MemCall confidential - do not reproduce A fabless semiconductor company developing Call-Out-Memory™ (COM) based VLSI searchable.

Slides:



Advertisements
Similar presentations
Welcome to the Open Court Business Plan Executive Summary Template!
Advertisements

Company Name Sample Template Presenter Name
Title Slide Name of your business Your name or presenter’s name
Business Plan What? Overview & reflection of the business and its owner – thorough explanation of a business idea and how it will be executed Story of.
Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco Partner Plus: Premium Enablement Accelerate Your Competitive Edge.
A Search Memory Substrate for High Throughput and Low Power Packet Processing Sangyeun Cho, Michel Hanna and Rami Melhem Dept. of Computer Science University.
A Scalable and Reconfigurable Search Memory Substrate for High Throughput Packet Processing Sangyeun Cho and Rami Melhem Dept. of Computer Science University.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Virtualization of Fixed Network Functions on the Oracle Fabric Krishna Srinivasan Director, Product Management Oracle Networking Savi Venkatachalapathy.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
1 DSL BASED NETWORK FOR 2 Vision Statement Specializing in broadband network solutions including high-speed internet access, data, voice and video services,
1 DSL BASED NETWORK FOR Air Line Pilots Association International.
SDN and Openflow.
Tattletale Toy Company ®
Overview Stewart Varney Bridge IT – Wednesday April 6, 2011.
Writing a Winning Business Plan. A business plan is a strategy for creating, launching and managing a new venture. It answers the questions of A business.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
Writing a Winning Business Plan. A business plan is a strategy for creating, launching and managing a new venture. It answers the questions of A business.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Chapter 11 Enterprise Networks & Internet Enterprise Network Architecture Internet Enterprise Network & Internet.
Writing a Winning Business Plan
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
CH. 6 TECHNOLOGY-BASED INDUSTRIES AND THE MANAGEMENT OF INNOVATION ALLEN HICKS ANTHONY BROWN CHRISTIAN GRANDORF BRADEN WALKER.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
This project is funded by the European Union Integrated Innovation Support Programme Venture Capital – Challenges & Support Barriers and Solutions Robert.
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
EWAN Equipment Last Update Copyright 2010 Kenneth M. Chipps Ph.D. 1.
Database Environments Assignment Two By Benjamin Turner Assignment Two By Benjamin Turner 8/24/2015.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
A powerful, unique (patent pending) website that pulls together everything businesses and projects need for success: Crowdsourcing Crowdfunding Social.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Your name or presenter’s name Date of presentation
DIR-835A1 Wireless N750 Dual-Band Router Wireless & Router Product Div. July 2011 D-Link WRPD.
© 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4 © 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Active Video makes any video Interactive Vassili Akimov 2006.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Presentation Guidelines. I. OPPORTUNITY 1: Market need What problem does the product solve? Is the solution to this problem based on an innovative product/technology/model?
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Firewall Network Processor™: Technical Concept and Business Solutions FNP™ – is a trademark of Fractel Inc. December 2008 Columbus.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
Assessment Process Infrastructure Inventories Demographic/User Analysis Financial Modeling Infrastructure Options –Needs versus capacity delivered –Capacity.
(C) 2008 Clusterpoint(C) 2008 ClusterPoint Ltd. Empowering You to Manage and Drive Down Database Costs April 17, 2009 Gints Ernestsons, CEO © 2009 Clusterpoint.
Wire Speed Packet Classification Without TCAMs ACM SIGMETRICS 2007 Qunfeng Dong (University of Wisconsin-Madison) Suman Banerjee (University of Wisconsin-Madison)
Center for cei Entrepreneurship & Innovation Technology Venture Sequence 9/6/05.
VENTURE PRESENTATION Version [VENTURE NAME HERE] VERY IMPORTANT: you should be knowledgeable of the IP rules of IST and of those organizations that.
 2007 Level 3 Communications, Inc. All Rights Reserved. 1 Business Markets Group: Reliable and Responsive Prepared for CUSTOMER NAME PRESENTER’S NAME.
1 © 2003, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Advancing the Carrier IP/MPLS Edge Routing Technology Group Cisco Systems, Inc. April.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Assoc. Prof. Dr. Nik Maheran Nik Muhammad, (CFP, CITM, IBBM)
 Cachet Technologies 1998 Cachet Technologies Technology Overview February 1998.
1 Gary Williams – Director Jeni Clark – Associate Director New Product Development May 16,2012.
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
Page: 1 The Evolution of Networking The next step in products & solutions Jan Hof EMEA Product Marketing Manager.
Profit from a practical IP Billing Solution Suresh Balasubramanian Senior Product Manager Macrovision.
May 2010 Company Due Diligence Process The University of Texas at Austin.
© 2001 Caspian Networks, Inc. CONFIDENTIAL AND PROPRIETARY INFORMATION Internet Intelligence and Traffic Growth Lawrence G. Roberts Chairman & CTO Caspian.
Content Delivery Cloud A Better Alternative To Your Content Delivery Network (CDN) ©2013 Riverbed Technology Confidential and Proprietary.
Name of the Startup. Product / Service Offering Summary You may like to use the following sentence to bring out the key elements of the service offering.
Product Introduction --QoS VPN Router G3 16/12/2015 Business WLAN
“…Embedded Software to OSS/Applications…”
James Crowe Goldman Sachs Communacopia XVII 2008
Campus Software Deployment Solution
Presentation transcript:

MemCall confidential - do not reproduce A fabless semiconductor company developing Call-Out-Memory™ (COM) based VLSI searchable memories.

MemCall confidential - do not reproduce The overflow of data in our new Information Age creates an urgent need for enhanced search technology.

MemCall confidential - do not reproduce MemCall’s Products A flexible high speed low power searchable memory with revolutionary new features. Two products out of one design: A general purpose chip for use in database acceleration, networking, security products and other applications. A networking Application Specific Standard Product (ASSP) to enable high-end routers/switches

MemCall confidential - do not reproduce The General Purpose Chip Features Linear search. –Search-key size: 32-bit to 256 Kbit. –Search can start at any position within the data. 250 million searches per second at maximum throughput. Dynamic search range 4 to 18 Mbit binary data. Transparent cascading of up to 32 chips.

MemCall confidential - do not reproduce The Networking ASSP Features Table based search. 250 million searches per second. Search-key size: 36, 72, 144 or 288 bits. Dynamic selection of search-key size (cycle-by-cycle ). Dynamic compare range Very low power consumption Uniform search time. Single cycle table update Up to 18 Mbit ternary data. Transparent cascading of a large number of chips.

MemCall confidential - do not reproduce The value of variable search-key size and position - an example Today: A 33-byte database record has to be stored in 64-byte lines (where 32-byte is the next smaller size). A COM: can store the records in 32- byte lines, utilizing the entire memory.

MemCall confidential - do not reproduce The COM Advantage - Opening a New Dimension Linear search Variable search key size Variable search key position Dynamic search range

MemCall confidential - do not reproduce The COM Advantage Relative to hardware search: The flexibility dimension - a set of new features first available in hardware. Very low power consumption - 75% less than the closest competitor! Much faster than other of-the-shelf search solutions! Relative to software search: At least two orders of magnitude faster. Uniform table based search time. Frees valuable processor time.

MemCall confidential - do not reproduce Markets First target - segments within the WAN and LAN markets. Next - database management accelerators.

MemCall confidential - do not reproduce New and Enhanced Applications. The networking ASSP enables high-end ATM, IP and SONET/SDH routing - much faster than today, at much lower power consumption. Applications enabled by the general purpose chip: –Wire-speed hardware intruder/virus detection. –Hardware database management acceleration. –Enhanced multi-layer, content based, routing.

MemCall confidential - do not reproduce High-end Networking Growth Opportunities SONET/SDH ASSP unit growth in 1999 was 36.8% for OC-48 (2.5G), and 112.7% for OC-192 (10G) {IDC #22844} Layer 4/7 switch port shipments expected CAGR is 123% {IDC #22925} 10 Gigabit Ethernet switch port shipments expected CAGR is 171% {IDC #22925}

MemCall confidential - do not reproduce COM Applications DB accelerator SAN Load balancing High end LAN switch Firewall ISP SONET routers Internet backbone Enterprise LAN Core

MemCall confidential - do not reproduce Other Markets  Database management accelerators  Load balancing for Internet servers  Policy management for networks  Encryption; Firewalls  Virtual Private Networks (VPN).  Storage Area Networks (SAN)  Video/audio compression  Pattern matching  Cache controllers

MemCall confidential - do not reproduce Competition SW solutions – very flexible but very slow. Proprietary HW solutions – high cost; medium speed; high integration and fit to specific customer’s solution. Off the shelf CAMs – Lara Networks; Mosaid Technologies; Music Semiconductors; others – rigid table based implementations, high speed (but less than COM) and high power consumption. A high barrier to entry: Full custom VLSI solution. Protected by patent applications.

MemCall confidential - do not reproduce Intellectual Property Filed five patent applications to date, others are in formulation. The first patent application, on which the technology is based, has already gone through the preliminary search by the European Patent Office in its capacity as international searching authority, with the result that no prior patents were found to be relevant to the invention.

MemCall confidential - do not reproduce Search Solutions Comparison

MemCall confidential - do not reproduce Company Overview Status: Team buildup in progress. COM design started, with encouraging simulation results. Customers’ contacts - good reactions, feedback incorporated into the definition. Expected tapeout - Q Finance:$1.0 million by Eshed Robotec. An additional $1.5 million committed according to milestones. Ownership: 72% Eshed Robotec. 28% founders & CEO.

MemCall confidential - do not reproduce Management Team

MemCall confidential - do not reproduce MemCall’s Momentum Q2’01 - Establish R&D team and infrastructure. Select foundry. Q3’01 - Establish close relationship with 1+ major potential customer. Q4 ‘01 - Tapeout. Q1’02 - Samples to select customers. Q2’02 - Product launch.

MemCall confidential - do not reproduce Use of Proceeds Early stage investment opportunity - $7.5M. Reach product launch and first samples (Q3 2002). They will be allocated: –60% for R&D –25% for S&M –5% for G&A –the rest for working capital

MemCall confidential - do not reproduce Summary Call-Out-Memory technology based VLSI searchable memories. Clear product advantage: Linear search; Much faster than others; Very low power consumption! Protected by patent applications. Experienced executive team. High revenue existing markets; First mover into new markets. Profit expected in 2003.

MemCall confidential - do not reproduce