These days not to spread point internal mail, are embarrassed to say that they are internet companies, this turn to Zhou 祎. An internal letter from the old week, which is the first to speak since his retreat, explains and arranges for the 360 status quo and the core trends that followed.
At a time when major internet giants scrambled to acquire or lead themselves into O2O and finance, 3,601 were questioned: half a shot. But Zhou that 360 is not suitable for such a development route, compared with bat, their history is insufficient, insufficient funds, resources are not counterpart. In this case, expansion is not a good strategic direction.
"Don't blindly think of 360 as a giant of the internet."
The letter also mentions that for 360 the real core competencies are actually security. And the big Data age gives a chance to play a core competitive role: from 1.0 to 2.0, from the mobile phone to a variety of smart hardware, wearable equipment, carrying human privacy data will be more easily controlled, the security field will be more and more attention.
Overall, 360 does not expand into an empire as a bat, but instead focuses on doing it in a vertical area, Zhou that the acquisition of better companies is standing now looking past, but 360 want to do more things that belong to the future.
The following is the original version of the internal open letter:
The most lacking in the world is the person who sees far, is the person who does the real thing, the world's most need is the critic. Now there are a lot of commentators in the Internet, said 360 behind the mobile internet, because 360 did not enter O2O like bat, into the internet finance, and did not like them extravagantly large-scale acquisitions. Some even write articles saying, Zhou old.
Whatever the purpose of these articles, I need to remind 360 of my colleagues that we should not blindly view 360 as an internet giant like these commentators. In time, our history is shorter than the other half, we have done for eight years, they have been doing for 16 years. From the volume, Ali and Tencent are the market capitalisation of hundreds of billions of dollars of companies, we are more than 10 times times. In terms of income, we are 10 times times worse off than the internet giants. So, although the outside world and investors are optimistic about our future, I hope we can become the same size as bat company, but we need to have self-knowledge, because in the fierce and complex competitive environment, only self-knowledge, we can develop a suitable for their survival and development of the competitive strategy.
So, when we do any action, we have to ask ourselves a few questions: first, do we have such a core competitiveness? Secondly, do we have such volume and resources? Third, is it in line with our values?
What is core competitiveness? Tencent, for example, has done the internet for so many years, and it has been very unsuccessful in search, electricity, and security. It did ten years of search, lost a lot of money, but the search share did not grow, finally thrown to the Sogou. In the electric business, Tencent made the easy news, patted, finally pack to throw to the Liu. In security, it cost a lot of money to build Tencent computer Butler in the XP challenge in less than 42 seconds by hackers, and 360 security guards remain. In the foreign evaluation of Tencent computer Butler only blocked 18.25% of the vulnerability attack, 360 security guard is 100% interception.
Do not do the electrical business, do not do search, do not safe, but Tencent in the instant messaging, SNS in the world to do the largest and strongest, because this is the gene Tencent. So, when we do anything, we have to figure out what our core competencies are, whether it's our genes. If I were a shark in the sea, I should have made the best of this shark, not necessarily envy the lions on the land. If the shark had to go to the land and fight with the lions, the shark would be doomed.
What are the 360 core competencies? is safe. As the big data age approaches, security is becoming more and more important as an infrastructure for large data.
Now is the mobile Internet 1.0 phase, the sign is the access device is the smartphone and the tablet computer. In the 1.0 phase, everyone has seen the importance of security. The two giants, in an effort to pay for the fight, have pushed a giant to make public opinion that another giant's payments are unsafe. Now there is a new black industry, when you change your mobile phone, the old phone back to the factory default, or even the format of the phone, thought that the data deleted clean. But these outlaws can restore all of your old phone messages, communications, apps, and even your browsing records and photos. In the mobile internet age, mobile phones become very personal devices, and everyone's privacy is closely related to the phone. In the age of 1.0, security is a very important thing.
The next generation of mobile internet, that is, the 2.0 era, the Internet device is not only mobile phones, but also no longer computers and tablets, but everywhere, any device, anytime and anywhere networking, the prerequisite is that they will send you generated data to the cloud, which is facing the problem of data security. Who dares to say that in the future hackers will not control your device by controlling the cloud? Who dares to say that hackers do not control your self-driving car through software vulnerabilities? So, with the development of mobile Internet, the boundaries of network and reality will become more and more ambiguous with the development of wearable devices and intelligent hardware. In such situations, security becomes more and more important.
Some time ago, the system of a famous Chinese large enterprise was invaded by foreign government agencies, and the CEO's e-mails were secretly monitored. In the future, the war between nations may be mainly in the form of cyber warfare, and competition from multinationals around the world may develop into the use of intrusion networks to obtain business intelligence. In the big data age, the security of the enterprise will become more and more important. A large U.S. retailer called Target, the server was compromised, causing many users to leak credit card information. China's electricity dealers exposed more security problems, data transmission, storage, no uniform security standards, and even record the wrong consumer credit card information. You will find that this is still a problem that is exposed. Many enterprises have been hacked, they do not know, or know not to tell.
I have been "retreat" thinking, the conclusion is that we have to put the safety of this matter, do a deeper, more thoroughly, we have to do is to make our good security to the extreme. In the era of large data, we should not only solve the security problems of consumers, but also to solve the security problems of enterprises.
We do not chase the hottest things, because the Chinese Internet is never short of hot spots, every year in the wave of the tide of the tide. For example, some time ago, the internet financial noise for a while, everyone is selling funds. But we did not follow up because I think that is nothing but the use of traffic to earn some money, but can give 360 of the core competitive advantage? I didn't see it.
Many people say that 360 is different from other Internet companies. Yes, because 360 has different values. This value determines what kind of enterprise 360 is going to be. China's three major internet companies can be called corporate Empire, the so-called Imperial Dream is to make a full product, a full range of business, in all, that is, diversification. China Internet so many users, space is so big, every enterprise pursues the whole industry chain, so the conflict more and more, the war is more and more intense.
The internet giant's purchases have caught up with Silicon Valley in the size of the capital, but you'll find that, in addition to pursuing the whole industry chain, they are more of an existing, proven business model, a way of looking at the past. They are evaluating these projects, and more about what kind of sites these projects already have. I think the 360 things you want to do are a little different from them. I hope to do more things that belong to the future.
I think that in any society in the industrial form, there is a division of labor, should not be a full sweep of a business. And we have to do is, the first is in their own areas of expertise to keep doing No1, do the best. Second, stay curious about the world, and be able to constantly make something innovative, even something that doesn't seem to have commercial value, but it's fun and cool. Simply put, security is the internet age everyone, every enterprise needs, that 360 to the real solution to the security problem, to restrain a lot of temptation, a lot of lively things do not follow a stick, do not go around, so that nothing can be harvested.
Some wonder how much business value 360 can create in the big Data age, where the ultimate security is being pursued. It has been said before. 360 kill Rogue Software, be peer beat up, 360 do free antivirus, be others say is a scam every day, will fail. 360 is able to live to the present, because the user to solve the problem, creating user value.
There is the value of the user before there will be commercial value. Today, the market value of 3.6 trillion dollars is based on the enormous value of users, and the security of the big data age creates a lot of business values.
I believe it will only be more.