Tag: learn

  • StrictlyVC at Disrupt 2025: Inside the LP Track

    StrictlyVC at Disrupt 2025: Inside the LP Track

    StrictlyVC is back at TechCrunch Disrupt in October, bringing together the insiders who shape the venture capital landscape. This time there will be a sharper focus on the market’s biggest challenge: liquidity.

    In an era of extended exit timelines, slowed distributions, and increasingly selective LPs, the conversations behind closed doors matter more than ever. Working with Cendana Capital, which has backed 80+ funds in its 15-year history, we are launching a new off-the-record LP Track that offers an unfiltered look at where capital is flowing, how LP priorities are shifting, and what GPs need to know to survive and thrive in this environment. If you raise, deploy, or manage capital, this is the room you want to be in.

    Join us on October 28 from 3 p.m. at San Francisco’s Moscone West for drinks and networking before the program begins. Attendance is limited to Investor Pass holders only — and every session is designed to arm you with strategies you can use immediately in today’s challenging fundraising climate while at the same time connecting you with the people you need to know. Secure your Investor Pass and be part of this curated event built for investors.

    Meet the startup investment leaders

    Without further ado, meet the VC voices driving the insider conversations. Explore the Disrupt speaker page to learn more.

    The Liquidity Reckoning: Navigating the New LP Landscapewith Michael Kim, Cendana Capital; Lara Banks, Makena Capital; and a speaker to be announced

    Exits have slowed to a trickle, distributions are under pressure, and LPs are recalibrating their venture allocations. Michael Kim and Lara Banks unpack how the liquidity drought is reshaping LP-GP relationships, fund pacing, and capital commitments. Expect candid discussion on where LPs see opportunity, where they’re pulling back, and how GPs can position themselves to weather the storm.

    Inside the LP Selection Process: Differentiating in a Competitive Marketwith Michael Kim and Kelli Fontaine, Cendana Capital, and a speaker to be announced

    Techcrunch event

    Tech and VC heavyweights join the Disrupt 2025 agenda

    Netflix, ElevenLabs, Wayve, Sequoia Capital, Elad Gil — just a few of the heavy hitters joining the Disrupt 2025 agenda. They’re here to deliver the insights that fuel startup growth and sharpen your edge. Don’t miss the 20th anniversary of TechCrunch Disrupt, and a chance to learn from the top voices in tech — grab your ticket now and save up to $600+ before prices rise.

    Tech and VC heavyweights join the Disrupt 2025 agenda

    Netflix, ElevenLabs, Wayve, Sequoia Capital — just a few of the heavy hitters joining the Disrupt 2025 agenda. They’re here to deliver the insights that fuel startup growth and sharpen your edge. Don’t miss the 20th anniversary of TechCrunch Disrupt, and a chance to learn from the top voices in tech — grab your ticket now and save up to $675 before prices rise.

    San Francisco
    |
    October 27-29, 2025

    REGISTER NOW

    With fundraising timelines stretching and capital concentration intensifying, LPs are more selective than ever. What actually gets a GP noticed and funded in 2025’s competitive market? Michael Kim and Kelli Fontaine of Cendana Capital pull back the curtain on how LPs evaluate emerging managers, assess fund strategy, and weigh track records against market conditions. Expect candid insights on building trust, standing out in a crowded field, and avoiding the pitfalls that quietly kill commitments.

    GP Perspectives on LP Relationshipswith Kevin Hartz, A*

    The GP-LP dynamic is the quiet engine that drives venture capital. Kevin Hartz of A* shares a founder-turned-investor’s perspective on cultivating lasting LP partnerships, managing expectations through cycles, and aligning on both vision and returns. From first meetings to multi-fund commitments, Hartz offers hard-earned advice on building trust and turning transactional relationships into long-term alliances.

    Grab your Investor Pass and take a seat

    Take advantage of exclusive, investor-only sessions and connect with fellow VCs and startup leaders at StrictlyVC on October 28. And don’t forget to dive into the full Disrupt 2025 experience — industry-driven stages, expert-led breakouts, curated roundtables, investor-founder meetings, 200+ startup demos, and more. Register for your Disrupt ticket before rates increase after August 31.GV CEO David Krane at StrictlyVC SF.Image Credits:Slava Blazer Photography

    We’re always looking to evolve, and by providing some insight into your perspective and feedback into TechCrunch and our coverage and events, you can help us! Fill out this survey to let us know how we’re doing and get the chance to win a prize in return!

  • Innovative Dental Care: Tips and Insights for a Healthier Smile – Health Cages

    Innovative Dental Care: Tips and Insights for a Healthier Smile – Health Cages

    Key Takeaways

    • Discover the latest advancements in dental care for healthier oral hygiene.
    • Learn practical tips for maintaining a radiant smile at any age.
    • Understand the significance of preventive care and regular check-ups.

    In today’s fast-paced world, maintaining a healthy smile has become easier thanks to significant advancements in dental care. Whether you’re visiting a dentist in Manhattan or elsewhere, understanding the latest technologies and practices is crucial for maintaining optimal oral health. Gone are the days when dental visits were filled with apprehension; modern techniques have revolutionized the experience. Regular dental visits, preventive care, and good oral hygiene habits ensure your teeth and gums are in peak condition year-round. This article aims to explore these innovations and provide tips for maintaining a radiant smile.

    (adsbygoogle=window.adsbygoogle||[]).push({})

    Advancements in dental technology have catapulted oral care from rudimentary practices to sophisticated, patient-centric solutions. These innovations and an increased emphasis on patient education are transforming how we approach oral health. From digital imaging to laser treatments, being informed about these advancements helps patients make educated decisions about their dental care needs. As we delve deeper, you’ll find knowledge essential for making the right decisions for your dental health.

    (adsbygoogle=window.adsbygoogle||[]).push({})

    Introduction to Modern Dental Care

    The landscape of dental care has seen tremendous evolution, especially with new technologies and treatment methodologies. These advancements have paved the way for more effective and less invasive oral care. Dentists now utilize digital tools that enhance precision and reduce discomfort, making visits to the dentist more pleasant and far less daunting. Procedures requiring multiple visits can now be efficiently completed in just one or two, thanks to innovations like computer-aided design and manufacturing (CAD/CAM). Modern dentistry is about comfort, efficiency, and optimal outcomes, catering to preventive and restorative needs.

    (adsbygoogle=window.adsbygoogle||[]).push({})

    The Importance of Regular Dental Check-Ups

    Routine dental examinations are fundamental to successful dental care. Such visits allow for the early detection of potential issues like cavities, gum disease, or even oral cancer. This early intervention is crucial since it can stop small problems from escalating into significant health concerns. Additionally, dentists perform professional cleanings that remove plaque and tartar, which daily brushing may miss, reducing the risk of cavities and gum disease. Through routine check-ups, not only can patients achieve better oral health, but they also reinforce the foundation for long-term wellness.

    (adsbygoogle=window.adsbygoogle||[]).push({})

    Advancements in Dental Technology

    Modern dental technology is transforming patient care in unprecedented ways. Innovations like CAD/CAM systems, 3D printing, and digital imaging have replaced many traditional methods. These technologies offer precision in crafting crowns, bridges, and other restorations, shortening treatment times significantly. Moreover, they enhance the quality of care by ensuring fitted and durable dental solutions. Dental lasers, used in soft and hard tissue procedures, minimize discomfort, bleeding, and healing time, making treatments more tolerable. As dental technology advances, patients can expect more tailored and efficient care.

    Tips for Daily Oral Hygiene

    Maintaining daily oral hygiene is essential in safeguarding against dental problems. Brushing twice daily is recommended, and it’s crucial to floss regularly to eliminate plaque from spots your toothbrush cannot access. Purchasing an electric toothbrush can be especially advantageous. Health experts highlight that electric toothbrushes often outperform manual versions in reducing plaque and gingivitis. It’s also wise to use an antimicrobial mouthwash to manage bacteria levels in the mouth, contributing to oral health.

    (adsbygoogle=window.adsbygoogle||[]).push({})

    Nutritional Impact on Dental Health

    Nutrition is essential for preserving oral health. Foods rich in calcium and phosphorus are especially advantageous, as they can help remineralize tooth enamel. Conversely, excessive consumption of sugary or starchy foods can lead to decay because the bacteria in the mouth consume these sugars, generating acid that wears down enamel. Individuals can greatly enhance their dental health and overall well-being by making mindful dietary choices.

    Myth-Busting Common Dental Misconceptions

    Steering through the realm of oral health can be fraught with misconceptions. For instance, a common myth is that sugar is the sole culprit for cavities. In reality, the acid produced by bacteria metabolizing sugar causes decay. Another misconception is that bleeding gums are normal; they may serve as a preliminary sign of gum disease. Dispelling these myths is essential, empowering individuals to adopt proper dental care practices and avoid potentially harmful habits.

    Exploring the Role of Cosmetic Dentistry

    Cosmetic dentistry has gained significant popularity, providing solutions for individuals looking to improve the look of their smile. Procedures like teeth whitening, veneers, and dental bonding complement aesthetic improvements while providing structural benefits. These treatments are relatively accessible and can have a significant psychological impact, boosting self-esteem. As more people seek ways to improve their smiles, cosmetic dentistry continues to grow, offering many options for virtually any dental need.

    The Future of Dental Care

    The future of dental care holds thrilling developments that will enhance the patient experience even more. Developments in artificial intelligence, for instance, are leading to more precise diagnostics and tailored treatment strategies. Future technologies aim to make dental care even less invasive and more efficient, ensuring broader access and better patient outcomes. With ongoing research and innovation, dentistry will continue to evolve, adapting to and meeting the ever-changing needs of patients worldwide.

     

  • Coinbase CEO explains why he fired engineers who didn’t try AI immediately

    Coinbase CEO explains why he fired engineers who didn’t try AI immediately

    It’s hard to find programmers these days who aren’t using AI coding assistants in some capacity, especially to write the repetitive, mundane bits.

    But those who refused to try the tools when Coinbase bought enterprise licenses for GitHub Copilot and Cursor got promptly fired, CEO Brian Armstrong said this week on John Collison’s podcast “Cheeky Pint.” (Collison is the co-founder and president of the payments company Stripe.)

    After getting licenses to cover every engineer, some at the cryptocurrency exchange warned Armstrong that adoption would be slow, predicting it would take months to get even half the engineers using AI. 

    Armstrong was shocked at the thought. “I went rogue,” he said, and posted a mandate in the company’s main engineering Slack channel. “I said, ‘AI is important. We need you to all learn it and at least onboard. You don’t have to use it every day yet until we do some training, but at least onboard by the end of the week. And if not, I’m hosting a meeting on Saturday with everybody who hasn’t done it and I’d like to meet with you to understand why.’” 

    At the meeting, some people had reasonable explanations for not getting their AI assistant accounts set up during the week, like being on vacation, Armstrong said.

    “I jumped on this call on Saturday and there were a couple people that had not done it. Some of them had a good reason, because they were just getting back from some trip or something, and some of them didn’t [have a good reason]. And they got fired.”

    Armstrong admits that it was a “heavy-handed approach” and there were people in the company who “didn’t like it.”

    Techcrunch event

    Tech and VC heavyweights join the Disrupt 2025 agenda

    Netflix, ElevenLabs, Wayve, Sequoia Capital, Elad Gil — just a few of the heavy hitters joining the Disrupt 2025 agenda. They’re here to deliver the insights that fuel startup growth and sharpen your edge. Don’t miss the 20th anniversary of TechCrunch Disrupt, and a chance to learn from the top voices in tech — grab your ticket now and save up to $600+ before prices rise.

    Tech and VC heavyweights join the Disrupt 2025 agenda

    Netflix, ElevenLabs, Wayve, Sequoia Capital — just a few of the heavy hitters joining the Disrupt 2025 agenda. They’re here to deliver the insights that fuel startup growth and sharpen your edge. Don’t miss the 20th anniversary of TechCrunch Disrupt, and a chance to learn from the top voices in tech — grab your ticket now and save up to $675 before prices rise.

    San Francisco
    |
    October 27-29, 2025

    REGISTER NOW

    While it doesn’t sound like very many people were fired, Armstrong said it sent a clear message that AI is not optional. Still, everything about that story is wild: that there were engineers who wouldn’t spend a few minutes of their week signing up for and testing the AI assistant — the most hyped tech for coders ever — and that Armstrong was willing to fire them over it.

    Coinbase did not respond to a request for comment.

    Since then, Armstrong has leaned further into the training. He said the company hosts monthly meetings where teams who have mastered creative ways to use AI share what they have learned.

    Interestingly, Collison, who has been programming since childhood, questioned how much companies should be relying on AI-generated code.

    “It’s clear that it is very helpful to have AI helping you write code. It’s not clear how you run an AI-coded code base,” he commented. Armstrong replied, “I agree.”

    Indeed, as TechCrunch previously reported, a former OpenAI engineer described that company’s central code repository as “a bit of a dumping ground.” The engineer said management had begun dedicating engineering resources to improve the situation.

    We’re always looking to evolve, and by providing some insight into your perspective and feedback into TechCrunch and our coverage and events, you can help us! Fill out this survey to let us know how we’re doing and get the chance to win a prize in return!

  • Navigate NZ Winter: Essential Truck Parts & Checks for Optimal Cold-Weather Performance

    Navigate NZ Winter: Essential Truck Parts & Checks for Optimal Cold-Weather Performance

    Winter doesn’t wait—and neither should your maintenance. In New Zealand, low overnight temperatures, damp conditions, and frequent stop-start driving quickly reveal any weak points in your truck’s setup. A seal that holds fine in summer might fail in frost. Grease that performs well in the workshop can thicken just enough to strain bearings before you even leave the yard. To keep your fleet running reliably, it’s crucial to learn about heavy vehicle winter maintenance NZ and get ahead of the components most likely to struggle in the cold.

    Why essential truck parts for NZ winter need early attention

    Cold conditions can significantly affect vehicle performance after extended idle periods, wet loading zones, and tight schedules. Wheel-end components, in particular, are highly sensitive to temperature changes. If you’re relying on pre-assembled bearing units or insert assemblies, the internal grease must remain stable in freezing conditions. Trucks operating overnight in Otago or across alpine passes need parts that are rated for sub-zero use. Just because a component is sealed doesn’t mean it’s protected against winter’s harsh elements.

    The mistake many fleets make is assuming summer performance translates to winter reliability. But rubber contracts, grease thickens, and even properly torqued fasteners can shift under cold stress. Preparation begins with awareness—knowing which components suffer first when the temperature drops.

  • NATO summit: The defence ‘tech race’ is on — this is how NATO aims to get ahead

    NATO summit: The defence ‘tech race’ is on — this is how NATO aims to get ahead

    Euronews Next learned about NATO’s plans to better integrate new technologies and the defence tech to watch in the future, ahead of the summit at The Hague.

    ADVERTISEMENT

    As defence technologies and the geopolitical climate rapidly evolve, NATO has formally launched a plan to speed the adoption of new tech products.
    World leaders gathered at the NATO summit at the Hague on Tuesday, with the organisation’s new secretary general Mark Rutte and many allies ready to sign on to raising core defence spending to 3.5 per cent of gross domestic product (GDP) by 2035.

    One of the main points to be decided is the Rapid Adoption Action plan. As its name suggests, it aims to speed up how NATO and its allies can integrate technologies from companies so it can use the latest tech products within a maximum of 24 months.
    “We are in what we call a tech race,” Jean-Charles Ellermann-Kingombe, NATO assistant secretary general for innovation, hybrid, and cyber, said in a press briefing which Euronews Next attended.

    Related

    When it comes to defence tech, Europe could learn lessons on speed from Ukraine

    He said that in Russia’s war against Ukraine, Russia has reduced the product development cycle to as short as two to 12 weeks.
    Meanwhile, he said China has “a serious integration of their defence industry and their defence forces”.

    “We have a defence industry that has been struggling to keep up pace. We’ve seen it following the war in Ukraine as we’ve been emptying our stocks. Production lines have had difficulties to keeping up the pace,’ Ellermann-Kingombe said. 

    Lessons from Ukraine

    Ellermann-Kingombe also said that the first starting point for NATO will be looking at what tech has to offer. 
    He said the speed of artificial intelligence (AI) advancements and the rapid development of drones during the war in Ukraine show that “tech today is ready and able to actually fill some of the gaps”.A JAS 39 Gripen C/D takes off during military exercise Nordic Response at Luleå-Kallax Airport, near Luleå, Sweden, Monday, March 4, 2024. NATO exerciseA JAS 39 Gripen C/D takes off during military exercise Nordic Response at Luleå-Kallax Airport, near Luleå, Sweden, Monday, March 4, 2024. NATO exercise
    Anders Wiklund/TT News Agency via AP

    AI, for example, has helped NATO by enabling precision strikes and reducing decision time by 90 per cent. But the organisation said it needs to adapt to working with start-ups and tech companies.
    “The new ecosystems work in a different way than we’re used to,” said Ellermann-Kingombe, referring to procurement requirements.
    “So if we want to exploit what that ecosystem has to offer, we also need to adapt to the way that they work,” he added.

    Related

    NATO explores new drone technology as ‘Pandora’s box’ opened in Russia’s war in Ukraine

    The Rapid Adoption Action plan aims to bridge this divide by sharing market research on a voluntary basis among allies and increasing testing to lower risks from new tech, among other measures.
    But access to governments or defence ministries is lucrative, and it is difficult for start-ups to get a foot in the door, Euronews Next previously reported. A tech company working with NATO said the organisation’s “stamp of approval” helped it work with governments. 
    NATO said in the press conference that it aims to provide a so-called badge of approval to companies that show their solutions to the military, either through a NATO programme or another way. The badge would work as a form of recognition from NATO that the companies could then use. 

    Related

    Inside NATO’s Cyber Range: How armies prepare against attack and why nations must work together

    NATO has test centres in 29 allied nations and innovators from 20 countries, said John Ridge, chief adoption officer at the NATO Innovation Fund (NIF).
    The NIF Fund is a deep tech venture capital fund that is supported by 24 of NATO’s 32 nations. It focuses on deep tech dual-use investments that support defence, security and resilience. 
    It works with NATO’s Defence Innovation Accelerator for the North Atlantic
    (DIANA), a NATO body that aims to find and accelerate dual-use innovation capacity. However, NIF does not have to invest in technologies identified by DIANA. 

    What tech is NATO interested in?

    DIANA innovators are now working on a range of new tech, including power generation on the high seas and advanced passive exoskeletons that give soldiers more strength on the battlefield and people with disabilities more mobility at home, said Tom McSorley, general counsel of NATO DIANA, at the press conference attended by Euronews Next.
    Some of the technologies NATO has invested in include Portuguese drone company Tekever and Germany’s robotics company ARX Robotics GmbH, both of which are used in Ukraine.
    NATO has looked at more than 2,000 start-ups and has invested in 12, said Ridge.

    Related

    AI cyber attacks are a ‘critical threat’. This is how NATO is countering them

    The organisation is looking into autonomy and keeping soldiers out of risk as it considers the future of defence.
    “It seems to me as if that’s a sort of a direction which all militaries are going to go. The way you can remove human beings from harm’s way, why wouldn’t you? So that’s one of the trends that we’re all ready to see, and I suspect we’ll double down onto that,” said Ellermann-Kingombe.
    Ridge also wants to make industrial bases more resilient so they can operate in war time, for example, by investing in semiconductor companies to make them more scalable. 
    “One of the lessons we should be drawing out of Ukraine is how you’re able to mobilise your industry base at time of [war] to really ramp up production,” Ellermann-Kingombe said.
    “That’s not a new lesson. That’s a World War I lesson. That’s a World War II lesson”.
    This article has been updated to correctly attribute the quotes.

  • Five ways Modern Multi Factor Authentication (MFA) secures businesses

    Five ways Modern Multi Factor Authentication (MFA) secures businesses

    The level of cyber threat to businesses is higher than ever. 

    Personal data held by businesses is increasingly valuable, meaning bad actors are always looking to gain access by any means possible. 
    As a result, the approaches to security used as recently as five years ago are no longer sufficient to protect the valuable personal data businesses hold. Security methods like Multi Factor Authentication (MFA) have become crucial for businesses who want to protect and secure user data and accounts. 
    End users meanwhile, whilst undoubtedly valuing the security of their personal data also expect a good user experience. Businesses therefore need to strike a fine balance between security and ease of access. Understanding when to implement MFA techniques and which situations don’t require rigorous authentication will be crucial. 
    Business Matters spoke to Jacob Ideskog, CTO, Curity, to ask for his top five techniques that have evolved and been adopted for MFA that will help businesses achieve strong data protection and ease of access. 

    Always On and Opt In 

    Always On is consistent with its name – MFA is always on and is always a user requirement. At every log-in opportunity, users will be prompted to use two or more identifying factors in order to access the account in question. While this method is the most rigorous in terms of security, it is the least user-friendly. The repeated demands for re-authentication can become tiresome to users, particularly if they accidentally close a webpage and need to quickly re-access the information. It is also important to note that not all information requires the same level of protection. Whilst such a stringent approach works for many applications, there are different MFA methods that offer more flexibility that are more suitable for certain applications. 
    Opt In MFA is a more flexible approach. It strikes an important balance between helping users to protect their data and offering more flexibility. In these instances, customers are prompted to set up MFA, but can decide for themselves whether to do so. Opt In MFA also allows companies to always require two factors while giving users more options to improve their own security by adding additional factors. 

    Step-up Authentication 

    As briefly mentioned with Opt In, sometimes data does not require a rigorous authentication process and a single log-in is the only authentication necessary. Consequently, the end user does not have to engage in a complex process,  providing an improved and frictionless user experience. 
    However, if a user then needs to access more sensitive information, they will receive a series of authentication questions, “stepping up” from one form of authentication to multiple. Step Up is initiated by an OpenID authentication request with a higher privilege scope, particularly prevalent in the financial industry. Here, the initial log-in may be to just check a bank balance or when a credit card bill is due, but if a customer then chooses to make a payment or update their personal information, the additional authentication process will prompt them to answer a security question, or use a secondary authenticator for example a biometric input. Step-up authentication can offer a good balance between user experience and security. 

    Time Sensitive Re-Verification 

    This approach is becoming increasingly common, particularly for access to email or cloud-based document accounts such as Google Drive, or Microsoft 365. With this approach, users are required to log-in using multiple factors the first time they access their account, however if a user continues to access their account regularly, and via the same browser they are rarely prompted to re-enter their verification information. This process requires fine-tuning of the Time To Live (TTL) for different authentication factors, so the trusted device can be established at the initial log-in. The TTL for the different authentication factors is set for different time periods, meaning the password expires before the coding of the verification, so that while users will need to change their password for security reasons on a semi-regular basis, they will not need to continuously enter the password to access their information. However, if a user changes the device they access the account from, or their browser (ie. from Google Chrome to Microsoft Edge) they will need to go through the MFA process. 
    This approach gives cyber security professionals the option of flexibility, allowing them to set the TTL to the time period that works best for their business model in order to optimise user experience while protecting the necessary data. 

    New Country and Changed Country 

    It is also possible to use geolocation to support the MFA process. While geolocation isn’t able to exactly pinpoint a user’s location to the exact house number or to identify them as an individual, it can determine the country where the user request pings from. 
    For this to work seamlessly, identity access will be behind a reverse proxy. The X-Forwarded-For header will be used as an identifying factor, as the original IP will be behind the proxy. The proxy will also need to be white-listed with identity servers, as it will need to be trusted and not flagged as a potential security alert. 
    New Country as an action can be as simple as businesses need. It only requires a Bucket to store and a boolean subject attribute that will be related to the geolocation. If this attribute is not set, the boolean value will change to True and it will be considered a new geolocation, requiring additional log-in and authentication. However, once the user continues to log-in from this geolocation, the boolean value will be set to False, and they will no longer need to go through the MFA process. 
    The Changed Country functionality offers similar simplicity. It also requires a Bucket to store data and an attribute name for a boolean subject attribute. In this instance however, the boolean value will be set to True every time the user logs in from a different country, meaning that previous geolocations will be forgotten and if the country is different from the previous, they will be required to re-authenticate. 
    These two actions are useful tools to support the MFA. While the actions are similar, the crucial difference lies in the Changed Country “forgetting” geolocations once they change, while New Country will only change the boolean value to True if the location is brand new and not been used before as an access point. 

    The Impossible Journey Authentication Action 

    The Impossible Journey serves as an authentication action, or prompt, and adds additional authentication layers where necessary. This MFA functionality is also fairly straightforward to use. As with the New Country and Changed Country, a data source is needed to store the geolocation, along with an attribute name, with the Boolean subject attribute set to True if an impossible journey has been identified. This identification process also includes speed as a determining factor. 
    As previously mentioned, the geolocation is not enough to serve as an identifying factor, however the Impossible Journey will capture longitude and latitude which is then stored (Point A). When the same user authenticates again (Point B), the action verifies the speed it would take to move from Point A to Point B, and if the speed is slower than the configured speed, the Boolean value will be set to False. If the speed is faster it will be considered an Impossible Journey and the boolean value will be set to True and the user will be required to go through additional authentication.