This year may have felt like it was dominated by political shenanigans, but technology also had its wild ride.
The USA vs Huawei
A story that has persisted throughout the year is the heat around Huawei in the US. The Americans have stopped Huawei phones from being sold in their country because they say the Chinese mobile phone maker has stolen technology from American companies and has spied on them.
The tussle began in 2018 but kicked into gear in 2019. Nevertheless, some American companies and organisations are still doing business with Huawei despite the ban by US President Trump’s government.
The President of Microsoft, Brad Smith, also wants to the US government to offer more evidence to back up its Huawei ban.
The core issue with Huawei has been around concerns with Huawei’s close relationship with the Chinese government and fears that its equipment could be used to spy on other countries and companies.
Huawei has also hit back at US ‘bandwagon followers’ and recently threatened to boycott Germany’s Auto industry if the European powerhouse banned them from offering 5G (broadband) in the country.
Not a great year for big tech
Big technological companies like Facebook, Alphabet, Google and Uber have faced a barrage of probes in 2019 be it around anti-competitive behaviour, spying on customers or their staff abusing customers. We also haven’t seen many new companies graduate to super-size status.
After a long drought of big-name tech IPO (initial public offerings), 2019 promised to be a banner year. A crop of highly anticipated, highly valued tech companies — with hot marquee names such as Lyft, Uber, Pinterest, and Slack listed on the public markets. The idea was to allow you to take a stake in their business.
Their reception, however, was truly tough. These companies’ stocks have not gained momentum and being listed has attracted greater public scrutiny.
Artificial Intelligence (AI) – We’ve been talking about this for decades since Terminator came out but scientists are managing to harness the technology especially in manufacturing and medical fields.
Most of the top tech companies (Microsoft, IBM, Amazon, and Google) have already embraced AI. Many tout it as one of the main distinguishing features to set them apart competitively.
A little of this tech has gone into robotics with much fanfare and fear over their capabilities and propensity to ‘initiate a judgement day’. Check out Boston Dynamics
Blockchain – Bitcoin may be highly volatile and not the get rich quick scheme people thought it could be, but it is still out there. Clever people are finding ways of making commerce more efficient.
Robotic Process Automation (RPA)– this is a technology that could explode in 2020. Right now, only large enterprises are using RPA but it could become more affordable and workable for smaller businesses in 2020. RPA is the process of automating mundane tasks such as taking data from one file and entering it into a business application like CRM software.
It’s about computerizing repetitive tasks that are an inefficient use of time, so it makes our lives more efficient.
RPA is not a physical robot. It is also an approach to working across multiple business applications and entering, maintaining, migrating, integrating, mining and testing data on spreadsheets.
These tasks are prone to human error which is why computerizing them makes so much sense.
Virtual Reality and Augmented Reality – VR made strong progress in 2019. This was most useful in gaming, real estate companies, pornographic entertainment and for people with disabilities.
For you gamers – it is best to buy an Oculus Quest for your PC. Sony’s VR headset is still the best and only gaming set.
Look after my data – or not!
The first fines around the General Data Protection Regulation (GDPR) were lodged in parts of the EU. The GDPR was promulgated in 2016. It is a regulation in EU law on data protection and privacy for all individual citizens of the EU and the European Economic Area.
It also addresses the transfer of personal data outside the EU and EEA areas. GDPR was enforced because of concerns about data breaches and attacks on privacy by the likes of Facebook and Google.
Then there were concerns our banks, insurance, and other data keepers were selling or losing our data to dangerous entities.
The types of personal data exposed included your names, addresses, phone numbers, email addresses, and even passport numbers.
Lessons learned
The Marriott hotel group’s data breach of 2018 resulted in the exposure of 339-million customer records. Around 30-million of the records belonged to European Union citizens, and therefore they were subjected to a GDPR fine.
Back home in Berlin, on October 30th the Berlin Commissioner for Data Protection and Freedom of Information issued a €14.5m fine on a German real estate group, die Deutsche Wohnen SE. This was the highest German GDPR fine yet. The infraction related to the over retention of personal data.
Despite the turbulent year for tech companies and consumers, we look to 2020 with breathless anticipation. We also ponder on which of the mentioned technologies will stick out and make a positive impact on our lives.
New business? You’re going to need some basic software!
In this modern-day and age, it may seem that small businesses do not require a plethora of technological tools in order to succeed, but it’s worth investigating which technologies can give you an edge. This is especially crucial if you are not offering a niche product or service and have to compete with an army of existing players in your industry.
Accounting, CRM, marketing, analytics, taxation and other useful software may have just levelled the playing field between small and big businesses. The challenge is to choose the right one to help you grow quickly at the least expense.
You will, nevertheless, if you are even to make a first impression, need some basic software regardless of your trade.
HERE IS WHAT YOU WILL NEED
Almost everybody needs some kind of online presence. You’re a business and while social media is helpful (more on that later), a website is where you will be found by prospective clients or business partners. You can build one easily these days via a paid content manager provider such as WordPress or Wix.
They will even provide and host your domain if you don’t have one.
If you do not, however, have the time nor the energy to create one yourself, there are cost-effective alternatives such as outsourcing the building to a web-designer. They can do it remotely and the safest way would be through a regulated marketplace such as Fiverr* or Upwork.
*Debunqed can recommend a designer known as aceholder on Fiverr.
Email
You need to be contactable. In the old days, you got away with Yahoo or Google email but now you need an email service that can host a domain. The free emails are also not secure and subjected to heaps of spam.
Email hosting is a service in which your email messages and associated files are all stored on a server. When you receive an email to your website’s domain address, that email is routed across the Internet and stored on the recipient server.
A hosting service stores the files that make up a website on a data server which then uploads them directly to the web.
This gives you an Internet connection and way for your customers to access the site through a domain name.
Web hosting services often come with a slew of options for designing sites. These include the one-click installation of supported applications such as a service mailbox. Wix partners with Microsoft’s Office 365 for mail hosting whilst WordPress works seamlessly with Gmail/GSuite.
Task Management System/ Job Manager
Being organised from the beginning isn’t a good idea; it’s a great idea! Get yourself a system which tracks your sales and logs the deliverables that each employee completes.
There are an array of CRM solutions focusing on different tasks from customer services or sales to project management and full-on finance and back office (ERP) operations (more on this later).
The key is to start small many of these offer trials but also some even offer a free package naturally with limited functionality. Figure out which tasks are important in order to choose the right package to handle your scheduling, sales and tasks. A simple calendar/scheduler via MS Outlook and Office 365 (Microsoft Bookings) can be a good place to start for a paid but fully functional service.
Payroll and Accounting Systems
You need to keep accurate books and not to rip off your employees. You’re a start-up; play the numbers by the books. And a word of caution: don’t ever cook the books!
There is a huge choice of accounting (and back office) systems to choose from. The big names are probably out of reach so like a CRM system, you might want to shop around and start with smaller but a reputable brand like Quickbooks.
But if you go for an Office 365 solution, you might as well look into something like Dynamics 365. One of their entry-level finance packages (Business Central) has all the ‘bells and whistles’ for a Startup to help get your books up to date for the taxman/audit.
You also need to monitor your payroll – this service can be added by upgrading to a bigger package under Microsoft Dynamics family. You could also shop around for payroll software if you are on a tight budget.
Project management and support logging system
Once you build up a workable database of existing and potential clients, you will require some kind of logging system to handle customer queries.
This will help you keep tags of what customers are having issues with. If they are repeated issues, then you know there is a recurring problem with your operations or an aspect of your business.
A good ticketing system will allow you to keep a knowledge base with instructions to help your staff with how to deal with recurring issues quickly.
Shopping cart software
If your products are sold online or does not come from a physical store, this is the mandatory software that enables you sell goods online. It is designed to quickly process debit and credit cards transactions but also allows your customers to use their PayPal and other payment methods – even Cryptocurrency.
A good shopping cart package also does inventory management, calculates packaging costs, shipping costs and taxes.
Security and Anti-Virus software
Always protect your Internet connection and your sensitive data against viruses, spyware, malware, worms and Trojans.
Most of the packages mentioned before come with in-built security measures such as sign-in authentication.
But these are not enough and you will need to source software to prevent a hack if you are dealing with extra sensitive data like patents, medical and financial records/accounts. Read our feature on Online Threats for more on this.
Cloud storage
This is a place where you can store large files as well askeep backups of files. Hardware can break. You could drop your 2-terabyte portable flash drive but at least your work will be safe in the cloud.
Once in the cloud, things can get disorganised (many files and folders) and sorting them can become a pain. The top file storage providers include, Microsoft’s SharePoint Online and OneDrive; Google’s Drive, Amazon’s S- series and Dropbox.
There are some really great add-ons like a Digital Asset Management (DAM) tool for those dealing daily with tons of documents and images by Pic.io. This software works specifically with GoogleDrive.
Social media
We have by now affirmed that you need a CRM system. With many choices of companies to buy products from for example, treating individual customers’ needs is very important.
A good CRM system will help you reach out to your customers where ever they are – online or offline. This is known as Social Engagement.
That, coupled with a powerful Business Intelligence tool, can help you leapfrog over your competitors with useful insights such as peak traffic times on your website, purchase habits and other characteristics of your client that will help you accurately predict potential revenues.
Find the best CRM platform that allows for social engagement, then set up whatever social network accounts that suit your business.
Webinar services
Remember you are doing business with groups from around the world.
Online communication tools, therefore, enable you conduct presentations and meetings over the Internet. This saves time and money associated with travelling costs whilst giving you access to markets outside your area, city or country.
Some of the most popular/effective communication tools includes those included in the Microsoft (Skype and Teams) and Google (Hangouts & Voice) bundles. There are also free standalones like Zoom.
Depending on your frequency of calls and audience size needs you can stick with the free version and then scale up to a paid subscription later. You can also run training sessions and product demonstrations and even replace your whole phone system with them.
Online Surveys and other Marketing Tools
Marketing is is the lifeblood of a company. It’s a key sales-driver and if you aren’t selling, you’re going out of business! Conduct market research using online tools such as SurveyMonkey and collect emails through opt-in forms. These valuable insights can be used in targeted email marketing campaigns.
The most advanced and widely recognised mail marketing tool is Mailchimp. It starts with a free version with 7 marketing channels and goes up to $299 per month for large companies with 200000-plus contacts. Most bundled Office solutions will allow you to add Mailchimp as a plug-in to your existing mailbox.
Conclusion
Technology constantly changes and it’s hard to keep up – so don’t. Get the basics right first and add technological services and tools as you grow. Rather understand what each button does first before you spend money on a whole super system.
Maybe you should encourage your kids to become hackers. When you open Twitter handles and Linkedin profiles, it’s not unlikely that you’ll find people listing hacking as a skill.
Parents used to tell their kids to become doctors, lawyers, and accountants. Later, they advised them to learn about computers. These kids have now grown to become hardware specialists and then software specialists today.
In the past 10 to twelve years, we have seen ourselves thrown into the fourth industrial revolution. In it, technology affects our lives through social media and augmented reality.
We share a lot of our personal information with more people, companies, and institutions every day, willingly and are often blasé about it. This has tempted people to steal this information by hacking it.
Hacking background
Since the advent of personal computers in the 1980s hackers have become prolific, initially in ‘first-world’ countries that had an advanced infrastructure. There were numerous cases in the US but as computer technology permeated the world, hackers followed suit.
A hacking group called MOD, Masters of Deception, in the 1980s allegedly stole passwords and technical data from Nynex, and other telephone companies as well as several big credit agencies and two major universities.
The damage caused was extensive and one company, Southwestern Bell said it suffered losses of $370,000 alone. These days the damages, though not always publically announced, can run into a few millions of dollars.
All this has paved the way for a special information technology (IT) vocation. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system and networks. They break into systems they aren’t authorized to, and tend to break seamlessly into email and banking systems.
Hacking as a career
Ben Wilson works as an ethical hacker. He has more than ten years of experience and worked in London where he received on-the-job training. He now works remotely in South Africa servicing UK clients.
“I test websites for clients and look for vulnerabilities in the systems. I have done a lot of work for banks lately but my work is across industries.”
“Energy companies are using my services more and more,” he says.
Wilson says he worked in a permanent position for six years. Right now he contracts for five clients regularly.
Ethical hackers are the knights who test how permeable these systems are.
“The majority of my work is for British clients. The UK pound is strong and I like to earn pounds. I’d say the best computer security consultants in the world are in the UK. The US is strong too but the UK consultants are sophisticated and the best.”
Vulnerabilities
The most common way in which people hack information is through email contacts; especially personal Gmail accounts.
People think that their information is safe because it sits with one of the largest companies in the world. But this is exactly why it isn’t safe.
Gmail and other third-party free email accounts are regularly hacked. If you want to protect especially valuable information you should either upgrade it to the business/enterprise level, use a different email service, or perhaps the one connected to your employer.
Nowadays companies use services to protect themselves against hacks and unauthorized access. These monthly or annual service providers might employ ethical hackers to check the companies’ systems.
Hacking, however, isn’t just something that happens to big companies or in blockbuster movies. Here are some reality checks:
Fortunately, there are several ways of protecting yourself and your information from hacking; starting with your emails. Be wary of “phishing” emails asking you to update your information, especially for bogus databases that you have never heard of.
Use a spam filter – Avoid opening attachments from senders you don’t know – Update your passwords regularly – It helps to have authentication methods, such as a smartphone-linked and email-linked authentication (2FA) or security keys like Yubico – Do not click on any ad – period! Back up your files regularly – it’s always a good idea – Don’t allowransomware bullies to bully you.
If you get sent communication saying that people have your files and want money or they’ll release the files; ignore them.
They can’t threaten you forever and might eventually move onto another target especially if your information loses its value over time.
Anti-hacking software
As a business, use tools like those from cybersecurity experts Acunetix. More than 4 000 companies protect their web applications from vulnerabilities using its powerful web scanner.
Its penetration testing software prevents potential attacks by identifying holes in your websites’ coding. This is where hackers usually plant their complex code which allows them to extract data such as contact details, credit card details, and in worse cases, company-sensitive data like patents and blueprints.
Naturally, it also scans networks to find gateway loopholes that could lead to crashes and downtime-related losses. A bank’s website going down for a few hours can cost it several thousand or even millions in lost revenue.
Despite having firewalls, VPNs,and other Internet security systems in place, your websites and apps being developed are still vulnerable to cyber-attacks or a hack.
The most commonly known hack used is a DDoS attack. Basically, it works like a traffic jam clogging up a highway, preventing regular traffic from arriving at its desired destination. Incidentally, only a few days ago, Amazon was hit by a DDoS Attack.
So, how would you know or find out if you are vulnerable? By conducting regular scans on your websites and apps to see where vulnerabilities lie.
Avoiding a hack requires common sense
Be aware and don’t fall into scams. It’s unlikely you’ve won 120-million Euros in a lottery. You should know by now that you are not the descendant of a king!
In addition, if someone says they have a sex tape with you in it and they want your salary, unless you know you made a sex tape, they’re probably lying.
Unless of course, a scorned lover of yours tricked you – but you can’t blame technology or a hacker for that.
Did you know that there are still more than 700 million people in the world who live in extreme poverty? These people must scrimp, starve, and struggle to survive off less than $1.90 per day.
By 2030, the World Bank estimates that more than 90 percent of those people will be concentrated in Sub-Saharan Africa.
This is perhaps one of the greatest developmental failures of the modern world. Despite the continent’s expansive natural resources and increasing connectivity, foreign actors still feel it’s too risky to heavily invest in their markets.
Blockchain could be the key!
Bitcoin and “Blockchain” were created in the mass wave of distrust in banks after the 2008 financial crisis. Therefore, the technology enables individual, distributed data storage that could become the perfect evidence (trust) base and financial infrastructure for a developing country.
With the right implementation, Blockchain holds the potential to completely revolutionize and revitalize such economies, especially in Sub-Saharan Africa.
So, what is this Blockchain?
Blockchain is essentially a kind of decentralized database that allows you to have a safe, secure way to handle their data without the need for third parties.
For example, you could with Bitcoin, make or accept payments in real-time without needing a centralized bank.
“[It is] a way for one Internet user to transfer a unique piece of digital property to another Internet user, such that the transfer is guaranteed to be safe and secure, everyone knows that the transfer has taken place, and nobody can challenge the legitimacy of the transfer,” said software entrepreneur Marc Andreessen.
“The consequences of this breakthrough are hard to overstate.”
Historic background
Until the mid-twentieth century, most of Africa was ruled under a colonial system meant to exploit the people and their natural resources for European benefit. Africans, in addition, were rushed into development according to European standards rather than homegrown ones.
The legacy of rapid development, distrust and corruption left behind an economic system failing to recover in the 21st century.
While the World Bank celebrates a decrease in global poverty levels, the number is expected to remain stagnant in Africa. Today’s poorest people are living in places with the least economic growth.
Sadly enough, poverty and lack of investment in many developing countries stem from how they were integrated into the world system.
The land was cut into countries according to European treaties and agreements, rather than by traditional and tribal land divisions. This situation worsened upon the handover of colonial power to so-called “democracies.” Power often shifted to the ethnic groups that former colonizers favoured.
Corruption multiplied in the form of bribes, political persecution, rigged elections, and a massive wealth gap. All of this still affects the wealth distribution and investment potentials of many developing countries.
Of course, this created a lack of trust in banks and government throughout much of Sub-Saharan Africa.
The perfect fit for Africa
During a 2012 study conducted in rural Western Kenya, Stanford University researchers waived the costs of opening basic savings accounts for a number of unbanked individuals.
While 63 percent of the subjects opened an account, only 18 percent of them used the accounts. This was likely due to three factors: a lack of trust in banks, unreliable service and prohibitive withdrawal fees.
Unfortunately, the prevalence of unbanked individuals in the informal sectors scares off foreign investors, who heavily rely on transactional evidence to make investments. Otherwise, pouring money into markets is too risky. That’s where Blockchain comes in.
How would it work?
Blockchain can host an entire evidence base of transactions, loan repayments, and asset titles. The technology is also decentralized and requires individual confirmation, creating an element of trust and transparency beyond traditional banking systems.
According to Victor Olorunfemi, Director of Products for Pan-African tech and crypto-exchange, KuBitX, Blockchain’s major benefits lie in “frictionless P2P and cross-border payments, transparent elections, land registry management [and] transparent crowdfunding.”
Let’s look at some of the different ways Blockchain could benefit developing economies, especially in Sub-Saharan Africa.
1. Creating financial infrastructure and accountability
According to a study by the Milken Institute, viable financial markets require consistent, accurate data on assets and credit histories. Luckily, Blockchain may fulfil these needs.
The use of Smart Contracts technology is ideal in areas lacking accountability, such as the real estate or land/agricultural sectors. In Africa, a lack of record-keeping practices often leads to “missing” or non-existent title deeds. In some cases, this is intentional.
Title deeds “go missing,” only to end up in the hands of benefactors other than the rightful owners. Smart Contracts could eradicate these issues through the use of special tokens that cannot be duplicated, changed or removed. See the article on tokenization.
Likewise, Bitland, a company in Ghana, currently helps individuals record deeds and land surveys. By resolving land disputes, Bitland creates more stability while accurately recording land asset data.
“There’s a massive number of people in the informal sector, but there’s not much data being collected on them right now.”
Merit Webster, co-president of the MIT Sloan Africa Business Club.
“That means you don’t have that credit history or payment history for them. If you have a decentralized approach to collecting data, you end up with more malleable data. [This] is very valuable for creating credit histories.” The agricultural industry also has the potential to thrive using Blockchain.
“Blockchain could be used to track goods around the world. This allows farmers to earn a fair wage for their goods.”
Also, farmers could use record-keeping technology to streamline the supply chain and document resources. This would lead to better efficiency, lower transactional costs, and improved logistics.
2. Security in banking
According to the World Bank, there were 1.7 billion people with no bank account in 2017. This situation is worst in developing countries, especially African ones. For example, over 62 million of these people lived in Nigeria.
Besides, data from Google Trends reveal that Lagos, one of Nigeria’s biggest cities, ranks globally as the number one city based on the volume of online searches for Bitcoin (BTC). Clearly, for the city’s 21 million-odd people, there an immense interest in some form of an accessible payment system.
Of course, it’s unrealistic to expect bank branches to magically appear in every remote corner of the world. However, a digital database using Blockchain technologies has the potential to reach far beyond physical banks.
Many Africans value trust and transparency. In developing countries, this lack of trust goes beyond the Internet. Developing countries with less industrialization tend to have higher levels of corruption.
This reduces national investment opportunities in the public sector and instills a lack of trust in centralized oligarchs handling an international investment.
Because its power lies within the community of users, Blockchain can combat these trust issues. All data logs and amendments must pass through this community and identification confirmation tests.
Blockchain technology also secures your data incredibly. Hacking and data breaches are all too common nowadays. In 2017, for example, around 3 billion Yahoo user accounts were stolen.
When information is stored in the same place, hackers have one, easy target. In contrast, Blockchain is a distributed entity. This dissemination of data leaves it far less vulnerable to cyberattacks.
3. Fostering Entrepreneurship
Coupled with the Internet, Blockchain technology could be the perfect platform for aspiring African developers. Because the ‘source code’ is free of charge, skilled coders can adapt, create, and configure special applications, called DApps.
These are available on Crypto platforms and provided by companies like Ethereum, and a South African firm specializing in what they called the Keto-Coin.
Rather than waiting for governments to drag their feet trying to create jobs—individuals on the continent can form small firms that build and sell Crypto-based Apps locally or abroad.
“Despite the frictions and impediments mentioned,” said Olorunfemi. “Blockchain can still provide an avenue for promising African tech projects to access capital (FDI) via token offerings on digital assets exchanges.”
Many courses are even readily available online to quickly learn about new technology. Microsoft, for instance, offers a platform via Azure for you to build and learn about the Blockchain.
One-man shops in countries with unfavourable economic systems, like Zimbabwe, can also adopt smaller, stable, Cryptocurrencies to facilitate or payments. In cases of rampant inflation, they can temporarily act as a store of value or help you pay for things until your currency stabilizes.
As with the Venezuelan hyperinflation case study, Cryptocurrency intervention could help many developing countries troubled with economic instability.
There is also the option of Crypto-mining. But before you pull out the ‘high-consumption energy’ argument – think outside the box for a moment. What about energy sources that are free and available nearly 24/7? Like water and the sun!
The African continent is full of capable scientists and mechanical engineers. One could build special solar-powered energy centers to power Bitcoin-mining.
And without the expertise, governments or private companies could alternatively just invite Crypto companies with abundant financial resources to mine (cleanly) for a special tax/fee while creating jobs for the locals.
4. Elections
In addition to the financial side of things, Blockchain technology could help eliminate some forms of corruption. For example, many African countries’ elections are incredibly vulnerable to the social scourge. In some extreme cases, some officials change or forge written ballot votes to rig elections.
To combat this, Blockchain databases could record votes. This makes it nearly impossible to tamper with using Smart Contract technology. Having fair elections improves infrastructure, which then increases development and economic dependability.
While some might see Africa’s economy as underdeveloped, others might see it as a blank canvas well-suited for a large-scale implementation of Blockchain. Economic and governmental systems are shifting and slightly shaky in many Sub-Saharan African nations.
The challenge is to foster a rigid economic system to implement Blockchain.
Don’t just take our word for it—African nations have often implemented new, practical technologies before the Western world. Let’s look at the example of M-Pesa. Back in 2014, Americans and Europeans were amazed by Apple Pay’s launch.
However, this mobile payment system wasn’t exactly “new.” By that time, Kenyans had used M-Pesa, a very similar technology, for years.
“There’s a lot of opportunity to leapfrog the way the West developed and have these more unique African solutions, but it needs to come from within,” said Webster.
“It needs to come from entrepreneurs in the continent who want to implement these solutions. It’s important to engage people very early on. Systems incubated in the West don’t stand as great of a chance to work as African ones do.”
Concluding remarks
With the possibility of an experimental, large-scale takeover of Blockchain technology to improve African infrastructure, the nations there could leapfrog in development and growth.
This must begin internally. According to Olorunfemi, “Education—of policymakers and other stakeholders—which is often ignored has to be a critical factor in paving the way for the acceptance and adoption of new technologies and the accompanying investment.”
The results in Sub-Saharan African countries could help eliminate much of the world’s poverty. It would also remove remnants of mistrust and corruption left behind by the days of colonial exploitation.
While there are some obstacles to large-scale Blockchain implementation, we can’t think of a better benefactor than there. The possibilities for business using the Blockchain are endless!
To learn more about how to get started with Cryptocurrency mining or purchasing, visit our resources page for useful links and guides.
Additional input by Bobby Quarshie (BQ).
Citations: Christopher Lee and Jackson Mueller.
Swan, Melanie. “Anticipating the Economic Benefits of Blockchain.” Technology Innovation Management Review 7.10. Oct. 2017.
Bitcoin Lessons from Venezuela, Where Hyperinflation Reigns. Online Source: https://www.lathropgage.com/newsletter-237.html
Like a biological virus mutates – as technology advances so do the complexity of phishing and identity theft schemes. With major services adopting cloud technologies and storing private data online, anyone is vulnerable to hacking.
To make matters worse, hackers continue to come up with some pretty creative ways to profit from stolen information.
Without wasting time, these are the things you should already be doing to avoid being exposed to hackers in the first place:
In order to keep these cyber-criminals out of your lives and computers, let’s take a look at some of the actual schemes to watch out for in 2019.
Hacking
We all know what hacking is by now – the term has almost become synonymous with internet security. So a question is: do you love watching movies on Netflix or jamming out to your summer playlist on Spotify? If the answer is yes, then you’re at a pretty high risk of getting hacked.
DynaRisk, a UK cybersecurity firm, recently found that cybercriminals most commonly target these brands, along with adult-oriented sites (you know what we mean) and then, online gaming services.
Identity Theft
A few weeks ago, authorities caught a New York-based gang who had used identity theft to steal over $19 million worth of iPhones. Quartz reported that this operation ran for seven years.
So-called “Top Dogs,” the ring leaders, would organize lower level members of their organization to steal identities and create clone credit and identity cards. Then, affiliates fanned across the nation, signing up for mobile phone plans to acquire iPhones, which were later sold for a profit by the Top Dogs.
Because phone payment plans take the shape of nominal fees over the course of several years, victims often wouldn’t notice the fraud until it was too late. Learn how another scheme dubbed sim port attackworks in the diagram below:
Ransomware
Hacking can happen to anyone – including our favorite bands. In early June, a hacker managed to steal the minidisk archive of Thom Yorke, the lead singer of Radiohead. This included previously unreleased demos and audio material from around the time of “OK Computer,” the band’s 1997 worldwide hit album. The hacker then demanded $150,000 on the threat of releasing it.
Holding files for ransom is so common nowadays that it even has its own name: “Ransomware.” Either pay over the ransom or lose your files—or, even worse, have them released onto the unforgiving Internet.
In response, Radiohead released all 18 hours of material on Bandcamp themselves, winning against these ransom hackers.
Most security experts recommend the same route as Radiohead—never pay the ransom, because there’s no guarantee you’ll recover files or prevent their release.
Sextortion
If you think ransomware is bad, there’s an entire subgroup of it aimed to profit off sexual shame. Cheekily named “Sextortion,” some hackers creatively upgraded the classic email phishing scam to scare victims into handing over Bitcoin.
According to Fortune, hackers have already racked up over $900,000 with sextortion. In these phishing emails, the sender claims to have spied on you while you watched porn—and has webcam footage of the salacious deeds. The message then demands a Bitcoin ransom, or else face the social and professional consequences of this lewd video getting sent to all your contacts.
To make the threat even more believable, the sender references a previous password tied to the user’s email account. According to Krebson Security, a sextortion phishing message might look a little like what’s written in the sidebox.
In rare cases, the threats are real—and hackers get their hands on some sexually explicit photos. Recently, American actress Bella Thorne fell victim to sextortion. Last Saturday, she took a similar, albeit more risqué, route as Radiohead, opting to release her nude photographs on Twitter in order to take the power away from her hacker.
Last thoughts
So, what’s the best way to avoid your personal, or, business from costing thousands in virtual currency? Since most of these emails are fake, you can just avoid them with a spam filter. And you should probably buy a webcam cover…just to be safe. When it comes to general browsing- we suggest using a VPN.
There are now more secure anti-hacking tools that use the Blockchain and offer great protection, especially against identity theft. Have a look at our feature on Tokenisation.
Most online services now like mobile banks, offer App-based 2-factor authentication. This should now be regarded as the minimum security for ANY online account or App.
To avoid hacking or phishing scams in general, optimizing your cybersecurity and using online common sense will save you loads of time, trouble and money.
Running your business requires choosing the right tools for you and your employees. In order to streamline work-related productivity, many organizations are migrating to cloud-based office suites. Specifically, Microsoft’s Office 365 and Google’s GSuite (now known as Google Workspace).
Both products boast a variety of helpful productivity tools and the latest remote collaboration technologies. While it’s impossible to say which one is “better”. This head-to-head comparison can help you decide which office suite is a better fit for your business.
What is Workspace & Office 365?
Office 365 and Workspace (previously GSuite) are packages, of powerful business tools that facilitate your day-to-day tasks using the cloud. They even provide business emails along with apps for creating documents, spreadsheets, presentations, video conference calls, shared calendars, and notes.
In addition, storing information on Google or Microsoft servers, rather than your own via these suites, can also save your business a lot of money.
Plans and Pricing
First, let’s look at plans and prices. It’s important to note that Microsoft requires an annual commitment, while Google offers you the option to make monthly payments if you prefer.
While both Office 365 and Workspace offer web and mobile apps (Outlook and Gmail, respectively) for email. There are, however, some subtle differences.
One advantage to Office 365 is the desktop version of Outlook, which is incredibly feature-rich and lets you sort and group emails with ease. Gmail, on the other hand, is widely used throughout the world. For this reason, a variety of third-party app options (e.g. WordPress) can be linked to it to enhance its capabilities.
Cloud Data Storage
For the entry-level plans, Office 365 Business Essentials wins out with 1 TB (terabyte) of storage per user, while the Workspace ‘Basic’ plan only offers 30 GB. GSuite includes emails in this storage limit, whereas Office 365 provides extra storage for email files with added archiving.
However, Workspace’s upgraded plans beat out most of Microsoft’s storage offerings. So long as your business has more than five employees, Workspace Business and Enterprise provides unlimited cloud storage. Although, businesses with less than 5 employees on the “Business” plan are capped at 1 TB. Only Microsoft’s E3 plan and higher offer the same unlimited cloud storage.
Applications
Applications are the cornerstones of a suite’s functionality. Workspace and Office 365 offer you a variety of comparable apps for word processing, creating spreadsheets and presentations, all on the cloud!
This means every user gets a free desktop version of the Office suite (i.e. Microsoft Word, Excel) to download.
These feature-rich apps expand far beyond the capabilities of the mobile and online versions, and are available on every plan except the ‘Business Essentials’.
While both services offer mobile and online apps, one major benefit of Office 365 are its desktop applications.
Collaboration
These online applications make both suites ideal for remote collaboration. Microsoft Teams lets facilitate this with tools like real-time co-authoring, mentioning users by name and chat capabilities while working on OneDrive. Microsoft now lets you collaborate using its desktop apps, too, although the updates to shared files are a bit sluggish compared to its online apps.
Similarly, GSuite offers Hangouts for chats and Google Drive for real-time collaboration. Google’s online and mobile apps were created with cloud collaboration in mind, so some might find them a bit more user-friendly.
For remote meetings, GSuite and Office 365 both offer group video conference calls. If you plan on large-scale video conferences, then Office 365 offers far more for your money: most plans have a 250-participant limit, while the E3 plan increases to an astounding 10,000-person limit.
Meanwhile, GSuite’s Google Meet allows up to 25 participants on the “Basic” plan, 50 on the “Business” plan, and 100 on the “Enterprise” plan.
Security
Cloud services are running into a variety of security issues, and these suites are no exception.
A 2019 Barracuda Networks’ report found that a large percent of ATO (account takeover) attacks were targeted at Microsoft Office 365 accounts after businesses migrated emails to the service.
These attacks prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue a set of best practices. The aim was to help organizations migrate their email services while avoiding risks and vulnerabilities.
Meanwhile, Google recently announced that a cloud storage feature for encrypted passwords on its “Enterprise” plans was faulty. As a result, some user passwords were stored in plaintext on Google’s servers!
While cloud computing has its risks, the two suites do have impressive security features. GSuite is comparable to Google’s own level of security and offers AI detection of suspicious activity, Two-Factor authentication, and data leak protection—in which admins can block outgoing communication determined by set keywords.
On the other hand, Office 365 has the option of Multiple Factor Authentication (MFA), along with the detection of malware, viruses, and suspicious activities. Microsoft also provides data loss protection, and admins can restrict access to company-issued devices only.
Ease of Use
So, which is easier to use? Well, it depends on who you are, and your ability to grasp software quickly.
If you’re accustomed to working with MS Word or Excel documents, and edit them for work on a regular basis, then Office 365 and its desktop-to-online formatting compatibility will probably be your best bet. This is especially true if your company solely computes with Windows PCs.
However, new users might find GSuite apps easier to learn, as the tools are a bit simpler and straightforward.
So, which is best for you?
Firstly, Office 365 offers feature-rich apps, and most of its plans come with a desktop version of MS Office applications. This is a definite advantage over its competitors.
Its entry-level plan is far more generous in terms of data storage than GSuite’s “Basic” plan. In addition, businesses that already exclusively use Windows technology are likely to find Office 365 better-suited for their needs.
With that said, GSuite was originally designed as a cloud collaborative productivity tool. Therefore, its features might be easier for collaboration and can be used among a wider variety of Windows and Mac devices. In addition, GSuite’s Business’ plans and above outdoes Microsoft when it comes to unlimited cloud file storage. <- This has changed since the article was first published.
Unfortunately, I can’t tell you which of the two is “best.” But, with this knowledge in mind, you can make an informed decision to choose the best cloud suite for you.
It’s not often that we readily endorse a product or company. However, when the nature of work they engage in is considered ground-breaking and has a positive impact on our lives – it most certainly warrants a mention.
The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’. Nor that it is simply because it is fascinating and therefore must be an excellent product. This project actually has a value proposition for you!
We are indeed well into the information age and while we have written extensively about data, its importance to marketers, and its fragility when used and abused by unscrupulous third-parties for their financial gain.
The issue of data security is, however, quite a serious one. You just need to pay attention to the news to become even more aware.
Data breach incidents
In Europe, where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked. Several hundreds of thousands of customers’ personal data compromised.
These were followed by hacks on other major airlines such as Cathay Pacific. Aside from airlines, other business outfits have suffered a similar fate.
The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked. This left vulnerable passengers terrified and stuck high up in the air. And all this happened probably to the amusement of the pranksters (hackers).
Can you imagine the chaos and commotion that would be caused if their control systems of driverless cars were to be hacked?
The digital intrusion gets even more sophisticated...
This time affecting the very wealthy: private yachts are now being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!
Data security
On the issue of data security, you often hear about extra protection but not just anti-virus and anti-phishing software. The more secure and heavily encrypted Blockchain technology is, however, making waves in the digital sphere.
It is mainly for the escalation of its once shining star by-product designed for discreet transacting – Bitcoin.
Blockchain technology has also triggered several other technologies based on its digital cryptology technology. The aim is to ensure that your information is kept safe from prying eyes while stored, used, or transferred online.
Blockchain products such as cryptocurrencies, however, are not completely safe from hackers.
A solution
The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization. It will be using it to ensure that your highly sensitive data online is kept safe.
“Our tokenised solution would have protected their customers’ personal identification information (PII) details. Instead the hackers ran off with the date of birth; passport numbers; financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.
Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.
Brown’s background in data privacy systems as well as her devoted passion for the protection of PII, financial and healthcare data led her to start up and chair Zortrex.
The law on data
Thanks to new laws like the European GDPR law, which enforces the protection of data, breaches are now met with hefty financial penalties.
“Companies have disrespected your data for over 25 years, and if left unattended, there will be nothing left to protect,” Browns says.
Companies now have to think twice about getting your consent and how to use and share your data digitally. But is it enough? The simple answer is no.
The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches.
We have ingeniously invented systems that automatically align with financial messaging, payments and securing information. All of which require data.
“However, we need to go a step further to secure all the PII details with tokenization. This is so that in the event of a hack, the cookies and trackers will only be following a ‘useless’ token will be no real identification on it,” Brown explains.
Zortrex would naturally like to tokenize all healthcare data. This way, vulnerable those of you living outside of major cities can also feel assured that your privacy is protected.
Using Blockchain
The application of the all-powerful blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with your data – especially the most sensitive ones.
A business angel or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope.
Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector.
A tokenized supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023. A judiciary blockchain, for instance, would allow the police to “talk” to the prison service. They, in turn, will communicate with the legal sector or public health institutions (NHS).
Forensic evidence would in such instances be tokenized and kept secure (away from tampering) during legal hearings. In another practical scenario, Smart Contracts(which could replace some lawyers) can spark off legal aid assistance to you.
Your court cases will be heard quicker and be more efficient. Protection registers can also be guarded using tokenization – rendering them more secure.
Blockchain technology offers quality assurance making sure that no shortcuts are taken.
This will enable the monitoring and tracking if any of your data is shared with third parties once tokenized. The third-party apps would only gain access to your data once the trigger has been activated.
Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenized, might seem far-fetched.
Zortrex wants to use its technology to put the hackers out of business!
Tokenisation cannot be mathematically reversed and thus it will least it will keep the hackers busy for a while.
Scalability
For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability. This is the ability of a network or software to grow and manage increased usage.
Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, however, have massive scalability issues.
The growth in demand for DApps is also crippling (slowing down) those systems. They need to investigate the incorporation of alternative technologies, upgrade or split their platforms to cope with such high demand.
Someone must take the first step in securing this data forever. You should be able to purchase what you want without being harassed by trackers and cookies.
The need for tokenization is endless and further, down the line, celebrities and government official’s PII can be secured by it to protect them from damaging schemes, ‘bad press’, and scandals.
In a previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.
It’s not often that we readily endorse a product or company. However, when the type of work they engage in is considered groundbreaking – and one with the potential to have a massively, positive impact on our livelihoods, it most certainly warrants a mention.
The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’ nor that it is cutting-edge/fascinating and therefore must be an excellent product – it actually has a value proposition for everyday people!
We are indeed well into the information age and while we have written extensively about data, its importance to marketers and its fragility when used and abused by unscrupulous third-parties for their financial gain, the issue of data security is quite a serious issue – we must just pay attention to the news to become even more aware.
In Europe, the where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked – with several hundreds of thousands of customers’ personal data compromised. This was followed by hacks on other major airlines such as Cathay Pacific. Aside from airlines, other business outfits have suffered a similar fate.
The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked, leaving vulnerable passengers terrified and stuck high up in the air – probably to the amusement of the pranksters (hackers). We all know about driverless buses and cars coming to the market soon.
Can you imagine the chaos and commotion that would be caused if their control systems were to be hacked? The hacks get even more sophisticated: this time, affecting the very wealthy – private yachts are being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!
On the issue of data security (with almost full anonymity); we have also heard about extra protection (and not just anti-virus and anti-phishing software) but the more secure and heavily encrypted Blockchain technology that is making waves in the digital sphere. Mainly for the escalation of its once shining star by-product designed for discreet transacting – the Bitcoin.
It has also triggered several other technologies based on its digital cryptology technology to ensure that information is kept safe from prying eyes while stored, used or transferred online.
The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization – and will be using it to initially ensure that highly sensitive data online is kept safe.
“Our tokenised solution would have protected their customers’ personal identification information (PII) details, instead the hackers ran off with the date of birth, passport numbers, financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.
“Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.”
The establishment of this start-up company was due to Brown’s background in data privacy systems as well as her devoted passion for the protection of PII and financial/healthcare data. In her view, companies have disrespected their customer data for over 25 years, and if left unattended, there will be nothing left to protect.
Thanks to new laws like the European GDPR law which is now imposing the data protection; data breaches and abuse of customer data is now met with hefty financial penalties. Companies now think twice about consent and how to use and share customer’s data digitally – but is it enough? The simple answer is a no. The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches – yet.
“We have ingeniously invented systems that automatically align with financial messaging, payments and securing information, all of which require data. However, we should and need to go a step further to secure all the PII details with tokenisation so that in the event of a hack, the cookies and trackers will only be following a useless token as there is no real identification on it,” Brown explains.
Zortrex would naturally like to tokenise all healthcare data so that vulnerable people living outside of major cities can also feel assured that their privacy is protected. In a previous blog, we wrote about the new Internet of things (IoT). For all those devices being built for it, their IP addresses and the serial numbers can be tokenised to avoid the terrifying thought of the whole Internet being compromised.
The application of the all-powerful Blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with customer data – especially the most sensitive ones.
An angel investor or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope!
Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector and a tokenised supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023. A judiciary blockchain, for instance, would enable the police to “talk” to the prison service, who in turn, will communicate with the legal sector and public health institutions such as the UK’s NHS.
Forensic evidence would in such instances be tokenised and kept secure (away from tampering) during legal hearings. In another practical scenario, Smart Contracts(which are touted to replace lawyers) can spark off legal aid assistance, so that court cases can be heard quicker, more efficient than currently pertains. Protection registers can also be protected with tokenisation rendering it more secure.
Blockchain technology offers quality assurance with every process being undertaken making sure that no shortcuts happen; as the smart contracts trigger any possible malfeasance. This will enable the monitoring/tracking of any data sharing to third parties once it is tokenised. The third party apps would only gain access to the data once the trigger has been activated.
The company will be providing numerous business blockchain platforms; Asset Chain, Supply Chain, Accountancy Chain, Debt Chain, Life Cycle Management Chain, Outsourced Worker Chain; the list is endless, and all will be adequately secured.
Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenised, might seem farfetched – but may we remind you of the need for data protection taking into consideration the growth rate of massive data breaches.
Zortrex is aiming high and wants to use their technology to put the hackers out of business! Tokenisation cannot be mathematically reversed and thus it will least it will stop the hackers for a while.
Brown explains further that as they move with their education; other information can be added on to the token, as with all their healthcare; any allergies tokenised; what injections they have had right through their life cycle until the day no more data can be tokenised.
For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability – which in tech terms, is the ability of a network or software to grow and manage increased demand.
Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, has massive scalability issues. The growth in demand for DApps is crippling those systems and they are having to investigate the incorporation of alternative technologies, upgrade or split their platforms and accompanying cryptocurrencies to cope with such high demand.
Someone must take the first step in securing this data forever. Citizens should be able to purchase what they want without being harassed by trackers and cookies. The need for tokenisation is endless and further, down the line, celebrities and government official’s PII can also be secured to protect them from damaging schemes, ‘bad press’ and scandals.
In another previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.
We have barely scratched the surface with the Internet (from the early eighties) and it is already seemingly being threatened with the competition. A possible replacement by a new phenomenon.
Well, for lack of a better word, “replaced” has connotations of a dying Internet. This is far from accurate. This new phenomenon – fostered by blockchain technology, will change the way we use and consume the Internet as a service.
So, what is this new Internet-like system creating waves online? And why is it making online marketers quiver at the prospect of them losing out on the exponential revenues they have previously enjoyed?
Before we delve further into its meaning and use in the cyber world, perhaps some background context is required.
The way we use online or mobile applications software or “Apps” has changed how we consume products and services online. Companies jumped onto the bandwagon when they discovered that we mostly use Smartphones for the Internet.
App developers were then subsequently sought after to create mobile Apps for practically anything. What started as something mainly for gamers moved quickly onto applications for practically any commercial activity.
We now use Apps for our shopping; fitness; traveling; online bookings and banking. Developers now create customized software to help us with practically, anything.
In addition, we now have App stores for every significant tech provider – Microsoft, Google, and Apple to mention a few. This has naturally fattened the pockets of software companies and created an additional stream of income for them.
The ‘catch’ for using mobile apps is that even though it costs you nothing to download, using them still requires you to register with your personal details. You can also do this by linkingyour existing social media accounts.
The benefit to App providers
These Apps, which are integrated with social media services, create a data goldmine for marketers to study and track browsing habits. Through them, marketers can gain valuable insights into your interests and then customize their products/services to sell to you.
The impetus behind a distributed application system is that it serves to distribute plow some of the wealth garnered from your data via application providers back to you.
Data mining has become more lucrative and accessible because of Artificial Intelligence (AI) and Machine Learning. Do you ever notice how after browsing online or having a conversation or a chat application like WhatsApp or Facebook Messenger? You go online later, and you see Ads displaying the items you discussed? Creepy isn’t it? Well, that is the future of Web 4.0 for you!
Staying ‘woke’
Luckily for us, there is a school of knowledgeable and security-conscious programmers who are not ‘giving in’. They help us understand how the Internet has become a cesspool for marketers to harvest our data. Social media platforms, search engine providers, and mobile application providers facilitate them immensely with this.
Imagine getting paid to surf the web for hours. The way you get paid for taking on a survey, partaking in a social experiment, donating an organ or sperm?
This is the way distributed apps are touted to work. They reward you for the use of specific applications (in a peer-to-peer review setting) with cashable tokens. Seems only fair right?
Now you can imagine how companies like Cambridge Analytica would react to having to pay you for their use of your data. They would surely be reluctant and that’s why they preferred to work clandestinely. But if they could pay companies like Facebook for the use of data, why not pay us directly?
Early adoption
Joining the ‘DApps revolution’ is a no-brainer. Those at the forefront of building and supporting DApps will end up with a more substantial chunk of the market.
DApps primarily provide you with the use of payment systems. These are specifically known as Smart Contracts and Proof of Work systems.
For instance, you are rewarded in cashable tokens to surf the net over applications like Google Chrome, or Mozilla Firefox.
It is only a matter of time that this form of Internet-browsing and use of applications becomes the norm.
The Internet revolutionized the way we communicate, socialize, learn, shop, and do business online. DApps however, will determine the way you get compensated for doing the things you love to do online.
The ‘Internet of Things’ (IoT) as the name suggests is basically connecting as many devices online for them to communicate with each other.
If you think that is a far-fetched concept it is nothing new. We have been using it since the advent of GSM, Infrared, GPS, GPRS, Bluetooth, Wi-Fi, and other wireless connections.
To put the concept into further context, your Smartphone/watch, Bluetooth headset, wireless printer, or smart fridge are all components of the ‘Internet of Things’. They all require a sensor or chip to connect or collaborate with each other.
Origins
The term was supposedly coined about a decade ago. This when a company executive discussed an idea which sounded bizarrely unnecessary and over-futuristic at the time.
He advocated for the need for a chip for every electronic device. The initially requirement was for supply chain and automation in the retail industry.
Fast forward to today, and this has indeed come to fruition. We now have smart cars, smart homes and even tracking chips inserted into pets!
So, each component or part of the object is equipped with an individual chip (small processor) with a unique IP address.
The very same IP address used to identify your home modem or Office server.
IoT application
Why would you want that you might ask? Wouldn’t it be useful for devices and machines to work things out by themselves – to solve complex problems before you even become aware of them?
This is in fact how the devices communicate with the central server to relate pertinent information. An example is the use of fuzzy logic: to regulate the temperature in the fridge (to avoid food getting moldy).
It can be used, in addition, to check the amount of water used in a washing cycle in your washing machine.
Another practical use would be to check car tyres pressure and temperature (to avoid overheating and bursting).
Can you then imagine the number of chips that are required for the typical household? For the car, security alarm, fridge, microwave, tumble dryer, TVs, Radios, computers/tablets, lighting, and heating/cooling system? Each would require a unique IP address
IP address shortage
Talks about IoT highlighted the need for more IP addresses and a need to track or generate them. This as it is evident we are running out of ‘normal’ IP addresses known as IP4: 4 denotes the number of billion IP addresses available.
At the birth of the Internet age in the 1980s, no one ever envisioned a time when the world would need more than four million IP addresses. But with the need as mentioned above for the internet of things – that has come to pass.
Without getting too technical, the issue is being resolved with the development of a newer IP system known as the IP6.
The main difference between the two but it is merely that one is on 32-bit system while the newer on 128-bit and that influences merely the length of the addresses.
Again, the technicalities would only matter to the now growing IoT industry and would not affect us as individuals.
Practical uses of IOT
Large companies that need to manufacture a lot of parts for their devices would need to insert an IP address on each piece. From items as trivial as the car side-mirror; to more serious parts like the helmet of a sportsperson engaging in the heavy contact sport.
From an education perspective, the IoT can make learning a lot more fun for kids and young adults. Toy-maker Sphero, for example, has been long making wireless operated toys like its SPRK+(pictured).
The idea is to fuse physical (programmable) robotic toys with digital apps.
This would simultaneously provide entertainment experiences while inspiring tomorrow’s leaders in maths, engineering, and science.
There are also a few new decentralized systems that are even advocating for a fragmented Internet for that very reason (security and privacy). This would enable you to control your little space within the “interconnected” web.
You can thus run a (private)local area network (LAN) within the Internet domain – if that makes any sense.
Blockchain advocates and companies like IOTA and Chinese-based Crypto-firm Tron are pushing the IoT narrative hard. They also want the decentralization of the whole Internet.
It is only a matter of time before this becomes the norm. Companies are now queuing to get the IP6s and have incorporated adding them to the manufacturing processes.
Once the security and privacy issues have been adequately planned and implemented. The pros of the full adoption of IoT will outweigh the cons.
Translate »
This website uses cookies. By continuing to use this site, you accept our use of cookies.