chat
expand_more

Abnormal Engineering Stories, Episode #10: Examining the UK Startup Ecosystem

In episode 10 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sits down with Zehan Wang, co-founder of Magic Pony.
July 28, 2022

In 2016, less than two years after co-founding Magic Pony, Zehan Wang and his partner found themselves signing an acquisition agreement with Twitter. Their machine learning-based visual processing technology caught Twitter’s eye during Nvidia GTC, and the rest, as they say, is history.

For the next five years, Zehan worked as a people manager at Twitter, first in charge of the machine learning software engineering team and then eventually as Head of Cortex Applied Research. In 2021, Zehan decided to change course and became an angel investor.

In part one of this two-part episode, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, explores how Zehan started his career in tech and his entrepreneurship. They discuss:

  • The founding (and eventual acquisition) of Magic Pony

  • The startup ecosystem in the UK

  • How to choose your next role

We hope you enjoy it! Don’t forget to subscribe on Apple, Spotify, or Google Podcasts.

Abnormal Engineering Stories, Episode #10: Examining the UK Startup Ecosystem

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

B AI Series
Discover how Abnormal's advanced AI models are used to detect abnormalities in email behavior and protect organizations from the most sophisticated email attacks.
Read More
B Insights from Clemson University CISO
John Hoyt, CISO at Clemson University, shares his take on the unique cybersecurity challenges of higher education and how Abnormal Security can help.
Read More
B Nigerian Prince
Scams about the Nigerian Prince that promise millions have been around for decades. But they are transitioning, now using ChatGPT and similar tools to seem more convincing.
Read More
B 9 12 23 ATO
Learn why account takeovers are successful, how to detect and remediate them, and how to better protect yourself from cybercriminals in the future.
Read More
B 9 8 23 Incident Response
An effective incident response plan is crucial to minimizing the effects of an email attack and preventing future breaches.
Read More
B MKT006 09 05 23 Site and Social Images for MDC Blog v02
This company has the best cybersecurity product I’ve ever seen, and we’re primed for a future where AI is the focus. Here’s my thoughts on why.
Read More