article thumbnail

RxAll grabs $3.15M to scale its drug checking and counterfeiting tech across Africa

TechCrunch

Some technologies have helped deal with this menace; for instance, radio frequency identification, which works by assigning serial numbers to containers of each product. More modern approaches are being adopted these days, which is the case of RxAll , a startup using deep technology to provide quality medication to patients.

article thumbnail

Boston offers a world of advantages for startup founders

TechCrunch

5 investors discuss Boston’s resilient tech ecosystem Boston’s university-to-startup pipeline defies downturn to grow and diversify In order to build a startup culture, a city or region needs some key elements in place – like an innovation engine to drive startup ideas. It also has a long history of innovation and a rich tech legacy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Chernobyl’s lessons for critical-infrastructure cybersecurity

The Parallax

The organization offers aid to communities decimated by industrial accidents, and that includes caring for the Chernobyl dogs , many of whom die young due to malnourishment, disease, predators, harsh weather, a lack of shelter, and Chernobyl’s notorious environmental contamination. There were at least two other cybersecurity incidents at U.S.

article thumbnail

Accelerating VMware’s growth

CIO

In Broadcom’s case, it has been through a combination of organic growth and growth through acquisition, which has created Broadcom today – a company built from a heritage of American technology pioneers such as AT&T Bell Labs and Hewlett Packard, among others. The core technology to do this already exists at VMware.

article thumbnail

Broadcom’s Approach Towards Delivering Customer Value

CIO

Instead, our entire business model is grounded in the belief that we can create innovative solutions that will deliver on our customers’ needs over time and progress through multiple generations of technology. Again, at Broadcom we believe our technology must evolve over time – our investment priorities are determined with that in mind.

Security 214
article thumbnail

Taking the risk out of the semiconductor supply chain

CIO

Over the past few years, the tech industry has been feeling the impact of unprecedented disruptions along the semiconductor supply chain. Yet, while the industry’s cyclicality may never change, a more secure and reliable system to safeguard and diversify the global supply chain is possible.

article thumbnail

Book Review: “The Perfect Weapon”

Palo Alto Networks

Cybersecurity Canon Candidate Book Review: “The Perfect Weapon: War, Sabotage and Fear in the Cyber Age” by David Sanger (Published June 19, 2018). Book reviewed by: U.S. Bottom Line: I recommend this book for the Cybersecurity Canon Hall of Fame. Innovation in technology is changing that argument.