Skip to main content

Y-combinator给founder们的公开警告信-寒冬已

 
YC这周给所有自己投资的founder发了一封公开的警告信。措辞之严厉,已经有一段时
间没有见过了。看版上没什么人讨论这个话题,估计大部分人还是觉得事不关己 - 毕
竟YC投资的目标大多数还是以B轮之前的公司为主,与我何干。但我觉得YC一定比一般
人得到更多信息,了解更多经济的情况。考虑到这封信里有很多具体的指标和结论,还是值得一读,同时也可以为未来2-3年的经济情况大概做一个预期,并为此早做准备。

TLDR 中文总结版:

1. 开门见山,经济不好。要求公司为最坏经济状况做准备(按照上两次经济危机的规
模做准备 - 提到了缩减开支,所以裁员。。跳槽。。。

2. 公司应该做好24个月都融不到钱而且不破产的准备。(有多少上市公司2年不发债,不增发股票,账上现金活不过2年?)

3. 融资环境和市场环境与过去5年将大为不同。(是否也可以认为18年那种规模的经济动荡,hiring freeze,在YC看来和未来几年比都是小case?)

4. 过了A轮但还没找准市场定位的公司,不会再融到钱了。

5. 如果计划未来6-12个月融资,大概率融不到任何钱。(同理 - 计划未来6-12个月
IPO的公司,instacart, stripe, quora, reddit等)

6. 现在能拿钱就赶快拿,哪怕估值不理想。活下来最重要。(同理 - 公司会强行上市,但是一定流血)

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...