Category: data privacy

  • Unleashing the Power of AI

    Unleashing the Power of AI

    Artificial Intelligence (AI) has transformed from a buzzword to a practical reality, revolutionizing numerous industries across the globe. With its ability to process vast amounts of data, learn from patterns, and make intelligent decisions, AI has become an invaluable tool for businesses seeking innovation, efficiency, and competitive advantage.

    In this brief, we will explore real-life use cases of AI, differentiate it from machine learning, AGI, and NLP, discuss potential job transformations, and shed light on the limitations and dangers that come with its implementation.

    The key to artificial intelligence has always been the representation

    Jeff Hawkins

    Defining AI, Machine Learning, AGI, and NLP:

    Before diving into the applications, it’s crucial to clarify the distinctions between AI, machine learning (ML), artificial general intelligence (AGI), and NLP. AI refers to the broader concept of machines imitating human intelligence, enabling them to perform tasks that typically require human intelligence, such as problem-solving, decision-making, and natural language understanding.

    On the other hand, ML is a subset of AI that focuses on algorithms and statistical models that allow systems to learn from data without being explicitly programmed.

    AGI, often considered the next step beyond AI, represents machines with the ability to understand, learn, and apply knowledge across multiple domains, akin to human-like intelligence.

    There is, also a less-mentioned subfield of artificial intelligence that focuses on the interaction between computers and human language. This ‘system’ encompasses the ability of machines to understand, interpret, and generate natural language in a way that is meaningful and useful.

    Known as Natural Language Processing (NLP), it combines techniques from linguistics, computer science, and machine learning to enable computers to process, analyze, and respond to human language.

    Some applications of NLP:
    • Virtual Assistants: Virtual assistants like Apple’s Siri, Amazon’s Alexa, and Google Assistant utilize NLP to understand voice commands and respond appropriately. They can perform tasks like setting reminders, playing music, providing weather updates, and answering questions.
    • Sentiment Analysis: NLP techniques are used to analyze and determine the sentiment expressed in text, such as social media posts, customer reviews, or survey responses. This information is valuable for businesses to understand public opinion, customer satisfaction, track trends, and brand perception.
    • Language Translation: NLP is widely used in machine translation systems like Google Translate. These systems employ sophisticated algorithms to process input text in one language and generate the corresponding translation in another language.
    • Chatbots: NLP is essential in creating intelligent chatbots that can understand and respond to user queries. Chatbots are employed in various applications, including customer support, information retrieval, and virtual assistance.
    • Information Extraction: NLP techniques enable the extraction of structured information from unstructured text. This is particularly useful in fields such as data mining, knowledge management, and content analysis.
    • Spam Filtering: NLP plays a vital role in email spam filters by analyzing the content and language patterns to identify and block unwanted or malicious emails.
    • Voice Recognition: NLP powers voice recognition technology, allowing systems to convert spoken words into written text. This technology is used in applications like transcription services, voice assistants, and voice-controlled devices.
    • Medical Text Analysis: NLP is utilized in healthcare to analyze medical literature, patient records, and clinical notes. It helps in extracting valuable insights, automating administrative tasks, and supporting medical decision-making.
    • News Summarization: NLP algorithms can summarize large volumes of news articles or documents, providing users with concise and informative summaries.

    These are just a few examples of how NLP is applied in various domains. Its versatility and potential continue to grow as researchers and developers explore new ways to leverage human language for improved communication and understanding between humans and machines.

    Some Real-World AI Applications in Industry

    AI in Healthcare
    Courtesy of Pixabay

    Healthcare: AI is revolutionizing healthcare by enhancing diagnostics, personalized medicine, and patient care. Companies like Zebra Medical Vision utilize AI algorithms to analyze medical images, improving the early detection of diseases like cancer. AI-powered virtual assistants also assist doctors in accessing patient information quickly, reducing administrative burdens.

    AI in Manufacturing
    AI-Generated Factory. Courtesy of Pixabay

    Manufacturing: Smart factories are embracing AI to optimize production processes, quality control, and predictive maintenance. Companies like Siemens leverage AI algorithms to predict machine failures and prevent downtime, ensuring efficient and uninterrupted operations. AI-driven robots and cobots are streamlining repetitive tasks, improving productivity and employee safety.

    AI in Finance
    Courtesy of Pixabay

    Finance: AI is transforming the finance sector by automating manual tasks, detecting fraud, and improving investment decisions. For instance, PayPal utilizes AI to detect suspicious transactions and prevent fraud in real-time. Robo-advisors powered by AI algorithms analyze vast amounts of financial data to offer personalized investment recommendations to individuals.

    AI in Transportation
    Courtesy of Pixabay

    Transportation: The transportation industry is harnessing AI to enhance safety, efficiency, and sustainability. Self-driving vehicles leverage AI to perceive their surroundings and make real-time decisions, reducing accidents and traffic congestion. Ride-sharing platforms like Uber employ AI algorithms to optimize route planning, reduce waiting times, and enhance the overall customer experience.

    Apple Visio Pro
    Courtesy – Apple Inc

    Design/Entertainment: Overall, AI has significantly impacted the design and entertainment industries by providing new tools, enhancing creativity, improving user experiences, and streamlining various processes. The experiences can thus be enhanced and simplified in Generative Design, UX Design, Data Visualization, Game Development & Virtual Reality (VR), and Augmented Reality (AR) – the Metaverse particularly comes to mind here. Apple’s new ‘Vision Pro’ augmented reality headset is ‘the most advanced’ device to date.

    Job Transformations

    While AI promises immense benefits, there are concerns about job displacement. Routine, repetitive tasks are likely to be automated, leading to changes in the job market. However, AI also creates new opportunities by augmenting human capabilities. Instead of replacing jobs, AI has the potential to transform them, enabling us to focus on complex problem-solving, creativity, and empathy-driven tasks.

    Advertisement

    Limitations and Dangers

    As with any technology, AI has its limitations and potential risks. AI systems heavily rely on data quality, and biased or incomplete datasets can lead to inaccurate outcomes or reinforce societal biases. Ensuring ethical AI practices and addressing algorithmic bias is crucial. Moreover, AI lacks human-like common sense and reasoning abilities, making it prone to errors in unfamiliar situations. The ethical implications of AI, such as privacy concerns and potential misuse of personal data, also require careful consideration.

    Afterthoughts

    The practical and realistic use of AI has already begun reshaping various industries, unlocking new possibilities, and transforming how businesses operate. By embracing AI, organizations can streamline processes, improve decision-making, and unlock insights from massive amounts of data. However, it is essential to navigate the limitations, address ethical concerns, and ensure a human-centric approach to AI implementation.

  • That’s so Meta, Dude!

    That’s so Meta, Dude!

    The adage that whatever you see in science fiction, you will witness in reality, seems to ring true more than ever in the 21st century. In fact, Facebook founder, Mark Zuckerberg is probably one of the biggest believers having bought the virtual reality company, Oculus as far back as 2014.

    Now, he and people from all walks of life are embracing the creation and adoption of a “Metaverse”. 

    But is this a buzz term or a new reality, and are the ultra-rich throwing money at it because they are trying to entertain themselves? Or is it because they actually want to ‘augment’ hundreds of millions of peoples’ senses of reality with beneficial technology? 

    Like many things in life, the truth isn’t black or white in this regard. While multi-dollar billionaires including Elon Musk and Jeff Bezos have looked to build cities in space that we can escape to when the world becomes overpopulated or uninhabitable, others are developing the ‘Metaverse’ as a complementary set of enhancements and parallel spaces for our lives on earth.   

    What is The Metaverse?

    Is the Metaverse more than just ‘sales speak’ for a bunch of sales-speak-for-tech companies? It has been bandied about throughout 2021 but Zuckerberg has been even more brazen, having announced at the end of October that Facebook would be rebranded as Meta. Rather cheeky!

    But what is this swanky new world we may soon be living, and maybe thriving in? I’ve been called Mr. Anderson for over 20 years, so it feels like a fitting time, with the release of the fourth Matrix movie, to ask: “What is the Metaverse(Matrix)?” 

    The Metaverse is a hypothesised iteration of the Internet, that supports persistent online 3-D virtual environments via conventional personal computing, as well as virtual & augmented reality headsets.

    Wikipedia

    It’s still being given a concrete definition but essentially it is an advanced version of the Internet wherein we can become immersed. You don’t just look at the Internet; you are ‘digitally immersed’ in it. Instead of just looking at a 3D object on your PC using a mouse to scroll up and down to see it from different angles, in the Metaverse your brain will convince you that you are in the same world as that object.

    Metaverses, in some limited form, were already present on platforms like VR-Chat or video games like Second Life. These suggest that we have been moving toward living in a Metaverse for years. But why should we care so much now about the Metaverse then?

    Why The Metaverse Matters

    The Metaverse has the potential to bring fulfilment, economic opportunity and equity to people. But, for this to happen, we would probably need a situation where a handful of companies – here’s looking at you Zuckerberg – are prevented from dominating it. The virtual world could overcome the shortcomings of the physical one which humanity has lived on for millennia. Digital environments could become actual places where people don’t only live; but also thrive.

    It is for these reasons that we believe Metaverses will be pervasive across our lives from a young age until our retirement.

    For example, the gaming platform, Roblox might be unknown to well, adults, but this 13-year-old platform is booming. Children and teenagers use this platform to play existing games together but also to create new games. It also sports a marketplace where users can sell those experiences and other products like online outfits and personalized avatars. Another incredibly popular online multiplayer game Fortnite is well poised to switch its huge user-base into ‘Metaversians’. Two upcoming multi-billion dollar gaming platforms built on Blockchain technologies are Decentraland and The Sandbox.

    The former made the news recently when a tech company bought a patch of virtual real estate in the Decentraland metaverse for 618,000 MANA (its native currency) – valued at $3.2 million.

    Virtual ‘land’ and other items (digital assets) in Decentraland are sold in the form of non-fungible tokens (NFTs), which are a class of crypto assets. All of these are authenticated using a Smart Contract component of the blockchain.

    Play-to-earn is another incentive to getting onto the Metaverse. You will now be able to earn virtual tokens (with monetary value) while emersed in your favourite game. This no-brainer strategy has seen an explosion of Blockchain play-to-earn games in the last quarter of 2021.

    Other Use Cases

    Back in the “real working world” virtual productivity platforms are also growing as companies’ employees use MS Teams, Zoom and other platforms to be able to communicate easily and at any time.

    You will be able to now have online offices and attend online conferences in virtual conference centres while represented by avatars. No more suiting up or wasting time on perfect makeup! So, while one can’t stop people from spending time in a cyber world, we can, however, enhance their experiences using cutting-edge technology.

    The opportunities for business and revenue generation will not be limited. Simulations for building and engineering projects will make presentations almost real – without having to travel to the actual sites. Online gambling/shopping companies will also look to capitalise by offering virtual casinos and stores in the Metaverse.

    Marketing Spin-offs

    There are even talks that companies may sell apparel and clothing and are designing virtual versions thereof. Virtual shoes could become status symbols which is rather bizarre but perhaps fun for the nouveau riche. Joke if you want but brands like Gucci, Adidas, and Nike are prepping (with partnerships) to board the Metaverse for obvious marketing opportunities.

    People are rapidly immersing themselves in virtual and augmented reality (VR/AR) worlds. Headsets are becoming more affordable and an assortment of AR/VR programmes are being written daily. These include entertainment programmes for PlayStation 5 as well as for pornography apps (another billion-dollar industry).

    Soon the Metaverse will become a tool that improves our lives and will go beyond being just an entertainment novelty.

    It doesn’t stop here. There is a little-known Metaverse company currently worth $2bn, that has made some major breakthroughs using Blockchain tech. They have actually created a device to scan entire people and objects to immerse them into the digital world.

    The ambitious project, MetaHero will be paying people a decent amount to have their avatars made and used in games from January 2022. Sounds absurd but perhaps you need to take a look yourselves.

    Final Word of Caution

    Bear in mind that the Metaverse may exacerbate problems faced by humans because of the Internet. We need a better grasp of managing data rights, data security, misinformation, the radicalisation of morally wrong ideas such as racism and vaccine hesitancy as well as platform power.

    Somebody needs to rein the likes of Facebook, um I mean Meta, in. We should not just allow the Metaverses to distract millions of us with a ‘wonderful’ cyber world.

  • Digital vulnerabilities

    Digital vulnerabilities

    Global security breaches are on the rise and no one or country is safe. The acceleration of certain technologies has been rapid since the pandemic engulfed the world last year. But unfortunately, we’ve also become slack in the process.

    Once again, it has become apparent just how ‘at-risk’ our data is.

    Data hacks have been frantic and are now getting major press attention. It’s hard to know who each unwanted visitor is in each case but fingers are being pointed in perhaps familiar directions.

    Russian invaders back at it again

    In fact, throughout June, Russians have been blamed for a slew of hacks around the world.

    Microsoft in late May said a wave of Russian cyber-attacks had targeted government agencies and human rights groups in 24 countries, mostly in the US.

    It claimed that around 3000 email accounts of more than 150 different organizations, some of them international, were attacked in just one week.

    Allegedly, the group responsible was the same one that carried out 2020’s SolarWinds attacks, which the Russian Foreign Intelligence Service (SVR) was accused of orchestrating.

    But the Kremlin denied having any knowledge or anything to do with any cyber-attacks. It challenged Microsoft to how these attacks were linked to the European attacks.

    Nevertheless, authorities are now aggressively investigating cybercrime. In the first week of June, the US Justice Department recovered around $2.3m in cryptocurrency ransom money.

    Webscanner

    This was part of the funds paid by the Colonial Pipeline Company to Russian hackers in the most disruptive cyberattack on record in the country.

    The US deputy attorney general Lisa Monaco said investigators had seized 63.7 Bitcoins which was paid by the company after its systems were hacked, leading to massive shortages of petrol along the US’s East Coast. The department said it founded and recaptured the majority of the ransom.

    The hackers are believed to be a group called DarkSide, whose menace caused a multi-day shutdown in certain petrol stations and a spike in gas prices.

    The attack made international news and prompted the US’s White House to encourage business executives to improve security measures to avoid future cyberattacks whatever their nature, ransomware or otherwise.

    The FBI said DarkSide had also disrupted operations at a meatpacking company. As no one tends to be spared in the spillover effects, it is always a good idea to protect your company’s digital assets as a preventative measure.

    Not so sophisticated

    The attackers rather proved to be quite ‘amatuerish’ because they sent the Bitcoins to an online platform to convert it to fiat money – and that is how they got nabbed. Server-hosted (Online) crypto exchanges are obliged to keep customer data for compliance and anti-money laundering practices. So while your Crypto digital wallet does not reveal your identity, pairing it with an exchange will link it to all the other particulars you needed to provide to use the exchange.

    As long as you need cash to pay for things you will always need to switch your crypto in some way or another – unless your recipient agreed to take payment in Crypto as well. Keeping your digital assets on a hard-wallet or on your hard-drive keeps them “off-the-grid”. But also means you can’t actually spend them.

    Although the initial cyberattack was a smart manuever, the attackers proved to be rookies at the robbing game in the end.

    On a positive note: the ability to retrieve Bitcoins actually reinforces the need for a Blockchain-based financial system. This made it easier for the authorities to track movements of the ‘ransom-paid’ Bitcoins.

    Cuban for a bruising

    But politicians aren’t the only people who are urging businesses, civil society organizations, and other groups to improve security systems and be cognisant of an often-dark future.

    US Dollar billionaire Mark Cuban has also called for stricter cryptocurrency regulations.

    The owner of the Dallas Mavericks who has been investing in trading Bitcoin and other cryptocurrencies such as Ethereum said the world was in dire need of regulation for the burgeoning decentralized finance (DeFi) space.

    READ MORE ABOUT DEFI HERE

    Cuban said in an interview with Bloomberg that there “should be regulation to define what a Stablecoin is” in order for DeFi to be reliable and to prevent total collapses in investments.

    This comes after he saw his investments in a particular Stablecoin ‘went to zero’. Cuban claimed he had been scammed.

    Stablecoins are a type of cryptocurrency that is pegged to an underlying asset, or currency – usually the US dollar. They are the earliest forms of DeFi and the largest Stablecoin, Tether, is currently worth more than $62bn.

    DeFi has helped the price of Ethereum, the blockchain on which most DeFi projects are built, to also soar. But they can be highly risky investments.

    Investors try to create arbitrage opportunities and liquidity between coins but such a scheme collapsed for Cuban.

    “There should be regulation to define what a stable coin is and what collateralization is acceptable,” he said.

    trade cryptos
    Buy, Stake, and Trade Cryptos

    Strong words of caution

    Cuban hasn’t revealed how much money he lost but told a fellow DeFi investor via Twitter that regulation must be implemented- and quickly.

    It had been suggested that Cuban was “rugged” which refers to when a project’s liquidity dries up and investors cannot withdraw their cash.

    Mark Cuban is alleged to have 60% of his crypto holdings in Bitcoin, 30% in Ethereum, and 10% held in other coins. He likes to experiment with new financial tech investments.

    He added further in a recent blog post that banks should be scared of unregulated DeFi technology.

    All crypto-based investments remain highly risky as the technology around them develops. But there certainly needs to be global laws to prevent people from losing hefty amounts of their wealth/investment. Cryptocurrency is without a doubt a very lucrative investment vehicle that could make you an overnight millionaire. But that also makes it a perfect vehicle for scammers to clone projects to make away with your hard-earned cash.

    You must, therefore, be extra vigilant and scrutinize offers for instant riches. But more so, you would be quite negligent these days to navigate the Internet without any form of cyber-protection.

  • Be Digitally hack-proof

    Be Digitally hack-proof

    Why do people hack systems? Hacking is a technique used to compromise any digital device. Hackers want to get into your device to use your data for varied reasons – naturally, most of these motives are financially driven.

    A data breach is usually what leads to a hack. There is a difference even though both terms are used interchangeably.

    A data breach happens when data that is left vulnerable in an unsecured environment gets viewed by someone who shouldn’t have access to it.

    While hacks are the result of malicious behavior, breaches happen as a result of negligence, human error, or other non-malicious behavior that creates a security vulnerability.

    Hackers may access your device just to say they could or for financial gain, to protest, or to gather sensitive information.

    So what makes a hacker?

    In the past, a hacker may have been a whiz kid or specialized programmer but in the modern-day, hacking has become easier and more people are becoming hackers. As more people shop online and use computers for everyday tasks, they become the prey of hackers worldwide.

    Actual hacking is technical in nature – the hacker does not communicate with the person whose PC they are hacking into.

    But they can also use psychology to trick the user into clicking on a malicious attachment or providing personal data. These tactics are referred to as social engineering.

    Your cellphone too can be hacked

    While most associate hacking with Windows computers, the Android operating system also offers an inviting target for hackers. That means millions of people who use Samsung phones can be hacked.

    Some fifty years ago, there was a name for hackers who obsessively explored low-tech methods for getting around the secure telecommunication networks and expensive long-distance calls. they were called phreaks.

    This was a portmanteau of the words phone and freaks. They were a defined subculture in the 1970s, and their activity was called phreaking.

    Phreakers have now evolved out of the ‘analog technology era’ to become hackers in the digital world. They are beyond a sub-culture and have become a genuine threat to the safety of our information and data.

    Mobile phone hackers currently use a variety of methods to access your mobile phone and can intercept phone calls, voicemails, text messages, and even the phone’s microphone and camera, all without your permission or even knowledge.

    iPhones are not safe either

    In 2020, many journalists working for Al Jazeera were victims of a sophisticated zero-click spyware attack.

    The Toronto-based internet watchdog group Citizen Lab was asked to look into the attacks, which took place in July and August, and they released their findings at the end of December.

    The report found that 36 journalists, producers, anchors, and executives had their iPhones compromised by Pegasus spyware. The spyware, developed and sold by an Israeli-based firm called NSO Group, targets security vulnerabilities in the iMessage app.

    The so-called “zero-click” exploit deploys without any user interaction. Once installed, it can record ambient sound and phone conversations, take pictures, and access user credentials. It sounds like science fiction but it’s very much real!

    Types of hacks

    Malware

    People can use hardware to sneak malware into your PC. In offices, hackers will infiltrate networks by giving staff members infected USB sticks, dodgy USB cables, and mouse chords.

    It is crucial to always think before plugging anything into your work or personal device with access to confidential data.

    Educate your staff about being careful before plugging anything into their PCs.

    Malware infections generally occur when users interact with dangerous code by clicking on a URL or downloading malicious software disguised as an authentic program. But zero-click spyware penetrates devices without any user interaction.

    Citizen recommends making sure that your mobile OS is updated to the latest version. Identified vulnerabilities in previous versions of iOS were patched in the iOS 14 update.

    Practicing good digital hygiene is always important for the security of your mobile devices.

    Use sites like haveibeenpwned.com and breachalarm.com to see if your email credentials have been compromised. Use strong passwords on any apps that contain sensitive data and delete any apps that you do not regularly use.

    Missing security patches

    Always remember to update your security tools. Too many people ignore update notifications or security patches, leaving themselves vulnerable. It’s not just antivirus software that needs patching.

    Tell your staff to ensure that all their antivirus and applications are routinely updated as security patches become available. This task is usually the job of your IT department if you have one in the first place.

    Getting your password information

    Hackers can obtain your credentials through several means, but commonly they do so through a practice called keystroke logging or keylogging.

    Can you believe that the most common password is “123456”? Hopefully, yours isn’t so, or any of the most hacked passwords in the last 10 years.

    Through a social engineering attack, you could accidentally download software that records your keystrokes, saving your usernames and passwords as you enter them.

    This and other forms of spyware are malware that tracks your activity until a hacker has what they need to break into your system.

    Attackers can deploy malware on a user’s machine if they are in your environment and capture your credentials via keylogging too.

    Hackers also use password cracking programs that can run letter and character combinations, guessing passwords in a matter of minutes, or even seconds.

    To get around this, use a password management tool that securely houses your company’s credentials. These tools can often auto-generate lengthy, diverse character passwords that are difficult for hackers to guess. They can also autofill for your employees for easy access to their tools.

    Encryption and multi-factor authentication methods also offer more layers of protection.

    Distributed Denial-of-Service (DDoS)

    Acunetix

    This technique involves taking down a website so that a user cannot access it or deliver their service. DoS attacks take place when hackers inundate a target’s server with large influxes of traffic. The amount is so frequent and high that it overloads the server by giving it more requests than it can handle. This crashes your server and your company’s website.

    Larger businesses can get hit by a Distributed Denial of Service (DDoS) attack, which is a synchronized attack on more than one server or website, potentially taking down numerous online assets. 

    A good method to fight DDoS attacks is to use cloud protection services to spot them – like Acunetix or Netsparker.

    Social Engineering & Phishing

    This is where hackers try to get your personal information, often by impersonating a legitimate and maybe trusted source.

    Many types of social engineering bait come in the form of phishing emails.

    A hacker sends you a message that looks like it’s from someone you know, asking you to do something, like wire them money, or to click or download an infected attachment to see more. 

    Here is a hilarious example of a phishing Email

    “The top malicious email attachment types are .doc and .dot which make up 37%. The next highest is .exe at 19.5%,” according to a report by Symantec. Always be cautious of opening these types of attachments.

    Warn your employees to never give out private business information over email, to think before opening any attachments, and educate them on mail scams.

    Use email software that scans for phishing. Microsoft 365 and Google’s Business packages come equipped with such. Google’s tech uses AI to scan the content and find things such as spelling errors and dodgy URLs. This enables the system to block them before they even hit your inbox.

    Most people or companies that get hacked or suffer from a data breach do so mainly due to negligence. Many do not prioritize beefing up their security systems before it is too late. Hacks are, however, completely avoidable so don’t fall victim to them.

    Other ways to protect yourself

    • Download a reliable anti-malware product that can both detect and neutralize malware and block connections to malicious phishing websites.
    • Of course, whether you are on Windows, Android, a Mac, an iPhone, or in a business network, you must always use layered protection wherever you can.
    • Only download phone apps from the legitimate marketplaces that police themselves for malware-carrying apps, such as Google Play and the Apple/Amazon Appstore.
    • Check the ratings and reviews first. If it has a low rating and barely any downloads, it might be best to avoid that app.
    • Use long and complex passwords. Don’t use numbers in sequence. You can also use mixes of letters that can be remembered through rhymes.
    • Consider using a password manager.
    Advert
  • 2020: Year of the PC

    2020: Year of the PC

    People will always find an opportunity in a crisis. This year has been one of the strangest years we will ever experience. Because of the global pandemic, we have been ‘shut-in’ physically and mentally. Hiding in our homes in an effort to save the lives of the elderly and sickly.

    Technologies that enable people to communicate with each other from different locations and work remotely have had an excellent year because of this.

    Who needs phones & email?

    The pandemic may have stopped us from having face-to-face meetings because of self-isolation and social distancing. So just like that, we all needed to have online meetings and digital collaborative meetups.

    In 2020, we just stopped phoning people. We needed to see what other humans looked like. So, we engaged more in video calling, using whatever technology available that supports that functionality.

    The online video-conferencing tool Zoom, therefore, went from being a company you’d probably never heard of, to global ‘overnight’ success. It was founded in 2011 by Eric Yuan, a former Cisco engineer, and executive, who then launched it in 2013 as software for companies. It was valued at $1bn in 2017 because it enjoyed very strong revenue growth and was easy to use, and became profitable in 2019, and listed on the Nasdaq.

    “You’re on Mute! “

    Quote of 2020

    Come early 2020, Zoom entered a boom period as most of us used it while in quarantine. Its share price, therefore, grew more than 490% from $68.72 to around $406.

    MS Teams, Microsoft’s answer to Zoom. is believed by many to be more reliable and secure than Zoom – which suffered a major breach earlier in the year. Google’s Meet also features on the list of top video calling/conferencing apps.


    We won’t delve into comparison here. The pros and cons are highly dependant on what you use it for and your business size/budget. The usage stats below speak volumes though albeit just for the two major economies.

    Other tools

    When we weren’t working, we were using social communication applications such as House Party which, apart from allowing you to stream music and play virtual DJ, enabled you to play games with one another.

    They were mostly silly general knowledge games but hangman made a welcome comeback to society thanks to this app.

    Discord, an American Voice over Internet Protocol (VoIP) that uses instant messaging and runs a digital distribution platform also gained new users. It no longer just relies on gamers and people in creative computer development roles to drive its usage.

    The Home Office

    We started (forcibly) working from home and those who believe it made them more efficient and productive are considering carrying on with it in 2021.
    The working from home concept, therefore, changed from being something associated with putting in half the effort and lazy lie-ins.

    Companies at least in the developed world, have to offer the option of working from home. Like any viral pandemic, Coronavirus will still be around in 2021 as the vaccine could take a while to ‘take effect’. Working from home isn’t disappearing any time soon!

    To operate a home office though, you need to have an advanced enough computer system, the right anti-virus software, and other methods of securing your work. Companies became concerned that people were using their personal computers to log onto work servers and bringing problems along with that. It’s not just good enough to get a laptop to have a ‘home office’.

    We have also had to set up reliable phone systems for business. Landlines are becoming old-fashioned plus virtual phone systems that are simple to set up and use are becoming popular.

    Smart speakers are also becoming popular. You can use them to play music via Spotify or the radio but can also be used to create the right audio ambience for your meetings and remind you about important events, tasks, and meetings.

    It’s all about getting tech products and virtual assistants to make working easier. People also invested in better desks and other office accessories such as computer or mobile-phone-operated coffee machines. Yes, those do exist! Expect the internet of things (IoT) to play a bigger role in your life next year and beyond.

    Cybercrime on fleek

    Naturally, because we are all forced online, this is no better time for cyber-thugs. They have upped the ante with cleverer ways to dupe you out of your already diminishing funds. Here some of the highlights of 2020 when it comes to crime on the web according to cybersecurity provider ID Agent:

    A cyberattack is attempted every 39 seconds.
    -700 million people in 21 countries experienced some form of cybercrime.
    The damage related to cybercrime is projected to hit $6 trillion annually by 2021.
    -Ransomware attacks rose 148% in March 2020.
    -Cloud-based attacks rose 630% between January and April 2020.
    -Two in five SMBs have been the victim of a ransomware attack.
    -More than 80% of reported cyberattacks are phishing.
    -Phishing attempts have increased by more than 660% since March 1, 2020.
    -Organized crime gangs account for 55% of attacks.

    The rise of AMD

    Chipmaker AMD has had a stellar year as it has brought out some of the most advanced (yet affordable) computer chips ever built and has managed to outshine rival behemoth, Intel.

    Its share price on the Nasdaq bounced from $49.10 to about $95.92. The company has been a runaway success story, especially over the past five years. At the end of December 2015, AMD stock was a paltry $2.87, that’s 3242% growth in half a decade!

    Another contributing factor for the company’s success is that AMD’s Ryzen line of processors has been a huge hit since its release. They are used in some of the best mining CPUs money can buy.

    Mining is the process of acquiring Bitcoins and other Cryptocurrencies using special software together with your PC’s hashing power.

    Crypto makes a comeback!

    Cryptocurrencies Bitcoin and Ethereum experienced returns of more than 216% and 390% year-to-date respectively.
    The argument is that institutional investors including some of the world’s largest finance houses and banks are now backing the world’s most popular digital currency.

    This is despite the fact that most ‘9-5 people’ are not using Bitcoin to buy much on a daily basis – but this trend is changing.
    It is still purported to be a means for criminals and drug dealers to help avoid banking authorities from checking their transactions. Or maybe that is just an underground rumour (or FUD) created by the fearful banking system.

    But seriously, a few things are speculated to be behind the Crypto surge.
    The US Federal Reserve cut interest rates, loaned more than $1.5 trillion to banks and financial institutions. It also increased its purchases of US treasury securities to stabilize the economy when the pandemic struck.
    This response was very strong and helped to weaken the effects of a national lockdown on the largest economy in the world.

    These actions created a favourable ‘macro environment’ in which to invest in an asset that is perceived as very risky given its lack of use and lack of clarity around what it can be used for. The high returns compared to Gold, interest-bearing and other traditional assets have certainly got the major asset managers excited.


    The second trend that propelled cryptocurrencies was the above-mentioned expansion of digital life. This may have lead to more investors feeling comfortable using a digital wallet. From payment systems, storage, finance, to gaming, gambling and sports: There is now literally a crypto-based coin for anything under the sun! This digital transformation has even prompted global Central Banks to seriously consider a move away from paper money.

    The Future

    Our lives are progressively going digital. Many older people who had never used a computer to shop online before, did so for the first time in 2020. They also using messaging apps for the first time as well as streaming entertainment services such as Netflix, Hulu, Amazon Prime, and Disney Plus.

    To sum up, the year 2020 has been an abomination of a year. Who knows what 2021 will bring? Maybe (tech-driven) Tesla stock will keep on rallying after successfully listing on the S&P500. But maybe also because owner, Elon Musk kind of took an interest to Bitcoin. This year has indefinitely made us aware of two things: proper sanitization and the practical use of computers.

  • Technology contained

    Technology contained

    Over the past decade container technology has become a popular method for packaging applications in an effective way. Some developers believe is better than that offered by virtual machines and other technologies.

    Container technology has been embraced by the big cloud computing providers including Microsoft Azure, Amazon Web Services, and Google’s Cloud platform.


    Examples of the actual container software include the Apache Mesos, Docker, rkt (pronounced rocket), and Kubernetes.

    But what is container technology?

    Logically, it gets its name from shipping. Shipping containers standardize how goods are moved around. Goods get placed in steel shipping containers which can be picked up by cranes and fit into ships. They tend to have standard sizes.

    By standardizing the process and keeping the items together, your container can be moved as a unit and it costs less to do it this way.


    In computer terms, container technology is referred to as just a container: a method to package your applications so they can be run, with their dependencies, isolated from other processes.

    Container technology decreases the potential for problems when developers move programs from server to server before the program is in a state where it is saleable.

    When you use container technology to create an application, you can code everything using just one operating system and database. This makes the application quite easy to replicate as resources including memory and the central processing unit (CPU) are shared. This also makes your technology great for scaling and for working within the cloud.

    Out with the old…

    If you don’t use container technology, you can have a situation where a program runs well on one machine but has problems on your server. This common problem occurs when you move a program from a data server to a cloud server.

    Many issues can happen because of variations in machine environments. These include differences between your operating system, secure sockets layer libraries, storage, and network topology.

    So, computer container technology picks up all of your software and related parts which include dependencies, being libraries, binaries, and configuration files. They all get migrated as a unit, avoiding the differences between machines including operating system differences. This will also include underlying hardware that leads to incompatibilities and crashes.

    web scanner

    And, importantly, containers also facilitate the deployment of your software to your server. Advocates of using container technology say it is a much better tech to use than that which preceded it – virtual machines.

    In this case, one physical server would be used for multiple applications through visualization technology. Each virtual machine contains the entire operating system, as well as the application to run.

    The physical server then runs several virtual machines, each with its own operating system, with a single hypervisor emulation layer on top. By running several operating systems simultaneously, you incur a lot of overheads on your server as resources get used.

    …and in with the new

    Container technology allows your server to run a single operating system because each container can share that system.

    The parts of your operating system that are shared are read-only to not interfere with the other containers. Therefore, compared with virtual machines, containers require fewer resources of the server, and are much more efficient.

    You can pack many more containers onto a single server. Each virtual machine may require you to have gigabytes of storage. But each container running a similar program may only need megabytes.

    How do the containers operate?

    Containers are set up in an architecture known as a container cluster. Then, in a container cluster, there is a single cluster master, with the other related containers set as nodes, that are your multiple worker machines. The cluster master schedules the workloads for your nodes, and also to manage their lifecycle, and their upgrades.

    Containers allow programs to be broken down into smaller pieces, which are known as microservices.

    A major advantage of having a program as component microservices is that different teams can work on each of the containers separately as long as the interactions between the different containers are maintained. This facilitates faster software development.

    Containers are also flexible and can be orchestrated. Since the operating system would be already running your server, a container can be started and stopped in just a few seconds.

    Some containers within architecture can be turned on during peak demand, and turned down when not needed.
    The software can control this type of orchestration, and distribute the tasks among the container cluster.

    The way forward with the tech

    But is container technology overrated? Some people are concerned about the security around it.

    Because multiple containers share the same operating system, there are growing concerns that container technology is less secure than virtual machines. If there is a security flaw in your host kernel it will affect your multiple containers.

    Other software is being used to have more secure container technology. The use of isolated containers is, therefore, being constantly improved.

  • Forced digitization

    Forced digitization

    If you are reading this, you are probably couped up in your home, apartment, or wherever you have been forced to settle for a couple of months.

    Local stores ran out of toilet paper, rice, and other ‘essential’ supplies but what also flew off shelves were laptops, printers, webcams, and modems. Let’s not mention the millions of software and apps that are downloading every second.

    Retailers are also running out of printer paper because some of us are still hooked on paper despite the invention of emails and digital signing.

    State of play

    Pic courtesy of Pixabay

    The term ‘home office‘ is no more a privilege for those people in senior management or for entrepreneurs – we all have to do it now.

    The coronavirus has shifted the way we integrate digitally – more people are learning how to use video-conferencing and collaboration tools.


    But how long can businesses afford to pay people to babysit their kids, watch funny cat videos, binge on Netflix, and have meaningless conferences on Zoom?

    One can only imagine the frustration you are going through to set up your home offices. Installing/using software and the correct drivers for devices can get a little techy.

    Professional Web conferencing with Microsoft 365

    Let’s be frank, nowadays, no ‘IT guy or gal’ in their right mind would risk, or be willing to pay house calls to help with these installations. You will, therefore, need to familiarise yourself with finding the right remote tech support or by watching Youtube videos to guide you along. Most cloud providers like Google have an online help site. Microsoft also has a great support site to help with basic office set up.

    There are many of you, on the other hand, who have some working knowledge of computers but just need the right tools to facilitate your home working experience.

    Broadband needs

    So first things first – you need the Internet!

    Without this, you might as well go outside and risk infection. Or better, get hauled to prison for breaking national isolation laws for a few months. You might even get better forms of entertainment in your local hospital or prison.

    Back to the serious stuff…

    Research has shown that a ‘standard’ broadband Internet connection has a minimum download speed of 25 Mbps and a minimum upload speed of 3 Mbps. This serves as a baseline for determining fast and slow internet speeds.

    Speeds much faster than that (100 Mbps and above) are therefore considered “fast” Internet.

    Here’s how long it would take in hours, minutes and seconds to download a 4 GB file at various speeds.

    1 Mbps10 Mbps25 Mbps50 Mbps100 Mbps200 Mbps400 Mbps1,000 Mbps
    9:32:390:57:150:22:540:11:270:05:430:02:510:01:250:00:34

    Upload speeds (generally offered at much slower speeds ) come into play with things like video-conferencing or uploading large files to a server/cloud. It is good to pay attention to those as well. As a guide, 5 Mbps and above are good upload speeds.

    So based on the above, and what activities you perform online, you can now have an idea of which packages to go for if you need to upgrade or change your Internet Service Provider (ISP) altogether. If you are not sure what your current speed is, take a free speed test here.

    For those living in Germany, there is a local speed test which is monitored by the government to ensure the ISPs adhere to speeds promised to clients.

    Kitting up

    Once that is sorted you can shop for a good PC, laptop, or other accessories – bearing in mind that performance depends on the specs of the machine you choose.

    This can include the quality of the network card built into your device that enables you to maximize the broadband package’s top speeds. For more advice on choosing the right device that you need for optimum performance, give us a shout.

    Take a look at our resources page for a list of available software tools to help with communication and collaboration. Naturally, we all have our favourites so we will not advocate for one specifically.

    Debunqed, however, does supply some of the best brands (with enhanced security features) so check out our online store.

    Lastly, as tedious as it sounds, please ensure that you have adequate anti-virus, anti-hacking, malware, and anti-phishing (for emails) software. We cannot stress how many online scammers have become super active in this period. Some of them are even offering “help” fighting against the Coronavirus.

    Some cyber-criminals offer desperate people who have lost their jobs ‘a chance to work from home’. It’s all the same, a word to the wise is enough. Be safe when it comes to self-isolation and hygiene – but also online!

    Speak to us for a more detailed free consultation on how to best setup at home. At the global rate of the spread of the Coronavirus, this home office phase might be a thing for the rest of 2020.

  • The startup tech kit

    The startup tech kit

    New business? You’re going to need some basic software!

    In this modern-day and age, it may seem that small businesses do not require a plethora of technological tools in order to succeed, but it’s worth investigating which technologies can give you an edge. This is especially crucial if you are not offering a niche product or service and have to compete with an army of existing players in your industry.

    Accounting, CRM, marketing, analytics, taxation and other useful software may have just levelled the playing field between small and big businesses. The challenge is to choose the right one to help you grow quickly at the least expense.

    You will, nevertheless, if you are even to make a first impression, need some basic software regardless of your trade.

     HERE IS WHAT YOU WILL NEED 

    Almost everybody needs some kind of online presence. You’re a business and while social media is helpful (more on that later), a website is where you will be found by prospective clients or business partners. You can build one easily these days via a paid content manager provider such as WordPress or Wix.

    They will even provide and host your domain if you don’t have one.

    If you do not, however, have the time nor the energy to create one yourself, there are cost-effective alternatives such as outsourcing the building to a web-designer. They can do it remotely and the safest way  would be through a regulated marketplace such as Fiverr* or Upwork.

    *Debunqed can recommend a designer known as aceholder on Fiverr.

    Email

    You need to be contactable. In the old days, you got away with Yahoo or Google email but now you need an email service that can host a domain. The free emails are also not secure and subjected to heaps of spam.

    Email hosting is a service in which your email messages and associated files are all stored on a server. When you receive an email to your website’s domain address, that email is routed across the Internet and stored on the recipient server.

    A hosting service stores the files that make up a website on a data server which then uploads them directly to the web.

    This gives you an Internet connection and way for your customers to access the site through a domain name.

    Web hosting services often come with a slew of options for designing sites. These include the one-click installation of supported applications such as a service mailbox.  Wix partners with Microsoft’s Office 365 for mail hosting whilst WordPress works seamlessly with Gmail/GSuite.

    Task Management System/ Job Manager

    Being organised from the beginning isn’t a good idea; it’s a great idea! Get yourself a system which tracks your sales and logs the deliverables that each employee completes.

    There are an array of CRM solutions focusing on different tasks from customer services or sales to project management and full-on finance and back office (ERP) operations (more on this later).

    The key is to start small many of these offer trials but also some even offer a free package naturally with limited functionality. Figure out which tasks are important in order to choose the right package to handle your scheduling, sales and tasks. A simple calendar/scheduler via MS Outlook and Office 365 (Microsoft Bookings) can be a good place to start for a paid but fully functional service.

    Payroll and Accounting Systems

    You need to keep accurate books and not to rip off your employees. You’re a start-up; play the numbers by the books. And a word of caution: don’t ever cook the books!

    There is a huge choice of accounting (and back office) systems to choose from. The big names are probably out of reach so like a CRM system, you might want to shop around and start with smaller but a reputable brand like Quickbooks.

    But if you go for an Office 365 solution, you might as well look into something like Dynamics 365. One of their entry-level finance packages (Business Central) has all the ‘bells and whistles’ for a Startup to help get your books up to date for the taxman/audit.

    You also need to monitor your payroll – this service can be added by upgrading to a bigger package under Microsoft Dynamics family. You could also shop around for payroll software if you are on a tight budget.

    Project management and support logging system

    Once you build up a workable database of existing and potential clients, you will require some kind of logging system to handle customer queries.

    This will help you keep tags of what customers are having issues with. If they are repeated issues, then you know there is a recurring problem with your operations or an aspect of your business.

    A good ticketing system will allow you to keep a knowledge base with instructions to help your staff with how to deal with recurring issues quickly.

    Shopping cart software

    If your products are sold online or does not come from a physical store, this is the mandatory software that enables you sell goods online. It is designed to quickly process debit and credit cards transactions but also allows your customers to use their PayPal and other payment methods – even Cryptocurrency.

    A good shopping cart package also does inventory management, calculates packaging costs, shipping costs and taxes.

    Security and Anti-Virus software

    Always protect your Internet connection and your sensitive data against viruses, spyware, malware, worms and Trojans.

    Most of the packages mentioned before come with in-built security measures such as sign-in authentication.

    But these are not enough and you will need to source software to prevent a hack if you are dealing with extra sensitive data like patents, medical and financial records/accounts.  Read our feature on Online Threats for more on this.

    Cloud storage

    This is a place where you can store large files as well askeep backups of files. Hardware can break. You could drop your 2-terabyte portable flash drive but at least your work will be safe in the cloud. 

    Once in the cloud, things can get disorganised (many files and folders) and sorting them can become a pain. The top file storage providers include, Microsoft’s SharePoint Online and OneDrive; Google’s Drive, Amazon’s S- series and Dropbox.   

    There are some really great add-ons like a Digital Asset Management (DAM) tool for those dealing daily with tons of documents and images by Pic.io. This software works specifically with GoogleDrive.

    Social media

    We have by now affirmed that you need a CRM system. With many choices of companies to buy products from for example,  treating individual customers’ needs is very important.

    A good CRM system will help you reach out to your customers where ever they are – online or offline. This is known as Social Engagement.

    That, coupled with a powerful Business Intelligence tool, can help you leapfrog over your competitors with useful insights such as peak traffic times on your website, purchase habits and other characteristics of your client that will help you accurately predict potential revenues.

    Find the best CRM platform that allows for social engagement, then set up whatever social network accounts that suit your business.

    Webinar services

    Remember you are doing business with groups from around the world.

    Online communication tools, therefore, enable you conduct presentations and meetings over the Internet. This saves time and money associated with travelling costs whilst giving you access to markets outside your area, city or country.

    Some of the most popular/effective communication tools includes those included in the Microsoft (Skype and Teams) and Google (Hangouts & Voice) bundles. There are also free standalones like Zoom.

    Depending on your frequency of calls and audience size needs you can stick with the free version and then scale up to a paid subscription later.  You can also run training sessions and product demonstrations and even replace your whole phone system with them. 

    Online Surveys and other Marketing Tools

    Marketing is is the lifeblood of a company. It’s a key sales-driver and if you aren’t selling, you’re going out of business! Conduct market research using online tools such as SurveyMonkey and collect emails through opt-in forms. These valuable insights can be used  in targeted email marketing campaigns.

    The most advanced and widely recognised mail marketing tool is Mailchimp. It starts with a free version with 7 marketing channels and goes up to $299 per month for large companies with 200000-plus contacts. Most bundled Office solutions will allow you to add Mailchimp as a plug-in to your existing mailbox.

    Conclusion

    Technology constantly changes and it’s hard to keep up – so don’t. Get the basics right first and add technological services and tools as you grow. Rather understand what each button does first before you spend money on a whole super system.

  • A decentralised solution

    A decentralised solution

    Did you know that there are still more than 700 million people in the world who live in extreme poverty? These people must scrimp, starve, and struggle to survive off less than $1.90 per day.

    By 2030, the World Bank estimates that more than 90 percent of those people will be concentrated in Sub-Saharan Africa.

    This is perhaps one of the greatest developmental failures of the modern world. Despite the continent’s expansive natural resources and increasing connectivity, foreign actors still feel it’s too risky to heavily invest in their markets.

    Blockchain could be the key! 

    Bitcoin and “Blockchain” were created in the mass wave of distrust in banks after the 2008 financial crisis. Therefore, the technology enables individual, distributed data storage that could become the perfect evidence (trust) base and financial infrastructure for a developing country.

    With the right implementation, Blockchain holds the potential to completely revolutionize and revitalize such economies, especially in Sub-Saharan Africa.

    So, what is this Blockchain?

    Blockchain is essentially a kind of decentralized database that allows you to have a safe, secure way to handle their data without the need for third parties.

    How Blockchain works

    For example, you could with Bitcoin, make or accept payments in real-time without needing a centralized bank.

    “[It is] a way for one Internet user to transfer a unique piece of digital property to another Internet user, such that the transfer is guaranteed to be safe and secure, everyone knows that the transfer has taken place, and nobody can challenge the legitimacy of the transfer,” said software entrepreneur Marc Andreessen.

    “The consequences of this breakthrough are hard to overstate.”

    Historic background

    Until the mid-twentieth century, most of Africa was ruled under a colonial system meant to exploit the people and their natural resources for European benefit. Africans, in addition, were rushed into development according to European standards rather than homegrown ones.

    The legacy of rapid development, distrust and corruption left behind an economic system failing to recover in the 21st century.

    While the World Bank celebrates a decrease in global poverty levels, the number is expected to remain stagnant in Africa. Today’s poorest people are living in places with the least economic growth.

    Sadly enough, poverty and lack of investment in many developing countries stem from how they were integrated into the world system.

    The land was cut into countries according to European treaties and agreements, rather than by traditional and tribal land divisions. This situation worsened upon the handover of colonial power to so-called “democracies.” Power often shifted to the ethnic groups that former colonizers favoured.

    Corruption multiplied in the form of bribes, political persecution, rigged elections, and a massive wealth gap. All of this still affects the wealth distribution and investment potentials of many developing countries.

    Of course, this created a lack of trust in banks and government throughout much of Sub-Saharan Africa.

    The perfect fit for Africa

    During a 2012 study conducted in rural Western Kenya, Stanford University researchers waived the costs of opening basic savings accounts for a number of unbanked individuals.

    While 63 percent of the subjects opened an account, only 18 percent of them used the accounts. This was likely due to three factors: a lack of trust in banks, unreliable service and prohibitive withdrawal fees.

    Unfortunately, the prevalence of unbanked individuals in the informal sectors scares off foreign investors, who heavily rely on transactional evidence to make investments. Otherwise, pouring money into markets is too risky. That’s where Blockchain comes in.

    How would it work?

    Blockchain can host an entire evidence base of transactions, loan repayments, and asset titles. The technology is also decentralized and requires individual confirmation, creating an element of trust and transparency beyond traditional banking systems.

    SmartContracts

    According to Victor Olorunfemi, Director of Products for Pan-African tech and crypto-exchange, KuBitX, Blockchain’s major benefits lie in “frictionless P2P and cross-border payments, transparent elections, land registry management [and] transparent crowdfunding.”

    Let’s look at some of the different ways Blockchain could benefit developing economies, especially in Sub-Saharan Africa.

    1. Creating financial infrastructure and accountability

    According to a study by the Milken Institute, viable financial markets require consistent, accurate data on assets and credit histories. Luckily, Blockchain may fulfil these needs.

    The use of Smart Contracts technology is ideal in areas lacking accountability, such as the real estate or land/agricultural sectors. In Africa, a lack of record-keeping practices often leads to “missing” or non-existent title deeds. In some cases, this is intentional.

    Title deeds “go missing,” only to end up in the hands of benefactors other than the rightful owners. Smart Contracts could eradicate these issues through the use of special tokens that cannot be duplicated, changed or removed. See the article on tokenization.

    Likewise, Bitland, a company in Ghana, currently helps individuals record deeds and land surveys. By resolving land disputes, Bitland creates more stability while accurately recording land asset data.

    “There’s a massive number of people in the informal sector, but there’s not much data being collected on them right now.”

    Merit Webster, co-president of the MIT Sloan Africa Business Club.

    “That means you don’t have that credit history or payment history for them. If you have a decentralized approach to collecting data, you end up with more malleable data. [This] is very valuable for creating credit histories.”
    The agricultural industry also has the potential to thrive using Blockchain.

    “Blockchain could be used to track goods around the world. This allows farmers to earn a fair wage for their goods.”

    Also, farmers could use record-keeping technology to streamline the supply chain and document resources. This would lead to better efficiency, lower transactional costs, and improved logistics.

    2. Security in banking

    According to the World Bank, there were 1.7 billion people with no bank account in 2017. This situation is worst in developing countries, especially African ones. For example, over 62 million of these people lived in Nigeria.

    Besides, data from Google Trends reveal that Lagos, one of Nigeria’s biggest cities, ranks globally as the number one city based on the volume of online searches for Bitcoin (BTC). Clearly, for the city’s 21 million-odd people, there an immense interest in some form of an accessible payment system.

    Of course, it’s unrealistic to expect bank branches to magically appear in every remote corner of the world. However, a digital database using Blockchain technologies has the potential to reach far beyond physical banks.

    Ad: N26 Bank

    Many Africans value trust and transparency. In developing countries, this lack of trust goes beyond the Internet. Developing countries with less industrialization tend to have higher levels of corruption.

    This reduces national investment opportunities in the public sector and instills a lack of trust in centralized oligarchs handling an international investment.

    Because its power lies within the community of users, Blockchain can combat these trust issues. All data logs and amendments must pass through this community and identification confirmation tests.

    Blockchain technology also secures your data incredibly. Hacking and data breaches are all too common nowadays. In 2017, for example, around 3 billion Yahoo user accounts were stolen.

    When information is stored in the same place, hackers have one, easy target. In contrast, Blockchain is a distributed entity. This dissemination of data leaves it far less vulnerable to cyberattacks.

    3. Fostering Entrepreneurship

    Coupled with the Internet, Blockchain technology could be the perfect platform for aspiring African developers. Because the ‘source code’ is free of charge, skilled coders can adapt, create, and configure special applications, called DApps.

    These are available on Crypto platforms and provided by companies like Ethereum, and a South African firm specializing in what they called the Keto-Coin.

    Rather than waiting for governments to drag their feet trying to create jobs—individuals on the continent can form small firms that build and sell Crypto-based Apps locally or abroad.

    “Despite the frictions and impediments mentioned,” said Olorunfemi. “Blockchain can still provide an avenue for promising African tech projects to access capital (FDI) via token offerings on digital assets exchanges.”

    Many courses are even readily available online to quickly learn about new technology. Microsoft, for instance, offers a platform via Azure for you to build and learn about the Blockchain.

    One-man shops in countries with unfavourable economic systems, like Zimbabwe, can also adopt smaller, stable, Cryptocurrencies to facilitate or payments. In cases of rampant inflation, they can temporarily act as a store of value or help you pay for things until your currency stabilizes.

    As with the Venezuelan hyperinflation case study, Cryptocurrency intervention could help many developing countries troubled with economic instability.

    There is also the option of Crypto-mining. But before you pull out the ‘high-consumption energy’ argument – think outside the box for a moment. What about energy sources that are free and available nearly 24/7? Like water and the sun!

    The African continent is full of capable scientists and mechanical engineers. One could build special solar-powered energy centers to power Bitcoin-mining.

    And without the expertise, governments or private companies could alternatively just invite Crypto companies with abundant financial resources to mine (cleanly) for a special tax/fee while creating jobs for the locals.

    4. Elections

    In addition to the financial side of things, Blockchain technology could help eliminate some forms of corruption. For example, many African countries’ elections are incredibly vulnerable to the social scourge. In some extreme cases, some officials change or forge written ballot votes to rig elections.

    Corruption


    To combat this, Blockchain databases could record votes. This makes it nearly impossible to tamper with using Smart Contract technology. Having fair elections improves infrastructure, which then increases development and economic dependability.

    Blockchain non-profit company Cardano, this year, has partnered with the Ethiopian government to battle these issues specifically.

    5. Leapfrogging

    While some might see Africa’s economy as underdeveloped, others might see it as a blank canvas well-suited for a large-scale implementation of Blockchain. Economic and governmental systems are shifting and slightly shaky in many Sub-Saharan African nations.

    MPesa

    The challenge is to foster a rigid economic system to implement Blockchain.

    Don’t just take our word for it—African nations have often implemented new, practical technologies before the Western world. Let’s look at the example of M-Pesa. Back in 2014, Americans and Europeans were amazed by Apple Pay’s launch.

    However, this mobile payment system wasn’t exactly “new.” By that time, Kenyans had used M-Pesa, a very similar technology, for years.

    “There’s a lot of opportunity to leapfrog the way the West developed and have these more unique African solutions, but it needs to come from within,” said Webster.

    “It needs to come from entrepreneurs in the continent who want to implement these solutions. It’s important to engage people very early on. Systems incubated in the West don’t stand as great of a chance to work as African ones do.”

    Concluding remarks

    With the possibility of an experimental, large-scale takeover of Blockchain technology to improve African infrastructure, the nations there could leapfrog in development and growth.

    This must begin internally. According to Olorunfemi, “Education—of policymakers and other stakeholders—which is often ignored has to be a critical factor in paving the way for the acceptance and adoption of new technologies and the accompanying investment.”

    The results in Sub-Saharan African countries could help eliminate much of the world’s poverty. It would also remove remnants of mistrust and corruption left behind by the days of colonial exploitation.

    While there are some obstacles to large-scale Blockchain implementation, we can’t think of a better benefactor than there. The possibilities for business using the Blockchain are endless!

    To learn more about how to get started with Cryptocurrency mining or purchasing, visit our resources page for useful links and guides.


    Additional input by Bobby Quarshie (BQ). 
    Citations: Christopher Lee and Jackson Mueller. 
    Swan, Melanie. “Anticipating the Economic Benefits of Blockchain.” Technology Innovation Management Review 7.10. Oct. 2017.
    Bitcoin Lessons from Venezuela, Where Hyperinflation Reigns. Online Source: https://www.lathropgage.com/newsletter-237.html
  • Cloud-hosted services square up

    Cloud-hosted services square up

    Running your business requires choosing the right tools for you and your employees. In order to streamline work-related productivity, many organizations are migrating to cloud-based office suites. Specifically, Microsoft’s Office 365 and Google’s GSuite (now known as Google Workspace).

    Both products boast a variety of helpful productivity tools and the latest remote collaboration technologies. While it’s impossible to say which one is “better”. This head-to-head comparison can help you decide which office suite is a better fit for your business.

    What is Workspace & Office 365?

    Office 365 and Workspace (previously GSuite) are packages, of powerful business tools that facilitate your day-to-day tasks using the cloud. They even provide business emails along with apps for creating documents, spreadsheets, presentations, video conference calls, shared calendars, and notes.  

    In addition, storing information on Google or Microsoft servers, rather than your own via these suites, can also save your business a lot of money.  

    Plans and Pricing

    First, let’s look at plans and prices. It’s important to note that Microsoft requires an annual commitment, while Google offers you the option to make monthly payments if you prefer.

    Contact us to get a formal quote for your business
    GooglevsMicrosoftSuites
    Cloud packages head-to-head

    Email

    While both Office 365 and Workspace offer web and mobile apps (Outlook and Gmail, respectively) for email. There are, however, some subtle differences.

    One advantage to Office 365 is the desktop version of Outlook, which is incredibly feature-rich and lets you sort and group emails with ease. Gmail, on the other hand, is widely used throughout the world. For this reason, a variety of third-party app options (e.g. WordPress) can be linked to it to enhance its capabilities.

    Cloud Data Storage

    For the entry-level plans, Office 365 Business Essentials wins out with 1 TB (terabyte) of storage per user, while the Workspace ‘Basic’ plan only offers 30 GB. GSuite includes emails in this storage limit, whereas Office 365 provides extra storage for email files with added archiving.

    However, Workspace’s upgraded plans beat out most of Microsoft’s storage offerings. So long as your business has more than five employees, Workspace Business and Enterprise provides unlimited cloud storage. Although, businesses with less than 5 employees on the “Business” plan are capped at 1 TB. Only Microsoft’s E3 plan and higher offer the same unlimited cloud storage.

    Applications

    Applications are the cornerstones of a suite’s functionality. Workspace and Office 365 offer you a variety of comparable apps for word processing, creating spreadsheets and presentations, all on the cloud!

    This means every user gets a free desktop version of the Office suite (i.e. Microsoft Word, Excel) to download.

    These feature-rich apps expand far beyond the capabilities of the mobile and online versions, and are available on every plan except the ‘Business Essentials’.

    While both services offer mobile and online apps, one major benefit of Office 365 are its desktop applications.

    Collaboration

    These online applications make both suites ideal for remote collaboration. Microsoft Teams lets facilitate this with tools like real-time co-authoring, mentioning users by name and chat capabilities while working on OneDrive. Microsoft now lets you collaborate using its desktop apps, too, although the updates to shared files are a bit sluggish compared to its online apps.

    Similarly, GSuite offers Hangouts for chats and Google Drive for real-time collaboration. Google’s online and mobile apps were created with cloud collaboration in mind, so some might find them a bit more user-friendly.

    For remote meetings, GSuite and Office 365 both offer group video conference calls. If you plan on large-scale video conferences, then Office 365 offers far more for your money: most plans have a 250-participant limit, while the E3 plan increases to an astounding 10,000-person limit.

    Meanwhile, GSuite’s Google Meet allows up to 25 participants on the “Basic” plan, 50 on the “Business” plan, and 100 on the “Enterprise” plan.  

    Security

    Cloud services are running into a variety of security issues, and these suites are no exception.

    A 2019 Barracuda Networks’ report found that a large percent of ATO (account takeover) attacks were targeted at Microsoft Office 365 accounts after businesses migrated emails to the service.

    These attacks prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue a set of best practices. The aim was to help organizations migrate their email services while avoiding risks and vulnerabilities.

    Meanwhile, Google recently announced that a cloud storage feature for encrypted passwords on its “Enterprise” plans was faulty. As a result, some user passwords were stored in plaintext on Google’s servers!

    While cloud computing has its risks, the two suites do have impressive security features. GSuite is comparable to Google’s own level of security and offers AI detection of suspicious activity, Two-Factor authentication, and data leak protection—in which admins can block outgoing communication determined by set keywords.

    On the other hand, Office 365 has the option of Multiple Factor Authentication (MFA), along with the detection of malware, viruses, and suspicious activities. Microsoft also provides data loss protection, and admins can restrict access to company-issued devices only.

    Ease of Use

    So, which is easier to use? Well, it depends on who you are, and your ability to grasp software quickly.

    If you’re accustomed to working with MS Word or Excel documents, and edit them for work on a regular basis, then Office 365 and its desktop-to-online formatting compatibility will probably be your best bet. This is especially true if your company solely computes with Windows PCs.

    However, new users might find GSuite apps easier to learn, as the tools are a bit simpler and straightforward.

    So, which is best for you?

    Firstly, Office 365 offers feature-rich apps, and most of its plans come with a desktop version of MS Office applications. This is a definite advantage over its competitors.

    Its entry-level plan is far more generous in terms of data storage than GSuite’s “Basic” plan. In addition, businesses that already exclusively use Windows technology are likely to find Office 365 better-suited for their needs.

    With that said, GSuite was originally designed as a cloud collaborative productivity tool. Therefore, its features might be easier for collaboration and can be used among a wider variety of Windows and Mac devices. In addition, GSuite’s Business’ plans and above outdoes Microsoft when it comes to unlimited cloud file storage. <- This has changed since the article was first published.

    Unfortunately, I can’t tell you which of the two is “best.” But, with this knowledge in mind, you can make an informed decision to choose the best cloud suite for you.

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.