Skip to main content

大家在看Startup的时候注意几点

http://gengwg.blogspot.com/
我发现大多数vc都喜欢持续投,投了a轮,在b轮,c轮
这么看startup也没那么难,反正vc奉陪到底,

大家在看Startup的时候注意几点
1. Founder team:背景强,如果是年轻的就是名校出身,stanford最佳,比如
snapchat,dropbox,pinterest,都是这样的,他们确实很容易拿到funding,如果老
些的就是连环创业,之前有过成功经历,比如square。业界名人,当年Yahoo Hadoop
创始人Eric去做Hortonworks,还有是不是犹太人,比如houzz
2. VC:基本上红杉,KPCB,Accel,  Andreessen Horowitz, Benchmark, IDG,Reid
Hoffman投的都很有戏
3. 股份稀释,基本上B轮之后engineer就很难到0.1%了,所以确实捞不到什么,但问题
是也很难看准太早期的,拿A轮的太多了,就是几个人的规模,压中的话确实厉害。
4. 羊群效应,当年FB收购whatsapp,马上tango,snapchat就估值狂涨,如果那个有名
vc投了,下一轮也很多跟风。
【 在 dongfeiwww (在路上) 的大作中提到: 】
: 当然有可能d轮就上了,你看聚美优品,两轮就上了。
: 这些公司都是我的判断啊,创业公司那么多,我选择的是比较靠谱的,上不了说明我看
: 走眼了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...