Dave Kelly (@evplusev) 's Twitter Profile
Dave Kelly

@evplusev

Attracted to complex problems... Cofounder & CTO @SensCy, Former Cyber Command & Intel, USMC Vet, Poker Player, Stock Trader, EV=Expected Value

ID: 1680622674

linkhttp://www.senscy.com calendar_today18-08-2013 12:50:56

25,25K Tweet

3,3K Followers

622 Following

Dave Kelly (@evplusev) 's Twitter Profile Photo

Phishing attacks are not a vulnerability. They are a fact of life in the digital world. Learn to recognize them to keep yourself and your company safe.

Dave Kelly (@evplusev) 's Twitter Profile Photo

In the early stages of a start-up you must find people that are comfortable with abstraction; executing on ideas and iterating them quickly is the key. Don’t hire “Highly experienced, process oriented professionals” until you have proven product market fit. But once you do, hire

Jack Altman (@jaltma) 's Twitter Profile Photo

Dan Lewis I think the internal experience of any pursuit is hard to understand if you haven't done it (same goes for being a parent, an artist, a politician, etc)

Mark Cuban (@mcuban) 's Twitter Profile Photo

The big insurance companies and the PBMs they own, create almost all of the complications. They are able to do so because they control the flow of patients for hospitals/providers and drug manufacturers. They are the gatekeepers for trillions of dollars of healthcare

Dave Kelly (@evplusev) 's Twitter Profile Photo

Next time you think you need that Google job to be someone, always know that the ultimate status would be forcing Google to buy your company (or displacing them all together).

Sam Altman (@sama) 's Twitter Profile Photo

if you are interested in infrastructure and very large-scale computing systems, the scale of what’s happening at openai right now is insane and we have very hard/interesting challenges. please consider joining us! we could desperately use your help.

Dave Kelly (@evplusev) 's Twitter Profile Photo

This injects catastrophic cybersecurity risk to all businesses. Here’s why: The CVE (Common Vulnerabilities and Exposures) is the backbone of the entire vulnerability ecosystem. It’s the notification process that tells us which software / firmware / hardware we own that has a

This injects catastrophic cybersecurity risk to all businesses. Here’s why:

The CVE (Common Vulnerabilities and Exposures) is the backbone of the entire vulnerability ecosystem. It’s the notification process that tells us which software / firmware / hardware we own that has a
James Clear (@jamesclear) 's Twitter Profile Photo

Don't let the hope of finding a better way prevent you from starting down the best path you know of right now. This day won't come again.

Ben Geskin (@bengeskin) 's Twitter Profile Photo

WSJ on Jony Ive and Sam Altman’s OpenAI device: • The product will be capable of being fully aware of a user's surroundings and life, will be unobtrusive, able to rest in one's pocket or on one's desk, and will be a third core device a person would put on a desk after a MacBook

WSJ on Jony Ive and Sam Altman’s OpenAI device:

• The product will be capable of being fully aware of a user's surroundings and life, will be unobtrusive, able to rest in one's pocket or on one's desk, and will be a third core device a person would put on a desk after a MacBook
The Race Club (@theraceclub) 's Twitter Profile Photo

As a physician and a swimming coach, I feel the need to chime in here. All of the known performance enhancing drugs which (by definition) are known to be effective, and when taken in significantly high enough quantities, are also known to be unsafe. We cannot rely on the swimmers

CTV Power Play (@ctv_powerplay) 's Twitter Profile Photo

U.S. President Donald Trump is threatening to block the opening of the Gordie Howe International Bridge, which he had endorsed in 2017 during his first term. Former Michigan Governor Rick Snyder helped broker the deal with Canada to build the bridge. Vassy Kapelos asked him if