VAST Data lands $100M Series C on $1.2B valuation to turn storage on its head

VAST Data, a startup that has come up with a cost-effective way to deliver flash storage, announced a $100 million Series C investment today on a $1.2 billion valuation, both unusually big numbers for an enterprise startup in Series C territory.

Next47, the investment arm of Siemens, led the round with participation from existing investors 83North, Commonfund Capital, Dell Technologies Capital, Goldman Sachs, Greenfield Partners, Mellanox Capital and Norwest Venture Partners. Today’s investment brings the total raised to $180 million.

That’s a lot of cash any time, but especially in the middle of a pandemic. Investors believe that VAST is solving a difficult problem around scaled storage. It’s one where customers tend to deal with petabytes of data and storage price tags beginning at a million dollars, says company founder and CEO Renen Hallak.

As Hallak points out, traditional storage is delivered in tiers with fast, high-cost flash storage at the top of the pyramid all the way down to low-cost archival storage at the bottom. He sees this approach as flawed, especially for modern applications driven by analytics and machine learning that rely on lots of data being at the ready.

VAST built a system they believe addresses these issues around the way storage has traditionally been delivered.”We build a single system. This as fast or faster than your tier one, all-flash system today and as cost effective, or more so, than your lowest tier five hard drives. We do this at scale with the resilience of the entire [traditional storage] pyramid. We make it very, very easy to use, while breaking historical storage trade-offs to enable this next generation of applications,” Hallak told TechCrunch.

The company, which was founded in 2016 and came to market with its first solution in 2018, does this by taking advantage of some modern tools like Intel 3D XPoint technology, a kind of modern non-volatile memory along with consumer-grade QLC flash, NVMe over Fabrics protocol and containerization.

“This new architecture, coupled with a lot of algorithmic work in software and types of metadata structures that we’ve developed on top of it, allows us to break those trade-offs and allows us to make much more efficient use of media, and also allows us to move beyond scalability limits, resiliency limits and problems that other systems have in terms of usability and maintainability,” he said.

They have a large average deal size; as a result, the company can keep its cost of sales and marketing to revenue ratio low. They intend to use the money to grow quickly, which is saying something in the current economic climate.

But Hallak sees vast opportunity for the kinds of companies with large amounts of data who need this kind of solution, and even though the cost is high, he says ultimately switching to VAST should save companies money, something they are always looking to do at this kind of scale, but even more so right now.

You don’t often see a unicorn valuation at Series C, especially right now, but Hallak doesn’t shy away from it at all. “I think it’s an indication of the trust that our investors put in our growth and our success. I think it’s also an indication of our very fast growth in our first year [with a product on the market], and the unprecedented adoption is an indication of the product-market fit that we have, and also of our market efficiency,” he said.

They count The National Institute of Health, General Dynamics and Zebra as customers.

Verizon is buying B2B videoconferencing firm BlueJeans

US carrier Verizon* has splashed out to buy veteran B2B videoconferencing platform, BlueJeans Network — shelling out less than $500 million on the acquisition, according to the Wall Street Journal which first reported the news.

A Verizon spokeswoman confirmed to TechCrunch that the price-tag is sub-$500M but did not provide a more exact figure. Videoconferencing platform Blue Jeans has raised ~$175M since being founded around a decade ago, per Crunchbase, with US investor NEA leading a Series E round back in 2015.

In a press release announcing the deal, Verizon said it has entered into a definitive agreement to acquire the enterprise-grade videoconferencing and event platform in order to expand its “immersive unified communications portfolio”.

“Customers will benefit from a BlueJeans enterprise-grade video experience on Verizon’s high-performance global networks. In addition, the platform will be deeply integrated into Verizon’s 5G product roadmap, providing secure and real-time engagement solutions for high growth areas such as telemedicine, distance learning and field service work,” it wrote.

“As the way we work continues to change, it is absolutely critical for businesses and public sector customers to have access to a comprehensive suite of offerings that are enterprise ready, secure, frictionless and that integrate with existing tools,” added Tami Erwin, CEO of Verizon Business, in a supporting statement. “Collaboration and communications have become top of the agenda for businesses of all sizes and in all sectors in recent months. We are excited to combine the power of BlueJeans’ video platform with Verizon Business’ connectivity networks, platforms and solutions to meet our customers’ needs.”

The acquisition comes at a time when videoconferencing is seeing a massive uptick in usage as white collar workers around the world log on to meetings from home during the coronavirus pandemic.

Although it’s BlueJeans’ rival, Zoom, that’s been the most high profile name linked to the viral videoconferencing boom in recent weeks. The latter recently revealed that daily meeting participants on its platform jumped from a modest 10M in December to 200M in March.

However such booming growth and consumer usage has brought increased scrutiny for Zoom — leading to a spate of warnings (and even some bans), related to security and privacy concerns. And earlier this month the company said it would freeze product dev to focus on the laundry list of issues that have surfaced as users have piled in and kicked its tires, taking a little of the shine off of surging growth. 

On the sheer usage front BlueJeans is certainly small fish in comparison to Zoom — having remained b2b focused. A BlueJeans spokeswoman told us it has more than $100M ARR and over 15,000 customers at this point. (Some notable users include Facebook and Disney.)

But it’s paying users that are likely of most interest to Verizon, hence talk of telemedicine, distance learning and field service work — areas ripe for coronavirus-accelerated digitization. Carriers generally, meanwhile, haven’t been able to translate increased usage during the pandemic into a revenue growth story — as a result of a combination of fixed costs, debt and market disruption that’s been hitting their shares during the coronavirus crisis, per Reuters. Bolting on more b2b tools looks to be one way of growing network revenues.

“The combination of BlueJeans’ world class enterprise video collaboration platform and trusted brand with Verizon Business’ next generation edge computing innovation will deliver highly differentiated and compelling solutions to our joint customers,” said Quentin Gallivan, BlueJeans CEO, in a statement. “We are very excited about joining the Verizon team and we truly believe the future of business communications starts today!”

Verizon said today that said BlueJeans founders and “key management” will join the company as part of the acquisition, with BlueJeans employees set to become Verizon employees immediately following the close of the deal — which is expected in the second quarter, pending customary closing conditions.

BlueJeans co-founder Krish Ramakrishnan has a history of exits, selling a couple of his previous startups to networking giant Cisco — where he has also worked, in between spinning out his own companies.

*Disclosure: Verizon is also TechCrunch’s parent company

Anodot grabs $35M Series C to help monitor business operations

Anodot, a startup that helps customers monitor business operations against a set of KPIs, announced a $35 million Series C investment today.

Intel Capital led this round with a lot of help. New investors SoftBank Ventures Asia, Samsung NEXT and La Maison also participated along with existing investors Disruptive Technologies L.P., Aleph Venture Capital and Redline Capital. Today’s investment brings the total raised to $62.5 million, according to the company.

Anodot lets you take any kind of data, whatever your company finds important, and it tracks it automatically and reports on changes that would have an impact on the business, according to David Drai, CEO and co-founder.

“We take any kind of normalized data into our platform and learn all the behavior of the data against normal behavior. When I say normal behavior, it means any time-based data in what is called a time series. And we understand all the trends of that data, and we do this autonomously without any configuration, except defining what is interesting for you,” Drai explained.

That means that the platform will let you know, for example, of any drop in your business, any drop in your conversions, any spike in your costs — and so forth. What you track depends on your vertical and what’s important to your business.

He compares it to applications performance monitoring, but instead of monitoring the company’s technology systems, it’s monitoring the systems that run the business. Just as you don’t want to miss signals that your servers could be going down, neither do you want to let factors that could cost your business money go unnoticed.

This dashboard lets you monitor unusual changes in cloud costs. Image Credit: Anodot

The way it works is you connect to the systems that matter, and Anodot can review those systems, learn what constitutes a level of normal behavior, then identify when anomalies occur. It does this by mapping against your KPIs, and this can involve thousands or even tens of thousands of KPIs based on an individual company.

As Drai points out, an eCommerce company with 1000 products in 50 countries, will have 50,000 KPIs, one for each product in each country, and you can track these in Anodot.

He says that under the current economic conditions, he is taking a two-pronged approach to building his business involving both offense and defense. On defense, he will take a cautious approach to hiring, but he sees his product helping companies understand and control costs, so he will continue to sell the product as a cost-saving device at a time when that is of increasing importance to businesses everywhere.

The company was founded in 2014. It currently has 70 employees and 100 paying customers including Atlassian, T Mobile, Lyft and Pandora.

Daily Crunch: Verizon buys videoconferencing company BlueJeans

Verizon makes a move into videoconferencing, Jeff Bezos discusses a plan to test Amazon employees for COVID-19 and Apple is reportedly working on new over-ear headphones. Here’s your Daily Crunch for April 16, 2020.

1. Verizon is buying b2b videoconferencing firm BlueJeans

TechCrunch’s parent company is buying veteran videoconferencing platform BlueJeans Network — shelling out less than $500 million on the acquisition, according to the Wall Street Journal. (A Verizon spokeswoman confirmed that the price-tag is sub-$500 million but did not provide a more exact figure.)

“Customers will benefit from a BlueJeans enterprise-grade video experience on Verizon’s high-performance global networks,” the company said in a statement. “In addition, the platform will be deeply integrated into Verizon’s 5G product roadmap, providing secure and real-time engagement solutions for high growth areas such as telemedicine, distance learning and field service work.”

2. Bezos details Amazon’s COVID-19 testing plans in shareholder letter

Jeff Bezos dropped Amazon’s annual shareholder letter today, which includes more information on the Amazon-built testing labs that were announced last week. Bezos said the company is considering “regular testing of all Amazonians, including those showing no symptoms.”

3. Apple said to be working on modular, high-end, noise-cancelling over-ear headphones

Bloomberg reports that Apple is developing its own competitors to popular over-ear noise-cancelling headphones like those made by Bose and Sony, but with similar technology to that used in the AirPod and AirPod Pro lines.

4. Unicorn layoffs keep piling up as the economy gets worse

Yesterday, news broke that a trio of well-known, heavily-backed unicorns — Carta, Zume and Opendoor — were cutting staff.

5. Punitive liquidation preferences return to VC — don’t do it

VC Pascal Levensohn says that several of his current portfolio companies have recently proposed “emergency bridge” convertible note financings of between $5 million and $15 million, each featuring a painful feature for non-participants. (Extra Crunch membership required.)

6. DoD Inspector General report finds everything was basically hunky-dory with JEDI cloud contract bid

While controversy has dogged the $10 billion, decade-long JEDI contract since its earliest days, a report by the Department of Defense’s Inspector General’s Office concluded that the contract procurement process was fair and legal.

7. Google Play adds a ‘Teacher Approved’ section to its app store

All apps found in this section are vetted by a panel of reviewers, including more than 200 teachers across the U.S., and meet Google’s existing requirements (around government regulation and advertising) for its “Designed for Families” program.

The Daily Crunch is TechCrunch’s roundup of our biggest and most important stories. If you’d like to get this delivered to your inbox every day at around 9am Pacific, you can subscribe here.

Bridgecrew announces $14M Series A to automate cloud security

In today’s grim economic climate, companies are looking for ways to automate wherever they can. Bridgecrew, an early-stage startup that makes automated cloud security tooling aimed at engineers, announced a $14 million Series A today.

Battery Ventures led the round with participation from NFX, the company’s $4 million seed investor. Sorensen Ventures, DNX Ventures, Tectonic Ventures, and Homeward Ventures also participated. A number of individual investors also helped out. The company has raised a total of $18 million.

Bridgecrew CEO and co-founder Idan Tendler says that it is becoming easier to provision cloud resources, but that security tends to be more challenging. “We founded Bridgecrew because we saw that there was a huge bottleneck in security engineering, in DevSecOps, and how engineers were running cloud infrastructure security,” Tendler told TechCrunch.

They found that a lot issues involved misconfigurations, and while there were security solutions out there to help, they were expensive, and they weren’t geared towards the engineers who were typically being charged with fixing the security issues, he said.

The company decided to solve that problem by coming up with a solution geared specifically for the way engineers think and operate. “We do that by codifying the problem, by codifying what the engineers are doing. We took all the tasks that they needed to do to protect around remediation of their cloud environment and we built a playbook,” he explained.

The playbooks are bits of infrastructure as code that can resolve many common problems quickly. When they encounter a new problem, they build a playbook and then that becomes part of the product. He says that 90% of the issues are fairly generic like following AWS best practices or ensuring SOC-2 compliance, but the engineers are free to tweak the code if they need to.

Tendler says he is hiring and sees his product helping companies looking to reduce costs through automation. “We are planning to grow fast. The need is huge and the COVID-19 implications mean that more and more companies will be moving to cloud and trying to reduce costs, and we help them do that by reducing the barriers and bottlenecks for cloud security.”

The company was founded 14 months ago and has 100 playbooks available. It’s keeping the crew lean for now with 16 employees, but it has plans to double that by the end of the year.

Sipping from the Coronavirus Domain Firehose

Security experts are poring over thousands of new Coronavirus-themed domain names registered each day, but this often manual effort struggles to keep pace with the flood of domains invoking the virus to promote malware and phishing sites, as well as non-existent healthcare products and charities. As a result, domain name registrars are under increasing pressure to do more to combat scams and misinformation during the COVID-19 pandemic.

By most measures, the volume of new domain registrations that include the words “Coronavirus” or “Covid” has closely tracked the spread of the deadly virus. The Cyber Threat Coalition (CTC), a group of several thousand security experts volunteering their time to fight COVID-related criminal activity online, recently published data showing the rapid rise in new domains began in the last week of February, around the same time the Centers for Disease Control began publicly warning that a severe global pandemic was probably inevitable.

The total number of domains registered per day that contain a COVID-19 related term, according to DomainTools. The red line indicates the count of domains that DomainTools determined are “likely malicious.” The blue line refers to domains that are likely benign.

“Since March 20th, the number of risky domains registered per day has been decreasing, with a notable spike around March 30th,” wrote John Conwell, principal data scientist at DomainTools [an advertiser on this site]. “Interestingly, legitimate organizations creating domains in response to the COVID-19 crisis were several weeks behind the curve from threat actors trying to take advantage of this situation. This is a pattern DomainTools hasn’t seen before in other crises.”

Security vendor Sophos looked at telemetry from customer endpoints to illustrate the number of new COVID-related domains that actually received traffic of late. As the company noted, one challenge in identifying potentially malicious domains is that many of them can sit dormant for days or weeks before being used for anything.

Data from security vendor Sophos, published by the Cyber Threat Coalition, shows the number of Coronavirus or COVID-19 themed domains registered per week that received traffic.

“We can see a rapid and dramatic increase of visits to potentially malicious domains exploiting the Coronavirus pandemic week over week, beginning in late February,” wrote Sophos’ Rich Harang. “Even though still a minority of cyber threats use the pandemic as a lure, some of these new domains will eventually be used for malicious purposes.”

CTC spokesman Nick Espinosa said the first spike in visits was on February 25, when group members saw about 4,000 visits to the sites they were tracking.

“The following two weeks starting on March 9 saw rapid growth, and from March 23 onwards we’re seeing between 75,000 to 130,000 visits per weekday, and about 40,000 on the weekends,” Espinosa said. “Looking at the data collected, the pattern of visits are highest on Monday and Friday, and the lowest visit count is on the weekend. Our data shows that there were virtually no customer hits on COVID-related domains prior to February 23.”

Milwaukee-based Hold Security has been publishing daily and weekly lists of all COVID-19 related domain registrations (without any scoring assigned). Here’s a graph KrebsOnSecurity put together based on that data set, which also shows a massive spike in new domain registrations in the third week of March, trailing off considerably over the past couple of weeks.

Data: Hold Security.

Not everyone is convinced we’re measuring the right things, or that the current measurements are accurate. Neil Schwartzman, executive director of the anti-spam group CAUCE, said he believes DomainTool’s estimates on the percentage of new COVID/Coronavirus-themed domains that are malicious are too high, and that many are likely benign and registered by well-meaning people seeking to share news or their own thoughts about the outbreak.

“But there’s the rub,” he said. “Bad guys get to hide amidst the good really effectively, so each one needs to be reviewed on its own. And that’s a substantial amount of work.”

At the same time, Schwartzman said, focusing purely on domains may obscure the true size and scope of the overall threat. That’s because scammers very often will establish multiple subdomains for each domain, meaning that a single COVID-related new domain registration could eventually be tied to a number of different scammy or malicious sites.

Subdomains can not only make phishing domains appear more legitimate, but they also tend to lengthen the domain so that key parts of it get pushed off the URL bar in mobile browsers.

To that end, he said, it makes perhaps the most sense to focus on new domain registrations that have encryption certificates tied to them, since the issuance of an SSL certificate for a domain is usually a sign that it is about to be put to use. As noted in previous stories here, roughly 75 percent of all phishing sites now have the padlock (start with “https://”), mainly because the major Web browsers display security alerts on sites that don’t.

Schwartzman said more domain registrars should follow the example of Los Angeles-based Namecheap Inc., which last month pledged to stop accepting the automated registration of website names that include words or phrases tied to the COVID-19 pandemic. Since then, a handful of other registrars have said they plan to manually review all such registrations going forward.

The Internet Corporation for Assigned Names and Numbers (ICANN), the organization that oversees the registrar industry, recently sent a letter urging registrars to be more proactive, but stopped short of mandating any specific actions.

Schwartzman called ICANN’s response “weak tea.”

“It’s absolutely ludicrous that ICANN hasn’t stepped up, and they will bear significant responsibility for any deaths that may happen as a result of all this,” Schwartzman said. “This is a CYA response at best, and dictates to no one that they should do anything.”

Michael Daniel, president of the Cyber Threat Alliance — a cybersecurity industry group that’s also been working to fight COVID-19 related fraud — agreed, saying more pressure needs to be applied to the registrar community.

“It’s really hard to do anything about this unless the registrars step up and do something on their own,” Daniel said. “It’s either that or the government gets involved. That doesn’t mean some [registrars] aren’t doing what they can, but in general what the industry is doing is nowhere near as fast as the bad guys are generating these domains.”

The U.S. government may well soon get more involved. Earlier this week, Senators Cory Booker (D-N.J.), Maggie Hassan (D-N.H.) and Mazie K. Hirono (D-Hawaii) sent letters to eight domain name company leaders, demanding to know what they were doing to combat the threat of malicious domains, and urging them to do more.

“As cybercriminals and other malevolent actors seek to take advantage of the Coronavirus pandemic, it is critical that domain name registrars like yours (1) exercise diligence and ensure that only legitimate organizations can register Coronavirus-related domain names and domain names referencing online communications platforms; (2) act quickly to suspend, cancel, or terminate registrations for domains that are involved in unlawful or harmful activity; and (3) cooperate with law enforcement to help bring to justice cybercriminals profiting from the Coronavirus pandemic,” the senators wrote.

MBRLocker Wiper Malware | Destructive Pranks Are No Joke For Victims

Earlier this month a steady stream of new MBRLocker malware variants began to appear, locking victims out of their devices. While many of these seem to be pranks rather than serious attempts at extortion like typical ransomware, the effect is no less disruptive and potentially just as damaging. This week, some attention-seeking pranksters decided to troll our own Vitali Kremez by releasing an MBRLocker variant using his name and revealing his personal contact details. While we wouldn’t ordinarily comment on such stunts, the issue has already been widely reported in the media.

Why Are Security Researchers Targeted by Malware Authors?

It’s not uncommon for malware authors to bait prominent security researchers and other cybercrime fighters. For example, a malspam campaign trolled AVIRA CEO, Travis Witteveen in 2016, while a ransomware campaign the same year dubbed ‘Black Shades’ included strings taunting researchers. Other ransomware like GandCrab has been known to call out researchers by name in code strings, and earlier this year Maze ransomware singled out Vitali Kremez, Hasherezade and CryptoInsane for special mention in their code.

However, it rarely gets as personal as this latest incident, in which the malware authors impersonated Vitali Kremez, and also included his personal contact details, falsely claimed to be promoting SentinelOne,  and also called out security researchers @MalwareHunterTeam. Needless to say, neither SentinelOne nor any of the named researchers are in any way associated with this destructive prank. 

The purpose of such stunts is usually attention-seeking, one of the trademarks of the ‘script kiddie’ class of threat actors; professionals generally avoid such behavior, as history shows such attention-seeking is one of the primary opsec failures that lead to the capture of cyber criminals by law enforcement. And while we wouldn’t ordinarily “feed the troll”, the widespread attention this has received in the mainstream cyber media as well as the confusion on behalf of some victims of this recent spate of MBRLocker variants justifies a clarification.

What is an MBRLocker?

MBR stands for “Master Boot Record”, which is a small sector on a disk drive that holds information needed by the operating system in order to boot. Once a machine boots, it will read the MBR first and only then will start the operating system. As such, manipulating the MBR will cause a failure to start the operating system, and from the average user standpoint, they will face a situation where, instead of the operating system being loaded and the user presented with a login screen or desktop view, they will get a command line view of a taunting message from the attacker splashed across the screen. 

From a technical point of view, malware that ‘locks’ the MBR typically copies the original MBR to another part of the drive and overwrites the original MBR with the malware author’s code. When the user attempts to boot or restart a device after the malware has done its work, the computer will load whatever code the malicious prankster has placed in the custom MBR. Instead of loading the operating system, the malware displays the attacker’s taunting or threatening message.

MBRLockers have been around for a long time and are relatively unsophisticated malware. The tools to create these have been around since 2011 or so, and are widely available. 

Over the last year we have seen something of a resurgence in the use of MBRLockers, resulting from some ‘aggressive’ advertising through Youtube, Discord, and similar social media platforms. Recently there have been multiple attacks observed leveraging this tool, outside of the ‘SentinelOne Labs’ focused example. Most are far more generic in nature, prompting victims to communicate with the attackers, via email, to receive the “unlock code”. Some of these are scams, others are genuine ransomware attempts, and still others are just purely destructive.

Often, an MBRLocker is not as fatal as it may seem. In some cases, victims have found that they can escape the custom MBR and restore the original by using the keychord “CTL+ALT+ESC”. However, this does not work on all variants, including the one released this week that has caused so much attention. 

If you have been affected by this recent MBRLocker on an unprotected machine, the primary mitigation is to restore from a known-good backup. As MBRLockers are typically spread through download sites offering cracked versions of commercial software, be sure that your users are avoiding such sites and ensure your devices are protected by a trusted security solution. 

Does SentinelOne Protect Against MBRLocker?

Yes, it does. As demonstrated in the video below, the SentinelOne platform protects customers from all variants of MBRLocker.  
 

Conclusion

Defenders are used to dealing with cybercriminals that are motivated by profit, whether that comes from ransomware, adware, business email compromise, cryptomining, data theft or any one of the other myriad scams they come up with. Crude wiper malware like the one we’ve seen this week is just a destructive prank that yields only two things for the perpetrators: thrills and publicity. For victims without the protection of a modern security solution, it’s nothing but misery. Therein lies the one thing that such pranksters do have in common with professional cybercriminals: a lack of concern for the damage they do.


Like this article? Follow us on LinkedIn, Twitter, YouTube or Facebook to see the content we post.

Read more about Cyber Security

Frame AI raises $6.3M Series A to help understand customers across channels

Frame AI, a New York City startup that uses artificial intelligence and machine learning to help companies understand their customers better across multiple channels, announced a $6.3 million Series A investment today.

G20 Ventures and Greycroft led the round together. Bill Wiberg, co-founder and partner at G20, will join Frame’s board under the terms of the deal. The total raised with an earlier seed round is over $10 million, according to the company.

“Frame is basically an early warning system and continuous monitoring tool for your customer voice,” Frame CEO and co-founder George Davis told TechCrunch . What that means, in practice, is the tool plugs into help desk software, call center tooling, CRM systems and anywhere else in a company that communicates with a customer.

“We then use natural language understanding to pull out emerging themes and basically aggregate them to account and segment levels so that customer experience leaders can prioritize taking actions to improve their relationships,” Davis explained.

He believes that customer experience leaders are being asked to do more and more in terms of talking to customers on ever more channels and digesting that into useful information for the rest of their company to be responsive to customer needs, and he says that there isn’t a lot of tooling to help with this particular part of the customer experience problem.

“We don’t think they have the right tools to do either the listening in the first place or the analysis. We’re trying to make it possible for them to hear their customers everywhere they’re already talking to them, and then act on that information,” he said.

He says they work alongside customer data platforms (CDPs) like Segment, Salesforce Customer 360 and Adobe Real-time CDP. “We can take the customer voice information from all of these unstructured sources, all these natural language sources and turn it into moments that can be contributed back to one of these structured data platforms.”

Davis certainly recognizes that his company is getting this money in the middle of a health and economic crisis, and he hopes that a tool like his that can help take the pulse of the customer across multiple channels can help companies succeed at a time when a data-driven approach to customer experience is more important than ever.

He says that by continuing to hire through this and building his company, he can contribute to restarting the economic engine, even if in some small way.

“It’s a bleak time, but I have a lot of confidence in New York and in the country, in the customer experience community and in the world’s ability to bounce back strong from this. I think it’s actually created a lot of solidarity that we’re all going to find a lot of new opportunities, and we’re going to just keep building Frame as fast as we can.”

DoD Inspector General report finds everything was basically hunky-dory with JEDI cloud contract bid

While controversy has dogged the $10 billion, decade-long JEDI contract since its earliest days, a report by the DoD’s Inspector General’s Office concluded today that, while there were some funky bits and potential conflicts, overall the contract procurement process was fair and legal and  the president did not unduly influence the process in spite of public comments.

There were a number of issues along the way about whether the single contractor award was fair or reasonable, about whether there were was White House influence on the decision, and whether the president wanted to prevent Amazon founder Jeff Bezos, who also owns the Washington Post, from getting the contract.

There were questions about whether certain personnel, who had been or were about to be Amazon employees, had undue influence on the contents of the RFP or if former Secretary of Defense showed favor to Amazon, which ultimately did not even win the contract, and that one of Mattis’ under secretaries, in fact, owned stock in Microsoft .

It’s worth noting that the report states clearly that it is not looking at the merits of this contract award or whether the correct company won on technical acumen. It was looking at all of these controversial parts that came up throughout the process. As the report stated:

“In this report, we do not draw a conclusion regarding whether the DoD appropriately awarded the JEDI Cloud contract to Microsoft rather than Amazon Web Services. We did not assess the merits of the contractors’ proposals or DoD’s technical or price evaluations; rather we reviewed the source selection process and determined that it was in compliance with applicable statutes, policies, and the evaluation process described in the Request for Proposals.”

Although the report indicates that the White House would not cooperate with the investigation into potential bias, the investigators claim they had enough discussions with parties involved with the decision to conclude that there was no undue influence on the White House’s part:

“However, we believe the evidence we received showed that the DoD personnel who evaluated the contract proposals and awarded Microsoft the JEDI Cloud contract were not pressured regarding their decision on the award of the contract by any DoD leaders more senior to them, who may have communicated with the White House,” the report stated.

The report chose to blame the media instead, at least for partly giving the impression that the White House had influenced the process, stating:

“Yet, these media reports, and the reports of President Trump’s statements about Amazon, ongoing bid protests and “lobbying” by JEDI Cloud competitors, as well as inaccurate media reports about the JEDI Cloud procurement process, may have created the appearance or perception that the contract award process was not fair or unbiased.”

It’s worth noting that we reported that AWS president Andy Jassy made it clear in a press conference at AWS re:Invent in December that the company believed the president’s words had influenced the process.

“I think that we ended up with a situation where there was political interference. When you have a sitting president, who has shared openly his disdain for a company, and the leader of that company, it makes it really difficult for government agencies, including the DoD, to make objective decisions without fear of reprisal.”

As for other points of controversy, such as those previously referenced biases, all were found lacking by the Inspector General. While the earliest complaints from Oracle and others were that Deap Ubhi and Victor Gavin, two individuals involved in drafting the RFP, failed to disclose they were offered jobs by Amazon during that time.

The report concluded that while Ubhi violated ethics rules, his involvement wasn’t substantial enough to influence the RFP (which again, Amazon didn’t win). “However, we concluded that Mr. Ubhi’s brief early involvement in the JEDI Cloud Initiative was not substantial and did not provide any advantage to his prospective employer, Amazon…,” the report stated.

The report found Gavin did not violate any ethics rules in spite of taking a job with Amazon because he had disqualified himself from the process, nor did the report find that former Secretary Mattis had any ethical violations in its investigation.

One final note: Stacy Cummings, Principal Deputy Assistant Secretary of Defense for Acquisition and Deputy Assistant Secretary of Defense for Acquisition Enablers, who worked for Mattis, owned some stock in Microsoft and did not disclose this. While the report found that was a violation of ethics guidelines, it ultimately concluded this did not unduly influence the award to Microsoft.

While the report is a substantial, 313 pages, it basically concludes that as far as the purview of the Inspector General is concerned, the process was basically conducted in a fair way. The court case, however involving Amazon’s protest of the award to Microsoft continues. And the project remains on hold until that is concluded.

Note: Microsoft and Amazon did not respond to requests from TechCrunch for comments before we published this article. If that changes, we will update accordingly.

Report on the Joint Enterprise Defense Infrastructure (Jedi) Cloud Procurement Dodig-2020-079 by TechCrunch on Scribd

Pinpoint releases dashboard to bring visibility to software engineering operations

As companies look for better ways to understand how different departments work at a granular level, engineering has traditionally been a black box of siloed data. Pinpoint, an Austin-based startup, has been working on a platform to bring this information into a single view, and today it released a dashboard to help companies understand what’s happening across software engineering from an operational perspective.

Jeff Haynie, co-founder and CEO at Pinpoint says the company’s mission for the last two years has been giving greater visibility into the  engineering department, something he says is even more important in the current context with workers spread out at home.

“Companies give engineering a bunch of money, and they build a bunch of amazing things, but in the end, it is just a black box, and we really don’t know what happens,” Haynie said. He says his company has been working to take all of the data to try and contextualize it, bring it together and correlate that information.

Today, they are introducing a dashboard that takes what they’ve been building and pulls it together into a single view, which is 100% self-serve. Prior to this, you needed a bunch of hand-holding from Pinpoint personnel to get it up and running, but today you can download the product and sign into your various services such as your git repository, your CI/CD software, your IDE and so forth.

It also provides a way for engineering personnel to communicate with one another without leaving the tool.

Pinpoint software engineering dashboard. Image Credit: Pinpoint

“Obviously, we will handhold and help people as they need it, and we have an enterprise version of the product with a higher level of SLA, and we have a customer success team to do that, but we’ve really focused this new release on purely self service,” Haynie said.

What’s more, while there is a free version already for teams under 10 people that’s free forever, with the release of today’s product, the company is offering unlimited access to the dashboard for free for three months.

Haynie says they’re like any startup right now, but having experience with several other startups and having lived through 9/11, the dot-com crash, 2008 and so forth, he knows how to hunker down and preserve cash. At the same time, he says they are seeing a lot of in-bound interest in the product, and they wanted to come up with a creative way to help customers through this crisis, while putting the product out there for people to use.

“We’re like any other startup or any other business frankly at this point: we’re nervous and scared. How do you survive this [and how long will it last]? The other side of it is that we’re rushing to take advantage of this inbound interest that we’re getting and trying to sort of seize the opportunity and try to be creative about how we help them.”

The startup hopes that, if companies find the product useful, after three months they won’t mind paying for the full version. For now, it’s just putting it out there for free and seeing what happens with it — just another startup trying to find a way through this crisis.