Raising multiple rounds of venture capital might be wrong for your startup

What if startups raised less VC money and became self-sustaining? SecurityPal founder Pukar Hamal has done that and wants founders to know their options.What if startups raised less VC money and became self-sustaining? SecurityPal founder Pukar Hamal has done that and wants founders to know their options.[#item_full_content]

StrictlyVC at TechCrunch Disrupt 2025: Inside the LP Track

StrictlyVC is back at TechCrunch Disrupt in October, bringing together the insiders who shape the venture capital landscape, this time with a sharper focus on the market’s biggest challenge: liquidity. In an era of extended exit timelines, slowed distributions, and increasingly selective LPs, the conversations behind closed doors matter more than ever. Working with Cendana […]StrictlyVC is back at TechCrunch Disrupt in October, bringing together the insiders who shape the venture capital landscape, this time with a sharper focus on the market’s biggest challenge: liquidity. In an era of extended exit timelines, slowed distributions, and increasingly selective LPs, the conversations behind closed doors matter more than ever. Working with Cendana[#item_full_content]

Space is open for business with Even Rogers and Max Haot at TechCrunch Disrupt 2025

The next era of the space economy isn’t just about rockets and satellites — it’s about infrastructure, autonomy, and entirely new models for building and defending off-Earth assets. At TechCrunch Disrupt 2025 this October 27–29 in San Francisco’s Moscone West, the Space Stage is where this shift gets real.The next era of the space economy isn’t just about rockets and satellites — it’s about infrastructure, autonomy, and entirely new models for building and defending off-Earth assets. At TechCrunch Disrupt 2025 this October 27–29 in San Francisco’s Moscone West, the Space Stage is where this shift gets real.[#item_full_content]

At UC Berkeley, researchers in Sergey Levine’s Robotic AI and Learning Lab eyed a table where a tower of 39 Jenga blocks stood perfectly stacked. Then a white-and-black robot, its single limb doubled over like a hunched-over giraffe, zoomed toward the tower, brandishing a black leather whip. Through what might have seemed to a casual viewer like a miracle of physics, the whip struck in precisely the right spot to send a single block flying from the stack while the rest of the tower remained structurally sound.At UC Berkeley, researchers in Sergey Levine’s Robotic AI and Learning Lab eyed a table where a tower of 39 Jenga blocks stood perfectly stacked. Then a white-and-black robot, its single limb doubled over like a hunched-over giraffe, zoomed toward the tower, brandishing a black leather whip. Through what might have seemed to a casual viewer like a miracle of physics, the whip struck in precisely the right spot to send a single block flying from the stack while the rest of the tower remained structurally sound.Robotics[#item_full_content]

At UC Berkeley, researchers in Sergey Levine’s Robotic AI and Learning Lab eyed a table where a tower of 39 Jenga blocks stood perfectly stacked. Then a white-and-black robot, its single limb doubled over like a hunched-over giraffe, zoomed toward the tower, brandishing a black leather whip. Through what might have seemed to a casual viewer like a miracle of physics, the whip struck in precisely the right spot to send a single block flying from the stack while the rest of the tower remained structurally sound.At UC Berkeley, researchers in Sergey Levine’s Robotic AI and Learning Lab eyed a table where a tower of 39 Jenga blocks stood perfectly stacked. Then a white-and-black robot, its single limb doubled over like a hunched-over giraffe, zoomed toward the tower, brandishing a black leather whip. Through what might have seemed to a casual viewer like a miracle of physics, the whip struck in precisely the right spot to send a single block flying from the stack while the rest of the tower remained structurally sound.[#item_full_content]

Why SecurityPal is choosing ‘nuanced capital’ over more VC rounds

During the venture capital crash of 2022, SecurityPal founder Pukar Hamal was just 14 months from running out of money. Rather than raise another round, he chose to restructure and focus on getting his business to profitability as quickly as possible — and he hasn’t raised since his $21M Series A in 2021. On today’s […]During the venture capital crash of 2022, SecurityPal founder Pukar Hamal was just 14 months from running out of money. Rather than raise another round, he chose to restructure and focus on getting his business to profitability as quickly as possible — and he hasn’t raised since his $21M Series A in 2021. On today’s[#item_full_content]

Modular robots built by Dartmouth researchers are finding their feet outdoors. Engineered to assemble into structures that best suit the task at hand, the robots are pieced together from cube-shaped robotic blocks that combine rigid rods and soft, stretchy strings whose tension can be adjusted to deform the blocks and control their shape.Modular robots built by Dartmouth researchers are finding their feet outdoors. Engineered to assemble into structures that best suit the task at hand, the robots are pieced together from cube-shaped robotic blocks that combine rigid rods and soft, stretchy strings whose tension can be adjusted to deform the blocks and control their shape.[#item_full_content]

Pick up an August 2025 issue of Vogue and you’ll come across an advertisement for the brand Guess featuring a stunning model. Yet tucked away in small print is a startling admission: She isn’t real. She was generated entirely by AI.Pick up an August 2025 issue of Vogue and you’ll come across an advertisement for the brand Guess featuring a stunning model. Yet tucked away in small print is a startling admission: She isn’t real. She was generated entirely by AI.Machine learning & AI[#item_full_content]

In computer security, random numbers are crucial values that must be unpredictable—such as secret keys or initialization vectors (IVs)—forming the foundation of security systems. To achieve this, deterministic random bit generators (DRBGs) are used, which produce numbers that appear random. However, existing DRBGs had limitations in both security (unpredictability against hacking) and output speed.In computer security, random numbers are crucial values that must be unpredictable—such as secret keys or initialization vectors (IVs)—forming the foundation of security systems. To achieve this, deterministic random bit generators (DRBGs) are used, which produce numbers that appear random. However, existing DRBGs had limitations in both security (unpredictability against hacking) and output speed.[#item_full_content]

Hirebucket

FREE
VIEW