allowing those victims to prevent further infections, like destructive malware or ransomware.

But that leaves the smaller, rural victims largely on their own to investigate if their networks were breached.

“The types of victims we have seen are quite diverse, many of whom outsource technical support to local IT providers whose expertise is in deploying and managing IT systems, not responding to cyber threats,” said Matthew Meltzer, a security analyst at Volexity, a cybersecurity firm that helped to identify Hafnium.

Without the budget for cybersecurity, victims can always assume they are compromised – but that doesn’t equate to knowing what to do next. Patching the flaws is just one part of the recovery effort. Cleaning up after the hackers will be the most challenging part for smaller businesses that may lack the cybersecurity expertise.

It’s also a race against the clock to prevent other malicious hackers from discovering or using the same vulnerabilities to spread ransomware or launch destructive attacks. Both Red Canary and Huntress said they believe hacking groups beyond Hafnium are exploiting the same vulnerabilities. ESET said at least ten groups were also exploiting the same server flaws.

Katie Nickels, director of intelligence at threat detection firm Red Canary, said there is “clearly widespread activity” exploiting these Exchange server vulnerabilities, but that the number of servers exploited further has been fewer.

“Cleaning up the initial web shells will be much easier for the average IT administrator than it would be to investigate follow-on activity,” said Nickels.

Microsoft has published guidance on what administrators can do, and CISA has both advice and a tool that helps to search server logs for evidence of a compromise. And in a rare statement, the White House’s National Security Council warned that patching alone “is not remediation,” and urged businesses to “take immediate measures.”

Patching and mitigation is not remediation if the servers have already been compromised. It is essential that any organization with a vulnerable server take immediate measures to determine if they were already targeted. https://t.co/HYKF2lA7sn

— National Security Council (@WHNSC) March 6, 2021

How that advice trickles down to smaller businesses will be watched carefully.

Cybersecurity expert Runa Sandvik said many victims, including the mom-and-pop shops, may not even know they are affected, and even if they realize they are, they’ll need step-by-step guidance on what to do next.

“Defending against a threat like this is one thing, but investigating a potential breach and evicting the actor is a larger challenge,” said Sandvik. “Companies have people who can install patches — that’s the first step — but figuring out if you’ve been breached requires time, tools, and logs.”

Security experts say Hafnium primarily targets U.S. businesses, but that the attacks are global. Europe’s banking authority is one of the largest organizations to confirm its Exchange email servers were compromised by the attack.

Norway’s national security authority said that it has “already seen exploitation of these vulnerabilities” in the country and that it would scan for vulnerable servers across Norway’s internet space to notify their owners. Slovenia’s cybersecurity response unit, known as SI-CERT, said in a tweet that it too had notified potential victims in its internet space.

Sandvik said the U.S. government and private sector could do more to better coordinate the response, given the broad reach into U.S. businesses. CISA proposed new powers in 2019 to allow the agency to subpoena internet providers to identify the owners of vulnerable and unpatched systems. The agency just received those new powers in the government’s annual defense bill in December.

“Someone needs to own it,” said Sandvik.


Send tips securely over Signal and WhatsApp to +1 646-755-8849. You can also send files or documents using SecureDrop.

Alex Mike Mar 10 '21
Alex Mike

In recent years, the tech and venture scene in Latin America has been growing at an accelerated pace. More global investors are backing startups in the region and certain sectors in particular, such as fintech, are exploding.

Global investors are not only pouring money into companies. They’re also investing in funds.

Today, Volpe Capital  announced the $80 million first close of its fund targeting high growth technology investments in Latin America. Notably, Japanese investment conglomerate SoftBank, BTG and Banco Inter affiliates are anchor investors in the new fund, which is targeting aggregate commitments of $100 million with a hard cap of $150 million. Volpe also received a “large anchor investment” from its management team.

Andre Maciel, Gregory Reider and Milena Oliveira are the fund’s founding partners, and are based in Sao Paulo, Brazil. Notably, Maciel is the former managing partner at SoftBank’s $5 billion Latin America-focused innovation fund. He launched Volpe in 2019 primarily with SoftBank’s backing. Reider formerly invested at Warburg Pincus.

Maciel said the fund’s raise was “significantly oversubscribed with firm commitments” and believed to be “among the best capital raises for a first-time fund in its asset class in Latin America.”

Volpe Capital plans to invest in about 15 companies over a two and half year time span, according to Maciel, who expects its average check size to be around $5 billion.

So far, it’s backed Uol Edtech, a subsidiary of Grupo Uol that aims to redefine the digital learning experience in Brazil. 

“We are in no rush,” Maciel told TechCrunch. “We are happy with our first deal and will take capital preservation in consideration. We believe markets are hot now and plan on taking advantage of the cycle by being patient.”

The fund’s strategy is to go after the companies that are not actively raising capital.

We want to invest in companies that are not necessarily raising capital when we approach them,” Maciel said.

The fund views itself as agnostic regarding stage and primary versus secondary.

It is seeking to back early-stage companies with less than $50 million in valuation as well as some later stage, high growth companies. The fund’s first investment — Uol Edtech — falls in the latter category with EBITDA margins above 30%, according to Maciel.

Volpe plans to avoid capital intensive industries, even if related to tech.

“Those are more suitable to investors with deeper pockets than Volpe,” Maciel said. 

Instead it’s eyeing edtech, healthtech, software and fintech investments (that are not credit-related).

“We like sectors that are prone for disruption in Latin America and that require local customization,” Maciel said. “Given the stage of the vc/growth industry in Latin America, we believe it is better to be a generalist.”

SoftBank International CEO Marcelo Claure describes Maciel as one of his “amazing founding partners for SoftBank in Latin America.”

“We are very happy to be one of Volpe’s anchor investors and look forward to continuing our relationship with them,” he added in a written statement.

Another anchor investor has a SoftBank tie. João Vitor Menin, CEO of Inter, a publicly traded fintech platform in Brazil with a market cap of over  $7 billion, points out that Maciel led an investment in Inter’s platform through SoftBank. He also “made valuable contributions” as a board member, according to Menin.

Alex Mike Mar 10 '21
Pages: « Previous ... 199 200 201 202 203 ... Next »
advertisement

Advertisement

advertisement
Password protected photo
Password protected photo
Password protected photo