25.03.2024
The unveiling of Zoom Workplace by a leading video conferencing company introduces an innovative "AI-powered collaborative platform" integrating its AI virtual assistant alongside a suite of novel features aimed at enhancing team productivity. Leveraging its existing AI Companion, Zoom Workplace streamlines meeting organization and summarization tasks, empowering users with its Ask AI Companion function to effectively prepare for and review meetings by aggregating and analyzing data from various Zoom applications such as Meetings, Mail, Team Chat, Notes, and Docs. Notably, the platform seamlessly integrates with third-party applications like Microsoft 365 and Google Workspace, further broadening its functionality and utility for users.
19.03.2024
Microsoft has acquired Inflection, a conversational AI startup that had previously secured $1.3 billion in funding to develop what it dubbed "more personal AI," with Microsoft as the lead investor. Inflection's vision centered on a conversational AI capable of engaging across multiple platforms in a natural manner, retaining memory of users and past interactions for enhanced personalization and utility. Despite the promising concept, their AI, Pi, fell short of expectations. Despite significant investment, Inflection struggled to keep pace with the rapid advancements in capabilities and services offered by competitors such as OpenAI (also backed by Microsoft), Google's Gemini, which benefited from its dominance in search, and Anthropic, focusing on practical applications where AI excels.
16.03.2024
LinkedIn, the social platform owned by Microsoft renowned for networking, professional development, and recruitment, boasting over 1 billion users, is venturing into gaming to enhance user engagement. Introducing a new gaming experience, LinkedIn aims to inject fun into its platform, foster deeper connections, and encourage meaningful conversations. Drawing inspiration from the viral success of puzzle games like Wordle, LinkedIn's initial forays into gaming include titles such as “Queens”, “Inference”, and “Crossclimb”. One intriguing aspect of this venture involves organizing player scores by workplaces, potentially ranking companies based on these scores, thus adding a competitive element to the professional networking arena.
15.03.2024
Cloud security firm Zscaler has completed its acquisition of cybersecurity startup Avalor for $310 million, aiming to enhance its platform with a range of new capabilities including streamlined security incident reporting, incident mitigation, asset discovery, data classification, and security policy generation. Avalor serves as a central repository for cybersecurity assets, controls, identities, vulnerabilities, bugs, and various data points, enabling security teams to aggregate, normalize, de-duplicate, and track risk data from discovery to remediation. While similar startups like Securiti and Dig Security address comparable challenges, Avalor stands out for its versatility in handling data from diverse sources and formats, along with its unique suite of vulnerability risk management and prioritization tools.
07.03.2024
PayPal has announced the rollout of "Tap to Pay" for merchants utilizing iPhones through the Venmo and Zettle applications in the U.S. This feature, facilitated by PayPal, enables businesses to accept contactless card and digital wallet payments directly on their iPhones without incurring extra expenses or requiring additional hardware. Following its introduction for Android phone merchants eight months prior, Tap to Pay allows merchants not only to accept payments from cards or digital wallets such as Apple Pay or Google Pay but also to incorporate taxes, receive tips, issue receipts, and process refunds seamlessly. PayPal assures that funds from transactions are promptly deposited into the merchant's Venmo or PayPal Zettle account. For each sale via the tap-to-pay method across Zettle and Venmo, PayPal applies a charge of 2.29% + 9¢.
05.03.2024
Axonius, a prominent figure in enterprise asset management, specializing in comprehending and overseeing the digital assets and infrastructure constituting an organization's network, has secured an additional $200 million in funding to further develop its operations following notable growth. Despite prevailing economic challenges affecting IT budgets and the broader technological landscape, the market segment Sysman alludes to has expanded consistently over time. A pivotal element in contemporary cybersecurity strategies is the recognition of the attack surface: comprehending the array of assets, services, and interactions within a network is fundamental to safeguarding against malicious infiltration.
25.02.2024
X, the social media platform previously recognized as Twitter is introducing audio and video call functionalities for its regular users, extending beyond its former exclusivity to premium subscribers. To utilize this feature, users navigate to a direct message, tap the designated phone icon, and opt for either an audio or visual call. However, it appears to be a feature that users might stumble upon inadvertently while browsing through messages, raising questions about its practicality amidst the abundance of existing communication services. While X offers the convenience of avoiding the exchange of phone numbers, a capability already present in other platforms, its unique value proposition remains unclear. Thus, the addition of calling features on X for non-paying users seems more like a forced inclusion rather than a demanded enhancement.
21.02.2024
Signal is introducing usernames, a new feature that eliminates the need to share your phone number to connect with others on the platform. This update, currently in beta, will be gradually available to all users in the upcoming weeks. While Signal still mandates a phone number during registration, this move enhances privacy by allowing users to maintain their phone numbers confidential. This step reinforces Signal's reputation as a leader in secure, end-to-end encrypted messaging, as it mitigates a potential loophole exploited by hackers who could gain access to users' messages by hijacking registered phone numbers at the carrier level.
Document editors, Email, browsers, file storage...
Project management, group chat, intranet portals, wiki...
Messengers, PBX, telephony, videoconferencing...
CRM, call-centers, presentation, support software...
Marketing software, SEO, Ads, email-marketing, webinars...
Website builders, CMS, web-analytics, merchant services...
Accounting software, warehouse management, ERP...
ECM software, Document management software...
HRM, recruiting software, job sites, freelance marketplaces...
To-Do organizers, calendars, notebooks, news reading apps...
IT Service Desk, antiviruses, cloud management...
Retail, restaurant, hotel, beauty salon, medical practice...