Category: Social Media

  • Get more organised digitally!

    Get more organised digitally!

    One often hears the phrase “technology is your friend” To what extent the friendliness/support is, in being a most effective “companion” to assist you to cope with your daily activities or business plans depends on how you embrace it.

    Read more via Get more organised digitally!

  • Anonymous Surfing

    Anonymous Surfing

    You don’t have to be an online arsonist, hacker, or international cyber-terrorist to hide your online identity. Likewise, concealing your PC’s web address or your Internet Protocol address (IP address), making it unknown to the public, does not necessarily mean you are up to no good online.


    We will, therefore,  build a case for why it is important at times to conceal your private online location using VPNs (Virtual Private Networks).


    A VPN is a connection method used to add security and privacy to your private and public networks. This includes your Wi-fi Hotspots and access to the Internet. They are most often used by corporations to protect sensitive data but now also by people like yourselves for the same purpose.

    VPN-Protect-you

    Click on the image to view a quick video


    Let’s get back to the importance of your IP address. It is probably something you rarely think about but is crucial to your online lifestyle even as an individual. How so? You might still ask.


    Well, without an IP address, you wouldn’t be able to get the current weather, check the latest news, or view videos (streaming) online for instance.

    The uses of VPNs

    Your IP is also used to access every online service you partake in including very private things like your internet/mobile banking or online trading activity.  Think of it as your physical address and how important it is when getting things delivered by post or using it when you need to make applications for loans, jobs, etc.

    “Without a public IP address, online service providers like Netflix, BBC, or Amazon wouldn’t know where to send the information you asked for. They wouldn’t be able to get it to your computer.”


    Imagine how naked you must feel if you have nothing to protect this address from the advent of a hack without adequate data encryption.  Also the just the haggling by overzealous online marketers, spam, malware, and even ‘419 scammers’!


    Now the argument for whether using VPNs is illegal is highly debatable for some of the valid reasons highlighted above. It should, however, be a given right to be able to use it. And even though it is commonly used by cyber-thugs to mask their clandestine and often dark activities, it should not be outlawed altogether.

    The case for VPN

    The legitimacy of VPNs debate, therefore, carries on into a grey area.
    We will, however, investigate a few VPN providers that are ‘paid for services’ and even offered by established companies such as AVG (which primarily offers Antivirus protection).


    The directive is to help the everyday consumer surf the web without ‘virtual’ salespeople bombarding them with offers based on personal information gathered in an ‘unsolicited’ manner.


    Policies like the European-based GDPR law were put in place to protect consumers from the non-consensus use of their data. Even your Internet Service Providers (ISPs) can track your online activities via your IP and sell your browsing habits.


    Some forward-thinking people and companies, however, have long been shielding themselves manually using VPNs.


    One direct benefit for you as a consumer is the ability to access content (information, products, and services) from different servers. A good VPN service can enable you to obtain access to other geo-locational content despite being on a different continent.

    It is perfectly legal provided you are paying for the service. The burden falls on the provider of the service and not you if it came down to a legal “scrap”.

    Rationale for using them

    If you perform these tasks frequently, you need a VPN:

    • Hide your IP address (to enable anonymity from marketers and hackers)
    • Change your IP address (to avoid identity theft)
    • Encrypt data transfers (private and financial data)
    • Mask your location (to access other services)
    • Access blocked websites
    250x250

    A word of caution when navigating websites blocked by governments with a VPN. Unless you are a high-profile journalist working on a case and backed by good legal aid – it’s not a wise thing to do.
    Do some research if you are not sure because accessing such sites could land you in some hot water. Rather use a known privacy service like Tor to ensure full anonymity to gain access to restricted sites if you really must.


    Top Virtual Private Network Protocols

    VPN protocols and available security features are numerous. The most common (best) protocols are:
    ExpressVPNthe acclaimed best offshore VPN for privacy and unblocking.
    IPVanish great for P2P and Torrenting.
    VyprVPNthe best choice for those looking for security.
    NordVPNsecurity is its middle name.
    TunnelBeardubbed the easiest VPN to use.
    Windscribea VPN which gives you unlimited connections.
    Hotspot Shieldan awesome solution for online browsing.
    KeepSolid VPN Unlimitedthe jack of all trades of VPNs.
    CyberGhostrich clients and ease of reconfiguring.
    ZenMateuser-friendly VPN that caters to the newbies to VPN.
    PureVPNtake advantage of easy to use apps and access to many servers.

    Source: www.itproportal.com, PureVpn

    Making the choice

    Picking a VPN service can be a daunting task as there are now literally hundreds of them to choose from. Landing the right one means striking the right balance between what you are offered, the ease of use, and naturally, the price.

    Some providers offer free you VPN services while some like AVG charges for their VPN service. Paid VPN providers, however, are preferred to the free service providers as they offer robust gateways, proven security, additional free software, and unmatched speed.

    The key is to find the best VPN that meets your immediate needs while matching your budget.

  • Cloud (Storage) Wars!

    Cloud (Storage) Wars!

    The term “storage wars” has taken on a new meaning. It has shifted literally from the ability to keep one’s belongings in physical containers to having one’s data stored and managed in the digital realm.

    A question often asked is whether the (Internet) cloud is infinite. The answer is both a yes and no.

    The top four cloud tech companies are endlessly engaged in a silent market share war. It is a tough choice as they all offer millions of gigabytes in storage. We can only attempt to investigate to what extent is there an abundance of storage when we ‘run out’.


    The “Cloud” as explained in our previous blog, is a series of backed-up servers scattered across the globe.

    Consequently,  in terms of availability of storage, it is just a matter of where (location) a datacenter can be run and at what its maintenance costs are.
    The answer to how infinite is the cloud, therefore, boils down literally to a cost, rather than a capacity issue for cloud-storage providers (CSPs).

    The main CSPs vying for a market share in the paid cloud storage subscriptions are Google, Microsoft (Azure), Amazon, and IBM.

    There are also smaller yet significant players such as Box, Dropbox, Tresorit, and Barracuda.  A quick online search on their websites will reveal what they can offer you.


    Similarly, the pages of any one of the smaller companies will give some comparisons of each cloud storage offer (bundles).


    We will, however, focus on the major ‘players’ and summarize their offerings based on offers for both individuals and small to large enterprises.

    What to look out for
    stacking-up-cloud-vendors-2018-right-scale-2

    Some of the key features to look for when storing data in the cloud include Encryption at rest and in transit, as well as end-to-end encryption; 2-Step Verification, HIPAA Compliance.


    Other factors to consider are the actual server location, ability to sync any folders, and perform selective Synchronization.


    There are also key offerings such as offering the ability to edit files on mobile devices. For businesses, the ability to remotely wipe mobile devices, perform file-versioning, and other useful features for data management.

    As a business, if the above-mentioned features are not in your cloud solution, you better look into switching away.


    While you can technically run your own cloud, it would require a full-on IT team. That or a very good support system to assist in its maintenance and administration.


    It is for this very reason that a SaaS(and Hybrid)-approach to storage is preferred by many medium to large enterprises.

    4 of the most popular CSPs 


    Google

    Weaponry: 

    A standard (personal) GoogleDrive starts from 15 GB in size and comes when you open a Google email account. This is a standard with most Android-powered mobile phones which require a Gmail account to register the phone.

    It is a convenient way to store and access your pics, videos, and files across multiple devices or back them up in case of a hard drive crash.
    If you do not mind the inconvenience of having several logins, you could get away with multiple drives giving you 15 GBs each.


    There is, however, a drawback as there is no such a thing as a free lunch – the level of security and compliance features naturally are little to almost none.  Additional storage can also be purchased with different upgrade plans, which may come with more  add=ons such as extra file encryption.


    When it comes to their business offering, their Team Drive is available with the G-Suite bundle. One can upload 750 GB of data per day and up to a total of 5 TB in size.  Team Drive can contain a maximum of 100,000 files and folders, however, this limit can be increased upon request.


    The basic package including the more advanced security costs $5 per user per month and gives you 30 GB for storage and collaboration.

    A full comparison of available storage plans 

    Tactical strengths:

    The ease of accessing and using the drives via strategic partnerships such as Android provides them with a growing market share.   As it is cloud-based and not linked to physical devices,  you can access your GoogleDrive using a Mac computer as well.


    There are growing talks of incorporating Artificial Intelligence <AI> into the data management systems. They are currently building a full AI Center in Accra, Ghana. This will help bigger companies manage, access, and organize their stored information faster and with more purpose.


    They have recently launched a set of new cloud storage tiers under the branding Google One. This comes with revised pricing and storage options: 15 GB: remains Free; 100 GB costs $1.99/month; 200 GB $2.99/month  and 2 TB $9.99/month.

    Potential weakness/es:

    Google is a latecomer when it comes to offering business solutions and still battles with the stigma of being a free service and thus associated with inferior quality.


    The integration with Office applications is still something they struggle to get right. Not many are fans of  Googlesheets.


    Most non-Microsoft platforms will have this compatibility problem.
    They also run into a few data syncing problems ever so often, especially with the free storage. Google offers full 24/7 customer and technical support with their products. More aggressive advertising and pricing of their business offerings now serves to hopefully alleviate this issue for them.


    How Google bounces back from a hefty  EUR 4,34 billion fine for colluding with Android will determine if they survive the storage war. This especially if they will be now forced to allow other CSPs to offer services on mobile devices.


    Amazon

    Weaponry:

    One of the first cloud solution providers to offer eCommerce and Business-to-Business (B2B) offerings. Amazon and its Amazon Web Services (AWS) have come a long and calculated way from just offering/selling books online.


    They are actually seen as a formal threat and a direct (more superior) competitor to Microsoft’s cloud (equivalent) offering –  which we touch on next.
    Most of this comes from a robust and apparently the world’s largest global cloud infrastructure.


    Based on this, its cloud storage, dubbed Amazon S3, works on a “pay as you use” basis while its free tier starts you off on 5GB of storage. Thereafter you pay in increments based on the storage class you fall under.


    So the first 50 TB will cost  $0.023 per GB per month and then the next 450 TB will cost $0.022 per GB per month and so on.
    This is practical for businesses that do not have a limit to storage space but scale up and down very quickly based on their operations.

    Tactical strengths:

    Amazon’s storage platform gives users and businesses alike the ability to geographically store and move data with the highest levels of encryption. In addition, one can use data analytics on your data without moving the data into a separate analytics system.


    Amazon Athena additionally provides anyone who knows SQL on-demand query access to vast amounts of unstructured data. As with Google, AI incorporation along with Alexa would facilitate this even further.


    Other notable benefits offered include open workflows, Hybrid-cloud storage capability, powerful APIs, and easy and reliable access to many Third-Party vendors & Partners.


    Naturally, you get access to its AWS Marketplaces. It also has a strong compliance adherence including HIPAA/HITECH, EU Data Protection Directive, and FISMA.

    Comparison of the various storage classes available.

    Potential weakness/es:

    Its primary offering of consumer goods and online delivery will make it prone to any bad press received if that arm of operations does not work well.


    Further expansion into areas like streaming TV via Amazon Prime and cashless stores might result in a jack of all trades expert in none phenomenon. They are, nevertheless, handling all well so far.


    Microsoft

    Weaponry:

    The “go-to” tech company for word-processing software as well as operating systems. This software giant like Amazon is branching into many products.


    They now offer games, server hosting software, applications, an online store for all its devices, software, services, and of course, storage.
    Its Azure platform powers certain parts of Nasa and utility giant Schneider Electric to mention a few clients. Its purchase works similarly to Amazon via ‘pay-as-you-use’ terms.


    Storage users need to have a .Net Framework and SQL installed to use the storage. For those looking for quick storing solutions without building heavy infrastructure, they can adopt the cloud completely.


    With the launch of its online services (Microsoft 365), it has had to repackage a portion of its Azure platform to cater to small to mid-sized businesses.


    These include functional/specific bundles such as OneDrive (personal), OneDrive for Business, and Sharepoint (powerful storage and content management tool).


    The online version of the Sharepoint starts at $5.00 per user per month for a rather limited 1 TB per organization. Thereafter, users can purchase more in 1 GB increments of 12 to 16 (US) cents depending on the total (storage space) size ordered.

    Tactical strengths

    Also early adopters of AI (Machine Learning) and recently, the Blockchain (Blockchain Workbench), Microsoft is providing its developers with more and better reasons to use its storage space for practicality.
    Like their online storage offers on Office 365, Azure storage packages are also quite structured and well categorised.


    There are specific functions such as a database server-data management system. Then there is one for application running services, and others to handle rest-based object storage (Blob Storage).
    Lastly, they offer storage to help perform computations and process events (Functions).
    These bundles are all provided free for the first 12 months and then range from $0.002 per GB to about US 0.20c per million executions.


    They have a good Partner system to help distinguish and provide support for the best storage package based on one’s immediate needs.


    To bolster their growing Marketplace, they recently also purchased a business that deals with OpenSource (GitHub).  This enables more freedom for developers to manipulate the software on their platform.

    For a comparison of the storage types via Azure and pricing for each, click here.

    Potential weakness/es:

    People have found its pricing a little to steep on the storage side and so keeping market share will be tough.  Many new smaller CSPs offering cheaper per GB rates.


    They can only counter this by offering more products that require their storage (compatibility-wise).
    Some other cumbersome restrictions like users being only able to upload 20 000 files at once or the actual file-size limit might not bode too well with heavy cloud data users.


    They also don’t have as many APIs as Google or Amazon does, but these are growing by the day.


    IBM

    Weaponry:

    Probably the first of the CSP batch that provided cloud computing. It therefore has had the experience of honing ways of storing and retrieving data for larger businesses. International Business Machines (or IBM) can be considered as the grandfather of data storage.


    As with the other CSPs, there is a free offering called the “Lite plan” consisting of a single IBM Cloud service instance with storage up to 25 GB/month.
    Paid storage is staggered, per consumption and based on complex costing tiers based on location, storage class, and resiliency choice.


    Storage charges start from $0.09 for up to 50 GB down to $0.014 for 500+ TB on what they call the Cross-Region Flex plan.

    For more insight into the complex costing table, visit the IBM storage pricing page here.

    Tactical strengths:

    Their security is their biggest pride and strength and makes them a firm favourite for large companies and potentially governmental institutions.
    The fact that they do not actively advertise as much as Google or Microsoft is telling. They clearly need to provide high secrecy and protection for their existing clients.


    One such feature unique to the way data is stored on their cloud servers is using Information Dispersal Algorithms (IDAs). This helps to separate data in unrecognizable “slices” that are distributed across datacenters.


    So basically the complete copy of the data resides in any single storage node, and only a subset of nodes are available in order to fully retrieve the data on the network. This is similar to how peer-to-peer sharing or data encryption works.


    And speaking of heavy encryption, they have allegedly recently also started on the Blockchain and are experimenting with a particular Cryptocurrency to enable ease of payments. This in the light of IBM with its Watson platform looking to become more of a cloud-based data operating system.

    Potential weakness/es:

    IBM relies too much on its reputation as a forerunner for tech and cloud-based computing. It has earned that title for several decades before the likes of Google and Amazon barged in.


    They might lose out on market share once the newer CSPs start to offer more robust products and compliance services like theirs.


    Their high security and complex system come at a premium so designed for or rather restricted to wealthy companies essentially. The hosting option (main server locations) looks limited and restricted to geographical areas primarily in the US and EU.


    250x250

    Be wary of clandestine terminology such as ‘unlimited archiving/storage’ even with a paid subscription. This usually refers to storing data at rest and not the ability to constantly and unlimitedly sync files.


    Another salient factor to compare would be the number of files that you can upload or sync at the same time.
    This will be relevant for larger companies that need to upload large files and by large, we mean 10 GB files (2 and a half HD DVDs’ worth of content) and upwards.

    Making a choice

    At the end of the day, your decision to take on a faction in the storage war should be based on your priorities. You simply match it to what each of the companies is offering taking your budget into consideration of course.


    You may need to consider running a combination of two or more of them.
    Some larger companies offer storage as a “must-have” with hosted email or something as basic as purchasing a new smartphone.


    You will, however, have to ask yourself a few more pressing questions around functionality, data security, and compliance before taking it up.

    Or you can simply not accept the offer or disable it in cases where it is presented as a freebie!
  • Already GDPR-ed Out?

    Already GDPR-ed Out?

    Well, it didn’t take long. Less than a full week in fact, for the first GDPR-related court cases to surface against social tech giants Facebook and Google.

    It was as if lawyers were just waiting to pounce on them for their apparent failure to protect our rights as online users. This pertains specifically to issues relating to data privacy and the sharing of private details mainly with third-party marketers.


    How Facebook stores and shares your data has been clarified by several intense inquiries in the US and recently in Europe. This is where the law is set to benefit users of the social media platform in that geospatial area of the world.


    The said lawsuit, however, focuses on the opt-out clause that forces you to make a choice to comply or leave. The claimant is a privacy campaigner. He has made the Billion-Euro complaint on behalf of several users; seemingly a challenge to Facebook.


    Additionally, he has launched a separate suit against Google, accusing them of “pressurizing” users into accepting their data collection policies.
    This ‘comply and accept or get thrown out’ clause could leave you without your routine dose of social media consumption. Such a clause is thus deemed unfair.


    It could cost Facebook a lot if they get their way based on the terms stipulated in the new law. The social media giant could be fined up to a few billion or a sizeable fraction of their earnings in punitive damages.

    The aim of the new law

    The passing of the new regulation on May 25th, 2018, better known as the General Data Protection Regulation {GDPR} has been a long time coming.


    Despite the warnings of the “kick-in” of the regulation, many are unprepared for it. Some of the reactions to the law include confusion, anxiety by both large and small firms alike, and plain comical hysteria!


    Non-compliance now carries heavy fines and penalties, up to 20 million euros for anyone operating within the EU borders.

    So, what then, is the big fuss about GDPR?


    Well, it boils down to a right that has since the launch of the Internet to the mainstream, been waivered and overlooked. Gaining CONSENT to use your data for anything other than the reason you went public on the Internet is very crucial.


    This has become a contentious issue as many companies have over the years, unscrupulously benefited from data acquired (mined) – without your consent. Facebook only brought this into the spotlight recently.

    You can read more about data mining here

    Ad: Web, Network & App Scanner

    Who needs compliance?

    If you hold a folder, database of clients whether online or on your internal server, you would have to comply with the rules which stipulate full disclosure. This includes who you share your details with, and how the information is tracked, shared, and kept secure.


    Furthermore, research in March this year showed that only 39% of the Fortune 500 companies in the UK and 47% had GDPR compliance taskforces.


    Another UK firm commissioned study found that our buying behaviours are heavily influenced by we perceive our data is being handled by companies.

    The consent given to use your basic information cannot be taken for granted – even in the medical environment.

    German doctors’ practices, in the wake of GDPR, are manually making you sign consent forms. Doctors are now required to fully disclose who they share your contact information with.

    How to be compliant

    There are simple ways you can stay GDPR compliant. One method is to adopt an attitude of embracing it rather than just complying with it. You can be transparent with your customers by doing the following:

    Add a cookie bar to your website. You can also add a clause/paragraph to that effect (website disclaimer) in your ‘About Us’ section.


    Similarly, you must state clearly on any opt-in forms. Newsletters and any forms where their data is collected, used, and passed onto other third-parties must be announced. State clearly who they are and which data they have access to.


    You then need to give your customer the option to select what they want to share. Even if such data may not be necessary for them to receive services from you.


    Constantly review your relationships with third-party affiliates and partners to ensure that they are also complying with the law.
    They could be jeopardizing your data compliance efforts – as Cambridge Analytica did with Facebook.

    The last and most challenging step requires the action of what is promised above. This means an upgrade of your internal software to include security/encryption.

    GDPR compliant software

    You can obtain full compliance by using a GDPR-compliant package like Office 365 Enterprise E3. This package has email software specially designed for those of you dealing with sensitive client’s data that need to be kept for long periods.  Litigation hold, heavy archiving features; as well as basic email encryption are all included.


    You can add supplementary encryption software such as Azure Information Protection as an extra layer of security. This helps you to safeguard emails and stored data from being lost, compromised, or accidentally shared.


    All said and done it is likely that if you are a bigger firm, you would either need to create the position of a data security officer internally. If your lawyers are not up to date with digital laws, however, you can simply outsource the service.

    This should help make you become fully compliant thereby having to avoid issues with the data compliance authority altogether.
  • Life hacks using tech

    Life hacks using tech

    We often do things out of routine without considering if there is an easier way to achieve the same result quicker and even more effectively. In a larger company or organization, this is the job of the business analyst.

    What if we applied this to other daily activities and tasks that shape the way we live?

    This would give us more time to partake in the things we love.
    It’s hard enough for most working-class adults to spend most of their days in the week behind a PC. This is usually followed by hours behind the wheel in traffic or commuting via public transportation.
    This makes the task of going shopping or even attending a doctor’s check-up after an 8-hour work stint more of a burden or chore. Worse over if you must queue further to get the service.


    This very example came to mind when a relative complained about having to go from one doctor to another. When referred to a specialist they had to then book another appointment by calling that specialist’s practice.


    Now granted, this is basically a ´first world problem’. Because having a specialist attend to a back problem after your doctor recommends it during an initial check-up is a luxury. One that third world citizens could only dream of having in the first place!

    Problem-solving scenario

    So, in the case of the referral to a specialist, a simple unified medical system can resolve this. A CRM database linking all the medical practitioners including their schedules can save you the time taken to arrange the new appointment.
    This system would also have a secure high-tech scanning and attachment add-on so that X-rays, scans, diagnoses and the attending doctor’s notes can be attached. All for the attention of the specialist.
    The times for the new appointment can be chosen quickly while the patient is at the doctor’s practice.  When convenient, you could then go to the specialist directly.

    The concept explained

    This is one very basic and rudimentary example of how an automated, centralized software solution can help schedule appointments.
    To achieve maximum optimization the system would clearly require several tests before implementation.

    Too often systems analysts and developers do not consider the end users. The user experience (UX) is the most crucial aspect of software development and should be the first step in building an automated system or it will never achieve its purpose.

    It doesn’t have to be used as a national health solution. This is because centrally planned systems, as mentioned in a previous blog, can lead to inefficiencies.
    It would need to be localized in order to make the system easier to maintain and be updated with contact details.  This especially when information can change on a weekly or monthly basis.


    Naturally, and for decades, health insurance companies have utilized card systems to document patient visits to practitioners. This also helps you and practice to easily claim back medical costs.


    But this only serves a singular function and is laborious to run. What is being proposed in this blog post is something to resolve this in a more secure and decentralized manner.

    Application and security

    Cloud security has become a huge requirement and will be a necessity for all businesses and services in the very near future. Europe, for instance, is implementing compliance laws for storage of data under its new GDPR regulation.


    Countries like Sweden also have similar compliance laws to handle financial (with a lot of banking going mobile) and medical data stored in the cloud.


    So, security would become less of a concern for businesses when it comes to data storage and automated CRM systems in the future.

    Shopping and housing convenience

    smart-home-3096219_640

    The burden of shopping can also be alleviated with initiatives such as cashless processes. We first saw this introduced in Asia (China) and now adopted in the West through Amazon’s new cashless´ and cashier-less grocery stores.


    While shoplifters might not see the innovation in this ‘new method’ of shopping; it saves you time spent queueing to pay and will invariably help resolve the scourge of shoplifting.


    It will, however, require more reliance on technology for surveillance, to monitor and track the scanning of the goods and keep a database of records on a server.


    This helps you with the inventory management and other back-office processes and is managed by an automated ERP solution (and not a person).
    We are still waiting for massive roll-outs of the so-called smart houses equipped with smart chips that help regulate temperature, turn off energy-consuming devices when not in use.


    Some are even equipped with fridges that remind you when food is expiring or simply needs to be replaced.


    Designing such systems would naturally require careful observation into the various steps needed to reach the desired result. Details in every step from how you go from point A (selecting a product); to point Z.


    Point Z being you walking out of the shop with a fully paid item. All without using cash or the need for a cashier.

    Tweaking the solution

    The system analyst’s job would be to engage or even simulate the processes using different test subjects and not just the best practice.
    There is the possibility that you might forget to pay for the milk after checking out of a security area. That could result in an embarrassing scenario for all.


    These are just two examples of countless scenarios that can help us benefit from the use of automation and AI.
    There are many other subtle examples such as in the motor industry. This includes the use of computers to diagnose a ‘sick car’.


    There can be a solution for every bottlenecking problem. Addressing this is now has become a new field of study. Computerization and the use of robotics to handle manual labour and repetitive blue-collar jobs will be new highly lucrative career paths.

    Many new start-ups already exist purely to develop system automation.

    Welcome to the future!

     

  • Peer-to-peer service

    Peer-to-peer service

    History has taught us that a fully centrally controlled government system fails completely – well, in the long run.

    The idea of a communistic system has its merits and could still work in some sectors of our economies. It, however, omits the very thing that was provided to us as human beings – choice.


    Knowledge is empowering – but the power to do the things you would like to do effortlessly without fear of error.


    This shared knowledge emanates from scientific, biological, or financially proven theories and tests.


    They can help you make the right investments. Such as saving money on the best deals, obtaining rights to social benefits, travel to great destinations. Or simply just helping other people achieve their personal and spiritual goals.

    Monopolistic behaviour

    Those that cling onto knowledge though, serve their interests alone and should not be revered but rather shunned for power-hogging.


    Sadly, some governments monopolize access to information, basic services, resources, and even education to create an artificial demand for ´their services’.


    This forms the basis of a centrally controlled or outright communistic state.
    In business, this is a common practice of a monopoly to control the price of their good or service as they are the only ones providing it.


    The quality of that good or service, however, can and will be determined by them and them alone!


    Can you imagine then, based on the previous sentence, a situation that only governments have this power to dictate a basic service such as healthcare or education for you?


    Scary thought and if you look at most developing countries, the evidence of this is overwhelmingly sad.


    But we are not here to talk about the governments as there would be several cases to point out and this is not a political platform.
    Case in point, the concept of a centrally controlled system nevertheless is less efficient and prone to failure to disseminate the very items it sets out to provide.


    Deploying software by a global firm like IBM, via a centrally stored-located server would be absurd because the infrastructure of the recipient regions or end-users might not be well equipped to handle it.
    So one begs to question, why would you do it for social services for instance?

    Decentralized systems

    Decentralizing a system can improve efficiency because it gives options to get the best quality possible. It also removes power from one or a few providers and shares it equally amongst other stakeholders.


    This way all will stand to mutually benefit from a working system indirectly rather than just the state collecting monetary compensation or tax and deciding what to do with it alone.

    Centralized systems can learn from the blockchain to efficiently provide services.

    eMule


    Let’s take the now “illegal” peer-to-peer file-sharing and downloading software such as eDonkey/eMule (developed by Microsoft).
    Or take BitTorrent for example
    you could with them, build together any file by downloading “bits” of the file by many connected servers or PCs  (peers).


    This system leads to faster downloads and allows one to source from the best quality of the available digital bits to get the data to form the e-book, music track, or movie that you were after.


    Leaving your download running would enable others to get the files you have already amassed (you reciprocally upload the files). The cycle continues until everyone acquires the same great quality file from the best ‘seeds’.


    Downloading from a sole server for the same product, on the contrary, could crash the server.


    Let’s not forget the delays due to operational differences in time-zones, or complete failure to download if the file source is corrupted or the file quality is bad.

    Application of decentralized systems

    Naturally, the entertainment industry put a stop to this because it meant that people could attain their copyrighted material.

    Many fines and warnings were dished out to individuals as well as companies hosting the sharing servers.


    You can, however, still access them via carefully planned entry gateways to hide your IP address using VPNs. Those of you who are IT experts can use (old-school) backend protocols like FTP.

    BitTorrent -> Bitcoin…Torrent -> Tor ..anyone seeing a pattern here?

    There is now even a new digital currency designed to help artists curb piracy and reward the artists for their work.
    Such protective software is already in the pipeline thanks to blockchain technology.


    Decentralizing services such as money transfers in the advent of Cryptomania removes power from regulated financial institutions. They tend to charge high fees for sometimes slow and error-prone services because they can.

    Conclusion

    So, swiftness and security are a prime reason for the adoption the Blockchain technology. Everything else such as the price of digital alternative coins or ‘altcoins’ boils down to basic supply and demand for it.

    Governments and other institutional service providers can take a leaf out of the blockchain technology tree and its true intention.

    The aim is to decentralize the provision of a service to give everyone access to it. This will reduce associated costs of using it and improve efficiency!
  • Rise of the machines

    Rise of the machines

    As a young man born in and living in Pretoria South Africa, multi-billionaire Elon Musk – better known for pioneering the Tesla battery-operated motor concept – was shunned by the Industrial Development Corporation several times.

    His innovative ideas were denied financial backing so he moved to the USA for better support. The rest as we all know is history.


    The futuristic thinker, however, took a rather skeptical and worrisome handbrake-turn when it came to the topic of artificial intelligence (AI) and its benefits to society.


    When a man like that with so much insight into technology warns of its potentially harming effects, it warrants notice. Musk warned that its use could foster ‘the coming of third world war’. We have to for such reasons,  delve a little deeper into the topic.


    We have rapidly progressed from longer periods of stone, iron, industrial, to that of space, technological/information ages. The world is now apparently fused between the latter three.


    Despite skipping a few ‘crucial’ stages, we have now surged into the age of digital automation. This is while sadly still dealing with the ravages of poverty, disease, and irreversible damage to our environment.

    Automation & AI usage

    Automation is helping business through software like ERPs that take over traditional back-office finance and operations.


    In the IT industry, the Internet of things (IoT), cloud services, and general Software as a Service (SaaS) have simplified things for IT managers. You can now just monitor and attend to more pertinent issues and tasks (hopefully not just stream movies and play games on duty).


    While seated comfortably, you will be able to now perform tasks such as deploying new software, installing/removing updates on multiple machines/devices simultaneously. All with a push of a few buttons.

    Trading bots

    In the high-risk investment scene, automation has given traders more room for better research and analysis Thus relieving you from the known stresses and mundane tasks associated with trading.


    For many trading houses and brokers, AI has even completely taken over the mundane task of making and executing trades.

    iqoption
    Advert


    If you haven’t already, read this great book entitled: The Fear Index (thriller by Robert Harris). Though fiction, it illustrates the use of a machine learning tool using algorithms to help a hedge fund company generate billions for its investors.


    The use of AI is not without fault. It can also lead to costly system-generated errors like the trading error a few years at Goldman Sachs cost the firm $100 million and other cases.

    Other use cases

    It can still, on a ‘micro’ level, help free human capital (individuals) from PC-related issues. So things like having stress, headaches, backaches, and lack of time spent with family and friends can be a thing of the past.


    In the industrial and manufacturing sectors, the advent of AI creates even more of a fear and a concern. The number (staffing) of redundancies, may increase when it is introduced.


    This would require careful planning to ensure the blue-collars that are ‘replaced’, are compensated. More so, they would need to be incorporated into different areas of businesses.

    Limits of robotics

    Obviously, not every task need to be automated or performed by robots. We (as humans) are still required to check-up, inspect, and perform quality checks for instance.
    We can, as a result, deal with inter-personal jobs that require more empathy like in customer and social service.


    Human resources or getting into corporate social responsibility (CSI) projects that reach out to communities.

    Embracing it

    More importantly, policies by governments will need to focus ever so more on job-creation. Governments must now adopt innovative means of creating jobs or foster and supporting entrepreneurship. Projects like those of Mr. Tesla/Mr. PayPal/Mr. SpaceX has created thousands of new jobs.


    As for the use of AI in weaponry and military defense systems, the less said the better. When it comes to privacy and security concerns we can only hope that rogue politicians don’t get unregulated access to such technology. In such a case we would only be able to protest and hope not to feature in a real-life James Cameron sequel to Judgment Day.

  • Sales misconception – debunqed!

    Sales misconception – debunqed!

    The ‘great’ art of selling is about earning and keeping your client’s trust. In business or commerce, there is nothing greater than the feeling of completing that successful sale.

    By successful, we refer the whole process: from convincing the customer that your product or service will meet his/her long or short-term needs. This is after listening carefully to their requirements through thorough discovery.  The client is then able to the payment without hassles and take timely delivery of the goods.
    Finally, the customer acknowledging and thanking you for it with the hopes of coming back should be the most rewarding part of the sale. That coupled with your commission of course!
    A successful sale is a step-by-step process and must have all the above elements.
    Anything short of that is paramount to a quick-fix or even a scam. It is only lazy salespeople (taking shortcuts) that give the trade a bad reputation.
    Granted, not all of your sales interactions will turn out to be complete success. Some elements of the above process could be stymied by aspects out of your control.  For instance, the client’s lack of funds, suppliers’ delivery delays or a faulty product can mess up a good sales cycle.

    A true story

    Some of the most successful sales are even conducted by faceless agents. Once, while based in Johannesburg, we sold a product (that was mass produced in China) and had it delivered from New York to Cape Town via air-freight.
    This was based on a demand (order) that was placed on a then operational website. The actual sales were brokered via correspondence by email and phone.
    Luckily, the product (and delivery) quality was good enough not to warrant a face-to-face visit, though in those days having Skype for Business would have been a great resource to at least give ‘a face’ to the sales rep.
    They were, however, willing to deal with the agent several times without having met them personally based on the quality of the (medical) product. This was in addition to the vote of confidence and guarantees provided throughout the intensive sales interactions.
    This little anecdote proves that it doesn’t matter what you sell, if the product is of good quality, and meets all (compliance) requirements including the recent GDPR law – the sale actually becomes the easy part.
    You will, however, still require a little bit (and the right kind) of presentation skills to position the product/service adequately enough to execute the sale.

    There is no real art to selling – we all do it all the time without realizing it. From the time we apply to a kindergarten or high school, to university and finally to all the jobs in our working career.

    Reinforce the brand

    As salespeople, we must present ourselves (our unique skills and character) and persuade a ‘buyer’ to take us on. This is also something no automated sales agent or Chatbot can do and is an area that Artificial Intelligence (AI) will not beat us on.
    And just like a brand, everything we do is intended to enhance our value and the more we beef-up our brand (with educational, mentorship and technical qualifications). The better our brand, the more demand for your offering.
    250x250But back to selling. We sell people ideas: something as simple as convincing your mate to meet at the pub after work or your girls to join you for a weekend spa takes skilful persuasion. And even more so if they had other plans or options.
    That is essentially what sales is about – persuading a buyer to choose your product or service over that of others using tools such as the consumer black box.
    Such persuasion obviously can be genuine or fraudulent. Those salespeople trained by their leader Jordan Belfort as illustrated in the 2013 Wolf of Wall Street movie are a testimony. The revealed how persuasion can be used effectively when capitalizing on with an inherent human trade – greed.
    Being truthful, however, (even if it means letting go of a sale) will determine whether you get repeat customers. This is something most successful salespeople make use of to boost their conversion rates and pipelines.

    Mentorship

    Debunqed.com likes to follow unconventional salespeople who use unorthodox but effective methods.  These are not necessarily the textbook style of selling but will help to inspire you to address the potential client’s needs honestly.
    Such ‘on the ground’ learning is done with the help of a mentor. Shadowing one or two mentors that are passionate about what they do can rub off a few skills that can supplement traditional sales theory.
    Sales is a skill best learned on the ground and you will hardly find an institution offering it as an elective course.
    Such revenue-multiplying potential that repeat-customers can provide for your sales portfolio or pipeline beats getting a quick-fix by conning people no matter how big the ‘score’ is.
    What you should be doing as a salesman is gaining your customers’ trust whilst solving their problem.
    A trusting customer will always look you up for more purchases.

    If you operate in an industry where you have multiple products or one that needs to be renewed – you earn revenue for life!
    https://rcm-eu.amazon-adsystem.com/e/cm?o=2&p=22&l=ez&f=ifr&linkID=932c8c541e355401d543251fcbe101a3&t=debunqed-21&tracking_id=debunqed-21
Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.