Zhou 祎 internal letter, Summary 360 survival reasons

Source: Internet
Author: User
Keywords 360 Zhou Hongwei user value

[abstract] Zhou said, now the Chinese internet has never lacked a hot spot, a lot of watching the lively things do not also follow the insertion of a taping, so can not harvest anything.

On May 20, 360 of the 2014 could be said to be in the face of a challenge, compared with a few years before the rapid expansion in various lines of business, the year 360 in the new field does not have much sound, and 360 of the Chairman Zhou also be questioned old. A few days ago, 360 of Chairman and CEO Zhou issued an internal open letter, warning 360 of employees should not blindly regard 360 as the giant of the Internet.

And Zhou said in the letter, in time, 360 of history is actually shorter than the other half, and from the volume, Ali and Tencent are already market capitalisation of hundreds of billions of dollars of companies, is 360 more than 10 times times. In the fierce and complex competition environment, 360 first to have self-knowledge, so as to formulate a suitable for their survival and development of the competition strategy.

After some time of "retreat" thinking, Zhou said, his conclusion is to the safety of this matter, do a deeper, more thoroughly, 360 to be good at the safety of the ultimate. In the era of large data, 360 not only to solve the security problems of consumers, but also to solve the security problems of enterprises.

Zhou says 360 won't go after the hottest things, because China's internet is never short of hot spots, and every year there are those on the crest of the wave. For example, some time ago, the internet financial noise for a while, everyone is selling funds. But 360 did not follow up, because that is nothing but the use of traffic to earn some money, but can give 360 of the core competitiveness does not bring benefits.

Zhou pointed out that the internet era, everyone, every enterprise needs security, 360 to the real solution to the security problem, to restrain a lot of temptation, a lot of lively things do not follow a stick, do not go around, so that nothing can be harvested.

The following is the full text of Zhou 祎 's latest internal letter:

The most lacking in the world is the person who sees far, is the person who does the real thing, the world's most need is the critic. Now there are a lot of commentators in the Internet, said 360 behind the mobile internet, because 360 did not enter O2O like bat, into the internet finance, and did not like them extravagantly large-scale acquisitions. Some even write articles saying, Zhou old.

Whatever the purpose of these articles, I need to remind 360 of my colleagues that we should not blindly view 360 as an internet giant like these commentators. In time, our history is shorter than the other half, we have done for eight years, they have been doing for 16 years. From the volume, Ali and Tencent are the market capitalisation of hundreds of billions of dollars of companies, we are more than 10 times times. In terms of income, we are 10 times times worse off than the internet giants.

So, although the outside world and investors are optimistic about our future, I hope we can become the same size as bat company, but we need to have self-knowledge, because in the fierce and complex competitive environment, only self-knowledge, we can develop a suitable for their survival and development of the competitive strategy.

So, when we do any action, we have to ask ourselves a few questions: first, we have such a core competitiveness? Second, we have such a volume, there is such a resource? Third, is it in line with our values?

What is core competitiveness? For example, Tencent has done so many years of the Internet, and it has not been successful in search, electricity, and security. Do not do the electrical business, do not do search, do not safe, but Tencent in the instant messaging, SNS in the world to do the largest and strongest, because this is the gene Tencent. So, when we do anything, we have to figure out what our core competencies are, whether it's our genes.

If I were a shark in the sea, I should have made the best of this shark, not necessarily envy the lions on the land. If the shark had to go to the land and fight with the lions, the shark would be doomed.

What are the 360 core competencies?

is safe. As the big data age approaches, security is becoming more and more important as an infrastructure for large data.

Now is the mobile Internet 1.0 phase, the sign is the access device is the smartphone and the tablet computer. In the 1.0 phase, everyone has seen the importance of security. The two giants, in an effort to pay for the fight, have pushed a giant to make public opinion that another giant's payments are unsafe. Now there is a new black industry, when you change your mobile phone, the old phone back to the factory default, or even the format of the phone, thought that the data deleted clean.

But these outlaws can restore all of your old phone messages, communications, apps, and even your browsing records and photos. In the mobile internet age, mobile phones become very personal devices, and everyone's privacy is closely related to the phone. In the age of 1.0, security is a very important thing.

The next generation of mobile internet, that is, the 2.0 era, the Internet device is not only mobile phones, but also no longer computers and tablets, but everywhere, any device, anytime and anywhere networking, the prerequisite is that they will send you generated data to the cloud, which is facing the problem of data security. Who dares to say that in the future hackers will not control your device by controlling the cloud?

Who dares to say that hackers do not control your self-driving car through software vulnerabilities? So, with the development of mobile Internet, the boundaries of network and reality will become more and more ambiguous with the development of wearable devices and intelligent hardware. In such situations, security becomes more and more important.

Some time ago, the system of a famous Chinese large enterprise was invaded by foreign government agencies, and the CEO's e-mails were secretly monitored. In the future, the war between nations may be mainly in the form of cyber warfare, and competition from multinationals around the world may develop into the use of intrusion networks to obtain business intelligence. In the big data age, the security of the enterprise will become more and more important. A large U.S. retailer called Target, the server was compromised, causing many users to leak credit card information.

China's electricity dealers exposed more security problems, data transmission, storage, no uniform security standards, and even record the wrong consumer credit card information. You will find that this is still a problem that is exposed. Many enterprises have been hacked, they do not know, or know not to tell.

I have been "retreat" thinking, the conclusion is that we have to put the safety of this matter, do a deeper, more thoroughly, we have to do is to make our good security to the extreme. In the era of large data, we should not only solve the security problems of consumers, but also to solve the security problems of enterprises.

We do not chase the hottest things, because the Chinese Internet is never short of hot spots, every year in the wave of the tide of the tide. For example, some time ago, the internet financial noise for a while, everyone is selling funds. But we did not follow up because I think that is nothing but the use of traffic to earn some money, but can give 360 of the core competitiveness of what benefits? I didn't see it.

Many people say that 360 is different from other Internet companies. Yes, because 360 has different values. This value determines what kind of enterprise 360 is going to be. China's three major internet companies can be called corporate Empire, the so-called Imperial Dream is to make a full product, a full range of business, in all, that is, diversification. China Internet so many users, space is so big, every enterprise pursues the whole industry chain, so the conflict more and more, the war is more and more intense.

The internet giant's purchases have caught up with Silicon Valley in the size of the capital, but you'll find that, in addition to pursuing the whole industry chain, they are more of an existing, proven business model, a way of looking at the past. They are evaluating these projects, and more about what kind of sites these projects already have. I think the 360 things you want to do are a little different from them. I hope to do more things that belong to the future.

I think that in any society in the industrial form, there is a division of labor, should not be a full sweep of a business. And we have to do is, the first is in their own areas of expertise to keep doing No1, do the best. Second, stay curious about the world, and be able to constantly make something innovative, even something that doesn't seem to have commercial value, but it's fun and cool.

Simply put, security is the internet age everyone, every enterprise needs, that 360 to the real solution to the security problem, to restrain a lot of temptation, a lot of lively things do not follow a stick, do not go around, so that nothing can be harvested.

Some people wonder how much business value 360 can create in the big Data age, where it has been said before. 360 kill Rogue Software, be peer beat up, 360 do free antivirus, be others say is a scam every day, will fail. 360 is able to live to the present, because the user to solve the problem, creating user value.

There is the value of the user before there will be commercial value. Today, the market value of 3.6 trillion dollars is based on the enormous value of users, and the security of the big data age creates a lot of business values.

I believe it will only be more.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.