Tag: products

  • Get a vault for your data!

    Get a vault for your data!

    It’s not often that we readily endorse a product or company. However, when the nature of work they engage in is considered ground-breaking and has a positive impact on our lives – it most certainly warrants a mention.

    The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’. Nor that it is simply because it is fascinating and therefore must be an excellent product. This project actually has a value proposition for you!

    We are indeed well into the information age and while we have written extensively about data, its importance to marketers, and its fragility when used and abused by unscrupulous third-parties for their financial gain.

    The issue of data security is, however, quite a serious one. You just need to pay attention to the news to become even more aware.

    Data breach incidents

    In Europe, where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked. Several hundreds of thousands of customers’ personal data compromised.

    These were followed by hacks on other major airlines such as Cathay Pacific.  Aside from airlines, other business outfits have suffered a similar fate.

    The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked. This left vulnerable passengers terrified and stuck high up in the air. And all this happened probably to the amusement of the pranksters (hackers).  

    Can you imagine the chaos and commotion that would be caused if their control systems of driverless cars were to be hacked? 

    The digital intrusion gets even more sophisticated...

    This time affecting the very wealthy:  private yachts are now being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!

    Data security 

    On the issue of data security, you often hear about extra protection but not just anti-virus and anti-phishing software. The more secure and heavily encrypted Blockchain technology is, however, making waves in the digital sphere.

    It is mainly for the escalation of its once shining star by-product designed for discreet transacting – Bitcoin.

    Blockchain technology has also triggered several other technologies based on its digital cryptology technology. The aim is to ensure that your information is kept safe from prying eyes while stored, used, or transferred online.

    Blockchain products such as cryptocurrencies, however, are not completely safe from hackers.

    A solution

    Zortrex400x400

    The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization. It will be using it to ensure that your highly sensitive data online is kept safe.

    “Our tokenised solution would have protected their customers’ personal identification information (PII) details. Instead the hackers ran off with the date of birth; passport numbers; financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.

    Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.

    Brown’s background in data privacy systems as well as her devoted passion for the protection of PII, financial and healthcare data led her to start up and chair Zortrex. 

    The law on data

    Thanks to new laws like the European GDPR law, which enforces the protection of data, breaches are now met with hefty financial penalties.

    “Companies have disrespected your data for over 25 years, and if left unattended, there will be nothing left to protect,” Browns says.

    Companies now have to think twice about getting your consent and how to use and share your data digitally. But is it enough? The simple answer is no.  

    The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches.

    We have ingeniously invented systems that automatically align with financial messaging, payments and securing information. All of which require data. 

    “However, we need to go a step further to secure all the PII details with tokenization. This is so that in the event of a hack, the cookies and trackers will only be following a ‘useless’ token will be no real identification on it,” Brown explains.

    Zortrex would naturally like to tokenize all healthcare data. This way, vulnerable those of you living outside of major cities can also feel assured that your privacy is protected.

    Using Blockchain

    The application of the all-powerful blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with your data – especially the most sensitive ones.

    A business angel or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope.

    Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector.

    A tokenized supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023.  A judiciary blockchain, for instance, would allow the police to “talk” to the prison service. They,  in turn, will communicate with the legal sector or public health institutions (NHS).

    Forensic evidence would in such instances be tokenized and kept secure (away from tampering) during legal hearings.  In another practical scenario, Smart Contracts (which could replace some lawyers) can spark off legal aid assistance to you.

    Your court cases will be heard quicker and be more efficient.  Protection registers can also be guarded using tokenization – rendering them more secure.

    Blockchain technology offers quality assurance making sure that no shortcuts are taken.

    This will enable the monitoring and tracking if any of your data is shared with third parties once tokenized. The third-party apps would only gain access to your data once the trigger has been activated.

    Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenized, might seem far-fetched.

    Zortrex wants to use its technology to put the hackers out of business! 

    Tokenisation cannot be mathematically reversed and thus it will least it will keep the hackers busy for a while.

    Scalability

    For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability. This is the ability of a network or software to grow and manage increased usage.

    This image has an empty alt attribute; its file name is 250x250.gif

    Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, however, have massive scalability issues.

    The growth in demand for DApps is also crippling (slowing down) those systems. They need to investigate the incorporation of alternative technologies, upgrade or split their platforms to cope with such high demand.

    Someone must take the first step in securing this data forever. You should be able to purchase what you want without being harassed by trackers and cookies.

    The need for tokenization is endless and further, down the line, celebrities and government official’s PII can be secured by it to protect them from damaging schemes, ‘bad press’, and scandals.

    In a previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.

  • Get a vault for your data!

    Get a vault for your data!

    It’s not often that we readily endorse a product or company. However, when the type of work they engage in is considered groundbreaking – and one with the potential to have a massively, positive impact on our livelihoods, it most certainly warrants a mention.

    The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’ nor that it is cutting-edge/fascinating and therefore must be an excellent product – it actually has a value proposition for everyday people!

    We are indeed well into the information age and while we have written extensively about data, its importance to marketers and its fragility when used and abused by unscrupulous third-parties for their financial gain, the issue of data security is quite a serious issue – we must just pay attention to the news to become even more aware.

    In Europe, the where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked – with several hundreds of thousands of customers’ personal data compromised. This was followed by hacks on other major airlines such as Cathay Pacific.  Aside from airlines, other business outfits have suffered a similar fate.

    The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked, leaving vulnerable passengers terrified and stuck high up in the air – probably to the amusement of the pranksters (hackers).  We all know about driverless buses and cars coming to the market soon.

    Can you imagine the chaos and commotion that would be caused if their control systems were to be hacked?  The hacks get even more sophisticated: this time, affecting the very wealthy –  private yachts are being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!

    On the issue of data security (with almost full anonymity); we have also heard about extra protection (and not just anti-virus and anti-phishing software) but the more secure and heavily encrypted Blockchain technology that is making waves in the digital sphere. Mainly for the escalation of its once shining star by-product designed for discreet transacting – the Bitcoin.

    It has also triggered several other technologies based on its digital cryptology technology to ensure that information is kept safe from prying eyes while stored, used or transferred online.

    Zortrex400x400The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization – and will be using it to initially ensure that highly sensitive data online is kept safe.

    “Our tokenised solution would have protected their customers’ personal identification information (PII) details, instead the hackers ran off with the date of birth, passport numbers, financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.

    “Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.”

    The establishment of this start-up company was due to Brown’s background in data privacy systems as well as her devoted passion for the protection of PII and financial/healthcare data.  In her view, companies have disrespected their customer data for over 25 years, and if left unattended, there will be nothing left to protect.

    Thanks to new laws like the European GDPR law which is now imposing the data protection; data breaches and abuse of customer data is now met with hefty financial penalties. Companies now think twice about consent and how to use and share customer’s data digitally – but is it enough? The simple answer is a no.  The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches – yet.

    “We have ingeniously invented systems that automatically align with financial messaging, payments and securing information, all of which require data. However, we should and need to go a step further to secure all the PII details with tokenisation so that in the event of a hack, the cookies and trackers will only be following a useless token as there is no real identification on it,” Brown explains.

    Zortrex would naturally like to tokenise all healthcare data so that vulnerable people living outside of major cities can also feel assured that their privacy is protected. In a previous blog, we wrote about the new Internet of things (IoT). For all those devices being built for it, their IP addresses and the serial numbers can be tokenised to avoid the terrifying thought of the whole Internet being compromised.

    N26_banner-160x600-EN

    The application of the all-powerful Blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with customer data – especially the most sensitive ones.

    An angel investor or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope!

    Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector and a tokenised supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023.  A judiciary blockchain, for instance, would enable the police to “talk” to the prison service,  who in turn, will communicate with the legal sector and public health institutions such as the UK’s NHS.

    Forensic evidence would in such instances be tokenised and kept secure (away from tampering) during legal hearings.  In another practical scenario, Smart Contracts (which are touted to replace lawyers) can spark off legal aid assistance, so that court cases can be heard quicker, more efficient than currently pertains.  Protection registers can also be protected with tokenisation rendering it more secure.

    Blockchain technology offers quality assurance with every process being undertaken making sure that no shortcuts happen; as the smart contracts trigger any possible malfeasance. This will enable the monitoring/tracking of any data sharing to third parties once it is tokenised. The third party apps would only gain access to the data once the trigger has been activated.

    The company will be providing numerous business blockchain platforms; Asset Chain, Supply Chain, Accountancy Chain, Debt Chain, Life Cycle Management Chain, Outsourced Worker Chain; the list is endless, and all will be adequately secured.

    Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenised, might seem farfetched – but may we remind you of the need for data protection taking into consideration the growth rate of massive data breaches.

    Zortrex is aiming high and wants to use their technology to put the hackers out of business!  Tokenisation cannot be mathematically reversed and thus it will least it will stop the hackers for a while.

    Brown explains further that as they move with their education; other information can be added on to the token, as with all their healthcare; any allergies tokenised; what injections they have had right through their life cycle until the day no more data can be tokenised.

    For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability – which in tech terms, is the ability of a network or software to grow and manage increased demand.

    This image has an empty alt attribute; its file name is 250x250.gif

    Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, has massive scalability issues. The growth in demand for DApps is crippling those systems and they are having to investigate the incorporation of alternative technologies, upgrade or split their platforms and accompanying cryptocurrencies to cope with such high demand.

    Someone must take the first step in securing this data forever. Citizens should be able to purchase what they want without being harassed by trackers and cookies. The need for tokenisation is endless and further, down the line, celebrities and government official’s PII can also be secured to protect them from damaging schemes, ‘bad press’ and scandals.

    In another previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.

  • 3D Copy and Print

    3D Copy and Print

    The bizarre-sounding copying phenomena called 3D-printing have been mulling around from the past.  Recently, it has been in the limelight; specifically in the press for the wrong reasons.

    In 2013, a University of Texas law student, Cody Wilson created a blueprint for a single-shot 3D-printed handgun, named ‘The Liberator’.


    However, guns have posed a serious threat to peaceful living when in the wrong hands. But what if you could hastily manufacture them unsupervised,  from the comfort of your home?


    His company Defense Distributed, had been distributing downloadable weapons plans for free. This would be great if it was planned to enable you to build something more useful to society.


    The point is, with this new device, you can literally make a 3D copy of any imaginable object – even your food!


    3D printing builds parts (mostly out of plastic) based on the central concept: using a digital model like your CAD drawing (Computer Assisted Drawing).


    This is then turned into a physical three-dimensional object by adding material a layer at a time. This is where the formal name for 3D printing, Additive Manufacturing arises. They are no bigger than a normal Deskjet or heavy-duty paper printer and are quite a marvel to watch in action.

    3D printing is a fundamentally different way of producing parts compared to traditional subtractive (CNC machining) or formative manufacturing technologies.

    The brands

    Some top 3D printing brands include MakerBot, XYZprinting, Formlabs, and LulzBot. You can pick them up from as little as $200 to $4000.

    These prices naturally depend on your end product size, material, complexity, and level of detail you need.

    The most expensive one, if you are into heavy-duty manufacturing would set you back a cool $2,500,000. That is the price tag for Imprimere’s Model 2156.

    Some of the advantages of using 3D printers include:

    • Speed: You can upload complex designs from a CAD model and print in a matter of hours.
    • You have more design freedom. It gives you complete customization of designs.
    • It is more eco-friendly: Additive manufacturing methods use only the material you need to build a component. You can recycle and re-use the raw materials.
    • Costs: Compared to traditional manufacturing, the labour costs for a 3D printer are almost zero.
    visual§DPrinting
    Image source: 3DHubs

    Application in the world

    Since its uptake in as far back as 2010, a lot of the products we use are manufactured using 3D printing.  You will find its application mostly in the medical and dental industry and used for custom prosthetics, implants, and dental aids.


    They are used to manufacture high-level sporting gear that is tailored to fit you perfectly. Naturally, you can also ‘print’ your own customized fashion accessories. This would give you more flexibility when it comes to your specific style, colour, and material.

    For a more comprehensive comparison of 3D Printers available to you, look at the 3D Printing index on the resources page.

    Here is a list of cool things you can create with a 3D printer. If you are looking for great ideas for Xmas or birthdays – this might just be it!

  • 3D Copy and Paste!

    3D Copy and Paste!

    The bizarre-sounding digital printing phenomena called 3D-Printing has been mulling around from the past.  Recently,  has been in the limelight; specifically in the press for the wrong reasons. In 2013, a University of Texas law student, Cody Wilson created a blueprint for a single-shot 3D-printed handgun, named “The Liberator”.

    Of recent, guns have posed a serious threat to peaceful living when in the wrong hands. But what if anyone could hastily manufacture them unsupervised,  from the comfort of their homes?

    Defense Distributed, Wilson’s company had been distributing downloadable weapons plans for free. This would be great if it was planned for building something useful for engineering and something practical rather than destructive. Point is, with this new device, you can literally make a 3D copy of any imaginable object –  even food!

    3D printing builds parts (mostly out of plastic or other synthetics) based on the central concept: a digital model e.g. a CAD drawing (Computer Assisted Drawing) This is turned into a physical three-dimensional object by adding material a layer at a time. This is where the formal name for 3D printing, Additive Manufacturing comes from.  The actual printing device is no bigger than a normal Deskjet or heavy duty paper printer and is quite a marvel to watch in action.

    3D printing is a fundamentally different way of producing parts compared to traditional subtractive (CNC machining) or formative (Injection moulding) manufacturing technologies.

    Some of the top 3D printing brands include MakerBot, XYZprinting, Formlabs and LulzBot and are priced from as little as $200 to $4000 (for high-end small business-level) depending on the product size, material, complexity and level of detail required. The most expensive if you are into heavy-duty manufacturing would, therefore, set you back a cool $2,500,000  for the Imprimere’s Model 2156.

     

    N26_banner-320x50-ENSince its uptake in as far back as 2010, you will now discover that a lot of the products already in use are manufactured via 3D printing.  It is prevalent in the medical and dental industry and used for custom prosthetics, implants, and dental aids.

    They are also used in the manufacture of high-level sporting gear that can be tailored to fit athletes perfectly. There is then, of course, the ability to ‘print’ fashion accessories which generally, would be designed to fit your specific style, colour and fabric/material.

    Some of the advantages of using these machines include:

    • Speed: The ability to upload complex designs from a CAD model and print in a matter of hours.
    • It facilitates more design freedom; it also allows complete customization of designs.
    • It is more eco-friendly: Additive manufacturing methods use only the material needed to build a part. The raw materials that can be recycled and re-used.
    • Costs: compared to traditional manufacturing, where highly skilled machinists and operators are typically required, the labour costs for a 3D printer are almost zero

     

    visual§DPrinting
    Image source: 3DHubs

    For a more comprehensive comparison of 3DPrinters available depending on what you want to do with one (hopefully not to build weapons), look at the 3D Printing index on our resources page under technology.

    Here is a list of cool things to create with a 3D printer if you are looking for great ideas for Xmas or birthdays – this might just be it!

     

     

  • Anonymous Surfing

    Anonymous Surfing

    You don’t have to be an online arsonist, hacker, or international cyber-terrorist to hide your online identity. Likewise, concealing your PC’s web address or your Internet Protocol address (IP address), making it unknown to the public, does not necessarily mean you are up to no good online.


    We will, therefore,  build a case for why it is important at times to conceal your private online location using VPNs (Virtual Private Networks).


    A VPN is a connection method used to add security and privacy to your private and public networks. This includes your Wi-fi Hotspots and access to the Internet. They are most often used by corporations to protect sensitive data but now also by people like yourselves for the same purpose.

    VPN-Protect-you

    Click on the image to view a quick video


    Let’s get back to the importance of your IP address. It is probably something you rarely think about but is crucial to your online lifestyle even as an individual. How so? You might still ask.


    Well, without an IP address, you wouldn’t be able to get the current weather, check the latest news, or view videos (streaming) online for instance.

    The uses of VPNs

    Your IP is also used to access every online service you partake in including very private things like your internet/mobile banking or online trading activity.  Think of it as your physical address and how important it is when getting things delivered by post or using it when you need to make applications for loans, jobs, etc.

    “Without a public IP address, online service providers like Netflix, BBC, or Amazon wouldn’t know where to send the information you asked for. They wouldn’t be able to get it to your computer.”


    Imagine how naked you must feel if you have nothing to protect this address from the advent of a hack without adequate data encryption.  Also the just the haggling by overzealous online marketers, spam, malware, and even ‘419 scammers’!


    Now the argument for whether using VPNs is illegal is highly debatable for some of the valid reasons highlighted above. It should, however, be a given right to be able to use it. And even though it is commonly used by cyber-thugs to mask their clandestine and often dark activities, it should not be outlawed altogether.

    The case for VPN

    The legitimacy of VPNs debate, therefore, carries on into a grey area.
    We will, however, investigate a few VPN providers that are ‘paid for services’ and even offered by established companies such as AVG (which primarily offers Antivirus protection).


    The directive is to help the everyday consumer surf the web without ‘virtual’ salespeople bombarding them with offers based on personal information gathered in an ‘unsolicited’ manner.


    Policies like the European-based GDPR law were put in place to protect consumers from the non-consensus use of their data. Even your Internet Service Providers (ISPs) can track your online activities via your IP and sell your browsing habits.


    Some forward-thinking people and companies, however, have long been shielding themselves manually using VPNs.


    One direct benefit for you as a consumer is the ability to access content (information, products, and services) from different servers. A good VPN service can enable you to obtain access to other geo-locational content despite being on a different continent.

    It is perfectly legal provided you are paying for the service. The burden falls on the provider of the service and not you if it came down to a legal “scrap”.

    Rationale for using them

    If you perform these tasks frequently, you need a VPN:

    • Hide your IP address (to enable anonymity from marketers and hackers)
    • Change your IP address (to avoid identity theft)
    • Encrypt data transfers (private and financial data)
    • Mask your location (to access other services)
    • Access blocked websites
    250x250

    A word of caution when navigating websites blocked by governments with a VPN. Unless you are a high-profile journalist working on a case and backed by good legal aid – it’s not a wise thing to do.
    Do some research if you are not sure because accessing such sites could land you in some hot water. Rather use a known privacy service like Tor to ensure full anonymity to gain access to restricted sites if you really must.


    Top Virtual Private Network Protocols

    VPN protocols and available security features are numerous. The most common (best) protocols are:
    ExpressVPNthe acclaimed best offshore VPN for privacy and unblocking.
    IPVanish great for P2P and Torrenting.
    VyprVPNthe best choice for those looking for security.
    NordVPNsecurity is its middle name.
    TunnelBeardubbed the easiest VPN to use.
    Windscribea VPN which gives you unlimited connections.
    Hotspot Shieldan awesome solution for online browsing.
    KeepSolid VPN Unlimitedthe jack of all trades of VPNs.
    CyberGhostrich clients and ease of reconfiguring.
    ZenMateuser-friendly VPN that caters to the newbies to VPN.
    PureVPNtake advantage of easy to use apps and access to many servers.

    Source: www.itproportal.com, PureVpn

    Making the choice

    Picking a VPN service can be a daunting task as there are now literally hundreds of them to choose from. Landing the right one means striking the right balance between what you are offered, the ease of use, and naturally, the price.

    Some providers offer free you VPN services while some like AVG charges for their VPN service. Paid VPN providers, however, are preferred to the free service providers as they offer robust gateways, proven security, additional free software, and unmatched speed.

    The key is to find the best VPN that meets your immediate needs while matching your budget.

  • Modern-day Profit Hunters

    Modern-day Profit Hunters

    Dealing with Cryptocurrency has its interesting dynamics. There are, however, many hidden facets making it still a mystery to the masses. Not knowing about it makes you prone to, get rich-schemes or outright scams.

    We are all by now aware of the mania caused by the soaring prices and then, the subsequent decline that followed early this year.

    What we don’t pay attention to, however, is just how complex it is to physically “acquire” and store these Cryptocurrencies.

    Mining coins can be described very basically as the process where users “or miners” become part of a Cryptocurrency network. This by making hardware (processors & graphics cards) available to support that specific network’s operations.

    As a miner, you contribute towards the working of the Blockchain. The technology requires millions of calculations to validate transactions into what are known as public ledgers.

    Click here for more about how the Blockchain works.

    There are three main ways to mine these coins but we will not be highlighting them in this post. The matter to be covered here, however, is the business aspect: how the Blockchain has created a new line of commercial entities and ‘profit-takers’.

    These modern tech “enterprises” offer you a specific or cluster of altcoins and tokens as a reward for helping them maintain their Blockchain.

    Sounds like a win-win situation right?  Or is it?

    Mining is hard

    If you have actually looked into the methods of mining, you will discover that only those with high-end hardware are able to produce enough energy to power the Blockchain. This is called “hash power” or “hash rate”. This is kind of like horsepower for cars, but for PC processing.

    There are sites that illustrate how to calculate potential profits such as one conveniently called ‘what to mine’.

    The opportunity cost of operating the customized computer systems (known as Mining Rigs), will have to be offset with the cost of acquiring hardware such as the Antminer S9i. Then there are energy costs associated with running the rigs for long periods of time.

    Your profit would, therefore, be the balance of the costs versus the revenue involved in mining coins.

    The mining profit = revenue (quantity multiplied by the price of the coin in local fiat currency). Then subtract the cost of the mining devices + annual electricity costs (measured in local currency per KWh).

    The problem with going at it alone is that it is very hard to break even. You are also faced with a conundrum:  the more powerful your hardware is, the more electricity it consumes.


    It also takes a lot longer to acquire the coins which you are awarded by the respective blockchain network after successful hashing is completed.

    To make it worth your while you would hope that the coin you mine’s market value exceeds the costs of the monthly/annual electricity bill.

    Value proposition

    There a now hundreds of these so-called Crypto/Tech companies spurting up by the day. Their modus operandi: to relieve you of the burden of the high electricity and hardware costs. This in exchange a monthly or once-off fee.

    In return, they promise to mine coins and provide you with daily or monthly profitsThey can do this because they presumably have more powerful mining setups and therefore, larger economies of scale.

    Some of these establishments use big rooms, whole buildings or even warehouses to run thousands of mining rigs throughout the year.

    The payments you make supposedly help them with maintenance costs and pay for the said electricity bills. They are also usually stationed in countries where the cost of electricity is very low.

    MiningCosts

    You are likely to, however, run the risk of dealing with the occasional Ponzi-scheme – setup.  Such companies dive at the opportunity to swindle those not familiar with Blockchain and Cryptocurrencies.

    By dazzling you with the price increases and potential astronomical returns, they take your money and make a run for it!

    You can also ponder, it is incredibly difficult and expensive to mine Bitcoin these days. If these setups are actually just people who have already made their millions from acquiring Cryptocurrency.

    The acquisition naturally, would have been when they were dirt cheap, and are now offering the residue to make more profit off unknowing investors.

     

    A working example

    How it would work is: let’s say you owned 100 Bitcoins mined in 2010 for the opportunity cost of $100 each (cost of electricity).  You then sold half at the height of the Crypto ‘bull-run’ in January 2018 when they were worth $19 000 each.  You would have been $945 000 richer.

    So, with almost a million bucks in the kitty and another 50 units of coins (which would be now worth a lot less); the natural inclination would be to look at ways to make the extra coins ‘work for you’.

    And what better way than to be your own boss and head a Crypto company! You can with your new setup, sell off the residue of Crypto coins in bits for profits in cash.

    This is likely what some of these companies offering you coins for an opportunity to get Bitcoins. This under the false pretence of partaking in a ‘mining operation’. Meanwhile,  in reality, the actual mining probably took place almost a decade ago!

    All in all, do stay alert and do your research before parting with your money to join a mining pool or Crypto investment scheme!

  • Can’t Get No Satisfaction

    Can’t Get No Satisfaction

    In economic terminology, the term “utility” has not much to do with multifunctionality nor completing specific useful tasks.

    It does in context, relate to the level of satisfaction or “completeness” one derives from the consumption of a product or service. For example, there is only so much pizza you can eat before feeling ill from satiety.


    On a broader and more macroeconomics spectrum, our utility levels will also help determine how resources are allocated and consumed.

    Definition

    The concept, a brainchild of Daniel Bernoulli, has so many relevant connotations. As humans, we individually have a maximum biological boundary which when reached, signals absolute satisfaction. This in economic terms is called maximum (total) utility.

    Total utility is the complete satisfaction that you can get from consuming all units of a specific item.


    Economists are more interested in the changes in levels of utility or what is referred to as the marginal utility.

    We will return to its application to the economy.

    Applying utility

    N26_banner-160x600-EN

    Incidentally, the utility has no formal unit of measurement – though we coined the term “utils”. These so-called utils equate a number to utility levels in a controlled sample experiment.


    Understandably it can be quite a feat to quantify utility as it is based on human behavioural preferences. The closest we got to quantifying such was via the marketing concept of the consumer black box.


    As an illustration, the concept can be applied to something as basic as eating a delicious meal.


    Depending on how hungry you were, you would derive the highest utility from the first few bites of your meal.


    As you progressed and depending on your appetite, each additional fork/ spoon, or handful would provide fewer levels of satisfaction. As you reach your stomach’s capacity (towards satiety) your utility diminishes.

    This can be applied to the taste of the meal. It specifically explains why we tend to eat something sweet after a main (savoury) meal.

    The appreciation of ice cream when you are starving would diminish quickly as you concentrate on filling up your stomach. This as opposed to enjoying the taste.

    When compared to the running of an economy, governments and policymakers can determine which goods and services yield the most utility.


    This helps them to consequently direct expenditure to identified priority areas (products/services).

    It is a long term concept

    Education, for instance, may not provide immediate utility (gratification) for scholars and pupils. However, when appropriately harnessed, could yield higher levels of satisfaction. This is when you enter the job market with better remuneration packages.


    Tweaking education curricula, taking into consideration levels of utility to whip up your interest for the good or service. This should, therefore, be a prime focus for legislators.


    Inputs such as maximum times you can concentrate and the length of study for a course should be offered without compromising the substance.


    Without a doubt, there would be considerations, at a micro-level to assist in enhancing both marginal and total utility in the education sector.

    Read more about fiscal policy and budgets here

    More life-related uses

    The concept of utility is a lot less ubiquitous as we think and relates to the unsavoury phenomenon of megalomania and why there is greed.
    When levels of self-gratification diminish quickly, it takes longer for those with lower levels of marginal utility to reach a plateau of pleasure.


    Drug addiction, sexual appetites, and fetishes would then kick-in. In such cases, people upgrade the “product or service” that they have already maximized utility in. At that stage, another level of fulfillment would be sought.

    The utility applied to finances

    120x600

    It also explains why you lose a lot of money gambling or investing in stocks. The satisfaction of gaining more for a little outlay will often drive you to take more risk until a level of risk aversion kicks in.


    High-risk investors “called whales”  are now delving into the Crypto market to maximize their utility. They are diverting their funds from property and stocks into digital currencies like Bitcoin and Ethereum.


    The saying too much of a good thing is inevitably bad for you applies. It can be countered by diversifying the things that deliver pleasure or satisfaction to you.


    This is to ensure that you do not maximize utility on them too quickly and lose interest.  Worse case, you end up delving into the dangerous territories of addiction.


    Economists need to be relevant, more than ever before. They also need to formulate a means to measure and quantify utility or provide “utils” for at least, the most common goods and services.

    With such a strategy, policy-making, product pricing, and the efficient allocation of resources would be more effortless.

  • Great PC Phone Plug-ins for your CRM & ERP tools

    Great PC Phone Plug-ins for your CRM & ERP tools

    Before deciding to purchase a top CRM solution like that of  Microsoft Dynamics, many companies are left to question the said  CRM’s integration capabilities — specifically, whether the Microsoft Dynamics Computer Telephony Integration (CTI) integration is user-friendly.

    Find out the benefits, how to do PC (VOIP) phone integrations and what is on offer by a top supplier here: Practical CRM & ERP integration tools

  • How would you like to be served?

    How would you like to be served?

    The thought of “servers” and “hosting” are rarely things you consider on a daily basis. If you are not an IT or a software architect, then probably not at all.

    For the mentioned professionals, however, these decisions are critical to the operations of a business however large or small.


    There is a fine line between how (and where) your software systems are used. This line has become thinner because of evolving cloud technology and automation.


    Sourcing and deploying the right IT architecture could therefore help your business stay afloat, or sink without.

    Communication is key

    The most effective mode of communication in any business (other than verbally or telephonically) is still electronic mail (E-mail).


    It is effective because it helps you get a time-stamp and a reference point when it comes to the documentation of your conversations. This is important tool when it comes to your legal obligations and commitments.

    Emails are, therefore, something that should not be taken for granted!
    We consequently send, receive emails with attachments through various devices. All this without a second thought as to how this happens.


    After all, this is the job of the IT-guys, right?


    Well quite rightly so. They often clash with their management and board of directors for funds to keep this going without compromising operations. Emails are crucial not only from a daily functional point of view but from security but also the compliance facet.

    Defining servers

    Your company’s IT infrastructure: Emails; File-servers; Databases (CRMs and ERPs) and other communication tools are commonly managed on-site on systems referred to as ‘on-premise’ solutions.


    These are managed by computer-like CPUs that look like the standard boxes that you plug your monitor and keyboards. They, however, have a lot more processing power and storage than your average desktop and are called Servers.


    Your servers naturally must be kept cool because of the heat they generate from being on all the time. As you can imagine, built-in fans are far from being enough to cool them off!


    There an array of server types. Each of them is designed to run the tasks of your mail exchanges, file storage, and the storing/deploying of remote PC operating systems. Others handle your databases and other dedicated functions.


    You would need to have the licensed software to operate each server providing unique services. This makes it quite an expensive outlay if you have all of the abovementioned requirements!


    Servers are not irreplaceable and can overheat, get corrupted, or crash like a hard-drive (or a NAS server system). You, therefore, need to be maintain them at a cost to your business via your IT department.


    Depending on the amount of data and complexity, the maintenance is outsourced to specialized IT companies or software license providers.

    Cloud-computing

    technology-3406895_640

    In the early 2000s, ‘the cloud’ or ‘cloud computing’ became a new concept. It is basically a very large set of high-end servers equipped with software to manage all the tasks mentioned above. It is usually offered as a service under a single (monthly or annual) subscription.


    So basically, you are renting the service of a server as opposed to owning it. Renting, just like with property or cars, relieves the user of all the costs of maintaining the product in question.


    This sort of rental service offered by cloud service providers is now known as Software as a Service (SaaS). This also saves you from purchasing any hardware let alone paying for the extra electricity bill to cool a server room.


    According to Quora.com, the main difference between a cloud and a datacenter is that a cloud is an ‘off-premise’ form of computing that stores data on the Internet.


    A Datacenter, on the other hand, is an on-premise set of hardware that stores data within an organization’s local network.

    As an IT professional, you constantly face the burning question of whether to go for a solution that will relieve you of mundane tasks – like server maintenance. Naturally, you would also want a solution that facilitates the daily administering of user-profiles, data archiving, and backups.  But to what costs then?

    Deciding on which to go for

    There are many pros and cons when it comes to the hosting of your company’s data on a local server as opposed to having it run via the cloud.  There is also a massive array of choices and bundles between the top cloud service providers.


    Cloud service providers have several data centers used as backups. So your email hosting may have several servers in different locations to serve that function.  This curbs the risk of your data getting lost, unavailable, or hacked.

    Naturally, Datacenters are kept highly secure in undisclosed locations globally. Google is known to have one of its datacenters floating on a massive container ship somewhere over the Atlantic ocean.

    Maintenance

    Maintaining a server is expensive as you require massive cooling systems. Some smarter companies like Microsoft, are now taking to the deep oceans for that function.

    When it comes to email hosting or the storage of your files in the cloud only five large multinational corporations’ names come to mind. Microsoft, Oracle, Google, IBM, and Amazon.

    These companies however bear the burden of maintenance, while providing just the service you require on a subscription basis.


    Setting up an on-premise solution, in contrast, can be a tedious exercise and an expensive one. This is more applicable to smaller companies that do not have large IT budgets.

    Licensing your server is no child’s play either!

    Having to decide on costs versus functionality will determine how to license your server. This would be either per-server, per virtual machine needed, or per processor core and then you need CALs). If you don’t believe it, just have a look at this licensing guide!

    An example

    To illustrate the difference, let’s say you have an outlay of a hundred thousand dollars to acquire the software licenses for three years. This compared to a cloud-hosted package that performs the same function over the same timeframe.

    You can then piggy-back off companies like Amazon and Microsoft’s security services, which then costs eight thousand dollars monthly ($96k annually).


    So, within three years of using the cloud, you would have reached the $100K cap that would be spent only for licenses. You would have also saved with an extra $188K in additional services.


    This is a portion of what you would have been spent on maintenance, technical support, security, upgrades, and updates.


    These figures are rudimentary, but the long-term savings are noticeable as cloud service providers tend to provide value-add solutions when pricing their bundles.


    Microsoft recently launched its Microsoft 365 package which includes an upgrade to the latest operating system (Windows 10 Professional or Enterprise). This is something you would have had to source and pay for separately.

    Stress relievers

    Software deployment and the administration of user accounts is cloud-based. This means you can do this conveniently and remotely from your PC, laptop, tablet, or even your smartphone!


    This means as an IT professional, you will now have more time to oversee more important issues like data security and overall IT policies. Better yet, you would have the time to investigate ways to automate and improve your systems.


    This is possible without the inconvenience of running from PC-to-PC to install operating systems, Office software, or manage mailboxes.


    Remote desktop services of an on-premise server were a step in this direction – but are a pain to set up. So, you can view the cloud as an evolution of remote-desktop services.

    Infrastructural setbacks

    120x600

    The only (and potential) hindrance to using cloud services naturally would be the availability of good and cheap broadband (Internet connectivity).


    Without both, the justification for running your business fully on the cloud would not stick. Some businesses, especially in developing countries, go endure desperates attempts to adopt the cloud.

    They use what is known as hybrid-systems: a combination of cloud and on-premise solutions.


    If you operate in a country without forward-thinking government officials that facilitate broadband availability, you will suffer the most.


    Like an old, car, outdated hardware and software can lead to costly services (out-of-date and warranty solutions). This leads to you having heftier maintenance fees and support costs by third-party IT professionals.


    The old rhetoric of ‘not trusting the cloud’ is now one of the past. Cloud services often outperform on-premise solutions when it comes to high-end security software and data protection. This is because of the obvious economies of scale involved in setting up expensive security software.


    The level of security has to be the digital equivalent of Fort Knox. This especially if you are dealing with sensitive data such as financial, legal services, healthcare, and educational institutions.


    Your company would need a system that will keep all such data secure and data compliant.


    Data is now treated as a commodity. There is now a subsequent need to trade and value it. We now have Blockchain-based solutions like IOTA to facilitate your payments. This while keeping data encrypted, decentralized, and safe.

    In the advent of the new GDPR laws, some companies will still opt to keep and maintain their servers internally.  By doing this, however, you might lack the transparency and tools needed to show your consumers how you handle their sensitve data.

  • Top Crypto coins to look out for now

    Top Crypto coins to look out for now

    Some nice insights into the trending top Cryptocurrency coins out there with a good explanation as to why they are great coins to invest in.
    A good idea to look into these ahead of a potential June ‘bull run’ via My TOP 10 Coins

    25046_200x300

    Or you can own Bitcoins directly:

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.