The large scale WannaCry (WannaCrypt) ransomware attack that has crippled over 100,000 computer systems, primarily in health care, is a reminder of just how vulnerable the world’s computing infrastructure really is. But what’s most amazing about the attack is not its scale or the speed with which it spread, but how easily it could have been avoided.
First the good news. If you get a signed term sheet with a reputable angel or venture investor, there is a very good chance you will get a deal done. Unless, of course, you don’t.
Probably the most common element of every term sheet is the provision that states unequivocally that by signing the term sheet neither party is obligating itself to enter into an investment transaction, whether on the terms reflected in the term sheet or otherwise. Still, if the parties do reach agreement on a term sheet, there usually is a deal made, and usually on terms mostly consistent with the term sheet. That said, herewith a look at the most common reasons a “done term sheet” does not lead to a “done deal.”
Dinner is set but the phone rings, and when you pick up it isn’t a friend, or someone you know, sometimes it’s not even a person. It’s a robocall.
Robocalls for years have managed to catch people at the most inopportune moments, and the shift from landlines to mobile phones hasn’t seemed to prevent all those fake tax collectors and mortgage vendors from calling in.
Tech companies and app developers everywhere are breathing a sigh of relief after Monday’s major Supreme Court ruling on a topic that’s close to their hearts: patents. More specifically, patent lawsuits — a rising number of which analysts say are bogus and threaten to strangle new start-ups and inventions before they have a chance to succeed.
This isn’t my usual biotech beat, but compromising my computer can certainly affect the beat and I don’t like that. Over the last week, a nasty ransom-ware program infiltrated hundreds of thousands computer in 150 countries. It affected 20% of hospitals in the UK and much more.
I don’t understand these misfits who do this; their effects can range from severe inconvenience to mass casualties. I know of a few professors who had their life’s academic work lost due to ransomware. And what about the patients in the UK hospitals whose telemetry suddenly stopped working while they were in intensive care?
There’s a huge court case you need to hear about. It might not be on your radar yet because, frankly, some of it gets pretty technical. But the outcome is likely to have enormous repercussions for online privacy, net neutrality and the economy.
Did you feel a sudden loss of Internet freedom in February 2015? That’s when the Federal Communications Commission imposed net neutrality rules that prevent Internet service providers from discriminating against websites and other online services. And that’s when Americans lost their Internet freedom—according to the current FCC chairman, Ajit Pai.
Blockchain networks tend to support principles, like open access and permissionless use, that should be familiar to proponents of the early internet. To protect this vision from political pressure and regulatory interference, blockchain networks rely on a decentralized infrastructure that can’t be controlled by any one person or group. Unlike political regulation, blockchain governance is not emergent from the community. Rather, it is ex ante, encoded in the protocols and processes as an integral part of the original network architecture. To be a part of a community supporting a blockchain is to accept the rules of the network as they were originally established.
Tech companies are pushing the Federal Communications Commission not to water down its rules on net neutrality, teeing up a confrontation between Silicon Valley and Washington as the nation’s top telecom regulator mulls a plan to undo the Obama administration’s regulations for Internet providers.
We live in a cyber-vulnerable world – a world governed by data. Data encapsulates almost every aspect of our personal and public life. It is heavily shared, distributed, stored and accessed, and it is constantly at risk. Recent mega-hacks, such as the ones on Target, Yahoo, and Ashley Madison, among others, demonstrate that leaking of personal information and misuse of our data are inevitable in a world that is becoming increasingly more connected and data-centric.