Archiv des Autors: innovation

2017 Guide to all Porsche Models

Porsche 911 GT3 991.22018 Porsche 911 GT3 991.2.Porsche

Porsche rounded out the 911 family on Tuesday at the 2017 Geneva Motor Show with the introduction of its latest track-bred GT3 variant. At the heart of the new Porsche 911 GT3 is a 4.0-liter, naturally aspirated flat-six-cylinder engine, which produces 500 horsepower and 339 lb.-ft. of torque. The GT3 becomes the first of the 991.2 generation 911s to eschew turbocharging.

Customers can option the GT3 with either a traditional six-speed manual transmission or a seven-speed twin-clutch PDK unit. The 2018 Porsche 911 GT3, expected to reach US showrooms this fall with a starting price of $143,600, is available with active rear-wheel steering and carbon-fiber aerodynamic elements.

According to Porsche, the PDK-equipped GT3 can sprint to 60 mph in just 3.2 seconds and reach a top speed of 197 mph. In six-speed guise, the Porsche requires 3.8 seconds to reach 60mph before hitting 198 mph. Even though, the six speed is slower off the line, the holy combination of a clutch pedal with a naturally aspirated powerplant will be too much of a draw for Porsche purists to ignore.

There are few cars in the world more iconic than the Porsche 911. Over the years, the rear-engine sports car has gotten bigger, faster, and more technologically advanced. But its spirited driving dynamics and on-track capabilities have continued to make it a favorite among enthusiasts worldwide.

But you often hear the complaint that all current 911s look pretty much the same. And if you ask critics such as Jeremy Clarkson, host of Amazon’s „Grand Tour“ show, he’ll tell you that all Porsche 911s since the model’s debut in 1963 look identical. The truth is, most of the various versions of the current generation of 911s do look similar, yet they can all be identified by numerous subtle but important differences.

Like Taco Bell in the fast-food industry, what Porsche has managed to do so successfully is create multiple iterations of the 911 by mixing and matching the same ingredients, and packaging them in a lot of different ways. And if you’ve ever driven a 911, you’ll probably agree with me in saying there’s absolutely nothing wrong with that.

So here it is, the most current lineup of Porsche’s 911 Taco Bell menu.

 

Carrera: The Carrera is the „base“ 911, if there is such as thing. The 991.2 Carrera powered by a 3.0-liter, 370-horsepower, twin-turbocharged, flat six …

Carrera: The Carrera is the "base" 911, if there is such as thing. The 991.2 Carrera powered by a 3.0-liter, 370-horsepower, twin-turbocharged, flat six ...

Porsche

… and the Cabriolet is the convertible version of the Carrera.

... and the Cabriolet is the convertible version of the Carrera.

Porsche

The Carrera 4 Coupe is a Carrera Coupe with all-wheel drive …

The Carrera 4 Coupe is a Carrera Coupe with all-wheel drive ...

Porsche

… and the Carrera 4 Cabriolet is the convertible variant.

... and the Carrera 4 Cabriolet is the convertible variant.

Porsche

The Carrera S gets a 50 hp boost from the base Carrera, thanks to larger turbochargers and an upgraded exhaust system on the 3.0-liter 420 hp flat-six engine …

The Carrera S gets a 50 hp boost from the base Carrera, thanks to larger turbochargers and an upgraded exhaust system on the 3.0-liter 420 hp flat-six engine ...

Porsche

… and here’s the convertible Cabriolet Carrera S.

... and here's the convertible Cabriolet Carrera S.

Porsche

The Carrera 4S is the Carrera S with all-wheel drive …

The Carrera 4S is the Carrera S with all-wheel drive ...

Porsche

… and the Carrera 4S Cabriolet is the convertible edition.

... and the Carrera 4S Cabriolet is the convertible edition.

Porsche

The Carrera GTS is a step up from the Carrera S. With turbochargers even larger than those found on the S, the GTS packs a stout 450 horsepower.

The Carrera GTS is a step up from the Carrera S. With turbochargers even larger than those found on the S, the GTS packs a stout 450 horsepower.

Porsche

… and the Carrera GTS Cabriolet is yet another convertible version!

... and the Carrera GTS Cabriolet is yet another convertible version!

Porsche

The Porsche 911 Carrera 4 GTS is the GTS with all-wheel drive …

The Porsche 911 Carrera 4 GTS is the GTS with all-wheel drive ...

Porsche

… and Carrera 4 GTS Cabriolet is, naturally, the accompanying convertible.

... and Carrera 4 GTS Cabriolet is, naturally, the accompanying convertible.

Porsche

The Targa 4 is a Carrera 4 with an awesome electric lift-away roof!

The Targa 4 is a Carrera 4 with an awesome electric lift-away roof!

Porsche

While the Targa 4S is a Carrera 4S with the special „Targa“ roof.

While the Targa 4S is a Carrera 4S with the special "Targa" roof.

Porsche

The Targa 4 GTS is a Carrera 4 GTS with the Targa roof.

The Targa 4 GTS is a Carrera 4 GTS with the Targa roof.

Porsche

The latest generation of the legendary Turbo gets a 3.8-liter, 540 horsepower version of the twin-turbocharged flat-six found in other 911 models. Thanks to a pair of monster turbochargers, the Turbo has become a benchmark vehicle for aspiring supercars everywhere.

The latest generation of the legendary Turbo gets a 3.8-liter, 540 horsepower version of the twin-turbocharged flat-six found in other 911 models. Thanks to a pair of monster turbochargers, the Turbo has become a benchmark vehicle for aspiring supercars everywhere.

Porsche

There’s a Turbo Cabriolet, as well.

There's a Turbo Cabriolet, as well.

Porsche

The Turbo S is a Turbo with a 580 hp engine.

The Turbo S is a Turbo with a 580 hp engine.

Porsche

And of course … a Turbo S Cabriolet is available, too!

And of course ... a Turbo S Cabriolet is available, too!

Porsche

The GT3 is the hard-core, track-oriented member of the 911 family. In the spirit of purity, its 500 horsepower, 4.0-liter engine is naturally aspirated — making it the only 991.2 to refrain from turbocharging.

The GT3 is the hard-core, track-oriented member of the 911 family. In the spirit of purity, its 500 horsepower, 4.0-liter engine is naturally aspirated — making it the only 991.2 to refrain from turbocharging.

Porsche

Finally, there’s the 911R. It’s an ultra-lightweight special edition, with only 991 expected to be built worldwide. The 911R is powered by a 500-horsepower, naturally aspirated, 4.0-liter unit that’s shared with the GT3 RS. It is also the only 911 that’s available exclusively with a manual transmission. The 911R is out of production — which means there will be no 2017 models made. However, they may be a few new cars floating around out there, but they will likely come with an extreme markup over the $185,000 MSRP. The 911R is a 991.1 spec model.

Finally, there's the 911R. It's an ultra-lightweight special edition, with only 991 expected to be built worldwide. The 911R is powered by a 500-horsepower, naturally aspirated, 4.0-liter unit that's shared with the GT3 RS. It is also the only 911 that's available exclusively with a manual transmission. The 911R is out of production — which means there will be no 2017 models made. However, they may be a few new cars floating around out there, but they will likely come with an extreme markup over the $185,000 MSRP. The 911R is a 991.1 spec model.

Porsche

How Whatsapp spies on Your Messages – WhatsApp Retransmission Vulnerability

According to Tobias Boelter tobias@boelter.it

Download the Slides from Tobias here: Whatsapp Slides from Tobias Boelter

Setting: Three phones. Phone A is Alice’s phone. Phone B is Bob’s phone. Phone C is the attacker’s phone.

Alice starts by communication with bob and being a good human of course meets with Bob in person and they verify each other’s identities, i.e. that the key exchange was not compromised.

Remember, Alice encrypts her messages with the public key she has received from Bob. But this key is sent through the WhatsApp servers so she can not know for sure that it is actually Bob’s key. That’s why they use a secure channel (the physical channel) to verify this.

Now, Alice sends a message to Bob. And then another message. But this time this message does not get delivered. For example because Bob is offline, or the WhatsApp server just does not forward the message.

wa3

Now the attacker comes in. He registers Bob’s phone number with the WhatsApp server (by attacking the way to vulnerable GSM network, putting WhatsApp under pressure or by being WhatsApp itself).

Alice’s WhatsApp client will now automatically, without Alices‘ interaction, re-encrypt the second message with the attackers key and send it to the attacker, who receives it:

wa2

Only after the act, a warning is displayed to Alice (and also only if she explicitly chose to see warnings in here settings).

wa1

Conclusion

Proprietary closed-source crypto software is the wrong path. After all this – potentially mallicious code – handles all our decrypted messages. Next time the FBI will not ask Apple but WhatsApp to ship a version of their code that will send all decrypted messages directly to the FBI.

Signal is better

Signal is doing it right. Alice’s second message („Offline message“) was never sent to the attacker.

signal3 signal1 signal2

Signal is also open source and experimenting with reproducible builds. Have a look at it.

Update (May 31, 2016)

Facebook responded to my white-hat report

„[…] We were previously aware of the issue and might change it in the future, but for now it’s not something we’re actively working on changing.[…]“

https://tobi.rocks/2016/04/whats-app-retransmission-vulnerability/

Download the Presentation here: Whatsapp Slides from Tobias Boelter

Whatsapp spies on your encrypted messages

Exclusive: Privacy campaigners criticise WhatsApp vulnerability as a ‘huge threat to freedom of speech’ and warn it could be exploited by government agencies

Research shows that the company can read messages due to the way WhatsApp has implemented its end-to-end encryption protocol.
Research shows that WhatsApp can read messages due to the way the company has implemented its end-to-end encryption protocol. Photograph: Ritchie B Tongo/EPA

A security backdoor that can be used to allow Facebook and others to intercept and read encrypted messages has been found within its WhatsApp messaging service.

Facebook claims that no one can intercept WhatsApp messages, not even the company and its staff, ensuring privacy for its billion-plus users. But new research shows that the company could in fact read messages due to the way WhatsApphas implemented its end-to-end encryption protocol.

Privacy campaigners said the vulnerability is a “huge threat to freedom of speech” and warned it can be used by government agencies to snoop on users who believe their messages to be secure. WhatsApp has made privacy and security a primary selling point, and has become a go to communications tool of activists, dissidents and diplomats.

WhatsApp’s end-to-end encryption relies on the generation of unique security keys, using the acclaimed Signal protocol, developed by Open Whisper Systems, that are traded and verified between users to guarantee communications are secure and cannot be intercepted by a middleman. However, WhatsApp has the ability to force the generation of new encryption keys for offline users, unbeknown to the sender and recipient of the messages, and to make the sender re-encrypt messages with new keys and send them again for any messages that have not been marked as delivered.

The recipient is not made aware of this change in encryption, while the sender is only notified if they have opted-in to encryption warnings in settings, and only after the messages have been resent. This re-encryption and rebroadcasting effectively allows WhatsApp to intercept and read users’ messages.

The security backdoor was discovered by Tobias Boelter, a cryptography and security researcher at the University of California, Berkeley. He told the Guardian: “If WhatsApp is asked by a government agency to disclose its messaging records, it can effectively grant access due to the change in keys.”

The backdoor is not inherent to the Signal protocol. Open Whisper Systems’ messaging app, Signal, the app used and recommended by whistleblower Edward Snowden, does not suffer from the same vulnerability. If a recipient changes the security key while offline, for instance, a sent message will fail to be delivered and the sender will be notified of the change in security keys without automatically resending the message.

WhatsApp’s implementation automatically resends an undelivered message with a new key without warning the user in advance or giving them the ability to prevent it.

Boelter reported the backdoor vulnerability to Facebook in April 2016, but was told that Facebook was aware of the issue, that it was “expected behaviour” and wasn’t being actively worked on. The Guardian has verified the backdoor still exists.

The WhatsApp vulnerability calls into question the privacy of messages sent across the service used around the world, including by people living in oppressive regimes.
Pinterest
The WhatsApp vulnerability calls into question the privacy of messages sent across the service used around the world, including by people living in oppressive regimes. Photograph: Marcelo Sayão/EPA

Steffen Tor Jensen, head of information security and digital counter-surveillance at the European-Bahraini Organisation for Human Rights, verified Boelter’s findings. He said: “WhatsApp can effectively continue flipping the security keys when devices are offline and re-sending the message, without letting users know of the change till after it has been made, providing an extremely insecure platform.”

Boelter said: “[Some] might say that this vulnerability could only be abused to snoop on ‘single’ targeted messages, not entire conversations. This is not true if you consider that the WhatsApp server can just forward messages without sending the ‘message was received by recipient’ notification (or the double tick), which users might not notice. Using the retransmission vulnerability, the WhatsApp server can then later get a transcript of the whole conversation, not just a single message.”

The vulnerability calls into question the privacy of messages sent across the service, which is used around the world, including by people living in oppressive regimes.

Professor Kirstie Ball, co-director and founder of the Centre for Research into Information, Surveillance and Privacy, called the existence of a backdoor within WhatsApp’s encryption “a gold mine for security agencies” and “a huge betrayal of user trust”. She added: “It is a huge threat to freedom of speech, for it to be able to look at what you’re saying if it wants to. Consumers will say, I’ve got nothing to hide, but you don’t know what information is looked for and what connections are being made.”

In the UK, the recently passed Investigatory Powers Act allows the government to intercept bulk data of users held by private companies, without suspicion of criminal activity, similar to the activity of the US National Security Agency uncovered by the Snowden revelations. The government also has the power to force companies to “maintain technical capabilities” that allow data collection through hacking and interception, and requires companies to remove “electronic protection” from data. Intentional or not, WhatsApp’s backdoor to the end-to-end encryption could be used in such a way to facilitate government interception.

Jim Killock, executive director of Open Rights Group, said: “If companies claim to offer end-to-end encryption, they should come clean if it is found to be compromised – whether through deliberately installed backdoors or security flaws. In the UK, the Investigatory Powers Act means that technical capability notices could be used to compel companies to introduce flaws – which could leave people’s data vulnerable.”

A WhatsApp spokesperson told the Guardian: “Over 1 billion people use WhatsApp today because it is simple, fast, reliable and secure. At WhatsApp, we’ve always believed that people’s conversations should be secure and private. Last year, we gave all our users a better level of security by making every message, photo, video, file and call end-to-end encrypted by default. As we introduce features like end-to-end encryption, we focus on keeping the product simple and take into consideration how it’s used every day around the world.

“In WhatsApp’s implementation of the Signal protocol, we have a “Show Security Notifications” setting (option under Settings > Account > Security) that notifies you when a contact’s security code has changed. We know the most common reasons this happens are because someone has switched phones or reinstalled WhatsApp. This is because in many parts of the world, people frequently change devices and Sim cards. In these situations, we want to make sure people’s messages are delivered, not lost in transit.”

Asked to comment specifically on whether Facebook/WhatApps had accessed users’ messages and whether it had done so at the request of government agencies or other third parties, it directed the Guardian to its site that details aggregate data on government requests by country.

Concerns over the privacy of WhatsApp users has been repeatedly highlighted since Facebook acquired the company for $22bn in 2014. In August 2015, Facebook announced a change to the privacy policy governing WhatsApp that allowed the social network to merge data from WhatsApp users and Facebook, including phone numbers and app usage, for advertising and development purposes.

Facebook halted the use of the shared user data for advertising purposes in November after pressure from the pan-European data protection agency groupArticle 29 Working Party in October. The European commission then filed charges against Facebook for providing “misleading” information in the run-up to the social network’s acquisition of messaging service WhatsApp, following its data-sharing change.

https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages

Obama gives CIA, FBI, DEA and 13 other agencies warrantless full raw DATA NSA surveillance access on Americans citizens

Obama gives CIA, FBI, DEA and 13 other agencies warrantless full raw DATA NSA surveillance access on Americans citizens.

Further Reading:

In its final days, the Obama administration has expanded the power of the National Security Agency to share globally intercepted personal communications with the government’s 16 other intelligence agencies before applying privacy protections.

The change means that far more officials will be searching through raw data.

Previously, the N.S.A. filtered information before sharing intercepted communications with another agency, like the C.I.A. or the intelligence branches of the F.B.I. and the Drug Enforcement Administration. The N.S.A.’s analysts passed on only information they deemed pertinent, screening out the identities of innocent people and irrelevant personal information.

Now, other intelligence agencies will be able to search directly through raw repositories of communications intercepted by the N.S.A. and then apply such rules for “minimizing” privacy intrusions.

“Rather than dramatically expanding government access to so much personal data, we need much stronger rules to protect the privacy of Americans,” Mr. Toomey said. “Seventeen different government agencies shouldn’t be rooting through Americans’ emails with family members, friends and colleagues, all without ever obtaining a warrant.”

“This development is very troubling for Americans’ privacy,” said John Napier Tye, a former state department official turned surveillance whistleblower. “Most people don’t realize this, but even our purely domestic email and text messages are often stored on servers outside the United States. And the NSA has written extremely permissive rules for itself to collect data outside US borders.

“So in operations overseas, the NSA is scooping up a lot of purely domestic communications. And now, with these new rules, many different federal agencies can search and read the domestic communications of normal Americans, without any warrant or oversight from Congress or the courts.”

They mean that NSA officials are no longer required to filter out information about innocent people whose identities have been scooped up before passing the intercepted communications to officials from other agencies, who will now be able to search through raw caches of data.

“This raises serious concerns that agencies that have responsibilities such as prosecuting domestic crimes, regulating our financial policy, and enforcing our immigration laws will now have access to a wealth of personal information that could be misused,” said Singh Guliani. “Congress needs to take action to regulate and provide oversight over these activities.”

https://www.theguardian.com/world/2017/jan/12/obama-us-intelligence-greater-access-warrantless-data-foreign-targets

Privacy advocates’ concerns center around loopholes in the rules that allow agencies like the FBI and DEA to search the NSA’s collected data for purposes such as investigating an “agent of a foreign power.” Any evidence of illegal behavior that a searcher stumbles on can be used in a criminal prosecution. That means the rule change, according to Cardozo, introduces new possibilities for law enforcement agencies like the DEA and FBI to carry out what’s known as “parallel construction.” That maneuver involves secretly using the NSA’s intelligence to identify or track a criminal suspect, and then fabricating a plausible trail of evidence to present to a court as an after-the-fact explanation of the investigation’s origin. The technique was the subject of an ACLU lawsuit against the Office of the Director of National Intelligence in 2012, and resulted in the Justice Department admitting to repeatedly using the technique to hide the NSA’s involvement in criminal investigations.

“It used to be that if NSA itself saw the evidence of a crime, they could give a tip to the FBI, and the FBI would engage in parallel construction,” says Cardozo. “Now FBI will be able to get into the raw data themselves and do what they will with it.”

https://www.wired.com/2017/01/just-time-trump-nsa-loosens-privacy-rules/

How NSA identifies you by just starting your windows PC

Thanks to the fine research paper found here http://www.icir.org/vern/papers/trackers-pets16.pdf  YOU ARE easiliy identified when you just start your windows PC and log onto the internet – not requiring you any user-inaction.

You are identified by either: HTTP Identifiers or NON-HTTP Identifiers

HTTP Identifiers

Application-specific: The first category is identifiers sent by applications other than browsers. For example, Skype sends a user identifier uhash in a URL of the format http://ui.skype.com/ui/2/2.1.0.81/ en/getlatestversion?ver=2.1.0.81&uhash= . The parameter uhash is a hash of the user ID, their password, and a salt, and remains constant for a given Skype user [12]. uhash can very well act as an identifier for a user; a monitor who observes the same value from two different clients/networks can infer that it reflects the same user on both. Another example in this category is a Dropbox user_id sent as a URL parameter. We discovered that since the Dropbox application regularly syncs with its server, it sends out this identifier—surprisingly, every minute—without requiring any user action.

Mobile devices: Our methodology enabled us to discover that the Apple weather app sends IMEI and IMSI numbers in POST requests to iphone-wu.apple.com. We can recognize these as such, because the parameter name in the context clearly names them as IMEI and IMSI; the value also matches the expected format for these identifiers. Other apps also send a number of device identifiers, such as phone make, advertising ID,4 SHA1 hashes of serial number, MAC address, and UDID (unique device identifier) across various domains, such as s.amazon-adsystem.com, jupiter.apads.com and ads.mp.mydas.mobi. The iOS and Android mobile SDKs provide access to these identifiers.

http-identifiers

NON-HTTP Identifiers

Device identifiers sent by iOS/OSX: We found instances of device identifiers sent on port 5223. Apple devices use this port to maintain a persistent connection with Apple’s Push Notification (APN) service, through which they receive push notifications for installed apps.

An app-provider sends to an APN server the push notification along with the device token of the recipient device. The APN server in turn forwards the notification to the device, identifiying it via the device token [2]. This device token is an opaque device identifier, which the APN service gives to the device when it first connects. The device sends this token (in clear text) to the APN server on every connection, and to each app-provider upon app installation. This identifier enabled us to identify 68 clients in our dataset as Apple devices. The devices sent their device token to a total of 407 IP addresses in two networks belonging to Apple (17.172.232/24, 17.149/16).

non-http-identifiers

The work http://www.icir.org/vern/papers/trackers-pets16.pdf was supported by the Intel Science and Technology Center for Secure Computing, the U.S. Army Research Office and by the National Science Foundation.

Copy of Publication here: trackers-pets16

Der Kreis derer, die als Chief Disruption Officer überhaupt nur annähernd in Betracht kommen, hat den Radius „null“

Ich bin eine eierlegende WollMilchSau – und der neue Chief Disruption Officer Deiner Firma!

Eierlegende Wollmilchsau

Eierlegende Wollmilchsau

Fotolia #83825279 | Urheber: jokatoons

Herausforderung: die Auftragsklärung

Ein neuer CDO soll bei den Konzernen oft den „Tanker bewegen und in Schnellboote verwandeln“, schließlich hört und liest man ja überall von Startups, Agil, Dynamik, Disruption und stetiger Veränderung. Da stellt sich doch die Frage (typischerweise an HR) wer erstellt den das JobProfil für einen Job, den es noch nie gab und dessen Ziele so faszinierend unterschiedlich, ja widersprüchlich sind. Schließlich wird jeder seine eigene Vorstellung davon haben, was der künftige CDO „endlich“ angehen soll – fragen Sie doch mal Kollegen aus unterschiedlichen Funktionen!

In der folgenden Liste habe ich einmal einige (Achtung Buzzword-Bingo) zusammengefasst:

Typische CDO Erwartungsperspektiven:

  • Neue(s) Business Modell(e) finden, entwickeln und bitte gleich den Return on Investment im ersten Jahr sicherstellen
  • Change Manager (Disruption, Innovation…) der die gesamte Organisation in die neue Arbeitswelt führt
  • Neue Vertriebs- und Finanzierungskanäle – vom Crowdfunding über Crowdstorming, Crowdworking und Social Marketing
  • Digital Mindset / Organisationsentwicklung – nachhaltige Veränderung der Unternehmenskultur
  • Board Coaching / Trainer für die anderen Vorstände
  • Smart Factory – die intelligente Fabrik, digitalisierte, automatisierte und vernetzte Produktionsumgebungen mit neuen agilen Werkzeugen bis zur Losgröße 1 (zugleich stetig wachsender Fokus auf Service-Orientierung stattfindet – also „nicht-produktion“)
  • BigData / Analytics / Predictive – alles was man mit Daten, deren Analyse und Vorhersagbarkeit so treiben kann
  • Rechtsanwalt – Arbeit 4.0, Zusammenarbeit mit Externen, Compliance… siehe unten „illegal“
  • Neues IT Framework – moderne Softwarearchitekturen, Werkzeuge und Apps einführen
  • Digitales Vorbild / Botschafter – Sichtbar werden für neuen Arbeitsstil, Führungskultur – am Besten auch nach außen werbewirksam
  • Digitale Prozesse / Digitale Effizienz – den systemischen Organisationsmotor generalsanieren
  • Social Media extern – von Arbeitnehmerattraktivität über Recruiting (von natürlich Digital Professionals) bis zu Wirkungsverbesserung durch virales Marketing
  • Interne Kommunikation und Zusammenarbeit (Enterprise Social Networking)… – die gesamte Belegschaft, inklusive Fabrikarbeiter mobil, vernetzt, zeit- und orts-unabhängig sowie skallierbar in Arbeit 4.0 führen

Diese Liste an Erwartungen ist sicher alles andere als vollständig, soll aber zeigen, dass es nicht einfach ist, das Profil für diese Position so zu definieren, dass der Inhaber überhaupt eine Chance hat Wirkung zu entfalten. Schließlich gilt es neben den fachlichen Aufgaben auch die bestehende Kultur, Politik, Seilschaften etc. kennen zu lernen und dann nachhaltig zu verändern.

Herausforderung: Woher nehmen, diese CDO – eierlegende WollMilchSau?

Wie einer der Headhunter mal so schön formulierte:

„der Kreis derer, die als CDO überhaupt nur annähernd in Betracht kommen, hat den Radius „null““

Es gibt keine Ausbildung zum CDO, typische Karrierewege erzeugen meist „system-stabilisierende“ Vertreter, wer will einem „jungen Wilden“ die Verantwortung über einen Konzern geben. Die Zahl derer, die in ähnlichen Rollen erfolgreich sind, ist äußerst überschaubar – Nachahmung schwierig- und oft auch nicht einfach übertragbar… auch die großen Consulting Riesen sind hier sicher keine Hilfe, da deren Reifegrad hier ähnlich jungfräulich ist (Es gibt keine Blaupausen, die man aus der Schublade ziehen könnte, keine Beweise, kaum Studien die als Handlungsanleitung taugen)

Also wird nach Kompromissen gesucht, das kann dann z.B. so aussehen:

  • wir nehmen eine(n), der schon Vorstand war/ist … dort findet man kaum Digital Natives (damit ist nicht vorrangig das Alter, vielmehr deren Haltung gegenüber neuen, disruptiven Entwicklungen gemeint, die noch nicht allgemein als erfolgreich, bleibend und wichtig/prägend anerkannt sind), aus Karrieregründen kaum jemanden, der mit Transparenz, Beteiligung und agilen Methoden risikofreudig umgeht
  • wir nehmen eine(n), der IT kann … wohl einer der häufigsten Fehler, Digitale Transformation mit IT zu verwechseln. Wohl ist ein guter Teil (ca. 20%) mit Software, Tools und IT KnowHow verbunden, der Großteil geht aber um völlig andere (oft sehr IT fremde) Themen – es geht sehr viel um Führung! siehe Liste oben
  • wir nehmen eine(n), der schon ein Startup erfolgreich gemacht hat … das führt auf beiden Seiten zu großen Enttäuschungen: Freiheit, Sicherheit, Vorgaben, Rahmenbedingungen, Größe, Internationalität… Assimilation garantiert
  • wir nehmen jemanden, der Karriere machen will und großes Potential zeigt … Wer Karriere machen will ist meist doch recht Regel-konform unterwegs. Wer traut es sich „alles“ in Frage zu stellen bei einem System, in dem er/sie groß werden will? Risikobereitschaft, Fehler machen (dürfen) sind nicht die üblichen Treiber einer erfolgreichen Karriere
  • wir suchen jemanden von Extern – klar, neue Besen kehren gut… wie sieht es aber mit der damit verbundenen sehr langen Anlaufzeit aus. Kann es sich z.B. ein Automobilkonzern in der heutigen Lage leisten jetzt mit jemandem bei null anzufangen, was die internen Kenntnisse, Netzwerke (oder besser Verstrickungen), Politik, Kultur angeht?

Den „fertigen“ CDO zu finden dürfte also ein schwieriges Unterfangen sein – eine Lösung wäre in meinen Augen mit der aktuellen Priorität zu beginnen und zu versuchen die fehlenden Merkmale zu intern zu entwickeln (ideal parallel mit allen anderen). Neben Kultur, Führung ist sicher „neues, konstantes Lernen“ auf allen Ebenen höchst relevant.

aus: https://www.linkedin.com/pulse/der-cdo-wirds-schon-richten-harald-schirmer

These 15 startups didn’t exist 5 years ago — now they’re worth billions

Silicon Valley can create immense value in just a short time. Just look at these 15 startups that didn’t even exist five years ago, which are now valued at $1 billion or more, according to venture capitalists.

zooxZoox’s cofoundersZoox

For the purposes of this list, Business Insider asked PitchBook Data to pull a list of US-based companies that were founded in 2012 or later — since we’re nearing the end of 2016 — and that are private tech companies with a valuation of north of $1 billion.

We then ranked them from least to most valuable based on their post-money valuations.

Here are the companies that achieved billion-dollar valuations in the last five years:

Cylance

Cylance

Cylance CEO Stuart McClureYouTube/Cylance

Founded: 2012

Valuation: $1 billion

Cylance built a product that uses artificial intelligence to analyze a file you’re about to open, determine if it’s malware, and then stop it from executing — all in less than a second. It solves the problem of email phishing scams, which are still a favorite method of hackers, and has over 1,000 customers, it says.

Cylance was founded by Stuart McClure and Ryan Permeh, two well-known names in security who are perhaps best known for their work at McAfee.

 

 

Compass

Compass

Compass

Founded: 2012

Valuation: $1 billion

While Compass functions like a traditional broker, the company’s promise is using technology to reduce the time and friction of buying and selling a house or apartment. In July, Compass released an app designed to replace „stale“ quarterly market reports with more dynamic information. In the app, buyers and sellers can search by standard things like neighborhood, number of bedrooms, price range, and so on. But they can also look at more advanced metrics, like year-over-year analysis of median price per square foot, days on the market, and negotiability.

 

 

Illumio

Illumio

Illumio CEO Andrew RubinIllumio

Founded: 2013

Valuation: $1 billion

In 2014, Illumio emerged from stealth. Six months later, it had already racked up a billion dollar valuation, thanks to its new approach to security.  The idea involves watching the applications themselves to make sure they aren’t doing anything they are not supposed to do, indicating a hacker or a virus. It places a tiny bit of code (called an agent) on every computer and operating system to watch all the apps. Companies can then install the software that watches the apps in their own data center, or they can hire Illumio’s cloud service to watch the apps for them. And then the security follows the app wherever it goes, even if an app moves from one server to another, or from the data center to a cloud computing service.

 

Carbon3D

Carbon3D

Carbon3D

Founded: 2013

Valuation: $1 billion

Carbon3D grabbed headlines and attention for its method of seemingly creating shapes out of a liquid resin soup.  It’s much more complicated than that, but Carbon3D has caught the eye of everyone from Ford to Johnson & Johnson. While Ford imagines a future of speedy customizable parts, like custom designed cup holders, healthcare operators are looking at Carbon3D for a fast way to create surgical parts.

The machines are already being tested less than a year after they launched. In April, it released its M1 printer.

 

 

Opendoor

Opendoor

Keith Rabois, chairman and cofounder of Opendoor

Founded: 2014

Valuation: $1.1 billion

Opendoor is betting that homeowners would take a guaranteed sale over a higher price. It calculates a fair market value and pays homeowners before re-selling the home with a 30-day satisfaction guarantee.

 

Uptake Technologies

Uptake Technologies

Getty Images/Bloomberg

Founded: 2014

Valuation: $1.1 billion

Former Groupon founder Brad Keywell started the secretive Chicago-based data analytics startup in 2014. Already it’s working with Caterpillar to be the analytics backbone of heavy industries like manufacturing, construction, rail, and more. Its sensors and data analysis should be able to help companies predict revenue and save money, according to Forbes.

Flatiron Health

Flatiron Health

Saskia Uppenkamp

Founded: 2012

Valuation: $1.2 billion

Flatiron Health is a software company that organizes the world’s oncology information and makes it accessible for doctors, patients, and researchers. In January 2016, Roche, one of the world’s leading pharmaceutical companies, made a $175 million investment in the company, which valued the company at $1.1 billion.

Zoox

Zoox

Tim Kentley-Klay and Jesse LevinsonZoox

Founded: 2014

Valuation: $1.55 billion

Despite remaining in stealth, Zoox has already raised $290 million for its unseen product. The only hint its founder Tim Kentley-Klay has given was at a conference in October when he described it as Disneyland on the streets:

“At Zoox what we’re creating…is not a self-driving car any more than the automobile is a horseless carriage. We’re not building a robo-taxi service, we’re actually creating an advanced mobility service,” Kentley-Klay said, according to the Wall Street Journal. “You can really think of it as Disneyland on the streets of perhaps San Francisco and that means a vehicle which is smart enough to understand its environment but it’s also importantly smart enough to understand you, where you need to be, what you want to do in the vehicle, and how you want to move around the city.”

 

 

Instacart

Instacart

Instacart

Founded: 2012

Valuation: $1.9 billion

Often dubbed „Uber for groceries,“ Instacart eliminates the need to ever set food in a grocery store. The service will deliver your full load of groceries, hand-picked by a personal shopper at local stores.

In 2016, the company deepened its relationship with Whole Foods after the grocery retailer invested in the company and signed a multi-year delivery contract.

 

 

Oscar

Oscar

Oscar CEO and co-founder Mario Schlosser, co-founders Kevin Nazemi and Joshua Kushner.Oscar

Founded: 2012

Valuation: $1.5 billion

Oscar founder Josh Kushner wants to transform the healthcare industry by creating a better user experience when it comes to health insurance. It launched publicly in 2013 to sell better insurance through Affordable Care Act marketplaces. Yet, the election of Donald Trump could spell trouble for the highly-valued startup, even though Kushner’s brother, Jared, is Trump’s son-in-law. According to Bloomberg, it’s still losing money as it looks to diversify away from Obamacare-only offerings — something Trump, a close family connection, seeks to repeal.

 

Quanergy

Quanergy

Quanergy

Founded: 2012

Valuation: $1.6 billion

Self-driving car startups aren’t the only billion-dollar bets around. Quanergy isn’t building its own car, but instead specializes in building LiDAR systems — the 3D sensing systems that self-driving cars use to the see the world. Already the startup has struck partnerships with vehicle-makers including Mercedes-Benz and Hyundai.

 

Blue Apron

Blue Apron

Blue Apron cofounders Matt Wadiak, Matt Salzberg, and Ilia PapasBlue Apron

Founded: 2012

Valuation: $2 billion

Blue Apron, a company that sends you portioned-out ingredients and recipes in a box, is a godsend for lazy cooks.

Though it’s only been around since 2012, Blue Apron has already generated more than $800 million in revenue in 2016, according to Bloomberg. However, it has put its IPO plans on hold as it works to decrease its customer acquisition costs and improve lifetime customer value, Bloomberg reported. Blue Apron’s potential is vast: The service appeals to millennials who want to expand their repertoire in the kitchen, as much as to busy moms straining for creativity and simplicity in their weeknight meals.

 

Avant

Avant

Avant CEO Al GoldsteinAvant

Founded: 2012

Valuation: $2 billion

One of two highly-valued Chicago startups, online lending company Avant targets subprime borrowers — people with lower credit scores. To date, the startup has given out more than 500,000 loans, totaling more than $3 billion.

 

Zenefits

Zenefits

Zenefits CEO David SacksREUTERS/Beck Diefenbach

Founded: 2012

Valuation: $2 billion

Zenefits‘ valuation took a haircut in 2016. The startup, once valued at $4.5 billion, experienced turmoil after it was discovered that its CEO had created a program designed to cheat state regulations. After installing a new CEO and launching Zenefits 2.0, the company also repriced its stock, shaving its valuation from $4.5 billion to a cool $2 billion — still a lot of money for a five-year-old company.

 

 

Pivotal Software

Pivotal Software

Pivotal CEO Rob MeeGlassdoor/Pivotal

Founded: 2013

Valuation: $2.8 billion

Pivotal sells a set of software tools and consulting services to help even the largest, most old-school companies build and develop software as if they were a tiny startup. Pivotal becomes their secret weapon as they turn to newfangled cloud computing and data-crunching technologies to stay competitive in a digital world. In May, Ford led a $253 million investmentin the company alongside Microsoft.

http://www.businessinsider.de/startups-didnt-exist-5-years-ago-worth-billions-2016-12?op=1

How to do the Right Moves in Small Business Owners Decisions

Owning and running a small business is a roller coaster ride with ups and downs as challenges and successes come your way. Most entrepreneurs march through uncharted waters and self-correct as they go along, knowing that mistakes are essentially inevitable. However, you don’t have to fall into all of the typical entrepreneur traps—here are five common mistakes and how to avoid them:

  • thinking big. Small business may start small, but that doesn’t mean they have to stay that way. According to experienced entrepreneurs and investors, the biggest challenge small businesses face is thinking big and being able to compete with larger, more established competitors. After all, a small business that is content to operate comfortably in its little sphere won’t achieve much success and could burn out eventually. To avoid this mistake, form strategic partnerships on a local level before moving to a larger stage. Find investors, mentors, or partners who share your passion and who have the drive and resources to help your business succeed on a larger scale.
  • Paying attention to the numbers. One of the most important aspects of running a small business is understanding the accounting and financial side of things. Investors won’t want to give you money if you don’t have accurate financials and guidance for upcoming growth. Everything your business does comes back to the numbers, so pay attention to them and make them an important part of your daily routine. Even if you are more focused on the big-picture strategy for the business, never stray from the numbers. If needed, find a trusted financial advisor or accountant who can keep you in the loop while being the one who does the daily number crunching.
  • knowing the customer. You might have a great product or service, but it won’t be successful if you can’t reach the right people. Start by doing research about your target audience to gain a better understanding of who will purchase your product and why. From there, look for ways to reach them and consider the messages to use that will best appeal to their self interests and make them interested in your product. Keeping an eye on your customer doesn’t stop after your business launches—stay up to date on who is entering your store or website with people counting software and pay attention to what they are saying online and via social media. Without customers, you won’t have a business, so pay attention to their habits and responses and adapt your business plan to meet their needs.
  • Staying cool. Running a small business has a way of humbling people, but it can be tempting to get a big-headed ego with your first bit of success. Making a big sale, landing a great investor, or signing a firm deal are all milestones for your business, but don’t let that be the high point of your entire endeavor. Use your success to drive your passion and hunger for further success. If needed, surround yourself with people who can bring you back down to earth after big moments and remind yourself that there are other small businesses that are having even greater success.
  • planning. Every entrepreneur knows the importance of a strong business plan, but that plan needs to be adaptable and not set in stone. Too many entrepreneurs get caught up in perfecting the details of their plans that they never actually put things into action, or by the time they do, it is too late to capitalize on a great opportunity. Setting goals for your business is a great way to drive motivation, but goals that are too solid and that can’t adapt as plans or situations change can lead to failure and be a big loss for the company. There are many things you don’t know when you start a small business, and learning them along the way is an important part of growth. If you are so tied to your original plans that you miss a learning opportunity, your business likely won’t have the flexibility to succeed in the long run.

Running a small business is full of learning as you go, but following these tips can help you doing the right things.

 

http://www.smallbizdaily.com/biggest-mistake

Cyber Attacks get worse in 2017

cyber-attack

Image Credit: SWEviL/Shutterstock

It was speculated 2016 would see even more cybersecurity activity than 2015, and it did not disappoint. Consider the $81 million stolen from Bangladesh Bank, the 500 million accounts swiped from Yahoo, or the 19,000 emails leaked from Democratic Party officials in the run-up to the election. Not to mention the IoT-powered botnets launching record-breaking DDoS attacks that have brought down major parts of the Internet.

But, in reality, this year’s cyber-attack headlines offer just a glimpse of a cyber war between hackers and security personnel that is being waged on a grand scale every day. More than anything, they are harbingers of worse to come.

Here are some of the escalated challenges we will face in 2017.

1. Attackers won’t just steal data — they will change it

Today’s savvy attackers are moving away from pure data theft and website hacking to attacks that have a subtler target: data integrity. They will use their ability to hack information systems not just to make a quick buck but also to cause long-term, reputational damage to individuals or groups through the erosion of trust in the data itself.

In the past six months alone, we’ve seen attacks like the DNC and Yahoo breaches, which focused on influencing political and economic public opinion, rather than simply gaining a profit. And the hackers aren’t done yet – the Russian group thought to be behind the election-related breaches is moving on to Germany’s elections next, according to a recent statement.

The scenario is particularly worrying for industries that rely heavily on public confidence. In fact, data from the analysis of SEC disclosures found 83 percent of publicly traded companies worry most about risk of brand damage via hacks. But it’s not just them. A laboratory that cannot vouch for the fidelity of medical test results, or a bank that has had account balances tampered with, are examples of organizations at particular risk. Governments, as pointed out above, may also suffer significant damage from such attacks, as critical data repositories are altered and public distrust in national institutions rises.

We’re also seeing this kind of manipulation at smaller scale. For example, we were deployed in a manufacturing firm that used biometric scanners to restrict access to their machinery and industrial plants. We noticed an unusual Telnet for a biometric scanner that was hooked to the corporate network. After further investigation, we found that legitimate data was being altered – quite possibly to add new fingerprints. This type of manipulation, had it not been detected early, would have have let attackers right in through the front door.

While some of the recent breaches and the result of this year’s U.S. presidential election may seem straight out of a movie, tomorrow’s cyber-attacks will make it harder than ever to parse fact from fiction.

2. Consumer devices will be held for (cyber) ransom

Ransomware, like Cryptolocker, has plagued companies around the world — experts reckon these attacks have increased fivefold in 2016 alone. They encrypt critical files at a speed that is virtually impossible to keep up with and leave companies facing hefty fees for their release.

Hospitals have suffered particularly at the hands of ransomware attacks. They are prime targets, as they have become digital jungles full of everything from life-saving medical equipment and critical patient records to patient devices and staff computers — all with cyber defenses that have failed to keep pace. The result is organizations that pay up. Hollywood Presbyterian Medical Center in Los Angeles paid the equivalent of $17,000 in Bitcoin to extortionists after its computers were taken offline for over a week.

In 2017 and beyond, we will start to see the beginning of a new type of extortion on a micro level, as consumers are targeted across a range of connected objects. Imagine getting home and turning on your smart TV only to find that cybercriminals are running a ransomware attack on your device. Would you pay $50 to unlock it? Or what if the new GPS system in your car got hacked when you were late for a meeting — how much would you pay to unlock it?

3. Artificial intelligence will be a weapon

Artificial intelligence is exciting for many reasons — self-driving cars, virtual assistants, better weather forecasting, the list goes on. But attackers will use AI to wield highly sophisticated and persistent attacks, attacks that blend into the noise of busy networks.

We have already seen the first glimpses of attacks going this direction in automated polymorphic and metamorphic malware. Polymorphic malware, which changes its attributes mid-attack to evade detection, has reinforced the obsoleteness of signature-based detection methods. It self-learns and understands its environment and network before choosing its next action. Automation has also been a major factor in the resurgence of ransomware. We can anticipate that artificial intelligence threats will be similar. Imagine a piece of artificially intelligent malware sitting silently on a network, observing its surroundings and learning how to disguise itself. If it understands how to completely blend in with the background noise of a network, could it ever be detected?

The next generation of AI-powered attacks to emerge will use customized code to emulate the behaviors of specific users to fool even skilled security personnel. This includes the ability to craft sophisticated and bespoke phishing campaigns that will successfully dupe even the most threat-conscious employee.

Earlier this year, we were deployed in a charity in California for a proof-of-value. One day, a receptionist received an email containing a fake invoice, supposedly coming from a stationary supplier known to the company. The receptionist opened the attachment, as she recognized the company, and typically handled many invoices per day. As soon as she clicked the attachment, her computer immediately connected to a server in Ukraine and downloaded a malware that rapidly began encrypting files. This will only get worse with “smart” malware driving attacks specifically tailored for their victims.

Next year’s attackers can see more than your social media profile. They’ll know that your 10 a.m. meeting with your supplier is being held at its new headquarters. At 9:15 a.m., an email with the subject line “Directions to our office” arrives in your inbox, apparently from the person you are meeting, as you get off the train. Do you click the map link in the email?

 

Here’s how cyber attacks get worse in 2017

15 quotes from self-made billionaires that will change your outlook on money

From investor Warren Buffett to tech mogul Jeff Bezos, here’s what some of the world’s richest men and women have to say about money.

“My goal was never to just create a company. A lot of people misinterpret that, as if I don’t care about revenue or profit or any of those things. But what not being just a company means to me is not being just that — building something that actually makes a really big change in the world.” —Mark Zuckerberg, CEO of Facebook

“My goal was never to just create a company. A lot of people misinterpret that, as if I don't care about revenue or profit or any of those things. But what not being just a company means to me is not being just that — building something that actually makes a really big change in the world.” —Mark Zuckerberg, CEO of Facebook

REUTERS/Robert Galbraith

“When a small business grows like eBay did, it has a multiplier effect. It creates other small businesses that supply it with intellectual capital, goods and services.” —Meg Whitman, CEO of Hewlett Packard Enterprise

“When a small business grows like eBay did, it has a multiplier effect. It creates other small businesses that supply it with intellectual capital, goods and services.” —Meg Whitman, CEO of Hewlett Packard Enterprise

AP

„I will tell you how to become rich. Close the doors. Be fearful when others are greedy. Be greedy when others are fearful.“ —Warren Buffett, chairman and CEO of Berkshire Hathaway

"I will tell you how to become rich. Close the doors. Be fearful when others are greedy. Be greedy when others are fearful." —Warren Buffett, chairman and CEO of Berkshire Hathaway

Mario Tama/Getty Images

„There are very few people in the world who get to build a business like this. I think trading that for some short-term gain isn’t very interesting.” —Evan Spiegel, CEO of Snap Inc., on not selling to Facebook

"There are very few people in the world who get to build a business like this. I think trading that for some short-term gain isn’t very interesting.” —Evan Spiegel, CEO of Snap Inc., on not selling to Facebook

Steve Jennings/Getty

„The reason I’ve been able to be so financially successful is my focus has never, ever for one minute been money.“ —Oprah Winfrey, business magnate

"The reason I've been able to be so financially successful is my focus has never, ever for one minute been money." —Oprah Winfrey, business magnate

Mark Metcalfe/Getty Images

“And I think the more money you put in people’s hands, the more they will spend. And if they don’t spend it, they invest it. And investing it is another way of creating jobs. It puts money into mutual funds or other kinds of banks that can go out and make loans, and we need to do that.” —Michael Bloomberg, CEO of Bloomberg LP

“And I think the more money you put in people's hands, the more they will spend. And if they don't spend it, they invest it. And investing it is another way of creating jobs. It puts money into mutual funds or other kinds of banks that can go out and make loans, and we need to do that.” —Michael Bloomberg, CEO of Bloomberg LP

REUTERS/Tyrone Siu

„If we were motivated by money, we would have sold the company a long time ago and ended up on a beach.“ —Larry Page, Google cofounder and CEO of Alphabet Inc.

"If we were motivated by money, we would have sold the company a long time ago and ended up on a beach." —Larry Page, Google cofounder and CEO of Alphabet Inc.

Kimberly White/Getty Images

„I think frugality drives innovation, just like other constraints do. One of the only ways to get out of a tight box is to invent your way out.“ —Jeff Bezos, CEO of Amazon

"I think frugality drives innovation, just like other constraints do. One of the only ways to get out of a tight box is to invent your way out." —Jeff Bezos, CEO of Amazon

Chip Somodevilla/Getty

“You always hear the phrase, money doesn’t buy you happiness. But I always in the back of my mind figured a lot of money will buy you a little bit of happiness. But it’s not really true.” —Sergey Brin, Google cofounder and president of Alphabet Inc.

“You always hear the phrase, money doesn’t buy you happiness. But I always in the back of my mind figured a lot of money will buy you a little bit of happiness. But it's not really true.” —Sergey Brin, Google cofounder and president of Alphabet Inc.

Steve Jennings/Getty Images

„Today, making money is very simple. But making sustainable money while being responsible to the society and improving the world is very difficult.“ —Jack Ma, executive chairman of Alibaba Group

"Today, making money is very simple. But making sustainable money while being responsible to the society and improving the world is very difficult." —Jack Ma, executive chairman of Alibaba Group

Andrew Burton/Getty Images

“Money makes you more of who you already are.” —Sara Blakely, founder of Spanx

“Money makes you more of who you already are.” —Sara Blakely, founder of Spanx

Paul Morigi/Getty

“I’m a bit tight with money, but so what? I look at the money I’m about to spend on myself and ask myself if IKEA’s customers can afford it… I could regularly travel first class, but having money in abundance doesn’t seem like a good reason to waste it.. If there is such a thing as good leadership, it is to give a good example. I have to do so for all the IKEA employees.” —Ingvar Kamprad, founder of IKEA

“I'm a bit tight with money, but so what? I look at the money I'm about to spend on myself and ask myself if IKEA's customers can afford it... I could regularly travel first class, but having money in abundance doesn't seem like a good reason to waste it.. If there is such a thing as good leadership, it is to give a good example. I have to do so for all the IKEA employees.” —Ingvar Kamprad, founder of IKEA

Heribert Proepper/AP

“The financial markets generally are unpredictable. … The idea that you can actually predict what’s going to happen contradicts my way of looking at the market.“ —George Soros, investor and chairman of Soros Fund Management

“The financial markets generally are unpredictable. ... The idea that you can actually predict what's going to happen contradicts my way of looking at the market." —George Soros, investor and chairman of Soros Fund Management

AP Photo

“I believe that you have to understand the economics of a business before you have a strategy, and you have to understand your strategy before you have a structure. If you get these in the wrong order, you will probably fail.” —Michael Dell, CEO of Dell Inc.

“I believe that you have to understand the economics of a business before you have a strategy, and you have to understand your strategy before you have a structure. If you get these in the wrong order, you will probably fail.” —Michael Dell, CEO of Dell Inc.

Jack Plunkett/AP Images for Dell, Inc.

“I never thought about becoming wealthy. It never crossed my mind. What really motivated me was to try to accomplish something.” —Sheldon Adelson, chairman and CEO of Las Vegas Sands Corporation