WeSpline is a community-built database and social network that connects companies, individuals, startups, enterprises, investors and other organizations. It uses artificial intelligence like text mining and machine learning to power intelligent search and recommendation functions. The goal is to foster innovation by making it easier for users to find potential partners, opportunities, and information around the world.
Early Stage Real Estate Tech Investment Thesis (Sept 2016)Earnest Sweat
Here is an example of a personal investment thesis that I created to share with venture capital firms. In this example, I provide my personal perspective on the real estate tech sector. For details on how I build this thesis check out my blog (https://goo.gl/CU4Qid).
Note: Some of the confidential information has been redacted for privacy.
What are Cognitive Applications? What is exciting about them? They represent a whole new way of human computer interaction and acting on data insights. Introducing IBM Watson and how to develop Cognitive applications. AI, Machine Learning compared and contrasted.
GET A SNEAK-PEEK INTO THE FUTURE OF ARTIFICIAL INTELLIGENCE!
Deepsphere.AI is conducting a two-day ‘Applied Artificial Intelligence Workshop’ for middle and high school students on July 24 and July 25, 2021.
It is a virtual instructor-led workshop that focuses on creating awareness about the real-world application of artificial intelligence and provides hands-on training to the students by implementing industry use cases on an enterprise-grade lab infrastructure.
In this two-day program, the students will gain knowledge on Data Science, Intelligence Automation, and Digital Transformation. They will also learn how to develop machine learning models on an advanced computing lab infrastructure such as google cloud, google collab, and open source technologies.
Know your Instructor:
Jothi Periasamy is the subject matter expert who knows his ins and outs in the field of Data Science and Artificial Intelligence. He is currently the Board Member at the University of California, Chief Data Scientist, Applied Machine Learning & Data Engineer. He has more than 17 years of experience in management consulting and end-to-end AI (ML, DL, RPA, NLP) experience with Deloitte, E&Y, and KPMG.
10th HRSD SUMMIT, General Santos City, July 20-22, 2011
Birth of A Permanent Mechanism: The MinDA Act of 2010 (RA 9996)
MINDANAO DEVELOPMENT AUTHORITY
4F SSS Building, Bajada, Davao City
Tel. No.: (082) 221-1345 and Telefax: (082) 221-8108
Email: info@minda.gov.ph
Enterprise and Acumen: Real World Information Skills and Employability for Bu...Western Sydney University
ALIA National Conference presentation on information literacy and employability for our research project assessing information skills for new graduates in the workplace and how academic librarians can improve and embed these information skills in library initiatives and support for students
note - audio is also available after ppt downloaded
Early Stage Real Estate Tech Investment Thesis (Sept 2016)Earnest Sweat
Here is an example of a personal investment thesis that I created to share with venture capital firms. In this example, I provide my personal perspective on the real estate tech sector. For details on how I build this thesis check out my blog (https://goo.gl/CU4Qid).
Note: Some of the confidential information has been redacted for privacy.
What are Cognitive Applications? What is exciting about them? They represent a whole new way of human computer interaction and acting on data insights. Introducing IBM Watson and how to develop Cognitive applications. AI, Machine Learning compared and contrasted.
GET A SNEAK-PEEK INTO THE FUTURE OF ARTIFICIAL INTELLIGENCE!
Deepsphere.AI is conducting a two-day ‘Applied Artificial Intelligence Workshop’ for middle and high school students on July 24 and July 25, 2021.
It is a virtual instructor-led workshop that focuses on creating awareness about the real-world application of artificial intelligence and provides hands-on training to the students by implementing industry use cases on an enterprise-grade lab infrastructure.
In this two-day program, the students will gain knowledge on Data Science, Intelligence Automation, and Digital Transformation. They will also learn how to develop machine learning models on an advanced computing lab infrastructure such as google cloud, google collab, and open source technologies.
Know your Instructor:
Jothi Periasamy is the subject matter expert who knows his ins and outs in the field of Data Science and Artificial Intelligence. He is currently the Board Member at the University of California, Chief Data Scientist, Applied Machine Learning & Data Engineer. He has more than 17 years of experience in management consulting and end-to-end AI (ML, DL, RPA, NLP) experience with Deloitte, E&Y, and KPMG.
10th HRSD SUMMIT, General Santos City, July 20-22, 2011
Birth of A Permanent Mechanism: The MinDA Act of 2010 (RA 9996)
MINDANAO DEVELOPMENT AUTHORITY
4F SSS Building, Bajada, Davao City
Tel. No.: (082) 221-1345 and Telefax: (082) 221-8108
Email: info@minda.gov.ph
Enterprise and Acumen: Real World Information Skills and Employability for Bu...Western Sydney University
ALIA National Conference presentation on information literacy and employability for our research project assessing information skills for new graduates in the workplace and how academic librarians can improve and embed these information skills in library initiatives and support for students
note - audio is also available after ppt downloaded
Alan is a niche-global innovation consulting firm based in EU and USA leveraging 20 years of experience of the founding partners in IT market innovations and International R&D management.
Why Developing Technology Skills is Essential for NonprofitsTechSoup
As the pace of change accelerates and technology continues to evolve, organizations across all industries are struggling to keep up — and the nonprofit sector is no exception. Technology skills are critical to building the solutions that solve the greatest challenges for nonprofits. But developing technology skills starts by creating a culture of lifelong learners. For enterprise organizations and nimble nonprofits alike, learning is an indispensable element of success.
Join us for this 60-minute webinar with Lindsey Kneuven, head of social impact of Pluralsight, who will cover how you can accelerate the ability to achieve your nonprofit’s mission and give your teams the opportunity to have more meaningful impact.
Building an Equitable Tech Future - By ThoughtWorks BrisbaneThoughtworks
At the heart of ThoughtWorks is an ambitious mission: to be a proactive agent of progressive change in the world. Aware of our own privilege, we strive to see the world from the perspective of the oppressed, the powerless and the invisible.
With QUT, here in Brisbane, we’re kicking off a series of research, projects, and conversations about the social impact of tech trends, with a view to building a more equitable tech future. Some of these topics include:
- Algorithmic accountability, transparency, bias & inclusion
- Responsible data practices (privacy and ownership of data)
- Automation and the future of work
- Data use in social media and elections
- Fake news and echo chambers
- Regulating decentralised technologies
- Blockchain for good
- End-user autonomy and privacy
Slides from: Felicity Ruby, Eru Penkman, Clayton Nyakana,
Assoc. Prof. Nic Suzor (QUT) & Dr. Monique Mann (QUT)
Hawaii International Conference on Systems Sciences 2017. There are many opportunities for academics to submit papers for presentation at this very important conference which has sessions on Cognitive, Analytics, Big Data and much more. Haluk Demirkan, U Washington and Sergey Belov, IBM University Relations CEEMA made this presentation at Cognitive Systems Institute Speaker Series call on March 10, 2016.
Misha Infotech Delivering Excellence with Interactive IT services.Misha Infotech
Misha Infotech is established to develop cost effective products, software and services. We have provided a lot of value addition to the overall product management process, right from the conceptualization to the development, support and maintenance.
1
5
Marketing Homework
Student’s Name
Institutional Affiliation
Course
Professor’s Name
Due Date
Marketing Homework
Value Proposition
My organization provides three primary value propositions: advancement, risk mitigation, and brand/status. A key component of its culture, the organization values innovation. More than half of its staff are involved in research and innovation. It also owns patents for online shopping, instant messaging, search engines, online transactions, gaming, and cybersecurity. In addition, the program is involved in the development of essential Internet technologies for the objectives of innovation.
The organization uses high protection and safety standards to reduce danger. The company employs the following measures to safeguard intellectual property on its platform network: Through user agreements, notices, and announcements, visitors are reminded to respect intellectual property. Operates a computerized monitoring and automated IP protection system that continuously monitors for infringement, investigates and acquires evidence of a breach, serves takedown notices, and generates infringement reports. Collaborates with law firms to identify, gather, and verify information of violation on all significant Internet and mobile technologies. Collaboration with other Internet firms, media groups, and IP rights holders to pool resources in the battle against infringement. It maintains a committed team of intellectual property enforcement attorneys, Enforces intellectual property rights through administrative proceedings, civil lawsuits, commercial arrangements, and criminal prosecution. Finally, as a result of its success, the company has developed a strong brand.
Customer Relationships
My company's customer relationships are primarily self-service. Customers access its offerings through its channels, with little interaction with workers. There is a personal assistance aspect available in telephone and e-mail service (Business Model: Key resources, 2016).
Revenue Stream
My company earns essential revenues through three types of money: revenue from value-added services, income from digital advertising services, and income from several other services.
Response 1
Hello class,
An entrepreneur is considered somebody who establishes or organizes a firm and remains an active member in its functioning. I agree with the post that the key resources required by any entrepreneur may be split into four classifications: physical, intellectual, monetary, and human resources. Physical resources are tangible items that can be touched and felt, as well as technology. For example, the following items are used for value proposition: a laptop, a phone, an internet connection, a video camera, and a video course hosting site.
The client and prospective customer information is an intellectual resource that is one of the company's most important assets. I cultivate relationships and provide members with free value in the shape of reading ...
1
5
Marketing Homework
Student’s Name
Institutional Affiliation
Course
Professor’s Name
Due Date
Marketing Homework
Value Proposition
My organization provides three primary value propositions: advancement, risk mitigation, and brand/status. A key component of its culture, the organization values innovation. More than half of its staff are involved in research and innovation. It also owns patents for online shopping, instant messaging, search engines, online transactions, gaming, and cybersecurity. In addition, the program is involved in the development of essential Internet technologies for the objectives of innovation.
The organization uses high protection and safety standards to reduce danger. The company employs the following measures to safeguard intellectual property on its platform network: Through user agreements, notices, and announcements, visitors are reminded to respect intellectual property. Operates a computerized monitoring and automated IP protection system that continuously monitors for infringement, investigates and acquires evidence of a breach, serves takedown notices, and generates infringement reports. Collaborates with law firms to identify, gather, and verify information of violation on all significant Internet and mobile technologies. Collaboration with other Internet firms, media groups, and IP rights holders to pool resources in the battle against infringement. It maintains a committed team of intellectual property enforcement attorneys, Enforces intellectual property rights through administrative proceedings, civil lawsuits, commercial arrangements, and criminal prosecution. Finally, as a result of its success, the company has developed a strong brand.
Customer Relationships
My company's customer relationships are primarily self-service. Customers access its offerings through its channels, with little interaction with workers. There is a personal assistance aspect available in telephone and e-mail service (Business Model: Key resources, 2016).
Revenue Stream
My company earns essential revenues through three types of money: revenue from value-added services, income from digital advertising services, and income from several other services.
Response 1
Hello class,
An entrepreneur is considered somebody who establishes or organizes a firm and remains an active member in its functioning. I agree with the post that the key resources required by any entrepreneur may be split into four classifications: physical, intellectual, monetary, and human resources. Physical resources are tangible items that can be touched and felt, as well as technology. For example, the following items are used for value proposition: a laptop, a phone, an internet connection, a video camera, and a video course hosting site.
The client and prospective customer information is an intellectual resource that is one of the company's most important assets. I cultivate relationships and provide members with free value in the shape of reading ...
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
2. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
WeSpline is a Community-Built Database of
companies and individuals who can find each other
and interact in a Social Network Framework with
Artificial Intelligence Capabilities
3. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
Enterprises
tech / innovation adopters
Startups / Innovative Companies
tech / innovation developers
By building a Community of Users, we aim to foster the development
and spread of Innovation across the globe:
Hubs
Incubators / Accelerators
Universities
Research Parks
Government Agencies
Crowdfunding Platforms
Angel Investor
Institutions, etc.
Service Providers
Law Firms
Accountants / Auditors
Consultants / Advisors
Media, etc.
Investors
VC Funds
Private Equity Funds
Banks
Community of Users:
4. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
With WeSpline's Intelligent Search Engine, users can find
companies and individuals of interest.
WeSpline's Recommendations Algorithm uses AI - text
mining, natural language processing, and machine learning -
to foster business among users by generating meaningful
company recommendations.
WeSpline's Communication Functions are designed to
facilitate business communications and primarily serve a
business purpose, making WeSpline a “task-driven social
network”.
Main Features:
5. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
Enterprises:
For Enterprises, it will be easier to discover and learn (Intelligent
Search Engine) about a given innovation/startup through WeSpline and
seize opportunities of collaboration that may otherwise be missed (AI
Recommendations Algorithm).
Startups/Innovative Companies:
Likewise, Startups/Innovative Companies will have the opportunity to
actively search, get exposed to, and communicate with hundreds of
Enterprises and Investors around the world. Enterprises and Investors will
be able to learn about their businesses, products/services, and founding
partners. Also, it will be easier for Startups to find and contact the "right"
investors, i.e., those investors who have a particular focus on their sectors
and locations.
Solutions:
6. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
Investors:
Investors will be able to better identify and follow up on opportunities,
especially if they happen to be in different geographies.
According to the Financial Times article entitled “Artificial intelligence is
guiding venture capital to start-ups”, one of the biggest challenges for venture
capital companies is finding interesting investment targets before anyone
else. ‘My job used to be about getting on a plane once a week and going to a
different European city to try to find people who were doing interesting
things,’ says Roberto Bonanzinga, co-founder of InReach Ventures. ‘It was
inefficient’, he says.”
Solutions:
7. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
Hubs:
Hubs will also benefit from this interaction. For example:
• Accelerators / Incubators will be able to better advertise their Special
Programs for Startups and Entrepreneurs, and spread the word about
the technologies that they help build;
• Universities – students and researchers – will be able to take Challenges
from Enterprises and develop tailor-made solutions for the Industry.
They will also be able to find partners and sponsors in the Industry for
their own projects and new technologies. This will hopefully bring tech
transfer from Academia to the Industry to a whole new level.
Service Providers:
Service Providers will be able to reach potential clients more easily and be
reached by them as well;
Solutions:
8. Global Market Size – For Companies:
CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
Large + SMEs (142 Selected Countries)
Source: World Bank, 2014
~30 mn
companies
~70 K
companies
Technology-Driven Startups
Source: Nasscom Report 2016
Global Market Size – For Individuals behind these companies: ???
Addressable Market:
9. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
Search & Find
Companies and
Individuals
Connect
&
Communicate
Learn & Stay
Updated
Get Relevant
Recommendations
Selected Screens:
10. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
WeSpline provides its users with multiple novel Intelligent functions by leveraging the
state of the art technology in:
• Information Retrieval,
• Natural Language Processing,
• Text Mining, and
• Machine Learning
- Intelligent semantic Search technology enables flexible and effective exploration of
relevant companies to engage in business;
- Semantic understanding of company profiles and challenges enhances state of the art
Recommender System technology to provide accurate matching of tech
developers and tech adopters, thus enabling accurate recommendations of
companies, technologies or challenges;
- Powerful Machine Learning techniques will be applied across all functions in
WeSpline to enable the system to learn from the user interaction data that will be
accumulated naturally as the system is being used, and self-improve its own
performance for all the tasks overtime.
Technology:
11. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
Basic Services (FREE) include company/user profiles, finder, basic search,
newsfeed, getting messages, among others.
Premium Services (subscription) include sending in-mails, chat,
recommendations, business analytics, posting challenges, posting special
programs, posting job ad, among others.
Revenue from Ads:
• the ads will typically show for a given target audience on their newsfeeds
and on the right-hand side of their pages.
• Users will also be invited to pay to boost their Newsfeed publications,
Challenge posts, Special Programs posts, and Job Ads.
• Companies will be able to pay to appear at the top of the search result
list (sponsored search results). Users will be able to identify such results
as “Ads”. Other useful (non-paid) results will typically follow below.
Business Model:
12. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
Phase in the Release according to:
• Features / Users – we plan to release “core” features to “core” users first;
• Countries – we plan to release WeSpline in the US, Israel, and Brazil first.
• Industries – we plan to create critical mass in certain “popular” industries first,
so that we can become a relevant reference for users there. “Popular” industries
would be those that are interesting for most companies such as Cyber Security,
Logistics Tech, among others.
For Scale & Traction – focus on distributing our product through Hubs:
• Industry Associations for Corporations and Mid-Sized Companies;
• Accelerators, Incubators, Universities, and VCs to reach Startups and
Innovative Companies.
Product Release / Distribution Strategy:
13. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
EFFICIENT
AFFORDABLEEXPENSIVE
INEFFICIENT
(time consuming, biased/regional, or
not adequately designed for that purpose)
Tech Scouters
Competition - Examples:
14. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
ChengXiang Zhai, PhD
Mentor / Advisor (& Future Partner)
Fernanda Torós, PhD
Founder / CEO
Patrick Gallagher
Software Engineer / Backend Developer
Pedro Richa Dabarian
CFO / Partner
Leonardo Bispo de Oliveira
Mentor / Software Engineer @ WeSpline via
Prototype.tech – Services include assisting with
infrastructure and backend developmentRomer Zandomingos Alves
Web Designer @ WeSpline via
Fator Criativo - web design &
frontend development
Joshua E. Sanchez
Software Engineer / Backend Developer
Team:
15. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
Fernanda Torós, PhD – Founder & CEO
Previously: Founding Partner & CEO at Sabra Capital, Partner & Portfolio Manager at Oren Investimentos, Portfolio Manager
& Head of Equity Research at Nest Investimentos, Equity Analyst at Investidor Profissional and Leblon Equities, Economist at
Credit Suisse, and executive at AmBev. In Academia, she was visiting assistant professor at Virginia Tech, where she taught
courses in International Finance, lecturer at the University of Illinois at Urbana-Champaign (UIUC), where she taught courses in
Corporate Finance, and researcher at the Inter-American Development Bank in D.C., where she worked during Summer 2002.
She has PhD in Economics & MS in Finance from UIUC, and BA and MA in Economics from PUC-Rio, Brazil.
ChengXiang Zhai, PhD – Mentor / Advisor (& Future Partner)
Dr. Zhai is Professor of Computer Science and Willett Faculty Scholar at the University of Illinois at Urbana-Champaign, where
he also holds a joint appointment at the Institute for Genomic Biology, Statistics, and the Graduate School of Library and
Information Science. He received a Ph.D. in Computer Science from Nanjing University in 1990, and a Ph.D. in Language and
Information Technologies from Carnegie Mellon University in 2002. He worked at Clairvoyance Corp. as a Research Scientist
and a Senior Research Scientist from 1997 to 2000. He has over 25 years of experience in R&D of novel intelligent information
systems from both academia and industry. His research interests include information retrieval, text mining, natural language
processing, machine learning, biomedical informatics, and intelligent education systems. He has published over 200 papers and
holds 5 patents in these areas. He is the major contributor of the Lemur toolkit (http://www.lemurproject.org), an information
retrieval and text mining toolkit used by many people. He is an ACM Distinguished Scientist and received multiple awards from
industry, including IBM Faculty Award, HP Innovation Research Award, Microsoft Beyond Search Research Award, Google
Research Grant Award, and Yahoo Faculty Research Engagement Program Award. More info: http://czhai.cs.illinois.edu/.
Pedro Richa Dabarian – CFO / Partner
Previously: Partner & Risk/Compliance Officer at Sabra Capital, and Financial Analyst at Koin Latam. MBA in Investment
Management and BA in Industrial Engineering from PUC-Rio, Brazil, with credits obtained at California Polytechnic University.
Team Members:
16. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
Leonardo Bispo de Oliveira – Software Engineer / Backend Developer
Founder at Prototype; Co-Founder/CTO at Notejuri. Previously: Co-Founder/Technical Leader at RockSpoon; Senior Software
Engineer at mbr targeting GmbH, VOIPFUTURE, and Orolix; Software Engineer at Cinq Technologies; Intern at HP; MS in
Distributed Systems and BS in Computer Science from PUC-Paraná, Brazil.
Romer Zandomingos Alves – Web Designer / Frontend Developer
Founder at Fator Criativo; UX Designer at Icatu Seguros. Previously: Web Designer at Petrobras; BS in Industrial Design from
UFRJ, Brazil.
Patrick Gallagher – Software Engineer / Backend Developer
BS candidate in Computer Science, with a dual degree in Technological Entrepreneurship at the University of Illinois at Urbana-
Champaign (UIUC). Co-Founder and Primary Developer of Fraktl.net. Course staff for UIUC's Software Design course.
Joshua E. Sanchez – Software Engineer / Backend Developer
BS candidate in Computer Engineering, with a dual degree in Technological Entrepreneurship at the University of Illinois at
Urbana-Champaign (UIUC). Co-Founder and Development Project Manager of YourTurn.
Team Members:
17. Use of Proceeds: mainly to hire Software Engineers and pay for Office/Marketing/Trip Expenses.
Suggested Structure: convertible note, with a discount to next round's valuation.
CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
US$ 200 K
US$ 300 K
-
US$ 1 mn
We are looking for funding to finish a fully functional MVP of the system by 2H18 and
pre-launch it to selected users (if US$ 300 K is raised) or to launch a MVP by 2H18 to a
larger # of users (if US$ 1 mn is raised).
Angel round
(raised 2016/17)
Pre-Seed round
(to be raised 2018)
Funding:
18. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
US$ 200 K
Valuation: Facebook currently trades at EV/Sales = 14x. If Sales are US$ 926 mn at
year 10 (2027) and we value WeSpline at a conservative EV/Sales = 10x, then our
Enterprise Value would be: EV = US$ 9.2 bn.
SENSITIVITY ANALYSIS - WESPLINE
share startups 67%
USD 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027
ASSUMPTIONS
AVERAGE # OF USERS PER TYPE OF COMPANY
corporations / enterprises 5
startups / innovative companies 2
non-core users 2
TOTAL # COMPANIES
corporations / enterprises - 264 792 3,168 15,312 38,280 95,040 160,512 223,080 278,784 324,720
startups / innovative companies - 536 1,608 6,432 31,088 77,720 192,960 325,888 452,920 566,016 659,280
growth rate 200% 300% 383% 150% 148% 69% 39% 25% 16%
core users (total) - annual average - 800 2,400 9,600 46,400 116,000 288,000 486,400 676,000 844,800 984,000
growth rate 500% 100% 383% 150% 148% 69% 39% 25%
non-core users (total) - annual average 200 500 3,000 6,000 29,000 72,500 180,000 304,000 422,500 528,000
TOTAL COMPANIES - 1,000 2,900 12,600 52,400 145,000 360,500 666,400 980,000 1,267,300 1,512,000
Engagement - PREMIUM SERVICES
% corporations engaged @ premium plan 0% 40% 50% 60% 65% 70% 75% 80% 80% 80%
# of users - - 1,584 7,920 45,936 124,410 332,640 601,920 892,320 1,115,136 1,298,880
rate per month - 24.00 24.00 24.00 24.00 24.00 24.00 24.00 24.00 24.00 24.00
rate per year - 288.00 288.00 288.00 288.00 288.00 288.00 288.00 288.00 288.00 288.00
% startups engaged @ premium plan 0% 40% 50% 60% 65% 70% 75% 80% 80% 80%
# of users - - 1,286 6,432 37,306 101,036 270,144 488,832 724,672 905,626 1,054,848
rate per month - 20.00 20.00 20.00 20.00 20.00 20.00 20.00 20.00 20.00 20.00
rate per year - 240.00 240.00 240.00 240.00 240.00 240.00 240.00 240.00 240.00 240.00
% non-core users engaged @ premium plan I 25% 50% 60% 65% 70% 75% 80% 80% 80%
# of users - - 250 3,000 7,200 37,700 101,500 270,000 486,400 676,000 844,800
rate per month - 15.00 15.00 15.00 15.00 15.00 15.00 15.00 15.00 15.00 15.00
rate per year - 180.00 180.00 180.00 180.00 180.00 180.00 180.00 180.00 180.00 180.00
TOTAL USERS ENGAGED - - 3,120 17,352 90,442 263,146 704,284 1,360,752 2,103,392 2,696,762 3,198,528
Appendix - Financials:
21. CONFIDENTIAL MATERIAL; NOT TO BE DISTRIBUTED
contact@wespline.comResearch Park @ UIUC
1800 South Oak St., suite 106
Champaign, IL 61820, USA
Social Network:
www.wespline.com
Investor Relations:
www.ir-wespline.com
+1 312 330 2543 Institutional Video:
https://youtu.be/Z6lfiItIGnE