logo
Airbnb CEO Brian Chesky lays out the 3 key differences between founders and managers

Airbnb CEO Brian Chesky lays out the 3 key differences between founders and managers

Yahoo2 days ago

Airbnb CEO Brian Chesky revealed three big differences between founders and managers.
He compared founders to parents, saying they have unique knowledge of their business baby.
Chesky also shared the two biggest risks for founders, drawing a lesson from Steve Jobs.
Airbnb CEO Brian Chesky knows firsthand what founders alone bring to the table — and what they lack.
In an interview on "The Diary of CEO" podcast, Chesky revealed the three crucial attributes he thinks founders have that managers don't. He says they have a unique love for the business as a company's "biological parent," they have "permission" to make big changes, and they know their metaphorical business baby better than anyone.
"You can love something, but when you're the biological parent of something, it came from you, it is you," Chesky, who cofounded and built up Airbnb during the 2008 financial crisis, said. "There's a deep passion and love."
Unlike managers, who often join a company once it's already built, founders have total control, or what Chesky calls "the permission." Building on the parental metaphor, he compared the concept to how parents can't tell other kids what to do, but can tell their own kids what to do. Whereas managers might not feel they have the latitude to rebrand a company, for example, founders likely do feel that authority, Chesky said.
Lastly, Chesky said a founder knows the roots of their company — their baby, in this case — in a way a manager simply doesn't.
"You built it, so you know how to rebuild it," he said. Founders know their company's foundational nuts and bolts from before it was even fully formed— he said they understand "the alloys, where they were sourced from."
Yet Chesky also revealed two big problems for founders. Most, he said, can't scale up to run a huge company — and they bump up against the inevitable fact of their own mortality.
"Great companies usually want to live longer than humans do, and so therefore you end up with the inevitable challenge that Disney and Steve Jobs had," he said. "Which is succession planning."
Tech companies, including Microsoft and Amazon, have been shedding middle managers recently to cut out bureaucratic bloat, but experts previously told BI that the efforts could go too far. Entry-level job opportunities are also scant in the tech and finance worlds.
Airbnb is making big changes, though not related to its management structure. The company is launching Airbnb Services, which offers include private chefs and personal trainers, in an attempt to claw back customers from hotels.
Read the original article on Business Insider

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

GeekWire Podcast: Microsoft, Remitly, and the new shape of work — plus, Amazon's NYT AI deal
GeekWire Podcast: Microsoft, Remitly, and the new shape of work — plus, Amazon's NYT AI deal

Geek Wire

time2 hours ago

  • Geek Wire

GeekWire Podcast: Microsoft, Remitly, and the new shape of work — plus, Amazon's NYT AI deal

A playful nod to classic computing on Microsoft's new campus: A vintage computer mouse emerges from a faux mouse hole in the wall — a bit of tech humor tucked into the modern workspace. (GeekWire Photo / Kurt Schlosser) This week on the GeekWire Podcast, we discuss Amazon's new licensing agreement with The New York Times to train its AI platforms, a notable move in the evolving relationship between media and tech. We also go behind the scenes at two very different office spaces that reflect changing approaches to the workplace: Microsoft's sprawling and still-developing Redmond campus, and Remitly's globally inspired new headquarters in downtown Seattle. We start the show on a lighter note, with a confession about computer mouse loyalty and a debate over whether a trackpad is good enough in a pinch. Listen to the full episode below or wherever you get your podcasts. Related stories: With GeekWire co-founder Todd Bishop and reporter Kurt Schlosser. Subscribe to GeekWire in Apple Podcasts, Spotify, or wherever you listen.

These 5 Tech Big Caps Are Unable To Reach New All-Time Highs: So Far
These 5 Tech Big Caps Are Unable To Reach New All-Time Highs: So Far

Forbes

time3 hours ago

  • Forbes

These 5 Tech Big Caps Are Unable To Reach New All-Time Highs: So Far

Microsoft, Nvidia getty Big cap tech stocks dropped this year from highs and they're having trouble getting all the way back up. Since these five make up so much of the S&P 500 weighting, it keeps the index from new highs. The likely reason: the 'strategic uncertainty' of on again/off again tariffs policy which amounts to simple uncertainty for investors. The feeling among economists is that tariffs and inflation go together. As the rise in prices continues, Fed experts take note and before you know it, interest rates stop going down. The new uncertainty, largely unspoken, is that rates will go up. Typically, that's the wrong direction as far as equities go. Microsoft Microsoft weekly price chart, 5 31 25. The all-time high price for the big software firm came in June/July 2024 at 462.52. The stock failed to make it to that level this week. It was close but no cigar. The 50-week moving average has turned back up and the 200-week moving average has not stopped heading upward on this chart. Note the RSI negative divergence to price from January 2024 to the summertime high. Microsoft's market capitalization is $3421 billion. Nvidia Nvidia weekly price chart, 5 31 25. The semiconductor chip designer is weaker than Microsoft. This week's high of $143.49 is below the previous all time highs of above $150 from November 2024 and January 2025. The negative divergence of the RSI is clear from its peak of March 2024 to the price highs of late 2024. Nvidia's price trades above a weakening 50-week moving average. Market cap is $3297 billion. Apple Apple weekly price chart, 5 31 25. This is the most surprising relative weakness among these big caps: Apple peaked late last year at near $260 and now goes for $200. Although that's a gain from the early April 2025 low, it's not keeping up with the others. The 50-week moving average appears to be turning over and beginning to trend downward. The 200-week moving average looks strong, even with the springtime price dip below it. Apple's market cap is $2999 billion. Broadcom Broadcom weekly price chart, 5 31 25. The Palo Alto-based semiconductor company hit an all time high in December 2024 of $250. This week's buying took the stock to $246.07 and that's where the selling came in. Friday's close was $242.07. This is another big cap tech name where the RSI peaked years ago and no longer makes it above 70 even as price keeps rising. The 50-week and the 200-week moving averages are non-stop upward. Market cap for Broadcom is $1138 billion. Salesforce Salesforce weekly price chart, 5 31 25. The peak for this software application firm came in November 2024 at just under the $370 level. The March/April 2025 price dip took it below the 200-week moving average, briefly. Since then, the stock in early May bounced to above the 50-week moving average but couldn't hold above it. It now trades at $265.37 with a price chart similar to Apple, given the inability to move back up to former peaks. Market cap for Salesforce is $253 billion. Stats courtesy of Charts courtesy of No artificial intelligence was used in the writing of this post. More analysis and commentary at

Massive data breach exposes 184 million passwords and logins
Massive data breach exposes 184 million passwords and logins

Fox News

time3 hours ago

  • Fox News

Massive data breach exposes 184 million passwords and logins

Data breaches are no longer rare events but a persistent problem. We've been seeing regular incidents at public-facing companies across various sectors, including healthcare, retail and finance. While bad actors are certainly to blame, these corporations aren't entirely without fault. They often make it easy for hackers to access user data by failing to protect it properly. A recent example came to light when a cybersecurity researcher discovered an open database containing over 184 million account credentials. Cybersecurity researcher Jeremiah Fowler has revealed the existence of an open database that contains 184,162,718 million account credentials. These include email addresses, passwords, usernames and URLs for platforms such as Google, Microsoft, Apple, Facebook and Snapchat. The information also covers banking services, medical platforms and government accounts. Most shockingly, the entire dataset was left completely unsecured. There was no encryption, no authentication required and no form of access control. It was simply a plain text file sitting online for anyone to find. Fowler located the database during routine scanning of publicly exposed assets. What he found was staggering. The file included hundreds of millions of unique records containing user credentials linked to the world's largest technology and communication platforms. There were also account details for financial services and official portals used by state institutions. The file was not protected in any way. Anyone who discovered the link could open it in a browser and instantly view sensitive personal data. No software exploit was needed. No password was asked for. It was as open as a public document. Fowler believes the data was harvested using an infostealer. These lightweight tools are favored by cybercriminals for their ability to silently extract login credentials and other private information from compromised devices. Once stolen, the data is often sold on dark web forums or used in targeted attacks. After reporting the breach, the hosting provider quickly removed access to the file. However, the owner of the database remains unknown. The provider did not disclose who uploaded it or whether the database was part of a legitimate archive that was accidentally published. Fowler could not determine whether this was the result of negligence or an operation with malicious intent. To verify the data, Fowler contacted some individuals listed in the records. Several confirmed that the information was accurate. This confirmation turns what might seem like abstract statistics into something very real. These were not outdated or irrelevant details. These were live credentials that could allow anyone to hijack personal accounts in seconds. 1. Change your password on every platform: If your login credentials have been exposed, it's not enough to change the password on just one account. Cybercriminals often try the same combinations across multiple platforms, hoping to gain access through reused credentials. Start by updating your most critical accounts, email, banking, cloud storage and social media, then move on to others. Use a new, unique password for each platform and avoid variations of old passwords, as they can still be predictable. Consider using a password manager to generate and store complex passwords. Our top-rated password manager delivers powerful protection to help keep your accounts secure. It features real-time data breach monitoring to alert you if your login details have been exposed, plus a built-in data breach scanner that checks your saved emails, passwords and credit card information against known leak databases. A password health checker also highlights weak, reused or compromised passwords so you can strengthen your online defenses with just a few clicks. Get more details about my best expert-reviewed Password Managers of 2025 here. 2. Enable two-factor authentication: Two-factor authentication, or 2FA, is a critical security feature that drastically reduces the risk of unauthorized access. Even if someone has your password, they won't be able to log in without the second verification step, usually a one-time code sent to your phone or an authenticator app. Enable 2FA on all services that support it, especially your email, financial accounts and any service that stores sensitive personal data. 3. Watch for unusual account activity: After a breach, it's common for compromised accounts to be used for spam, scams, or identity theft. Pay close attention to signs such as login attempts from unfamiliar locations, password reset requests you didn't initiate or unexpected messages sent from your accounts. Most platforms allow you to review login history and connected devices. If you see something off, take action immediately by changing your password and revoking suspicious sessions. 4. Invest in personal data removal services: You should also consider a data removal service. Given the scale and frequency of breaches like the one described above, relying on personal caution alone is no longer enough. Automated data removal services can provide an essential extra layer of defense by continuously scanning for and helping eliminate your exposed information from data broker sites and other online sources. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web. 5. Avoid clicking on suspicious links and use strong antivirus software: One of the most common post-breach threats is phishing. Cybercriminals often use information from leaked databases to craft convincing emails that urge you to verify your account or reset your password. Never click on links or download attachments from unknown or suspicious sources. Instead, visit websites by typing the URL directly into your browser. The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 6. Keep your software and devices up to date: Many cyberattacks exploit known vulnerabilities in outdated software. Operating systems, browsers, antivirus programs and even apps need to be updated regularly to patch security flaws. Turn on automatic updates wherever possible so you're protected as soon as fixes are released. Staying current with your software is one of the easiest and most effective ways to block malware, ransomware and spyware from infiltrating your system. Security is not only the responsibility of companies and hosting providers. Users need to adopt better practices, including unique passwords, multifactor authentication and regular reviews of their digital footprint. The careless exposure of over 184 million credentials is not just a mistake. It is an example of how fragile our systems remain when even basic protection is absent. In an era where artificial intelligence, quantum computing, and global connectivity are reshaping technology, it is unacceptable that plain text files containing financial and governmental credentials are still left sitting online. Do you feel that companies are doing enough to protect your data from hackers and other cyber threats? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels: Answers to the most-asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store