Skip to main content

TripActions secures $500M credit facility for its new corporate travel product

TripActions, a Palo Alto-based, corporate travel-focused unicorn, has secured a new, half-billion-dollar credit facility to help support the launch of its second product line. Called TripActions Liquid, the service helps companies that do not offer corporate cards to workers a way to avoid forcing those employees to use their personal cards to float costs for corporate travel.

Liquid plugs into the broader TripActions corporate travel service, which TechCrunch has written about here.

You can see where the debt fits into the news; if TripActions is going to float a lot of spend for other companies so that they can avoid temporarily offload travel spend to employee’s personal cards (which frankly should be illegal), it’s going to involve a lot of money — money that TripActions would rather not deduct from the business equivalent of its checking account. So, a short-term revolving credit line — the corporate version of a high-limit credit card, merely minus the usurious interest rates — is the answer.

Per the company, the money comes from “Silicon Valley Bank with participation from Goldman Sachs and Comerica Bank.” Or more specifically, the dollars are coming from the Iron Bank of California, its East Coast equivalent and Drake’s credit union. Jokes aside, it’s a good trio, showing presumably wide interest in helping funding TripActions’ new product.

Not that the company is itself short on funds. Crunchbase has more than $480 million in tracked equity funding down for the company, including a $250 million Series D from last June (a16z, Group 11, Lightspeed and Zeev Ventures). That funding round valued the company at around $3 billion, according to Crunchbase data.

Context

According to a TripActions interview with TechCrunch, travel costs are “the second biggest expenditure that’s controllable for companies and most finance leaders feel like they’re not managing it well,” putting its Liquid product in a spot in the market where there’s demand from both employees and management for a better service.

With TripActions Liquid helping workers avoid taking on company expenses, and the TripActions product theoretically making booking travel itself a less onerous task, this news item could make life less bad for the working corporates among us.

On that note, a story. Watching members of the TripActions brass walk me through a product demo during a briefing for this post was actually a bit annoying. I am currently in a back-and-forth with various elements of my corporate home regarding travel that I booked through our current provider — I will not name them, but their moniker rhymes with fun-purr — about whether I booked the trip inside that same software suite. So I was curious about Liquid for the perspective of a corporate traveler who, you know, has other things to do than expenses. It did look less irksome and deleterious to my mental health than what I use today.

And with $500 million in available spend, TripActions has lots of room to fund it.

All this is well and good, but with a new product fired up, when is TripActions going to go public? It claimed to be growing quickly in 2019, when discussing its 2018 performance. Get on with it!



from TechCrunch https://ift.tt/38YkUYH

Comments

Popular posts from this blog

How To Play Doom – And More – On An NES

Doom was a breakthrough game for its time, and became so popular that now it’s essentially the “Banana For Scale” of hardware hacking. Doom has been ported to countless devices, most of which have enough processing ability to run the game natively. Recently, this lineup of Doom-compatible devices expanded to include the NES even though the system definitely doesn’t have enough capability to run it without special help. And if you want your own Doom NES cartridge, this video will show you how to build it . We featured the original build from [TheRasteri] a while back which goes into details about how it’s possible to run such a resource-intensive game on a comparatively weak system. You just have to enter the cheat code “RASPI”. After all the heavy lifting is done, it’s time to put it into a realistic-looking cartridge. To get everything to fit in the donor cartridge, first the ICs in the cartridge were removed (except the lockout IC) and replaced with custom ROM chips. Some modifica...

Try NopSCADlib for your Next OpenSCAD Project

Most readers of this site are familiar by now with the OpenSCAD 3D modeling software, where you can write code to create 3D models. You may have even used OpenSCAD to output some STL files for your 3D printer. But for years now, [nophead] has been pushing OpenSCAD further than most, creating some complex utility and parts libraries to help with modeling, and a suite of Python scripts that generate printable STLs, laser-ready DXFs, bills of material, and human-readable assembly instructions complete with PNG imagery of exploded-view sub-assemblies. Recently [nophead] tidied all of this OpenSCAD infrastructure up and released it on GitHub as NopSCADlib . You can find out more by browsing through the example projects and README file in the repository, and by reading the announcement blog post on the HydraRaptor blog . Some functionality highlights include: a large parts library full of motors, buttons, smooth rod, et cetera many utility functions to help with chamfers, fillets, precis...

The Newbie’s Guide To JTAG

Do you even snarf? If not, it might be because you haven’t mastered the basics of JTAG and learned how to dump, or snarf, the firmware of an embedded device. This JTAG primer will get you up to snuff on snarfing, and help you build your reverse engineering skills. Whatever your motivation for diving into reverse engineering devices with microcontrollers, JTAG skills are a must, and [Sergio Prado]’s guide will get you going. He starts with a description and brief history of the Joint Test Action Group interface, from its humble beginnings as a PCB testing standard to the de facto standard for testing, debugging, and flashing firmware onto devices. He covers how to locate the JTAG pads – even when they’ve been purposely obfuscated – including the use of brute-force tools like the JTAGulator . Once you’ve got a connection, his tutorial helps you find the firmware in flash memory and snarf it up to a file for inspection, modification, or whatever else you have planned. We always apprec...