We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Panel - Meet the VCs

00:00

Formal Metadata

Title
Panel - Meet the VCs
Title of Series
Number of Parts
112
Author
et al.
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Venture capital investments have reached the highest level since the dot-com days. Almost seven billion dollars was invested last quarter alone. While clean-tech deals hit a new low, security deals increased the most. Security is the new black. How should we spend the next billion? Meet the VCs and strategize on the future! Deepak Jeevankumar, partner at General Catalyst, focuses on investments in cloud computing, big data, data center infrastructure and clean energy. He has been with General Catalyst Partners since 2010, first in Boston and later in the firm's Palo Alto office and has been closely involved in our investments in DataGravity, Virtual Instruments and Sunglass. Prior to joining GC, Deepak worked at Sun Microsystems and was an intern at the Yale Investments Office. At Sun, he was involved in designing a few top 10 supercomputers in the industry and led the high performance computing architecture practice in the Asia-Pacific region. Deepak is a graduate of the National University of Singapore, earning a B.Eng. in Computer Engineering; the Singapore-MIT Alliance, earning a S.M. in Computer Science; and the Yale School of Management, earning an M.B.A. John M. Jack actively consults startups and is a board partner at Andreessen Horowitz. Most recently, JJ was the CEO of Fortify Software, which was acquired by Hewlett-Packard in 2010 and was the market leader in protecting enterprises from the threats posed by security flaws in business-critical software applications. Prior to this, JJ was the CEO of Covalent (acquired by VMware), the COO of The Vantive Corporation (acquired by PeopleSoft) and held executive positions at Sybase Inc. JJ is on the boards of CipherCloud, ClearSlide, AlienVault and Cenzic.
HypothesisStandard deviationMereologyMultiplication signNetwork topologyLevel (video gaming)NumberGoogolInformation securityCodeOffice suiteLogic gateVulnerability (computing)SoftwareCartesian coordinate systemFacebookInternet service providerGoodness of fitSpacetimeIndependence (probability theory)Characteristic polynomialTerm (mathematics)Product (business)Closed setOrder (biology)LIGOWeightSource codeDirection (geometry)Lattice (order)Computer virusServer (computing)Lecture/Conference
Information securityCategory of beingBuildingCodeLevel (video gaming)Magnetic stripe cardNP-hardMultiplicationComputer hardwareProjective planeCybersexBayesian networkBitBelegleserInternetworkingData managementMeeting/Interview
Well-formed formula1 (number)Intelligent NetworkTerm (mathematics)Point (geometry)Process (computing)Multiplication signMobile WebInformation securityCartesian coordinate systemLevel (video gaming)Disk read-and-write headQuicksortHacker (term)NP-hardAndroid (robot)Channel capacityTwitterMultilaterationDeterminismCloud computingRandomizationNumberPoint cloudResultantEvent horizonEnterprise architectureCuboidSpacetimeAntivirus softwareCybersexBuildingHookingOffice suiteType theoryProduct (business)Self-organizationWhiteboardOrder (biology)Chief information officerWorkloadForm (programming)Real numberPhysical systemAddress spaceSet (mathematics)ArmLimit (category theory)Inheritance (object-oriented programming)Regulator geneMeeting/Interview
NumberMathematicsSoftware testingGroup actionScaling (geometry)Process (computing)Information securityBitPoint (geometry)Web 2.0Computing platformServer (computing)Operator (mathematics)Direct numerical simulationRight angleOrder (biology)KälteerzeugungState of matterMobile WebMultiplication signHacker (term)Different (Kate Ryan album)Cloud computingComputer scienceType theoryUtility softwareCurveVideo cardEnvelope (mathematics)TwitterCybersexInternet der DingeFamilyDataflowMobile appProgram slicingTerm (mathematics)PiSound effectNegative predictive valueBuildingExterior algebraProduct (business)Data miningValuation (algebra)ComputerArithmetic meanInformation managementMeeting/Interview
Level (video gaming)PreconditionerSubsetLattice (order)Right angleOptical disc driveContrast (vision)Information securityService (economics)InfinityDecision theoryOffice suiteMobile WebCASE <Informatik>BuildingExtension (kinesiology)Point (geometry)QuicksortGroup actionProduct (business)View (database)WhiteboardLine (geometry)Fitness functionMultiplication signSpacetimeValidity (statistics)Operator (mathematics)SoftwareComputing platformGoodness of fitReal numberVulnerability (computing)Meeting/Interview
Product (business)Spectrum (functional analysis)Multiplication signBusiness modelPhysical lawProcess (computing)1 (number)Grand Unified TheoryData conversionSpacetimeValuation (algebra)Combinational logicLevel (video gaming)Presentation of a groupPredictabilityGroup actionLimit (category theory)Point (geometry)ResultantCategory of beingOutlierObject (grammar)Wage labourProof theoryAngleSpecial unitary groupInformation securityLattice (order)PermutationEmailFitness functionComputer configurationSingle-precision floating-point formatGoodness of fitHacker (term)Decision theoryIrrational numberMeeting/Interview
FeedbackRight angleMultiplication signMeeting/Interview
Process (computing)HypothesisInformation securityPoint (geometry)Lattice (order)Right angleExpressionCybersexSoftwareProduct (business)PrototypeComputer hardwareWater vaporAreaGoodness of fitCategory of beingDeciphermentHypermediaCellular automatonLogistic distributionPosition operatorData managementAddress spaceSoftware testingOffice suiteVideoconferencingFigurate numberMeeting/Interview
Right angleProduct (business)Computer virusComputer fileInternetworkingLoginUniverse (mathematics)Transport Layer SecurityComputer hardwareInformation securityPoint (geometry)SoftwareAreaEuler anglesScheduling (computing)Sign (mathematics)State of matterMultiplication signDivisorNatural numberStandard deviationForm (programming)Computing platformPower (physics)Dependent and independent variablesElectric generatorLaptopInternet service providerAsynchronous Transfer ModeCategory of beingOnline helpCellular automatonElectronic mailing listTheory of relativityVideo cardAuthenticationField (computer science)Direct numerical simulationBitComputer programmingGoodness of fit
Transcript: English(auto-generated)