As facial recognition technology becomes pervasive, Microsoft (yes, Microsoft) issues a call for regulation

Technology companies have a privacy problem. They’re terribly good at invading ours and terribly negligent at protecting their own.

And with the push by technologists to map, identify and index our physical as well as virtual presence with biometrics like face and fingerprint scanning, the increasing digital surveillance of our physical world is causing some of the companies that stand to benefit the most to call out to government to provide some guidelines on how they can use the incredibly powerful tools they’ve created.

That’s what’s behind today’s call from Microsoft President Brad Smith for government to start thinking about how to oversee the facial recognition technology that’s now at the disposal of companies like Microsoft, Google, Apple and government security and surveillance services across the country and around the world.

In what companies have framed as a quest to create “better,” more efficient and more targeted services for consumers, they have tried to solve the problem of user access by moving to increasingly passive (for the user) and intrusive (by the company) forms of identification — culminating in features like Apple’s Face ID and the frivolous filters that Snap overlays over users’ selfies.

Those same technologies are also being used by security and police forces in ways that have gotten technology companies into trouble with consumers or their own staff. Amazon has been called to task for its work with law enforcement, Microsoft’s own technologies have been used to help identify immigrants at the border (indirectly aiding in the separation of families and the virtual and physical lockdown of America against most forms of immigration) and Google faced an internal company revolt over the facial recognition work it was doing for the Pentagon.

Smith posits this nightmare scenario:

Imagine a government tracking everywhere you walked over the past month without your permission or knowledge. Imagine a database of everyone who attended a political rally that constitutes the very essence of free speech. Imagine the stores of a shopping mall using facial recognition to share information with each other about each shelf that you browse and product you buy, without asking you first. This has long been the stuff of science fiction and popular movies – like “Minority Report,” “Enemy of the State” and even “1984” – but now it’s on the verge of becoming possible.

What’s impressive about this is the intimation that it isn’t already happening (and that Microsoft isn’t enabling it). Across the world, governments are deploying these tools right now as ways to control their populations (the ubiquitous surveillance state that China has assembled, and is investing billions of dollars to upgrade, is just the most obvious example).

In this moment when corporate innovation and state power are merging in ways that consumers are only just beginning to fathom, executives who have to answer to a buying public are now pleading for government to set up some rails. Late capitalism is weird.

But Smith’s advice is prescient. Companies do need to get ahead of the havoc their innovations can wreak on the world, and they can look good while doing nothing by hiding their own abdication of responsibility on the issue behind the government’s.

“In a democratic republic, there is no substitute for decision making by our elected representatives regarding the issues that require the balancing of public safety with the essence of our democratic freedoms. Facial recognition will require the public and private sectors alike to step up – and to act,” Smith writes.

The fact is, something does, indeed, need to be done.

As Smith writes, “The more powerful the tool, the greater the benefit or damage it can cause. The last few months have brought this into stark relief when it comes to computer-assisted facial recognition – the ability of a computer to recognize people’s faces from a photo or through a camera. This technology can catalog your photos, help reunite families or potentially be misused and abused by private companies and public authorities alike.”

All of this takes on faith that the technology actually works as advertised. And the problem is, right now, it doesn’t.

In an op-ed earlier this month, Brian Brackeen, the chief executive of a startup working on facial recognition technologies, pulled back the curtains on the industry’s not-so-secret huge problem.

Facial recognition technologies, used in the identification of suspects, negatively affects people of color. To deny this fact would be a lie.

And clearly, facial recognition-powered government surveillance is an extraordinary invasion of the privacy of all citizens — and a slippery slope to losing control of our identities altogether.

There’s really no “nice” way to acknowledge these things.

Smith, himself admits that the technology has a long way to go before it’s perfect. But the implications of applying imperfect technologies are vast — and in the case of law enforcement, not academic. Designating an innocent bystander or civilian as a criminal suspect influences how police approach an individual.

Those instances, even if they amount to only a handful, would lead me to argue that these technologies have no business being deployed in security situations.

As Smith himself notes, “Even if biases are addressed and facial recognition systems operate in a manner deemed fair for all people, we will still face challenges with potential failures. Facial recognition, like many AI technologies, typically have some rate of error even when they operate in an unbiased way.”

While Smith lays out the problem effectively, he’s less clear on the solution. He’s called for a government “expert commission” to be empaneled as a first step on the road to eventual federal regulation.

That we’ve gotten here is an indication of how bad things actually are. It’s rare that a tech company has pleaded so nakedly for government intervention into an aspect of its business.

But here’s Smith writing, “We live in a nation of laws, and the government needs to play an important role in regulating facial recognition technology. As a general principle, it seems more sensible to ask an elected government to regulate companies than to ask unelected companies to regulate such a government.”

Given the current state of affairs in Washington, Smith may be asking too much. Which is why perhaps the most interesting — and admirable — call from Smith in his post is for technology companies to slow their roll.

We recognize the importance of going more slowly when it comes to the deployment of the full range of facial recognition technology,” writes Smith. “Many information technologies, unlike something like pharmaceutical products, are distributed quickly and broadly to accelerate the pace of innovation and usage. ‘Move fast and break things’ became something of a mantra in Silicon Valley earlier this decade. But if we move too fast with facial recognition, we may find that people’s fundamental rights are being broken.”


Source: Tech Crunch

Google’s Apigee teams up with Informatica to extend its API ecosystem

Google acquired API management service Apigee back in 2016 but it’s been pretty quiet around the service in recent years. Today, however, Apigee announced a number of smaller updates that introduce a few new integrations with the Google Cloud platform, as well as a major new partnership with cloud data management and integration firm Informatica that essentially makes Informatica the preferred integration partner for Google Cloud.

Like most partnerships in this space, the deal with Informatica involves some co-selling and marketing agreements, but that really wouldn’t be all that interesting. What makes this deal stand out is that Google is actually baking some of Informatica’s tools right into the Google Cloud dashboard. This will allow Apigee users to use Informatica’s wide range of integrations with third-party enterprise applications while Informatica users will be able to publish their APIs through Apigee and have that service manage them for them.

Some of Google’s competitors, including Microsoft, have built their own integration services. As Google Cloud director of product management Ed Anuff told me, that wasn’t really on Google’s roadmap. “It takes a lot of know-how to build a rich catalog of connectors,” he said. “You could go and build an integration platform but if you don’t have that, you can’t address your customers needs.” Instead, Google went to look for a partner who already has this large catalog and plenty of credibility in the enterprise space.

Similarly, Informatica’s senior VP and GM for big data, cloud and data integration Ronen Schwartz noted that many of his company’s customers are now looking to move into the cloud and this move will make it easier for Informatica’s customers to bring their services into Apigee and open them up for external applications. “With this partnership, we are bringing the best of breed of both worlds to our customers,” he said. “And we are doing it now and we are making it available in an integrated, optimized way.”


Source: Tech Crunch

Ransomware technique uses your real passwords to trick you

A few folks have reported a new ransomware technique that preys upon corporate inability to keep passwords safe. The notes – which are usually aimed at instilling fear – are simple: the hacker says “I know that your password is X. Give me a bitcoin and I won’t blackmail you.”

Programmer Can Duruk reported getting the email today.

The email reads:

I’m aware that X is your password.

You don’t know me and you’re thinking why you received this e mail, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google) .

BTC Address: 1Dvd7Wb72JBTbAcfTrxSJCZZuf4tsT8V72
(It is cAsE sensitive, so copy and paste it)

Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.

To be clear there is very little possibility that anyone has video of you cranking it unless, of course, you video yourself cranking it. Further, this is almost always a scam. That said, the fact that the hackers are able to supply your real passwords – most probably gleaned from the multiple corporate break-ins that have happened over the past few years – is a clever change to the traditional cyber-blackmail methodology.

Luckily, the hackers don’t have current passwords.

“However, all three recipients said the password was close to ten years old, and that none of the passwords cited in the sextortion email they received had been used anytime on their current computers,” wrote researcher Brian Krebs. In short, the password files the hackers have are very old and outdated.

To keep yourself safe, however, cover your webcam when not in use and change your passwords regularly. While difficult, there is nothing else that can keep you safer than you already are if you use two-factor authentication and secure logins.


Source: Tech Crunch

As product development incorporates more feedback, development toolkit productboard raises $8M

Since its debut on the TechCrunch Disrupt stage in September 2016, demand for a service like productboard, which gives companies a wholistic view of product development and encourages input from across an organization, has only gotten more acute, according to company chief executive Hubert Palan.

Now, with an $8 million commitment from Kleiner Perkins Caufield & Byers with participation from Index Ventures, Credo Ventures, Reflex Capital and Rockaway Capital, alongside a host of angel investors, the company is looking to expand its sales and marketing and product development efforts to bring the benefits of its toolkit to more companies.

In the two years since TechCrunch last saw productboard, the company’s user base has grown significantly, from 100 customers in 2016 to over 1,200 companies today spanning a broad range of industries.

For Palan, the company’s growing user base (which now includes medical device companies, academic publishers, and news organizations in addition to traditional digital product developers) is proof of a new demand in the market for more inputs around product design and development.

“Every company is now a digital company,” Palan said. “So every company needs to worry about digital product design.”

The company’s toolkit still includes features that allow it to hoover up information from customer support tickets, emails, input from sales teams and user research, to organize and prioritize features that need to be built.

But now, the company’s services allow anyone in an organization (with the proper access) to provide feedback and track the process of product development.

“Product Excellence is no longer optional,”said  productboard Palan, in a statement. “These days competitors arise in a matter of months, not years. Customer loyalty is declining and users will happily switch to a competing solution that offers a better product experience. It’s more critical than ever to get the right products to market faster.”

As part of the financing, Kleiner Perkins’ new general partner, Ilya Fushman, will join the company’s board of directors. Fushman who was integral in locking down productboard’s seed financing when he was at Index Ventures, has a long product history from his time at dropbox, and is a welcome addition to the company’s board, Palan said.

While Fushman’s imprimatur is one sign of the company’s viability, the investment from strategic angel investors like Intercom co-founders, Eoghan McCabe and Des Traynor; Clark Valberg, the co-founder of InVision; and Larry Gadea, the founder of Envoy, is still another.

“Product management is a core function in every technology organization, but few dedicated tools exist for it,” said Fushman, in a statement. 


Source: Tech Crunch

Intel acquires eASIC to take its chipsets deeper into IoT and other future technologies

In the wake of Broadcom failing to complete its takeover of Qualcomm, Intel is buying another chip company as it works on adjusting its own its business to fit the next generation of computing. Today, the company is announcing that it is acquiring eASIC, a fabless semiconductor company that makes customisable eASIC chips for use in wireless and cloud environments.

Financial terms of the deal are not being disclosed, as the price paid will not be material to Intel. eASIC has 120 employees, was founded in 1999 and has counted Khosla, Kleiner Perkins and Seagate among its investors, raising $149 million in total. It had been recapitalised in 2012 and so, in its last round, in November 2017, it was valued at around $110 million post-money, according to PitchBook, to give you a basic idea of a possible pricing ballpark.

eASIC’s technology and team will become a part of Intel’s Programmable Solutions Group (PSG), which Intel created after it acquired Altera in 2015 for $16.7 billion. Altera is a producer of FPGA chips, and the idea will be to complement those with eASIC’s technology, said Dan McNamara, corporate vice president and GM of the PSG division:

“We’re seeing the largest adoption of FPGA ever because of explosion of data and cloud services, and we think this will give us a lot of differentiation versus the likes of Xilinx,” which is one of Intel’s biggest competitors in FPGA. “We’ll be able to offer an end-to-end lifecycle that fits today’s changing workloads and infrastructure. No one on the marketplace will have this.” FPGA designs allow companies to quickly modify chip architectures, but they also require a lot of power. eASIC chips are more efficient, and they can be configured quickly from the outset (but cannot be modified).

The idea will be to offer eASIC as a transition to customers of Intel’s (and its competitors) who are already using FPGA and looking for a migration to the next thing. Applications that might need eASIC power could range from baseband and radio heads in 4G and 5G networks as well as applications based in the cloud that require heavy data computations, for example AI and video services, or financial risk analysis.

Intel and eASIC have actually been working together since 2015, when the latter company started to provide its flavor of ASIC designs to Intel for its Xeon chips. McNamara confirmed that Intel never invested in eASIC but it had considered the idea “multiple” times, including recently, instead of acquiring. 

However, ultimately, owning the company outright made more sense for both sides, he said.

“Strategic partnerships are good but a combination much better,” he said, “because it brings the investment capability to the next node. When you are privately held and venture-backed you can be challenged by the investment needed for the next phase of innovation.” He also noted the “key talent” and IP — including multiple patents — that Intel will be getting in the deal.

eASIC itself has felt the pinch of being a smaller chip company: it tried to file to go public in 2015 to raise $75 million but cancelled its IPO at a time when the public markets were freezing up for listings of startups. Its move to Intel is part of what’s been a long-term consolidation in the chip industry, which gets more value out of economies of scale and selling end-to-end services to larger customers.

“The eASIC team has developed and deployed a truly innovative structured ASIC product. The marriage of the eASIC technology with IP and capabilities of Intel will allow the ubiquitous deployment of this proven structured ASIC product into a wide breadth of exciting end applications and markets. This is the perfect time to usher in this new chapter for eASIC,” said Ronnie Vasishta, president and CEO of eASIC, in a statement.

While many in the technology and communications industries believe that areas like the Internet of Things and 5G — and the infrastructure, hardware and related services powering them — will be huge businesses, today they remain relatively small. In Intel’s most recent quarterly earnings reported in April, PSG had revenues of $498 million — up 17 percent on a year ago but still the smallest division within the company’s data-centric business units. As a point of comparison, Intel’s PC-centric Client Computing Division made $8.2 billion. But CCG only grew three percent over a year ago, and that stagnation and slowdown in Intel’s business is one reason why it needs to buy companies like eASIC and focus on future technologies.

eASIC’s customers include a number of vendors that work in the communications industry, including Huawei, NEC, Violin Memory, Seagate, Microsoft, Flir Systems and Arm. After it added a longtime Apple vet to its board several years ago, it was speculated that Apple might also have a tie to the company, although that has never been confirmed.

The deal comes at a key time for Intel, which in addition to its over-reliance on revenues from its legacy business, has been facing delays on the production of 10nm chips, and then unexpectedly lost its CEO Brian Krzanich in June when he resigned over inappropriate behavior. But Robert Swan is in the role now on an interim basis, and McNamara says the company is going full-steam ahead on its previous strategy.

“The executive team is fully focused on the execution of our strategy and this is a good example of it,” he said.


Source: Tech Crunch

Microsoft launches new wide-area networking options for Azure

Microsoft is launching a few new networking features today that will make it easier for businesses to use the company’s Azure cloud to securely connect their own offices and infrastructure using Azure and its global network.

The first of these is the Azure Virtual WAN service, which allows businesses to connect their various branches to and through Azure. This basically works like an airline hub and spoke model, where Azure becomes the central hub through which all data between branches flows. The advantage of this, Microsoft argues, is that it allows admins to manage their wide-area networks from a central dashboard and, of course, that it makes it easy to bind additional Azure services and appliances to the network. And with that, users also get access to all of the security services that Azure has to offer.

One new security service that Microsoft is launching today is the Azure Firewall, a new cloud-native security service that is meant to protect a business’s virtual network resources.

In addition to these two new networking features, Microsoft also today announced that it is expanding to two new regions its Azure Data Box service, which is basically Microsoft’s version of the AWS Snowball appliances for moving data into the cloud by loading it onto a shippable appliance: Europe and the United Kingdom (and let’s not argue about the fact that the U.K. is still part of Europe). There is also now a “Data Box Disk” option for those who don’t need to move petabytes of data. Orders with up to five of those disks can hold up to 40 terabytes of data and are currently in preview.


Source: Tech Crunch

Space tech has outpaced space law, and we’re at risk of killing innovation

“Disruption” is a term (over)used in the technology world to describe some development or product that is inherently good. The formal definition of the term, however, is at odds with its casual use: a disruption is a ‘disturbance or problem that interrupts an event, activity, or process.’ Right now, space tech is currently experiencing both flavors of disruption.

Reliable estimates indicate that, within the next 5-7 years, the inhabitants of the Earth will launch more satellites into space than have been launched in the history of our planet up until now. This is a disruption in the best sense, however, there’s a serious problem: we’re at a very real risk of crushing our own excitement and stalling our progress towards the stars. Space policy hasn’t been high on our government’s to-do list, and this unfortunate regulatory neglect means that today’s most innovative companies’ plans are being disrupted by stuffy, antiquated rules and regulations.

Image: Bryce Durbin/TechCrunch

Existing space policy

For those who haven’t recently brushed up on existing space policy, a widely adopted international agreement called the “Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space including the Moon and Other Celestial Bodies” was negotiated, signed, and drafted in 1967 by the United Nations. Commonly referred to as The Outer Space Treaty, the agreement dictates that each nation be responsible for all and any of the space activities originating from their nation — whether they’re conducted by citizens, companies, or the government itself. Each must also maintain full jurisdiction and control over all space objects originating from their country.

It is noteworthy that, at the time the treaty was signed, nobody could fathom that commercial companies might want anything to do with outer space, let alone launch their own satellites

Permits… and the FCC

OK, so the US government is responsible for our space activity and space objects, right? That means it somehow needs to know — and track — anyone and anything that goes up, and this is no small task. It’s not like we can perform mandatory vehicle inspections when satellites cross the Karman Line, marking the border between atmosphere and space. So how do we track them? By issuing permits before they launch. And while we’re talking about word definitions, ‘permit’ loosely translates to ‘huge government bureaucratic morass.’

The current system in place involves getting permission from the FCC, which is strange because when you think ‘satellites’, I highly doubt that the FCC comes to top-of-mind as the appropriate expert agency. The logic goes that if you’re planning to launch an object into space, then surely you’re planning to communicate with it somehow — whether by beaming up commands or beaming down data — and this requires the use of radio frequencies, which are coordinated by the FCC. If you’re going to be making a call to the FCC anyway, then this might be an appropriate place to conduct a ‘vehicle inspection’ and put a permit sticker on the back of your satellite.

The problem is that the FCC now becomes the gatekeeper for all things related to satellites, extending to many checkboxes that have nothing to do with radio frequencies. For instance, the FCC requires all permit applicants to prove that their satellite won’t cause injury or harm when/if it re-enters the Earth’s atmosphere. You may not be surprised to learn that such a calculation involves more than a couple of dubious assumptions and some fuzzy math, and perhaps another agency (ahem, NASA?) might be better suited to checking this.

Among the many checkboxes, the FCC also requires launch permit applicants to prove that their satellites will be ‘trackable’ in space so that they can be monitored ostensibly, to foresee potential collisions with other satellites. It was this requirement that disrupted satellite manufacturer Swarm Technologies, who applied for FCC permission to launch their tiny SpaceBee satellites to disrupt the Internet of Things from space (see what I did there with ‘disruption?’). Now, these satellites are smaller than pretty much anything ever put into orbit — an enviable innovation! — and so the FCC determined that they might not show up on the usual radars used to track satellites. Permit denied. Which is confusing, since smaller satellites have been permitted and launched by the same agency.

Consequences for startups

The logical path forward is to appear before the FCC with hat in hand and appeal for a legitimate permit. This is the way things have been done in the past, when it took 10 years for giant aerospace companies to build a satellite; there was plenty of time to wait for bureaucracy.  But put yourself in the seat of a disruptive startup who is building an entire small satellite in a few months: your company is consuming venture cash at a steady burn rate towards zero and you need to demonstrate your tech in space to get your next pile of cash. If you take a number in the FCC lobby and wait your turn, then the likely outcome is that your permit will be delivered to the address of a bankrupt company.

Faced with the prospect of this, there’s no doubt that ambitious and bold startups will be tempted to push the boundaries and see just how severe the penalties will be for operating sans permit (and in fact, that seems to be the path taken by the Swarm team). At this point, nobody really knows what the real consequences are. In the worst case, they will destroy the entire business of the startup that dares, but then bankruptcy might have been pretty much guaranteed anyway, based on the undetermined time of the FCC appeal process.  An interesting alternative exists: a company can try to export their satellite to another country and try their hand in that country’s space permitting process. Needless to say, federal regulations that encourage US companies to take their tech offshore are not how we want to do business, and oh-by-the-way satellite export laws are such a mess they make the launch-permitting process look like buying an entrance pass to a national park in comparison.

Archinaut, a robotic system developed by Made in Space, can manufacture, assemble and repair satellites, spacecraft or other large equipment in zero gravity.

Fixing a broken system for the new space era

How do we fix a broken system? You can bet we won’t alter international treaties any time soon, so it’s safe to assume we’re stuck with what’s set forth by The Outer Space Treaty. One foreseeable option by the government would be to put stronger teeth into existing policies and laws, so that devastating penalties are issued to any renegade companies. The effect of this would be predictable: emerging startups with exciting new ideas will be stifled, while the corporate giants of the space industry’s old guard will remain untouched. On the other hand, the government could choose to look the other way and merely slap wrists, but this could invite even more dangerous and egregious violations down the line that would prove hazardous to the responsible space actors.

Because of the Outer Space Treaty, the US will always be required to monitor and track all satellites from our nation. Concepts like the space-equivalent of the FAA have been proposed, as have mandatory radio-beacons on each satellite, self-identifying them like ships at sea.  So far, this is all just chatter and nothing has been enacted. In the meantime, the New Space renegades will continue to explore the boundaries by pushing them, while the old guard will express outrage over the insolence of the disrespectful youngsters. It may be that the only solution is for the new explorers to self-organize and self-police to bring order to the chaos.

In any case, we are in dire need of a forward-thinking approach to space policy and regulation that includes and goes beyond just Earth-orbiting satellites. If our government continues to ignore the need for comprehensive space policy that is expandable to pervasive commercial activity, it’s just a matter of time before a major civil, commercial, or international dispute occurs in space that could prove legally catastrophic.


Source: Tech Crunch

Catch the next wave of tickets to the TechCrunch Summer Party at August Capital

Our 13th annual TechCrunch Summer Party at August Capital takes place on July 27, and we’re happy to announce we’ve just released a fourth batch of tickets to this fun Silicon Valley tradition. These tickets have been moving at a brisk pace, so if you’d like to join us in Menlo Park, be sure to buy your ticket today.

Come and spend a relaxing evening of cocktails and conversation with your peers. Celebrate your shared entrepreneurial spirit in a beautiful setting (gotta love that deck) at August Capital. Meet and greet new, interesting and influential people — who might one day make your dreams come true.

We love to tell the story of when Box founders Aaron Levie and Dylan Smith met one of their first investors, DFJ, back when our founder, Michael Arrington held these TechCrunch parties in his Atherton backyard. You just never know who you’ll meet at the TechCrunch Summer Party at August Capital.

Check out the party particulars:

  • July 27, 5:30 p.m. – 9:00 p.m.
  • August Capital in Menlo Park
  • Ticket price: $95

If you’re a founder of an early-stage startup, you might consider another way to network at this event. Get a Summer Party demo table and showcase your early-stage startup at this legendary soiree. In addition to the demo table, you get four attendee tickets. Learn more about demo tables here.

Food, drink, conversation, possibility — it’s all on the menu at the TechCrunch Summer Party. And it wouldn’t be a TechCrunch event without door prizes, including TechCrunch swag, Amazon Echos and tickets to Disrupt San Francisco 2018.

Tickets are available on a strictly first-come, first-served basis, so don’t put it off any longer — buy your ticket today.


Source: Tech Crunch

Real estate platform Nestio raises $4.5 million

Real estate platform Nestio is getting new funding as it continues to expand its footprint beyond New York City into other large U.S. markets. The startup’s software gives real estate owners and managers a hub to handle things like leasing and marketing.

The round, which they announced today, was led by Camber Creek and Trinity Ventures, with participation from other real estate firms, including Rudin Ventures, Currency M, The Durst Organization, LeFrak Ventures and Torch Venture Capital. The startup has raised around $16 million to date.

Nestio is building up its unit count in new markets, including Boston, Chicago, Houston and Dallas, and is seeking to expand operations with existing customers in NYC. The startup says that it’s grown the amount of units on its platform by 250 percent in the past 12 months.

“We now have hundreds of thousands of listings on the platform that people are now managing,” Nestio CEO Caren Maio told TechCrunch. “Part of that growth is net new logos, but also expansion. So we’ve seen a lot of growth — particularly in New York — although I think the same behavior will replicate itself once we have some longevity in some of those other cities.”

The company says they will use this new capital and strategic partnerships to “deliver advanced leasing and marketing solutions even faster.”


Source: Tech Crunch

YouTube launches new tool for finding and removing unauthorized re-uploads

Re-uploading videos on YouTube is a favorite of scammy channels that try to profit from other people’s work. Copyright owners already have a number of ways to protect their content, but today, the service is introducing a new tool that automatically scans every newly uploaded video to check if it’s a re-upload of an existing one or “very similar” to a video that’s already on the site.

It’s worth noting that this new tool, dubbed “copyright match,” won’t work for clips, only full videos. YouTube also notes that it’s important that the creator is the first person to upload the video because the time of the upload is how it shows matches.

When the tool finds a match, the creator can choose what to do. The options here are either doing nothing and feeling flattered that somebody would care about your mediocre cat video, get in touch with the other creator and have a nice chat about what happened or ask YouTube to remove the offending video (which is probably what most people will opt for).

Now a lot of this sounds like YouTube’s existing Content ID program, and while it uses very similar technology underneath, the company stresses that this tool is explicitly meant to recognize unauthorized re-uploads. Content ID, however, is mostly meant for the copyright owners of music and music videos, trailers and recordings of performances.

Starting next week, the new copyright match tool will roll out to all creators with more than 100,000 subscribers. The company plans to roll it out to a wider base of users over the next few months.


Source: Tech Crunch