Category: Big Data

  • Forced digitization

    Forced digitization

    If you are reading this, you are probably couped up in your home, apartment, or wherever you have been forced to settle for a couple of months.

    Local stores ran out of toilet paper, rice, and other ‘essential’ supplies but what also flew off shelves were laptops, printers, webcams, and modems. Let’s not mention the millions of software and apps that are downloading every second.

    Retailers are also running out of printer paper because some of us are still hooked on paper despite the invention of emails and digital signing.

    State of play

    Pic courtesy of Pixabay

    The term ‘home office‘ is no more a privilege for those people in senior management or for entrepreneurs – we all have to do it now.

    The coronavirus has shifted the way we integrate digitally – more people are learning how to use video-conferencing and collaboration tools.


    But how long can businesses afford to pay people to babysit their kids, watch funny cat videos, binge on Netflix, and have meaningless conferences on Zoom?

    One can only imagine the frustration you are going through to set up your home offices. Installing/using software and the correct drivers for devices can get a little techy.

    Professional Web conferencing with Microsoft 365

    Let’s be frank, nowadays, no ‘IT guy or gal’ in their right mind would risk, or be willing to pay house calls to help with these installations. You will, therefore, need to familiarise yourself with finding the right remote tech support or by watching Youtube videos to guide you along. Most cloud providers like Google have an online help site. Microsoft also has a great support site to help with basic office set up.

    There are many of you, on the other hand, who have some working knowledge of computers but just need the right tools to facilitate your home working experience.

    Broadband needs

    So first things first – you need the Internet!

    Without this, you might as well go outside and risk infection. Or better, get hauled to prison for breaking national isolation laws for a few months. You might even get better forms of entertainment in your local hospital or prison.

    Back to the serious stuff…

    Research has shown that a ‘standard’ broadband Internet connection has a minimum download speed of 25 Mbps and a minimum upload speed of 3 Mbps. This serves as a baseline for determining fast and slow internet speeds.

    Speeds much faster than that (100 Mbps and above) are therefore considered “fast” Internet.

    Here’s how long it would take in hours, minutes and seconds to download a 4 GB file at various speeds.

    1 Mbps10 Mbps25 Mbps50 Mbps100 Mbps200 Mbps400 Mbps1,000 Mbps
    9:32:390:57:150:22:540:11:270:05:430:02:510:01:250:00:34

    Upload speeds (generally offered at much slower speeds ) come into play with things like video-conferencing or uploading large files to a server/cloud. It is good to pay attention to those as well. As a guide, 5 Mbps and above are good upload speeds.

    So based on the above, and what activities you perform online, you can now have an idea of which packages to go for if you need to upgrade or change your Internet Service Provider (ISP) altogether. If you are not sure what your current speed is, take a free speed test here.

    For those living in Germany, there is a local speed test which is monitored by the government to ensure the ISPs adhere to speeds promised to clients.

    Kitting up

    Once that is sorted you can shop for a good PC, laptop, or other accessories – bearing in mind that performance depends on the specs of the machine you choose.

    This can include the quality of the network card built into your device that enables you to maximize the broadband package’s top speeds. For more advice on choosing the right device that you need for optimum performance, give us a shout.

    Take a look at our resources page for a list of available software tools to help with communication and collaboration. Naturally, we all have our favourites so we will not advocate for one specifically.

    Debunqed, however, does supply some of the best brands (with enhanced security features) so check out our online store.

    Lastly, as tedious as it sounds, please ensure that you have adequate anti-virus, anti-hacking, malware, and anti-phishing (for emails) software. We cannot stress how many online scammers have become super active in this period. Some of them are even offering “help” fighting against the Coronavirus.

    Some cyber-criminals offer desperate people who have lost their jobs ‘a chance to work from home’. It’s all the same, a word to the wise is enough. Be safe when it comes to self-isolation and hygiene – but also online!

    Speak to us for a more detailed free consultation on how to best setup at home. At the global rate of the spread of the Coronavirus, this home office phase might be a thing for the rest of 2020.

  • 2019 in Tech

    2019 in Tech

    This year may have felt like it was dominated by political shenanigans, but technology also had its wild ride.

    The USA vs Huawei

    A story that has persisted throughout the year is the heat around Huawei in the US. The Americans have stopped Huawei phones from being sold in their country because they say the Chinese mobile phone maker has stolen technology from American companies and has spied on them.

    The tussle began in 2018 but kicked into gear in 2019. Nevertheless, some American companies and organisations are still doing business with Huawei despite the ban by US President Trump’s government.

    The President of Microsoft, Brad Smith, also wants to the US government to offer more evidence to back up its Huawei ban. 

    The core issue with Huawei has been around concerns with Huawei’s close relationship with the Chinese government and fears that its equipment could be used to spy on other countries and companies.

    Huawei has also hit back at US ‘bandwagon followers’ and recently threatened to boycott Germany’s Auto industry if the European powerhouse banned them from offering 5G (broadband) in the country.

    Not a great year for big tech

    Big technological companies like Facebook, Alphabet, Google and Uber have faced a barrage of probes in 2019 be it around anti-competitive behaviour, spying on customers or their staff abusing customers. We also haven’t seen many new companies graduate to super-size status.

    After a long drought of big-name tech IPO (initial public offerings), 2019 promised to be a banner year. A crop of highly anticipated, highly valued tech companies — with hot marquee names such as Lyft, Uber, Pinterest, and Slack listed on the public markets. The idea was to allow you to take a stake in their business.

    Their reception, however, was truly tough. These companies’ stocks have not gained momentum and being listed has attracted greater public scrutiny.

    The biggest disappointment, however, must be WeWork’s failed proposed listing and its subsequent business fallout.

    The hottest things in tech

    Artificial Intelligence (AI) – We’ve been talking about this for decades since Terminator came out but scientists are managing to harness the technology especially in manufacturing and medical fields.

    Most of the top tech companies (Microsoft, IBM, Amazon, and Google) have already embraced AI. Many tout it as one of the main distinguishing features to set them apart competitively.

    A little of this tech has gone into robotics with much fanfare and fear over their capabilities and propensity to ‘initiate a judgement day’. Check out Boston Dynamics

    Bitcoin
    Bitcoin

    Blockchain – Bitcoin may be highly volatile and not the get rich quick scheme people thought it could be, but it is still out there. Clever people are finding ways of making commerce more efficient.

    There are however several practical and use-cases for Blockchain-based tokens and tech other than for payments and investments.

    Robotic Process Automation (RPA) – this is a technology that could explode in 2020. Right now, only large enterprises are using RPA but it could become more affordable and workable for smaller businesses in 2020. RPA is the process of automating mundane tasks such as taking data from one file and entering it into a business application like CRM software.

    It’s about computerizing repetitive tasks that are an inefficient use of time, so it makes our lives more efficient. 

    RPA is not a physical robot. It is also an approach to working across multiple business applications and entering, maintaining, migrating, integrating, mining and testing data on spreadsheets.

    These tasks are prone to human error which is why computerizing them makes so much sense.

    amazon web servies edge computing ad

     Virtual Reality and Augmented Reality – VR made strong progress in 2019. This was most useful in gaming, real estate companies, pornographic entertainment and for people with disabilities.

    For you gamers – it is best to buy an Oculus Quest for your PC. Sony’s VR headset is still the best and only gaming set.

    Look after my data – or not!

    The first fines around the General Data Protection Regulation (GDPR) were lodged in parts of the EU. The GDPR was promulgated in 2016. It is a regulation in EU law on data protection and privacy for all individual citizens of the EU and the European Economic Area.

    It also addresses the transfer of personal data outside the EU and EEA areas. GDPR was enforced because of concerns about data breaches and attacks on privacy by the likes of Facebook and Google.

    Then there were concerns our banks, insurance, and other data keepers were selling or losing our data to dangerous entities.

    The types of personal data exposed included your names, addresses, phone numbers, email addresses, and even passport numbers.

    Lessons learned

    The Marriott hotel group’s data breach of 2018 resulted in the exposure of 339-million customer records. Around 30-million of the records belonged to European Union citizens, and therefore they were subjected to a GDPR fine.

    Facebook seems to love controversy and had been found to have allowed a massive 247 million user (mostly Americans) data leak.

    Back home in Berlin, on October 30th the Berlin Commissioner for Data Protection and Freedom of Information issued a €14.5m fine on a German real estate group, die Deutsche Wohnen SE. This was the highest German GDPR fine yet. The infraction related to the over retention of personal data.

    Despite the turbulent year for tech companies and consumers, we look to 2020 with breathless anticipation. We also ponder on which of the mentioned technologies will stick out and make a positive impact on our lives.

    Pictures courtesy of Pixabay

  • The startup tech kit

    The startup tech kit

    New business? You’re going to need some basic software!

    In this modern-day and age, it may seem that small businesses do not require a plethora of technological tools in order to succeed, but it’s worth investigating which technologies can give you an edge. This is especially crucial if you are not offering a niche product or service and have to compete with an army of existing players in your industry.

    Accounting, CRM, marketing, analytics, taxation and other useful software may have just levelled the playing field between small and big businesses. The challenge is to choose the right one to help you grow quickly at the least expense.

    You will, nevertheless, if you are even to make a first impression, need some basic software regardless of your trade.

     HERE IS WHAT YOU WILL NEED 

    Almost everybody needs some kind of online presence. You’re a business and while social media is helpful (more on that later), a website is where you will be found by prospective clients or business partners. You can build one easily these days via a paid content manager provider such as WordPress or Wix.

    They will even provide and host your domain if you don’t have one.

    If you do not, however, have the time nor the energy to create one yourself, there are cost-effective alternatives such as outsourcing the building to a web-designer. They can do it remotely and the safest way  would be through a regulated marketplace such as Fiverr* or Upwork.

    *Debunqed can recommend a designer known as aceholder on Fiverr.

    Email

    You need to be contactable. In the old days, you got away with Yahoo or Google email but now you need an email service that can host a domain. The free emails are also not secure and subjected to heaps of spam.

    Email hosting is a service in which your email messages and associated files are all stored on a server. When you receive an email to your website’s domain address, that email is routed across the Internet and stored on the recipient server.

    A hosting service stores the files that make up a website on a data server which then uploads them directly to the web.

    This gives you an Internet connection and way for your customers to access the site through a domain name.

    Web hosting services often come with a slew of options for designing sites. These include the one-click installation of supported applications such as a service mailbox.  Wix partners with Microsoft’s Office 365 for mail hosting whilst WordPress works seamlessly with Gmail/GSuite.

    Task Management System/ Job Manager

    Being organised from the beginning isn’t a good idea; it’s a great idea! Get yourself a system which tracks your sales and logs the deliverables that each employee completes.

    There are an array of CRM solutions focusing on different tasks from customer services or sales to project management and full-on finance and back office (ERP) operations (more on this later).

    The key is to start small many of these offer trials but also some even offer a free package naturally with limited functionality. Figure out which tasks are important in order to choose the right package to handle your scheduling, sales and tasks. A simple calendar/scheduler via MS Outlook and Office 365 (Microsoft Bookings) can be a good place to start for a paid but fully functional service.

    Payroll and Accounting Systems

    You need to keep accurate books and not to rip off your employees. You’re a start-up; play the numbers by the books. And a word of caution: don’t ever cook the books!

    There is a huge choice of accounting (and back office) systems to choose from. The big names are probably out of reach so like a CRM system, you might want to shop around and start with smaller but a reputable brand like Quickbooks.

    But if you go for an Office 365 solution, you might as well look into something like Dynamics 365. One of their entry-level finance packages (Business Central) has all the ‘bells and whistles’ for a Startup to help get your books up to date for the taxman/audit.

    You also need to monitor your payroll – this service can be added by upgrading to a bigger package under Microsoft Dynamics family. You could also shop around for payroll software if you are on a tight budget.

    Project management and support logging system

    Once you build up a workable database of existing and potential clients, you will require some kind of logging system to handle customer queries.

    This will help you keep tags of what customers are having issues with. If they are repeated issues, then you know there is a recurring problem with your operations or an aspect of your business.

    A good ticketing system will allow you to keep a knowledge base with instructions to help your staff with how to deal with recurring issues quickly.

    Shopping cart software

    If your products are sold online or does not come from a physical store, this is the mandatory software that enables you sell goods online. It is designed to quickly process debit and credit cards transactions but also allows your customers to use their PayPal and other payment methods – even Cryptocurrency.

    A good shopping cart package also does inventory management, calculates packaging costs, shipping costs and taxes.

    Security and Anti-Virus software

    Always protect your Internet connection and your sensitive data against viruses, spyware, malware, worms and Trojans.

    Most of the packages mentioned before come with in-built security measures such as sign-in authentication.

    But these are not enough and you will need to source software to prevent a hack if you are dealing with extra sensitive data like patents, medical and financial records/accounts.  Read our feature on Online Threats for more on this.

    Cloud storage

    This is a place where you can store large files as well askeep backups of files. Hardware can break. You could drop your 2-terabyte portable flash drive but at least your work will be safe in the cloud. 

    Once in the cloud, things can get disorganised (many files and folders) and sorting them can become a pain. The top file storage providers include, Microsoft’s SharePoint Online and OneDrive; Google’s Drive, Amazon’s S- series and Dropbox.   

    There are some really great add-ons like a Digital Asset Management (DAM) tool for those dealing daily with tons of documents and images by Pic.io. This software works specifically with GoogleDrive.

    Social media

    We have by now affirmed that you need a CRM system. With many choices of companies to buy products from for example,  treating individual customers’ needs is very important.

    A good CRM system will help you reach out to your customers where ever they are – online or offline. This is known as Social Engagement.

    That, coupled with a powerful Business Intelligence tool, can help you leapfrog over your competitors with useful insights such as peak traffic times on your website, purchase habits and other characteristics of your client that will help you accurately predict potential revenues.

    Find the best CRM platform that allows for social engagement, then set up whatever social network accounts that suit your business.

    Webinar services

    Remember you are doing business with groups from around the world.

    Online communication tools, therefore, enable you conduct presentations and meetings over the Internet. This saves time and money associated with travelling costs whilst giving you access to markets outside your area, city or country.

    Some of the most popular/effective communication tools includes those included in the Microsoft (Skype and Teams) and Google (Hangouts & Voice) bundles. There are also free standalones like Zoom.

    Depending on your frequency of calls and audience size needs you can stick with the free version and then scale up to a paid subscription later.  You can also run training sessions and product demonstrations and even replace your whole phone system with them. 

    Online Surveys and other Marketing Tools

    Marketing is is the lifeblood of a company. It’s a key sales-driver and if you aren’t selling, you’re going out of business! Conduct market research using online tools such as SurveyMonkey and collect emails through opt-in forms. These valuable insights can be used  in targeted email marketing campaigns.

    The most advanced and widely recognised mail marketing tool is Mailchimp. It starts with a free version with 7 marketing channels and goes up to $299 per month for large companies with 200000-plus contacts. Most bundled Office solutions will allow you to add Mailchimp as a plug-in to your existing mailbox.

    Conclusion

    Technology constantly changes and it’s hard to keep up – so don’t. Get the basics right first and add technological services and tools as you grow. Rather understand what each button does first before you spend money on a whole super system.

  • Ethical hacking

    Ethical hacking

    Maybe you should encourage your kids to become hackers. When you open Twitter handles and Linkedin profiles, it’s not unlikely that you’ll find people listing hacking as a skill.

    Parents used to tell their kids to become doctors, lawyers, and accountants. Later, they advised them to learn about computers. These kids have now grown to become hardware specialists and then software specialists today.

    In the past 10 to twelve years, we have seen ourselves thrown into the fourth industrial revolution. In it, technology affects our lives through social media and augmented reality.

    We share a lot of our personal information with more people, companies, and institutions every day, willingly and are often blasé about it. This has tempted people to steal this information by hacking it. 

    Hacking background

    Since the advent of personal computers in the 1980s hackers have become prolific, initially in ‘first-world’ countries that had an advanced infrastructure. There were numerous cases in the US but as computer technology permeated the world, hackers followed suit. 

    A hacking group called MOD, Masters of Deception, in the 1980s allegedly stole passwords and technical data from Nynex, and other telephone companies as well as several big credit agencies and two major universities.

    The damage caused was extensive and one company, Southwestern Bell said it suffered losses of $370,000 alone. These days the damages, though not always publically announced, can run into a few millions of dollars.

    READ MORE about the Online Threats hackers use here

    All this has paved the way for a special information technology (IT) vocation. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system and networks. They break into systems they aren’t authorized to, and tend to break seamlessly into email and banking systems.

    Advertisment

    Hacking as a career

    Ben Wilson works as an ethical hacker. He has more than ten years of experience and worked in London where he received on-the-job training. He now works remotely in South Africa servicing UK clients.

    “I test websites for clients and look for vulnerabilities in the systems. I have done a lot of work for banks lately but my work is across industries.” 

    “Energy companies are using my services more and more,” he says.

    Wilson says he worked in a permanent position for six years. Right now he contracts for five clients regularly.

    Ethical hackers are the knights who test how permeable these systems are.

     

    “The majority of my work is for British clients. The UK pound is strong and I like to earn pounds. I’d say the best computer security consultants in the world are in the UK. The US is strong too but the UK consultants are sophisticated and the best.”

    Vulnerabilities

    The most common way in which people hack information is through email contacts; especially personal Gmail accounts.

    People think that their information is safe because it sits with one of the largest companies in the world. But this is exactly why it isn’t safe.

    Gmail and other third-party free email accounts are regularly hacked. If you want to protect especially valuable information you should either upgrade it to the business/enterprise level, use a different email service, or perhaps the one connected to your employer. 

    Nowadays companies use services to protect themselves against hacks and unauthorized access. These monthly or annual service providers might employ ethical hackers to check the companies’ systems.

    Hacking, however, isn’t just something that happens to big companies or in blockbuster movies. Here are some reality checks:

    • All websites are under threat;
    • So are applications (Apps) on your phone;
    • People can also program artificial intelligence (AI) to hack into systems. This has become a big concern and theme for security experts.

    Ways to proactively prevent a hack 

    Fortunately, there are several ways of protecting yourself and your information from hacking; starting with your emails. Be wary of “phishing” emails asking you to update your information, especially for bogus databases that you have never heard of.

    Use a spam filter – Avoid opening attachments from senders you don’t know – Update your passwords regularly – It helps to have authentication methods, such as a smartphone-linked and email-linked authentication (2FA) or security keys like Yubico – Do not click on any ad – period! Back up your files regularly – it’s always a good idea – Don’t allow ransomware bullies to bully you.

    • If you get sent communication saying that people have your files and want money or they’ll release the files; ignore them.
    • They can’t threaten you forever and might eventually move onto another target especially if your information loses its value over time.

    Anti-hacking software

    As a business, use tools like those from cybersecurity experts Acunetix. More than 4 000 companies protect their web applications from vulnerabilities using its powerful web scanner.

    Its penetration testing software prevents potential attacks by identifying holes in your websites’ coding. This is where hackers usually plant their complex code which allows them to extract data such as contact details, credit card details, and in worse cases, company-sensitive data like patents and blueprints.

    Naturally, it also scans networks to find gateway loopholes that could lead to crashes and downtime-related losses. A bank’s website going down for a few hours can cost it several thousand or even millions in lost revenue.

    Despite having firewalls, VPNs, and other Internet security systems in place, your websites and apps being developed are still vulnerable to cyber-attacks or a hack.

    The most commonly known hack used is a DDoS attack. Basically, it works like a traffic jam clogging up a highway, preventing regular traffic from arriving at its desired destination. Incidentally, only a few days ago, Amazon was hit by a DDoS Attack.

    So, how would you know or find out if you are vulnerable?  By conducting regular scans on your websites and apps to see where vulnerabilities lie.

    Avoiding a hack requires common sense

    Be aware and don’t fall into scams. It’s unlikely you’ve won 120-million Euros in a lottery. You should know by now that you are not the descendant of a king!

    In addition, if someone says they have a sex tape with you in it and they want your salary, unless you know you made a sex tape, they’re probably lying.

    Unless of course, a scorned lover of yours tricked you – but you can’t blame technology or a hacker for that.

     

  • A decentralised solution

    A decentralised solution

    Did you know that there are still more than 700 million people in the world who live in extreme poverty? These people must scrimp, starve, and struggle to survive off less than $1.90 per day.

    By 2030, the World Bank estimates that more than 90 percent of those people will be concentrated in Sub-Saharan Africa.

    This is perhaps one of the greatest developmental failures of the modern world. Despite the continent’s expansive natural resources and increasing connectivity, foreign actors still feel it’s too risky to heavily invest in their markets.

    Blockchain could be the key! 

    Bitcoin and “Blockchain” were created in the mass wave of distrust in banks after the 2008 financial crisis. Therefore, the technology enables individual, distributed data storage that could become the perfect evidence (trust) base and financial infrastructure for a developing country.

    With the right implementation, Blockchain holds the potential to completely revolutionize and revitalize such economies, especially in Sub-Saharan Africa.

    So, what is this Blockchain?

    Blockchain is essentially a kind of decentralized database that allows you to have a safe, secure way to handle their data without the need for third parties.

    How Blockchain works

    For example, you could with Bitcoin, make or accept payments in real-time without needing a centralized bank.

    “[It is] a way for one Internet user to transfer a unique piece of digital property to another Internet user, such that the transfer is guaranteed to be safe and secure, everyone knows that the transfer has taken place, and nobody can challenge the legitimacy of the transfer,” said software entrepreneur Marc Andreessen.

    “The consequences of this breakthrough are hard to overstate.”

    Historic background

    Until the mid-twentieth century, most of Africa was ruled under a colonial system meant to exploit the people and their natural resources for European benefit. Africans, in addition, were rushed into development according to European standards rather than homegrown ones.

    The legacy of rapid development, distrust and corruption left behind an economic system failing to recover in the 21st century.

    While the World Bank celebrates a decrease in global poverty levels, the number is expected to remain stagnant in Africa. Today’s poorest people are living in places with the least economic growth.

    Sadly enough, poverty and lack of investment in many developing countries stem from how they were integrated into the world system.

    The land was cut into countries according to European treaties and agreements, rather than by traditional and tribal land divisions. This situation worsened upon the handover of colonial power to so-called “democracies.” Power often shifted to the ethnic groups that former colonizers favoured.

    Corruption multiplied in the form of bribes, political persecution, rigged elections, and a massive wealth gap. All of this still affects the wealth distribution and investment potentials of many developing countries.

    Of course, this created a lack of trust in banks and government throughout much of Sub-Saharan Africa.

    The perfect fit for Africa

    During a 2012 study conducted in rural Western Kenya, Stanford University researchers waived the costs of opening basic savings accounts for a number of unbanked individuals.

    While 63 percent of the subjects opened an account, only 18 percent of them used the accounts. This was likely due to three factors: a lack of trust in banks, unreliable service and prohibitive withdrawal fees.

    Unfortunately, the prevalence of unbanked individuals in the informal sectors scares off foreign investors, who heavily rely on transactional evidence to make investments. Otherwise, pouring money into markets is too risky. That’s where Blockchain comes in.

    How would it work?

    Blockchain can host an entire evidence base of transactions, loan repayments, and asset titles. The technology is also decentralized and requires individual confirmation, creating an element of trust and transparency beyond traditional banking systems.

    SmartContracts

    According to Victor Olorunfemi, Director of Products for Pan-African tech and crypto-exchange, KuBitX, Blockchain’s major benefits lie in “frictionless P2P and cross-border payments, transparent elections, land registry management [and] transparent crowdfunding.”

    Let’s look at some of the different ways Blockchain could benefit developing economies, especially in Sub-Saharan Africa.

    1. Creating financial infrastructure and accountability

    According to a study by the Milken Institute, viable financial markets require consistent, accurate data on assets and credit histories. Luckily, Blockchain may fulfil these needs.

    The use of Smart Contracts technology is ideal in areas lacking accountability, such as the real estate or land/agricultural sectors. In Africa, a lack of record-keeping practices often leads to “missing” or non-existent title deeds. In some cases, this is intentional.

    Title deeds “go missing,” only to end up in the hands of benefactors other than the rightful owners. Smart Contracts could eradicate these issues through the use of special tokens that cannot be duplicated, changed or removed. See the article on tokenization.

    Likewise, Bitland, a company in Ghana, currently helps individuals record deeds and land surveys. By resolving land disputes, Bitland creates more stability while accurately recording land asset data.

    “There’s a massive number of people in the informal sector, but there’s not much data being collected on them right now.”

    Merit Webster, co-president of the MIT Sloan Africa Business Club.

    “That means you don’t have that credit history or payment history for them. If you have a decentralized approach to collecting data, you end up with more malleable data. [This] is very valuable for creating credit histories.”
    The agricultural industry also has the potential to thrive using Blockchain.

    “Blockchain could be used to track goods around the world. This allows farmers to earn a fair wage for their goods.”

    Also, farmers could use record-keeping technology to streamline the supply chain and document resources. This would lead to better efficiency, lower transactional costs, and improved logistics.

    2. Security in banking

    According to the World Bank, there were 1.7 billion people with no bank account in 2017. This situation is worst in developing countries, especially African ones. For example, over 62 million of these people lived in Nigeria.

    Besides, data from Google Trends reveal that Lagos, one of Nigeria’s biggest cities, ranks globally as the number one city based on the volume of online searches for Bitcoin (BTC). Clearly, for the city’s 21 million-odd people, there an immense interest in some form of an accessible payment system.

    Of course, it’s unrealistic to expect bank branches to magically appear in every remote corner of the world. However, a digital database using Blockchain technologies has the potential to reach far beyond physical banks.

    Ad: N26 Bank

    Many Africans value trust and transparency. In developing countries, this lack of trust goes beyond the Internet. Developing countries with less industrialization tend to have higher levels of corruption.

    This reduces national investment opportunities in the public sector and instills a lack of trust in centralized oligarchs handling an international investment.

    Because its power lies within the community of users, Blockchain can combat these trust issues. All data logs and amendments must pass through this community and identification confirmation tests.

    Blockchain technology also secures your data incredibly. Hacking and data breaches are all too common nowadays. In 2017, for example, around 3 billion Yahoo user accounts were stolen.

    When information is stored in the same place, hackers have one, easy target. In contrast, Blockchain is a distributed entity. This dissemination of data leaves it far less vulnerable to cyberattacks.

    3. Fostering Entrepreneurship

    Coupled with the Internet, Blockchain technology could be the perfect platform for aspiring African developers. Because the ‘source code’ is free of charge, skilled coders can adapt, create, and configure special applications, called DApps.

    These are available on Crypto platforms and provided by companies like Ethereum, and a South African firm specializing in what they called the Keto-Coin.

    Rather than waiting for governments to drag their feet trying to create jobs—individuals on the continent can form small firms that build and sell Crypto-based Apps locally or abroad.

    “Despite the frictions and impediments mentioned,” said Olorunfemi. “Blockchain can still provide an avenue for promising African tech projects to access capital (FDI) via token offerings on digital assets exchanges.”

    Many courses are even readily available online to quickly learn about new technology. Microsoft, for instance, offers a platform via Azure for you to build and learn about the Blockchain.

    One-man shops in countries with unfavourable economic systems, like Zimbabwe, can also adopt smaller, stable, Cryptocurrencies to facilitate or payments. In cases of rampant inflation, they can temporarily act as a store of value or help you pay for things until your currency stabilizes.

    As with the Venezuelan hyperinflation case study, Cryptocurrency intervention could help many developing countries troubled with economic instability.

    There is also the option of Crypto-mining. But before you pull out the ‘high-consumption energy’ argument – think outside the box for a moment. What about energy sources that are free and available nearly 24/7? Like water and the sun!

    The African continent is full of capable scientists and mechanical engineers. One could build special solar-powered energy centers to power Bitcoin-mining.

    And without the expertise, governments or private companies could alternatively just invite Crypto companies with abundant financial resources to mine (cleanly) for a special tax/fee while creating jobs for the locals.

    4. Elections

    In addition to the financial side of things, Blockchain technology could help eliminate some forms of corruption. For example, many African countries’ elections are incredibly vulnerable to the social scourge. In some extreme cases, some officials change or forge written ballot votes to rig elections.

    Corruption


    To combat this, Blockchain databases could record votes. This makes it nearly impossible to tamper with using Smart Contract technology. Having fair elections improves infrastructure, which then increases development and economic dependability.

    Blockchain non-profit company Cardano, this year, has partnered with the Ethiopian government to battle these issues specifically.

    5. Leapfrogging

    While some might see Africa’s economy as underdeveloped, others might see it as a blank canvas well-suited for a large-scale implementation of Blockchain. Economic and governmental systems are shifting and slightly shaky in many Sub-Saharan African nations.

    MPesa

    The challenge is to foster a rigid economic system to implement Blockchain.

    Don’t just take our word for it—African nations have often implemented new, practical technologies before the Western world. Let’s look at the example of M-Pesa. Back in 2014, Americans and Europeans were amazed by Apple Pay’s launch.

    However, this mobile payment system wasn’t exactly “new.” By that time, Kenyans had used M-Pesa, a very similar technology, for years.

    “There’s a lot of opportunity to leapfrog the way the West developed and have these more unique African solutions, but it needs to come from within,” said Webster.

    “It needs to come from entrepreneurs in the continent who want to implement these solutions. It’s important to engage people very early on. Systems incubated in the West don’t stand as great of a chance to work as African ones do.”

    Concluding remarks

    With the possibility of an experimental, large-scale takeover of Blockchain technology to improve African infrastructure, the nations there could leapfrog in development and growth.

    This must begin internally. According to Olorunfemi, “Education—of policymakers and other stakeholders—which is often ignored has to be a critical factor in paving the way for the acceptance and adoption of new technologies and the accompanying investment.”

    The results in Sub-Saharan African countries could help eliminate much of the world’s poverty. It would also remove remnants of mistrust and corruption left behind by the days of colonial exploitation.

    While there are some obstacles to large-scale Blockchain implementation, we can’t think of a better benefactor than there. The possibilities for business using the Blockchain are endless!

    To learn more about how to get started with Cryptocurrency mining or purchasing, visit our resources page for useful links and guides.


    Additional input by Bobby Quarshie (BQ). 
    Citations: Christopher Lee and Jackson Mueller. 
    Swan, Melanie. “Anticipating the Economic Benefits of Blockchain.” Technology Innovation Management Review 7.10. Oct. 2017.
    Bitcoin Lessons from Venezuela, Where Hyperinflation Reigns. Online Source: https://www.lathropgage.com/newsletter-237.html
  • The Online Threats of 2019

    The Online Threats of 2019

    How you can stop them from happening.

    Like a biological virus mutates – as technology advances so do the complexity of phishing and identity theft schemes. With major services adopting cloud technologies and storing private data online, anyone is vulnerable to hacking.

    To make matters worse, hackers continue to come up with some pretty creative ways to profit from stolen information.

    Without wasting time, these are the things you should already be doing to avoid being exposed to hackers in the first place:

    In order to keep these cyber-criminals out of your lives and computers, let’s take a look at some of the actual schemes to watch out for in 2019.

    Hacking

    We all know what hacking is by now – the term has almost become synonymous with internet security. So a question is: do you love watching movies on Netflix or jamming out to your summer playlist on Spotify? If the answer is yes, then you’re at a pretty high risk of getting hacked.

    DynaRisk, a UK cybersecurity firm, recently found that cybercriminals most commonly target these brands, along with adult-oriented sites (you know what we mean) and then, online gaming services.

    Identity Theft

    A few weeks ago, authorities caught a New York-based gang who had used identity theft to steal over $19 million worth of iPhones. Quartz reported that this operation ran for seven years.

    So-called “Top Dogs,” the ring leaders, would organize lower level members of their organization to steal identities and create clone credit and identity cards. Then, affiliates fanned across the nation, signing up for mobile phone plans to acquire iPhones, which were later sold for a profit by the Top Dogs.

    Because phone payment plans take the shape of nominal fees over the course of several years, victims often wouldn’t notice the fraud until it was too late. Learn how another scheme dubbed sim port attack works in the diagram below:

    Ransomware

    Hacking can happen to anyone – including our favorite bands. In early June, a hacker managed to steal the minidisk archive of Thom Yorke, the lead singer of Radiohead. This included previously unreleased demos and audio material from around the time of “OK Computer,” the band’s 1997 worldwide hit album. The hacker then demanded $150,000 on the threat of releasing it.

    Holding files for ransom is so common nowadays that it even has its own name: “Ransomware.” Either pay over the ransom or lose your files—or, even worse, have them released onto the unforgiving Internet.

    In response, Radiohead released all 18 hours of material on Bandcamp themselves, winning against these ransom hackers.

    Most security experts recommend the same route as Radiohead—never pay the ransom, because there’s no guarantee you’ll recover files or prevent their release.

    Sextortion

    If you think ransomware is bad, there’s an entire subgroup of it aimed to profit off sexual shame. Cheekily named “Sextortion,” some hackers creatively upgraded the classic email phishing scam to scare victims into handing over Bitcoin.

    According to Fortune, hackers have already racked up over $900,000 with sextortion. In these phishing emails, the sender claims to have spied on you while you watched porn—and has webcam footage of the salacious deeds. The message then demands a Bitcoin ransom, or else face the social and professional consequences of this lewd video getting sent to all your contacts.

    To make the threat even more believable, the sender references a previous password tied to the user’s email account. According to Krebson Security, a sextortion phishing message might look a little like what’s written in the sidebox.

    In rare cases, the threats are real—and hackers get their hands on some sexually explicit photos. Recently, American actress Bella Thorne fell victim to sextortion. Last Saturday, she took a similar, albeit more risqué, route as Radiohead, opting to release her nude photographs on Twitter in order to take the power away from her hacker.

    Last thoughts

    So, what’s the best way to avoid your personal, or, business from costing thousands in virtual currency? Since most of these emails are fake, you can just avoid them with a spam filter. And you should probably buy a webcam cover…just to be safe. When it comes to general browsing- we suggest using a VPN.

    Read more about VPNs here

    There are now more secure anti-hacking tools that use the Blockchain and offer great protection, especially against identity theft. Have a look at our feature on Tokenisation.

    Most online services now like mobile banks, offer App-based 2-factor authentication. This should now be regarded as the minimum security for ANY online account or App.

    To avoid hacking or phishing scams in general, optimizing your cybersecurity and using online common sense will save you loads of time, trouble and money.

    Cybersecurity by Acunetix
  • Cloud-hosted services square up

    Cloud-hosted services square up

    Running your business requires choosing the right tools for you and your employees. In order to streamline work-related productivity, many organizations are migrating to cloud-based office suites. Specifically, Microsoft’s Office 365 and Google’s GSuite (now known as Google Workspace).

    Both products boast a variety of helpful productivity tools and the latest remote collaboration technologies. While it’s impossible to say which one is “better”. This head-to-head comparison can help you decide which office suite is a better fit for your business.

    What is Workspace & Office 365?

    Office 365 and Workspace (previously GSuite) are packages, of powerful business tools that facilitate your day-to-day tasks using the cloud. They even provide business emails along with apps for creating documents, spreadsheets, presentations, video conference calls, shared calendars, and notes.  

    In addition, storing information on Google or Microsoft servers, rather than your own via these suites, can also save your business a lot of money.  

    Plans and Pricing

    First, let’s look at plans and prices. It’s important to note that Microsoft requires an annual commitment, while Google offers you the option to make monthly payments if you prefer.

    Contact us to get a formal quote for your business
    GooglevsMicrosoftSuites
    Cloud packages head-to-head

    Email

    While both Office 365 and Workspace offer web and mobile apps (Outlook and Gmail, respectively) for email. There are, however, some subtle differences.

    One advantage to Office 365 is the desktop version of Outlook, which is incredibly feature-rich and lets you sort and group emails with ease. Gmail, on the other hand, is widely used throughout the world. For this reason, a variety of third-party app options (e.g. WordPress) can be linked to it to enhance its capabilities.

    Cloud Data Storage

    For the entry-level plans, Office 365 Business Essentials wins out with 1 TB (terabyte) of storage per user, while the Workspace ‘Basic’ plan only offers 30 GB. GSuite includes emails in this storage limit, whereas Office 365 provides extra storage for email files with added archiving.

    However, Workspace’s upgraded plans beat out most of Microsoft’s storage offerings. So long as your business has more than five employees, Workspace Business and Enterprise provides unlimited cloud storage. Although, businesses with less than 5 employees on the “Business” plan are capped at 1 TB. Only Microsoft’s E3 plan and higher offer the same unlimited cloud storage.

    Applications

    Applications are the cornerstones of a suite’s functionality. Workspace and Office 365 offer you a variety of comparable apps for word processing, creating spreadsheets and presentations, all on the cloud!

    This means every user gets a free desktop version of the Office suite (i.e. Microsoft Word, Excel) to download.

    These feature-rich apps expand far beyond the capabilities of the mobile and online versions, and are available on every plan except the ‘Business Essentials’.

    While both services offer mobile and online apps, one major benefit of Office 365 are its desktop applications.

    Collaboration

    These online applications make both suites ideal for remote collaboration. Microsoft Teams lets facilitate this with tools like real-time co-authoring, mentioning users by name and chat capabilities while working on OneDrive. Microsoft now lets you collaborate using its desktop apps, too, although the updates to shared files are a bit sluggish compared to its online apps.

    Similarly, GSuite offers Hangouts for chats and Google Drive for real-time collaboration. Google’s online and mobile apps were created with cloud collaboration in mind, so some might find them a bit more user-friendly.

    For remote meetings, GSuite and Office 365 both offer group video conference calls. If you plan on large-scale video conferences, then Office 365 offers far more for your money: most plans have a 250-participant limit, while the E3 plan increases to an astounding 10,000-person limit.

    Meanwhile, GSuite’s Google Meet allows up to 25 participants on the “Basic” plan, 50 on the “Business” plan, and 100 on the “Enterprise” plan.  

    Security

    Cloud services are running into a variety of security issues, and these suites are no exception.

    A 2019 Barracuda Networks’ report found that a large percent of ATO (account takeover) attacks were targeted at Microsoft Office 365 accounts after businesses migrated emails to the service.

    These attacks prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue a set of best practices. The aim was to help organizations migrate their email services while avoiding risks and vulnerabilities.

    Meanwhile, Google recently announced that a cloud storage feature for encrypted passwords on its “Enterprise” plans was faulty. As a result, some user passwords were stored in plaintext on Google’s servers!

    While cloud computing has its risks, the two suites do have impressive security features. GSuite is comparable to Google’s own level of security and offers AI detection of suspicious activity, Two-Factor authentication, and data leak protection—in which admins can block outgoing communication determined by set keywords.

    On the other hand, Office 365 has the option of Multiple Factor Authentication (MFA), along with the detection of malware, viruses, and suspicious activities. Microsoft also provides data loss protection, and admins can restrict access to company-issued devices only.

    Ease of Use

    So, which is easier to use? Well, it depends on who you are, and your ability to grasp software quickly.

    If you’re accustomed to working with MS Word or Excel documents, and edit them for work on a regular basis, then Office 365 and its desktop-to-online formatting compatibility will probably be your best bet. This is especially true if your company solely computes with Windows PCs.

    However, new users might find GSuite apps easier to learn, as the tools are a bit simpler and straightforward.

    So, which is best for you?

    Firstly, Office 365 offers feature-rich apps, and most of its plans come with a desktop version of MS Office applications. This is a definite advantage over its competitors.

    Its entry-level plan is far more generous in terms of data storage than GSuite’s “Basic” plan. In addition, businesses that already exclusively use Windows technology are likely to find Office 365 better-suited for their needs.

    With that said, GSuite was originally designed as a cloud collaborative productivity tool. Therefore, its features might be easier for collaboration and can be used among a wider variety of Windows and Mac devices. In addition, GSuite’s Business’ plans and above outdoes Microsoft when it comes to unlimited cloud file storage. <- This has changed since the article was first published.

    Unfortunately, I can’t tell you which of the two is “best.” But, with this knowledge in mind, you can make an informed decision to choose the best cloud suite for you.

  • The latest cloud computing trends in 2019

    The latest cloud computing trends in 2019

    It’s 2019, and the Cloud is everywhere—from the apps we use every day to the infrastructure of global tech giants.

    According to researchers at Gartner, revenue generated from public cloud services is projected to grow 17.5 percent in 2019. This amounts to a total of $214.3 billion, up from $182.4 billion in 2018.

    More than a third of organizations surveyed by Gartner saw cloud investments as a top three investment priority. With this kind of growth, tech organizations are racing to get on board with cloud-only software and platforms.

    Here are some of the trends to look out for this year:

    Hybrid Cloud, Multi-Cloud and Mergers

    IBM announced its purchase of Red Hat last October, calling it the “most significant tech acquisition of 2018.” This combined Red Hat’s extensive network of open-source clouds with IBM’s Hybrid Cloud team.

    Mergers like these are likely to become a trend this year, as companies see the benefit of using multiple clouds across all sectors of their organization.

    Furthermore, this system will dominate in the future, as businesses find public clouds inadequate to meet every one of their requirements.

    As a more flexible and functional solution, many organizations will shift to a network of multiple private, public and hybrid clouds in the future.

    Serverless Cloud

    Serverless computing is a young market in technology, but it will continue growing in 2019. It isn’t actually “serverless.” Instead, it is a cloud-computing model in which the cloud provider itself runs the server on a dynamic, as-used basis (FaaS).

    Rather than buying server space, developers can use a back-end cloud service to code. They will only then pay for the server space they actually use.

    As this relatively new technology develops, we can expect to see more companies providing and expanding their “serverless” offerings.

    Artificial Intelligence

    Although cloud technologies are growing exponentially, artificial intelligence (AI) could prove an even greater economic driving force. According to Accenture, the impact of AI could double economic growth rates by 2035 in developed countries. 

    Around 80 percent of large companies have adopted some form of AI, according to the Harvard Business Review.

    Amazon, Twilio and Nvidia, to name a few, are thus, incorporating AI with cloud computing, next-gen GPUs and the Internet of Things (IoT). This has led to the developing of applications with “smart assistants,” and voice-to-text technologies.

    Such a combination of AI and the cloud provides an extremely powerful and unconstrained computing network.

    Security

    Digital transformation is already underway, with Gartner also projecting that 83 percent of all workloads will shift to the cloud by 2020. However, this movement presents issues of cybersecurity.

    Many businesses have not properly secured their cloud-stored data. For example, marketing and data aggregation firm Exactis left around 340 million records exposed on its cloud servers. This was uncovered in a data breach last year.

    Mitigating factors

    The implementation of the General Data Practice Regulations (GDPR) makes this even trickier. It affects cloud security, and IT companies will likely struggle to comply with these new laws while protecting sensitive information.

    Cloud computing services are progressing exponentially, as are their new developments. The year 2019 will surely be filled with businesses pouring investment into enterprise solutions. This while expanding, securing, and implementing cloud technologies to their fullest extent.

    Bridget is a freelance writer and editor, and the founder of Lost Bridge Blog, where she writes about traveling as a Millennial woman on a budget. When not writing, you can find her traveling, drinking inhuman amounts of caffeine and scrolling through the latest tech & political news.
    N26 Bank
  • Smoother Online Shopping

    Smoother Online Shopping

    As a small online business, it makes sense to ensure that what you are selling is very easy to access. This is especially important when offering something that is common. The purchasing process should be practical and aesthetically pleasing to your clients.

    Your online shopping cart software creates that important connection between you and your customers. It must therefore help you achieve three goals:

    -Deliver the best and most secure experience for your users;


    -Make it simple and desirable for them to complete transactions;


    Minimize common ecommerce hurdles (such as shopping cart abandonment).

    Customers expect consistency, reliability, and speed. Most users are now accustomed to the speeds facilitated by broadband Wi-Fi and omnipresent LTE mobile networks.

    Research indicates that 78 percent of ecommerce consumers completed a purchase on their mobile device in 2016.

    This percentage has probably increased since then. Therefore, delivering experiences that embrace mobile best practices has to be one of your primary concerns as you choose a solution.

    Some other salient things a good online shopping cart solution should pay attention to:

    TRUSTis obviously a huge part of establishing a valuable relationship. Your shopping cart software is an extension of your brand, and your buyers must trust it with their personal and financial information.

    As buyers avoid using direct credit card purchases (due to increasing fraud and data breaches) in favour of more secure methods. Your company must be prepared to offer new payment options.

    Customers appreciate the SECURITY and ease of mobile wallet payments, such as Apple Pay and Google Pay. This is because they can complete purchases using a single-use virtual credit card number.

    Give them the ability to use these alternative payments and if possible, do not exclude Cryptocurrency!

    It would also need to link up to your MARKETING and customer service platforms to provide a holistic customer experience.

    Naturally, you also want a system that tracks product sales and customer activity with as much detail as possible, and that can also sort transaction data across a multitude of categories.

    So, where does one get such software?

    Read more about how to get a good shopping cart software here.

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.