Rebirth of the richest man in black technology

Chapter 239 Huge losses (for subscription)

You can search for "Rebirth of the Black Technology Richest Man Search Novel (www.soxscc.com)" in Baidu to find the latest chapter!When Feng Hao asked the words, the faint smile on Liang Chao's original face disappeared instantly.

This is embarrassing!

Liang Chao touched the back of his head, and he was taken aback.

Obviously he didn't expect that Feng Hao would suddenly ask about this guy who hit someone in the face.

I was still complimenting the achievements of Hacker Technology just now, and within three seconds, I smashed my face.

The atmosphere was embarrassing for a while, before Liang Chao hesitated to explain: "Well, this loss has indeed become bigger."

"How much is that?"

Feng Hao stared at Liang Chao, trying to confirm the final loss from his mouth.

"From the three months of April, May and June, it has lost 60 million yuan so far."

Extending the head is a knife, and shrinking the head is also a knife, Liang Chao said with a stiff neck at this time.

"It's really possible to spend money. A large part of Genesis Computer's profit has gone into the bottomless hole of Hacker Technology."

Although the approximate data had to be known before, Feng Hao couldn't help taking a breath of air when he got confirmation from Liang Chao's mouth.

Sixty million is only a loss!

Wouldn't the expenses become more terrifying, how much does it cost?

"Recently competing with major anti-virus software, hackers continue to work hard to promote and promote, otherwise our competitiveness will be insufficient."

Seeing Feng Hao in a trance, Liang Chao explained a little bit more.

"Come on, I know this situation, but I didn't expect to lose so much. What about our expenditure?"

Feng Hao waved his hand to prevent Liang Chao from trying to explain the action, but asked him to talk about the specific revenue and expenditure of Hacker Technology.

He has taught many profitable methods, referring to the experience of free anti-virus software of later generations, but he has quite a lot of profitable methods.

In fact, pop-up ads, smart maintenance, hacking browsers, etc., are actually very common profit methods, and hacking technology all uses these methods.

Yes, Hacker Technology has also developed and launched its own search engine and input method.

Originally, Hacker Technology’s anti-virus engine had certain search and filtering functions. Through research and development and improvement, Hacker Technology’s engineers have now developed Hacker’s browser and input methods, which are called Hacker Browser and Hacker. Guest input method.

These new software and tools are originally very advanced, and rely on 361 anti-virus software. Relying on 361's reputation, many users have been accumulated in the early stage. Currently, they are software with close to tens of millions of users.

In fact, he has guessed that these tools may have seriously threatened other friends and businessmen.

However, Feng Hao is not afraid, he will always encounter difficulties if he wants to develop.

Feng Hao believes that through these methods, Hacker Technology can still obtain a certain amount of revenue, but he did not expect that the loss is still large, which shows how huge the actual expenditure of Hacker Technology is.

"Mr. Feng, in the past three months, we had a total of 25 million in revenue, which means that our hacker technology spent a total of 85 million. Among them, pop-up advertising revenue was 17 million, and hacker browser revenue Four million, input method revenue is one million, and the remaining three million are other revenues."

"Our expenditure includes the promotion and promotion of 361 anti-virus software, the research and development and promotion of hacker browsers and input methods, followed by expenditures on employee salaries and benefits. At present, the total number of people in Hacker Technology has exceeded 300. Recently, my colleagues have been working hard overtime, and the expenses paid have increased.” Heshun Novel www.heshun168.com

Liang Chao handed the report to Feng Hao, while explaining its contents to Feng Hao.

After receiving the report, Feng Hao looked at it. Could it be that he asked too much?!

no!

The spending of hacking technology is indeed very scary, this is only four, five and six three months of expenditure.

In fact, today is June 15th, and really, it is only two and a half months, and there are only 75 days in total, which is more than 1.1 million per day on average!

Spend money like water!

Is it because you are not in charge, and you don't know how much firewood, rice, oil and salt are expensive?

After pondering for a while, Feng Hao said with a heavy face: "Liang Chao, in the next period of time, our development will be more stable, and the expenditure will be too large. If it weren't for Genesis, our hacker technology would be finished!"

If this speed of spending money continues, Hacker Technology will not be far from bankruptcy.

If you spend more than 1 million a day, you have to spend more than 300 million a year.According to the current posture, revenue of more than one billion yuan a year.

That is to say, Hacker Technology loses more than two billion yuan each year. Feng Hao can't accept this kind of loss.

The market value of hacking technology, although it may be four billion, but the actual assets?If you have a lot of money, you will only have two or three memories, and the others are all illusory market values.

If hacking technology cannot keep users growing and cannot quickly find a profitable model, this illusory market value will gradually decrease and eventually disappear.

At that time, Hacker Technology was not far from bankruptcy.

"President Feng, I also know about this situation. Regarding the expenditure in April and May, you must also know that we have to do it to occupy more of the antivirus software market."

Liang Chao also had a heavy face, and he obviously knew the problem of such high expenditures like Hacker Technology.

Feng Hao is also aware of the hacking technology problem, but he has to think about the solution.

Predecessors planted trees and descended to enjoy the shade, he can learn from the experience of predecessors.

After filtering through his mind over and over again, he continued to speak, "Well, it's good to know the problem. Next, Hacker Technology will develop in several ways."

"First, consolidate users. We need to continue to stabilize the current number of users. The number of users is already huge. Retaining old users is critical, and we also need to absorb new users."

"Second, expand the content. Actively increase the content of 361 to increase user stickiness. Anti-virus software is almost a must for current computer users, but the time that users can stay with anti-virus software is very rare. Yes. Therefore, we need new content, such as the current hacker browser, hacker input method, etc., so that more users can spend more time using our products."

"Third, the means to expand revenue. Revenue and profitability are necessary conditions for the sustainable development of a company. We need ways to increase revenue. Under the current environment, there are two directions to obtain a large amount of revenue. One is e-commerce and the other is games. In addition to these two, I prefer film and television entertainment."

Feng Hao said here, the thoughts in his mind flashed by.

Feng Hao didn't want to choose the game, it was a direction that was scolded.

He can choose e-commerce, but he doesn't want to participate anymore. Jingdong is already in his hands and there is no need to repeat the layout.

Film and television entertainment, this huge market for later generations, can allow hacker technology to step in.

"Fourth, to improve research and development capabilities. Combining our own advantages in the field of antivirus and security, we will continue to deepen the technology in the security field, especially for the current market, to develop specific and effective security software to serve enterprises and users."

"Fifth, the richness of peripheral software. For example, hacker browsers, hacker input methods, and smart hardware can be appropriately combined. This can be cooperated with Haotian Research Institute."