Tag: company

  • 2020: Year of the PC

    2020: Year of the PC

    People will always find an opportunity in a crisis. This year has been one of the strangest years we will ever experience. Because of the global pandemic, we have been ‘shut-in’ physically and mentally. Hiding in our homes in an effort to save the lives of the elderly and sickly.

    Technologies that enable people to communicate with each other from different locations and work remotely have had an excellent year because of this.

    Who needs phones & email?

    The pandemic may have stopped us from having face-to-face meetings because of self-isolation and social distancing. So just like that, we all needed to have online meetings and digital collaborative meetups.

    In 2020, we just stopped phoning people. We needed to see what other humans looked like. So, we engaged more in video calling, using whatever technology available that supports that functionality.

    The online video-conferencing tool Zoom, therefore, went from being a company you’d probably never heard of, to global ‘overnight’ success. It was founded in 2011 by Eric Yuan, a former Cisco engineer, and executive, who then launched it in 2013 as software for companies. It was valued at $1bn in 2017 because it enjoyed very strong revenue growth and was easy to use, and became profitable in 2019, and listed on the Nasdaq.

    “You’re on Mute! “

    Quote of 2020

    Come early 2020, Zoom entered a boom period as most of us used it while in quarantine. Its share price, therefore, grew more than 490% from $68.72 to around $406.

    MS Teams, Microsoft’s answer to Zoom. is believed by many to be more reliable and secure than Zoom – which suffered a major breach earlier in the year. Google’s Meet also features on the list of top video calling/conferencing apps.


    We won’t delve into comparison here. The pros and cons are highly dependant on what you use it for and your business size/budget. The usage stats below speak volumes though albeit just for the two major economies.

    Other tools

    When we weren’t working, we were using social communication applications such as House Party which, apart from allowing you to stream music and play virtual DJ, enabled you to play games with one another.

    They were mostly silly general knowledge games but hangman made a welcome comeback to society thanks to this app.

    Discord, an American Voice over Internet Protocol (VoIP) that uses instant messaging and runs a digital distribution platform also gained new users. It no longer just relies on gamers and people in creative computer development roles to drive its usage.

    The Home Office

    We started (forcibly) working from home and those who believe it made them more efficient and productive are considering carrying on with it in 2021.
    The working from home concept, therefore, changed from being something associated with putting in half the effort and lazy lie-ins.

    Companies at least in the developed world, have to offer the option of working from home. Like any viral pandemic, Coronavirus will still be around in 2021 as the vaccine could take a while to ‘take effect’. Working from home isn’t disappearing any time soon!

    To operate a home office though, you need to have an advanced enough computer system, the right anti-virus software, and other methods of securing your work. Companies became concerned that people were using their personal computers to log onto work servers and bringing problems along with that. It’s not just good enough to get a laptop to have a ‘home office’.

    We have also had to set up reliable phone systems for business. Landlines are becoming old-fashioned plus virtual phone systems that are simple to set up and use are becoming popular.

    Smart speakers are also becoming popular. You can use them to play music via Spotify or the radio but can also be used to create the right audio ambience for your meetings and remind you about important events, tasks, and meetings.

    It’s all about getting tech products and virtual assistants to make working easier. People also invested in better desks and other office accessories such as computer or mobile-phone-operated coffee machines. Yes, those do exist! Expect the internet of things (IoT) to play a bigger role in your life next year and beyond.

    Cybercrime on fleek

    Naturally, because we are all forced online, this is no better time for cyber-thugs. They have upped the ante with cleverer ways to dupe you out of your already diminishing funds. Here some of the highlights of 2020 when it comes to crime on the web according to cybersecurity provider ID Agent:

    A cyberattack is attempted every 39 seconds.
    -700 million people in 21 countries experienced some form of cybercrime.
    The damage related to cybercrime is projected to hit $6 trillion annually by 2021.
    -Ransomware attacks rose 148% in March 2020.
    -Cloud-based attacks rose 630% between January and April 2020.
    -Two in five SMBs have been the victim of a ransomware attack.
    -More than 80% of reported cyberattacks are phishing.
    -Phishing attempts have increased by more than 660% since March 1, 2020.
    -Organized crime gangs account for 55% of attacks.

    The rise of AMD

    Chipmaker AMD has had a stellar year as it has brought out some of the most advanced (yet affordable) computer chips ever built and has managed to outshine rival behemoth, Intel.

    Its share price on the Nasdaq bounced from $49.10 to about $95.92. The company has been a runaway success story, especially over the past five years. At the end of December 2015, AMD stock was a paltry $2.87, that’s 3242% growth in half a decade!

    Another contributing factor for the company’s success is that AMD’s Ryzen line of processors has been a huge hit since its release. They are used in some of the best mining CPUs money can buy.

    Mining is the process of acquiring Bitcoins and other Cryptocurrencies using special software together with your PC’s hashing power.

    Crypto makes a comeback!

    Cryptocurrencies Bitcoin and Ethereum experienced returns of more than 216% and 390% year-to-date respectively.
    The argument is that institutional investors including some of the world’s largest finance houses and banks are now backing the world’s most popular digital currency.

    This is despite the fact that most ‘9-5 people’ are not using Bitcoin to buy much on a daily basis – but this trend is changing.
    It is still purported to be a means for criminals and drug dealers to help avoid banking authorities from checking their transactions. Or maybe that is just an underground rumour (or FUD) created by the fearful banking system.

    But seriously, a few things are speculated to be behind the Crypto surge.
    The US Federal Reserve cut interest rates, loaned more than $1.5 trillion to banks and financial institutions. It also increased its purchases of US treasury securities to stabilize the economy when the pandemic struck.
    This response was very strong and helped to weaken the effects of a national lockdown on the largest economy in the world.

    These actions created a favourable ‘macro environment’ in which to invest in an asset that is perceived as very risky given its lack of use and lack of clarity around what it can be used for. The high returns compared to Gold, interest-bearing and other traditional assets have certainly got the major asset managers excited.


    The second trend that propelled cryptocurrencies was the above-mentioned expansion of digital life. This may have lead to more investors feeling comfortable using a digital wallet. From payment systems, storage, finance, to gaming, gambling and sports: There is now literally a crypto-based coin for anything under the sun! This digital transformation has even prompted global Central Banks to seriously consider a move away from paper money.

    The Future

    Our lives are progressively going digital. Many older people who had never used a computer to shop online before, did so for the first time in 2020. They also using messaging apps for the first time as well as streaming entertainment services such as Netflix, Hulu, Amazon Prime, and Disney Plus.

    To sum up, the year 2020 has been an abomination of a year. Who knows what 2021 will bring? Maybe (tech-driven) Tesla stock will keep on rallying after successfully listing on the S&P500. But maybe also because owner, Elon Musk kind of took an interest to Bitcoin. This year has indefinitely made us aware of two things: proper sanitization and the practical use of computers.

  • The Future Office Worker

    The Future Office Worker

    Aside from essential services personnel, millions of people are now working from home. The Covid-19 pandemic has prompted the growth of products to help the home office worker of today and tomorrow.

    Debunqed breaks down which cloud solutions to pay attention to and which to avoid while you adjust to a changing world of commerce.

    During the pandemic, one video conferencing service has exploded in popularity after years of trying on the wayside. This is the service operated by the NASDAQ-listed American group, Zoom.

    Zoom has become a service of choice especially for companies and staff which may have not used online conferencing before. This popularity has made the service a target and there are concerns around security and privacy issues.

    Before Zoom’s burst in interest, the most popular applications include Google’s Gsuite which offers online conferencing solution Meet, Microsoft 365 which includes competing conferencing solution Teams, and Slack.

    Slack which was formed in 2013 also offers chat services that multiple people can use at once in private groups and persistent chat rooms or channels, which are organized by topic as well as direct messaging.

    Zoom being hacked during quarantine might have made news headlines but it’s not the first time that technology services like these have been infiltrated by the wrong people.

    .

    web scanner

    Slack was hacked back in 2015. The data included email addresses, usernames, hashed passwords, and in some cases, phone numbers, and Skype IDs users had associated with their accounts. As a result, Slack added two-factor authentication to protect data in the future.

    Gsuite is the ‘OG’ of cloud-based business

    How does Gsuite work? G Suite which was founded in 2006 and was formerly known as Google Apps for Work is a suite of web applications created by Google for businesses. It’s still a decent offering 14 years later. A basic G Suite account gives you access to Gmail and 30GB of Google Drive storage per user.

    There are obviously Enterprise-level packages with beefed up security to match that offered by highly secured ‘on-premise‘ setups.

    The suite’s Meet service is a video conferencing app. It is the business-oriented version of Google’s Hangouts platform and is suitable for businesses of all sizes. The solution enables users to make video calls with up to 30 users per high-definition video meeting.

    Compared to other software, and due to familiarity and affiliation to Android Smartphones, G Suite is quick and easy to set up and use from the time you subscribe to it. It literally takes up to 15mins to start receiving emails and make video-calls!

    Still in the game

    Microsoft offers 365 which includes Teams. Teams is quickly becoming Zoom’s big competition. Several companies are using Teams for internal meetings and Zoom for external meetings. Microsoft gains its competitive edge from is strong data protection, GDPR, and comprehensive security measures. But others are slowly and sometimes painfully also having to jack theirs up.

    The crucial factor to Teams is that it is part of the Office 365 ecosystem. In this way, it can collaborate with different services offered by Office 365. Users gain access to several functions separated into four categories:

    MS Proplus

    Firstly, they have access to the main Teams application which lets them find and create channels to hold “on-the-spot meetings, have conversations and share files”. Secondly, they have access to a function called Meetings. You can plan, schedule, and track meetings.  This calendar syncs with Outlook, as an example of the deep Office 365 integration.

    Thirdly users have access to calls which includes VoIP calling as well as fourth, they have access to the Activity application. This application lets one access @mentions, unread messages, and replies.

    Other secure apps

    Then we have Signal, a very new addition to the saturated video calling and voice messaging application world. The non-profit organization, the Signal Foundation launched a stable version of Signal last month.

    Signal is a cross-platform encrypted messaging service. It’s an impressive entrant and it’s opensource too.

    It uses the Internet to send one-to-one and group messages. These may include text and audio files, voice notes, images and videos.

    It is also available through a mobile application that can also make one-to-one voice and video calls. We expect the Android version to become well-loved soon. It can operate as a replacement for the SMS app.

    Signal’s emphasis on messages being protected and voice and video calls being stable because of the push by hackers to infiltrate the plethora of online messaging and video applications coming online over the past few months since Covid-19 broke out.

    This will become more and more important in 2020 and beyond as working from home becomes more common.

    The German government has encouraged people to work from home offices beyond the Covid-19 pandemic. This call is gaining impetus after the country saw a rise in Covid-19 infections after it started to ease it is locked in marked ways.

    With so much choice around cloud-based solutions, it’s best to try a few for yourself and see what works for you. But don’t waste too much time. Many of them are free and you’d really want to just get on with whatever your business is.

    A key is to use strong passwords which you change regularly as well as other measures to protect yourself from hackers.

    Read more about how to make your online accounts safer.

    Find out more about online office collaboration tools on our resources page

  • Get a vault for your data!

    Get a vault for your data!

    It’s not often that we readily endorse a product or company. However, when the nature of work they engage in is considered ground-breaking and has a positive impact on our lives – it most certainly warrants a mention.

    The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’. Nor that it is simply because it is fascinating and therefore must be an excellent product. This project actually has a value proposition for you!

    We are indeed well into the information age and while we have written extensively about data, its importance to marketers, and its fragility when used and abused by unscrupulous third-parties for their financial gain.

    The issue of data security is, however, quite a serious one. You just need to pay attention to the news to become even more aware.

    Data breach incidents

    In Europe, where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked. Several hundreds of thousands of customers’ personal data compromised.

    These were followed by hacks on other major airlines such as Cathay Pacific.  Aside from airlines, other business outfits have suffered a similar fate.

    The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked. This left vulnerable passengers terrified and stuck high up in the air. And all this happened probably to the amusement of the pranksters (hackers).  

    Can you imagine the chaos and commotion that would be caused if their control systems of driverless cars were to be hacked? 

    The digital intrusion gets even more sophisticated...

    This time affecting the very wealthy:  private yachts are now being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!

    Data security 

    On the issue of data security, you often hear about extra protection but not just anti-virus and anti-phishing software. The more secure and heavily encrypted Blockchain technology is, however, making waves in the digital sphere.

    It is mainly for the escalation of its once shining star by-product designed for discreet transacting – Bitcoin.

    Blockchain technology has also triggered several other technologies based on its digital cryptology technology. The aim is to ensure that your information is kept safe from prying eyes while stored, used, or transferred online.

    Blockchain products such as cryptocurrencies, however, are not completely safe from hackers.

    A solution

    Zortrex400x400

    The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization. It will be using it to ensure that your highly sensitive data online is kept safe.

    “Our tokenised solution would have protected their customers’ personal identification information (PII) details. Instead the hackers ran off with the date of birth; passport numbers; financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.

    Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.

    Brown’s background in data privacy systems as well as her devoted passion for the protection of PII, financial and healthcare data led her to start up and chair Zortrex. 

    The law on data

    Thanks to new laws like the European GDPR law, which enforces the protection of data, breaches are now met with hefty financial penalties.

    “Companies have disrespected your data for over 25 years, and if left unattended, there will be nothing left to protect,” Browns says.

    Companies now have to think twice about getting your consent and how to use and share your data digitally. But is it enough? The simple answer is no.  

    The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches.

    We have ingeniously invented systems that automatically align with financial messaging, payments and securing information. All of which require data. 

    “However, we need to go a step further to secure all the PII details with tokenization. This is so that in the event of a hack, the cookies and trackers will only be following a ‘useless’ token will be no real identification on it,” Brown explains.

    Zortrex would naturally like to tokenize all healthcare data. This way, vulnerable those of you living outside of major cities can also feel assured that your privacy is protected.

    Using Blockchain

    The application of the all-powerful blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with your data – especially the most sensitive ones.

    A business angel or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope.

    Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector.

    A tokenized supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023.  A judiciary blockchain, for instance, would allow the police to “talk” to the prison service. They,  in turn, will communicate with the legal sector or public health institutions (NHS).

    Forensic evidence would in such instances be tokenized and kept secure (away from tampering) during legal hearings.  In another practical scenario, Smart Contracts (which could replace some lawyers) can spark off legal aid assistance to you.

    Your court cases will be heard quicker and be more efficient.  Protection registers can also be guarded using tokenization – rendering them more secure.

    Blockchain technology offers quality assurance making sure that no shortcuts are taken.

    This will enable the monitoring and tracking if any of your data is shared with third parties once tokenized. The third-party apps would only gain access to your data once the trigger has been activated.

    Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenized, might seem far-fetched.

    Zortrex wants to use its technology to put the hackers out of business! 

    Tokenisation cannot be mathematically reversed and thus it will least it will keep the hackers busy for a while.

    Scalability

    For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability. This is the ability of a network or software to grow and manage increased usage.

    This image has an empty alt attribute; its file name is 250x250.gif

    Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, however, have massive scalability issues.

    The growth in demand for DApps is also crippling (slowing down) those systems. They need to investigate the incorporation of alternative technologies, upgrade or split their platforms to cope with such high demand.

    Someone must take the first step in securing this data forever. You should be able to purchase what you want without being harassed by trackers and cookies.

    The need for tokenization is endless and further, down the line, celebrities and government official’s PII can be secured by it to protect them from damaging schemes, ‘bad press’, and scandals.

    In a previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.

  • Get a vault for your data!

    Get a vault for your data!

    It’s not often that we readily endorse a product or company. However, when the type of work they engage in is considered groundbreaking – and one with the potential to have a massively, positive impact on our livelihoods, it most certainly warrants a mention.

    The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’ nor that it is cutting-edge/fascinating and therefore must be an excellent product – it actually has a value proposition for everyday people!

    We are indeed well into the information age and while we have written extensively about data, its importance to marketers and its fragility when used and abused by unscrupulous third-parties for their financial gain, the issue of data security is quite a serious issue – we must just pay attention to the news to become even more aware.

    In Europe, the where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked – with several hundreds of thousands of customers’ personal data compromised. This was followed by hacks on other major airlines such as Cathay Pacific.  Aside from airlines, other business outfits have suffered a similar fate.

    The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked, leaving vulnerable passengers terrified and stuck high up in the air – probably to the amusement of the pranksters (hackers).  We all know about driverless buses and cars coming to the market soon.

    Can you imagine the chaos and commotion that would be caused if their control systems were to be hacked?  The hacks get even more sophisticated: this time, affecting the very wealthy –  private yachts are being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!

    On the issue of data security (with almost full anonymity); we have also heard about extra protection (and not just anti-virus and anti-phishing software) but the more secure and heavily encrypted Blockchain technology that is making waves in the digital sphere. Mainly for the escalation of its once shining star by-product designed for discreet transacting – the Bitcoin.

    It has also triggered several other technologies based on its digital cryptology technology to ensure that information is kept safe from prying eyes while stored, used or transferred online.

    Zortrex400x400The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization – and will be using it to initially ensure that highly sensitive data online is kept safe.

    “Our tokenised solution would have protected their customers’ personal identification information (PII) details, instead the hackers ran off with the date of birth, passport numbers, financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.

    “Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.”

    The establishment of this start-up company was due to Brown’s background in data privacy systems as well as her devoted passion for the protection of PII and financial/healthcare data.  In her view, companies have disrespected their customer data for over 25 years, and if left unattended, there will be nothing left to protect.

    Thanks to new laws like the European GDPR law which is now imposing the data protection; data breaches and abuse of customer data is now met with hefty financial penalties. Companies now think twice about consent and how to use and share customer’s data digitally – but is it enough? The simple answer is a no.  The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches – yet.

    “We have ingeniously invented systems that automatically align with financial messaging, payments and securing information, all of which require data. However, we should and need to go a step further to secure all the PII details with tokenisation so that in the event of a hack, the cookies and trackers will only be following a useless token as there is no real identification on it,” Brown explains.

    Zortrex would naturally like to tokenise all healthcare data so that vulnerable people living outside of major cities can also feel assured that their privacy is protected. In a previous blog, we wrote about the new Internet of things (IoT). For all those devices being built for it, their IP addresses and the serial numbers can be tokenised to avoid the terrifying thought of the whole Internet being compromised.

    N26_banner-160x600-EN

    The application of the all-powerful Blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with customer data – especially the most sensitive ones.

    An angel investor or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope!

    Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector and a tokenised supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023.  A judiciary blockchain, for instance, would enable the police to “talk” to the prison service,  who in turn, will communicate with the legal sector and public health institutions such as the UK’s NHS.

    Forensic evidence would in such instances be tokenised and kept secure (away from tampering) during legal hearings.  In another practical scenario, Smart Contracts (which are touted to replace lawyers) can spark off legal aid assistance, so that court cases can be heard quicker, more efficient than currently pertains.  Protection registers can also be protected with tokenisation rendering it more secure.

    Blockchain technology offers quality assurance with every process being undertaken making sure that no shortcuts happen; as the smart contracts trigger any possible malfeasance. This will enable the monitoring/tracking of any data sharing to third parties once it is tokenised. The third party apps would only gain access to the data once the trigger has been activated.

    The company will be providing numerous business blockchain platforms; Asset Chain, Supply Chain, Accountancy Chain, Debt Chain, Life Cycle Management Chain, Outsourced Worker Chain; the list is endless, and all will be adequately secured.

    Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenised, might seem farfetched – but may we remind you of the need for data protection taking into consideration the growth rate of massive data breaches.

    Zortrex is aiming high and wants to use their technology to put the hackers out of business!  Tokenisation cannot be mathematically reversed and thus it will least it will stop the hackers for a while.

    Brown explains further that as they move with their education; other information can be added on to the token, as with all their healthcare; any allergies tokenised; what injections they have had right through their life cycle until the day no more data can be tokenised.

    For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability – which in tech terms, is the ability of a network or software to grow and manage increased demand.

    This image has an empty alt attribute; its file name is 250x250.gif

    Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, has massive scalability issues. The growth in demand for DApps is crippling those systems and they are having to investigate the incorporation of alternative technologies, upgrade or split their platforms and accompanying cryptocurrencies to cope with such high demand.

    Someone must take the first step in securing this data forever. Citizens should be able to purchase what they want without being harassed by trackers and cookies. The need for tokenisation is endless and further, down the line, celebrities and government official’s PII can also be secured to protect them from damaging schemes, ‘bad press’ and scandals.

    In another previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.

  • Digital Fundraising

    Digital Fundraising

    The latest abbreviation in the finance and crypto-world is ‘ICO’. This word, however, gives global financial authorities like the U.S. Securities and Exchange Commission (SEC) nightmares for several reasons.

    250x250

    Not to be confused with Initial Public Offering (IPO) which is used by firms to raise cash through the issuing of shares to the public. An ICO (Initial Coin Offering) works like crowdfunding, but for digital currency and tokens.


    We recently covered a feature on raising funds and capital for a business but missed out on one relatively new method. Many companies are using ICOs to raise capital for their businesses.

    Why ICOs?


    The concept of an ICO works similarly to how a company raises capital through shares in that it is all based on contrived value.


    Funding raising in effect boils down to sales! If your actual product or service has nothing substantial or intrinsic to offer a client base, then it is nothing more than a scam.


    Launching an ICO is quite easy, and to an extent, many tech companies are now catching onto it.

    An ICO is the cryptocurrency space’s rough equivalent to an IPO in the investment world. ICOs act as fundraisers of sorts; a company looking to create a new coin, app, or service launches an ICO.

    Investopedia

    If you still do not believe it is possible, just listen to this testament from someone who did it after unsuccessfully knocking on the doors of conventional funders.


    The alarming spurt rate of ICOs often brings with it a scourge of potential scammers. The SEC and other institutions have to step in to monitor and regulate them.

    Social media platforms like Facebook and Google – which house a bounty of users (potential investors) have banned ICOs ads due to possible prey on unsuspecting investors; exposing them to con artists.

    Basically, the scammers use fancy websites, laden with impressive figures and terminology to con users into buying into their coins or tokens.

    Though the tokens barely even cost a cent, it adds up if they have millions of people buying in.  Once they have reached a certain amount in funding – they close shop and disappear!

    To create a new digital coin:

    Create a product concept or Business Plan for the coin or what is called a Whitepaper. This describes in great detail what the coin or token aims to do; the core technologies behind it; the team and their qualifications; the product’s lifecycle/growth path etc.

    Once completed and water-tight, the whitepaper would be submitted along with an application to one of the best Cryptocurrency Exchanges for review.

    Naturally, you would need some initial working capital for liquidity. Some of this is raised through your savings and others through institutions (via loans etc).

    You must then assure your investors of a solid return on investment (ROI) and deliver – which goes back to sales. Unless your offering is a scam, you actually need to do some work!

    This assurance comes via regular updates (marketing campaigns can have a tremendous or adverse impact on the uptake and price) on milestones reached.

    The updates are also necessary to keep your investors abreast with progress and might convince them to increase funding.

    Growing interest and the addition of more funds create demand for the coin/ token which, in turn, drives up the price and market capitalization.


    Most successful ICOs of all time

    NEO:

    Known as “China’s Ethereum”, and backed by Microsoft, Alibaba and the Chinese government, NEO uses smart contract applications. It does so, however, with the addition of decentralized commerce, digitized assets and identification.
    It enjoyed a considerable hike in token value from $0.03 to $88.20, NEO has big things coming with a 294,000% ROI.

    Ethereum:

    Unlike Bitcoin, the second-most valuable cryptocurrency in the world has more functionality than just being a coin. Its ledger technology is used to build and deploy decentralized applications a.k.a. “smart contract” technology.
    Ethereum’s ROI has been nothing short of jaw-dropping at 230,000%. Having sold its tokens at $0.31, an Ether token now sits at a whopping $713, second in value only to Bitcoin.

    Spectrecoin:

    The “premier privacy-focused cryptocurrency” enables users to send and receive currency worldwide with total anonymity. It is currencies like SpectreCoin that have most government tax offices quaking in their boots.
    If you had repurchased a token in November 2016, that puny $0.001 would be worth $0.64 today, or an ROI of 64,000%.

    Ark:

    With Ark, collaboration is the name of the game. The platform’s SmartBridge is a lightning-fast ecosystem designed to integrate other cryptocurrencies into its blockchain.
    Investors were eager as any to buy in, and they have made a 35,400% gain given today’s token price of $3.54.

    DigixDAO:

    DGD, which stands for Digix Decentralized Autonomous Organization, is a self-governing community. It gives out grants to different projects which will promote the growth of the DGX network.
    At a current value of $346.88 per token, this gives them a return of 10,722%.

    Quantum (QTUM):

    QTUM is an open-source value transfer platform which focuses on mobile decentralized apps or Dapps. QTUM is the world’s first proof-of-stake smart contracts platform.
    They hosted a highly successful ICO in March 2017, and since that time has seen an ROI of 6,400%.

    Source: investinblockchain.com

    In conclusion

    The prospect can be daunting for a cryptocurrency investor looking to make money off new investment opportunities while remaining cushioned from fraudulent ICOs and dodgy coins and tokens.


    As there is no guarantee that any cryptocurrency or blockchain-related start-up will be genuine or successful.

    You simply need to be vigilant and take steps such as getting to know the core team, poring over the whitepaper with a big magnifying glass. Naturally, you should be monitoring the progress of the token sales.


    Most importantly, you must just use common sense to gauge just how feasible the project is to ensure that you’re not falling for a scam.

    Remember, if it’s too good to be true, then it isn’t true!

  • Vocations of the Future

    Vocations of the Future

    There is a lot of banter, which is backed up by well-research papers on how Automation and Robotics (powered by AI) will replace manufacturing jobs.

    Blue-collar jobs are not the only ones however, that face imminent and progressive extinction.

    A recent survey report conducted by the World Economic Forum predicts futuristic trends affecting certain jobs in the modern workplace.

    Robert Solow predicted decades ago, in his Solow-Swan model, a massive driving force of global growth: technology.

    And the evidence is prevalent with the likes of Apple, Google, and Amazon championing stock markets with Billion-dollar market capitalizations. They also create an abundance of jobs globally.

    250x250

    Disruptive technological advances such as AI (Artificial Intelligence); the ubiquitous high-speed mobile Internet (5G); widespread adoption of big data analytics; cloud technology; and the recent Blockchain technology will be the drivers of this job evolution.

    Based on the report, by 2022, this job evolution will be firmly in place as it has already.

    In a matter of just 4 years, we could have a situation where jobs such as postal service clerks, data entry clerks, and bean-counters (accountants and auditors) would be made redundant.

    Impact on services

    Software like Microsoft’s Dynamics 365, aims to remove ‘silos’ within customer relationship management (CRM) and enterprise resource planning (ERP) processes.

    The latter takes over (fully automates) back-office operations such as stock-taking and supply chain management.

    Such tasks will be performed via software, reducing the need for more human supervision. Consequently, the focus would be more on managerial roles.

    In the sales and customer service realm, technologies like Microsoft’s AI will provide automated insights to guide employees on improving customer experiences.

    Furthermore, it may lower support costs by using virtual agents or Chatbots to eliminate in-house AI experts and those writing code. This will  result in more redundancies!

    World's jobs

    On a positive note, newer and more exciting jobs such as data analysts, machine learning and AI specialists, digital transformation experts and in general information system services will be on the rise – up to 135 million globally, according to the Report.

    The fields to benefit directly from new technologies would be information technology; information security; innovation; customer services and risk management (financial services).

    Impact on finance

    Another group of professionals whose nature of work will be affected due to the advent of ‘disruptive technology‘ is financial middlemen. Likewise, smaller banks and money transfer institutions.

    Decentralized systems were primarily put in place to eradicate exorbitant fees associated with transferring money across borders.

    Cutting them out completely undoubtedly renders them redundant. It is therefore pertinent for them to innovate their products in order to open up sufficient job position.

    Read more about the effect of Cryptocurrencies on the banking sector here

    Recently, Malta’s finance minister whilst in a private interview during a Blockchain Conference, echoed this. He said that the advent of cryptocurrency has changed financial middlemen into traditional “photo developers”.

    “I can see this, just like in photography when you could tell that […] those who process the photos will lose their jobs; a lot of financial intermediaries will be facing the chop in the not too distant future,” says Edward Scicluna.

    The good news for governments will be that the trend shows that the jobs created will surpass those lost.

    Be proactive and skill yourself accordingly or get the right personnel who can quickly adopt some of the mentioned skills so that you do not fall behind!

  • Accountable Supervision

    Accountable Supervision

    Leadership values are not only confined to the running of a political campaign, party, or country for that matter, however, like in any venture that has an objective and deals with human beings – it forms the backbone of a successful business.

    Consequently, what leaders such as CEO of Tesla Elon Musk, for example, say or does, have a positive or, in the recent unfortunate case, a negative impact on the shareholdings of his business.


    The share price can decline sharply and worse yet, it can lead to the exit of senior staff members and thus undermining the business, its leadership values, and objectives.


    This why it is critical for companies to adopt the right practices and responsible leadership to enable them to address both internal and external issues affecting them.


    This is even most relevant when dealing with a company that has a multinational operational facet such as the Murray and Roberts Group – a South African company that operates in a global setting.


    This specific multinational company was used in a case study for a research paper because it is firmly entrenched in the construction and engineering industry.


    More specifically, they service the global natural resources market sectors of underground mining; Oil & Gas; Power & Energy.
    Such a diverse set of operations requires a varied set of objectives spearheaded by a solid leadership path.

    A new model of leadership

    We have covered the topic of Emotional Intelligence before. It now surfaces again within a brand-new leadership model known as the ARCHES model.
    The name derives from a key characteristic of the physical structure of an arch and its durability.

    Coupled with its diversity in models and materials and its depiction as symbols of triumph, it represents an apt analogy of what responsible and effective leadership should be.


    The model was especially derived by an academic* for a syndicate group assignment and is based on six key characteristics that should be imparted in a leader.


    An effective and responsible leader is one who is attuned to their followers, responsive, possesses the necessary competencies, serves with humility, is ethical and adopts a sustainable approach to leadership.

    A leader who possesses all these attributes is one who can rise above adversity and lead their followers in a way that promotes innovation, motivates, develops skills, promotes personal growth, and encourages improved performance.

    B.Moyo

    Application of the model

    ARCHES

    The model defines attuned leadership as the act of being self-aware, informed, and aware of the environment in which you exist – servant leadership.


    Employees should be encouraged to take responsibility for their actions because responsibility and effectiveness are complimentary. The demise of US energy company Enron, for example, was due to a failure of management to execute communication-based responsibility, internally and externally.

    A volatile, uncertain, complex, and ambiguous environment in which a business operates can result in many potential projects not coming to fruition.


    In such an environment, leaders that are attuned, responsive, and possess the right competencies can expert power as their way to influence followers to exhibit the same traits.


    Referent power develops out of admiration of another and a desire to be like them. Expert power, on the other hand, is a person’s ability to influence others’ behaviour because of recognized knowledge, skills, or abilities.
    This requires the leader to have a tolerable level of humility.

    This is defined as a personal quality reflecting the willingness to understand the self (identities, strengths, and limitations). That combined with a purpose in the self’s relationship with others.


    Once again, the emphasis on Emotional Intelligence coupled with traditional leadership competencies is needed to steer multifaceted companies.

    Even more so when dealing with diverse cultures and work ethics across borders and continents.

    Direct consequences

    Being the largest employer in the locality directly implied that Murray and Roberts had to be consistent with the idiomatic Zulu expression of “Umuntu ngumuntu ngabantu”. This means: I am because you are, you are because we are.
    Good leadership in the Ubuntu philosophy is based on the engagement with communities and defines a well-led organization.


    Not paying attention to ethical issues surrounding a community or the environment can have an adverse effect on your values. This would also affect your staff and the image of the company you steer.


    A bitter consequence of the failure of ethics was evident in the $4.2m (64.1 million ZAR) fine to the said company. This was for its involvement in sector collusion related to construction projects for the 2010 World Cup.

    Concluding remarks

    Finally, a practical leader will also consider any upcoming projects with the lens of understanding the environment that surrounds them to incorporate the concept of sustainability.


    These traits might sound like they need to be learned but most should be already ingrained or come naturally to you or your leaders.

    If not this is not the case, you need to quickly install the right personnel with such to help steer your business enterprise or economy for that matter, to success.

    *This blog post contains excerpts and is derived from a master’s research paper. It was conducted by Bonnie Moyo for the Rhodes University Business School.


  • Financing your Small Business

    Financing your Small Business

    When considering small business financing, it is important to understand all your available options. If not, investors can easily take advantage of you and offer unfair terms.

    So before raising any money, find out if using equity, debt, or convertible debt financing makes the most sense for you to grow your business.

    Equity


    Raising capital through equity is popular, if not the most popular choice, for entrepreneurs to pursue. Investors buy stock (or shares) in your company, giving them a financial stake in the future success of your business.

    How It Works:

    • You set a specific Dollar/Euro amount for what your company is worth.
    • Based on that valuation, investors agree to give you money in exchange for a certain percentage of your company.
    • Investors receive compensation based on the percent of stock/share they own once you sell the company or go public.

    Pros:

    • All your cash can go toward your business rather than loan repayments.
    • Investors take on some risk and don’t have to be paid back until you’re doing well.
    • Investors often have valuable business experience.
    • Since investors have a financial stake in the success of your business, they are motivated to offer sound guidance and valuable business connections.

    Cons:

    • Selling shares of your company will make it very difficult to get them back.
    • You will also most likely lose control of part of your board to your investors.

    Debt


    Debt-based fundraising is the form of small business financing that most small businesses end up choosing, according to Fundable. It is also the easiest to understand. Money is loaned to you with the agreement you’ll repay it over time with an established interest rate.

    Get a quick loan for your business here: N26_banner-320x50-EN

     

     

    How It Works:

    • You borrow money with an agreement to pay it back with interest within a specific time frame.
    • You will also have to offer your lender some form of collateral, which are liquid assets you will give up if you cannot make your loan payments.

    Pros:

    • You will raise capital much quicker than with equity small business financing. This is especially true of smaller cash amounts.
    • You can keep 100 percent ownership of your company, along with 100 percent of its profits.
    • Interest payments are tax-deductible.

    Cons:

    • You must be completely confident you can make your loan payments in cash each month. If you don’t, lenders can make you sell your business in order to get their money back.
    • Interest payments can become one of your largest business expenses.
    • Commercial lenders will demand small business owners to personally guarantee the loan and offer personal assets as collateral. This even if your company is structured as a corporation or limited liability company, according to Forbes.

    Convertible Debt


    A convertible debt small business financing structure is a mix of debt and equity financing. The money raised is considered a loan, but at some future date, the loan can convert to equity if the lenders so choose.

    How It Works:

    • You will negotiate an interest rate to pay back the loan. This will also be the interest rate for those lenders who decide not to convert any debt into stock.
    • The details concerning how lenders can convert the debt into equity are negotiated at the time of the loan. For the most part, that means agreeing to give lenders a discount or warrant on an upcoming round of equity fundraising.
    • You will also set the valuation cap, or maximum company valuation, at which lenders can convert debt into equity. If investors decide not to trade in their loan for shares at this predetermined valuation level, they can no longer do so at a future date.

    Pros:

    • Transaction costs are low and the process moves quickly.
    • If you don’t want to set a company valuation, which involves a lot of uncertainty and risks for new startups, a convertible debt structure for small business financing makes a lot of sense, according to Covestor CEO Asheesh Advani.
    • Using convertible debt protects investors from dilution in future financing rounds.

    Cons:

    • Investors are uneasy about giving money without knowing the exact share of a company they will own. You might have to offer steep discounts on equity in order to get them to agree to the terms.
    • You may be forced to set a valuation before you are ready in order to avoid unaffordable loan repayment expenses.

    In the end, it’s best you make your final choice, based on which of the mentioned options works best for you, not just now, but in the immediate future.

    Read more: about other investment methods.

    This article was originally Written by Alex Liu and published on UpCounsel

    UpCounsel is an interactive online service that makes it faster and easier for businesses to find and hire legal help solely based on their preferences.
Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.