![]() ![]() The company says that revenue has grown 800% over the past year. Snappy has over 1,000 enterprise customers including Microsoft, Adobe, Comcast, and Uber, and has sent more than 1 million gifts in the last six months alone. The company, which was founded in 2015 by CEO Hani Goldstein and Dvir Cohen, has developed a gifting platform to make it simple to digitally send personal gifts. The company will use these funds to enlarge its work force, expand into additional segments and markets, and explore potential acquisitions. This brings the total funding raised by the company to over $100 million, Trend reports with reference to Globes. "WINWORD.EXE" wrote bytes "f8114a75" to virtual address "0x754B8368" (part of module "SSPICLI.Israeli gift tech platform Snappy has announced the completion of a $70 million Series C financing round, led by GGV Capital with participation from existing investors 83North, Saban Ventures and Hearst Ventures. "WINWORD.EXE" wrote bytes "833a8ac2" to virtual address "0圆BD3F530" (part of module "WWLIB.DLL") "WINWORD.EXE" wrote bytes "f92adec2" to virtual address "0圆CF310AC" (part of module "MSPTLS.DLL") "WINWORD.EXE" wrote bytes "48124a75" to virtual address "0x754B83DC" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "48120000" to virtual address "0x754A12DC" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "48120000" to virtual address "0x754A139C" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "6012e96e" to virtual address "0x7637E324" (part of module "WININET.DLL") "WINWORD.EXE" wrote bytes "f8114a75" to virtual address "0x754B83C4" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "d32d8ac2" to virtual address "0圆5E878E4" (part of module "OART.DLL") "WINWORD.EXE" wrote bytes "48124a75" to virtual address "0x754B83C0" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "f8114a75" to virtual address "0x754B834C" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "f8110000" to virtual address "0x754A12CC" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "e969533ced" to virtual address "0x77893F8A" wrote bytes "48124a75" to virtual address "0x754B8348" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "b84013e96effe0" to virtual address "0x754A1248" (part of module "SSPICLI.DLL") "WINWORD.EXE" wrote bytes "f8110000" to virtual address "0x754A1408" (part of module "SSPICLI.DLL") ![]() "WINWORD.EXE" wrote bytes "6511b2c2" to virtual address "0圆4E80BA8" (part of module "MSO.DLL") "WINWORD.EXE" touched file "C:\Windows\System32\en-US\" "WINWORD.EXE" touched file "C:\Windows\System32\msxml6r.dll" "WINWORD.EXE" touched file "C:\Windows\System32\rsaenh.dll" "WINWORD.EXE" touched file "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Caches\cversions.1.db" "WINWORD.EXE" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v9\clr.dll" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v7\mscorwks.dll" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v7\clr.dll" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v\mscorwks.dll" "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v\clr.dll" "WINWORD.EXE" touched file "C:\Windows\Fonts\StaticCache.dat" "WINWORD.EXE" touched file "C:\Windows\Globalization\Sorting\s" "WINWORD.EXE" touched file "C:\Windows\AppPatch\sysmain.sdb"
0 Comments
Leave a Reply. |