DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7211

Limits of Facebook Ecommerce Operators; Small Business Owners, Not Entrepreneurs

0

The last few days have brought redesigns in our broad ecommerce sector. Konga was swallowed by Zinox, the firm behind Yudala, another ecommerce firm. OLX, a classified ecommerce firm, gave up on its operations in Nigeria. They join Efritin, Ady and other entities that have struggled.

But while these entities are struggling, Facebook (Instagram, WhatsApp) ecommerce operations are emerging. Facebook is now the second largest ecommerce platform, behind Jumia, in Africa. Unfortunately, even those Facebook ones would struggle. People that do them are purely Small Business Owners, and they would never evolve to become Entrepreneurs. They would not have the scalability because they are bounded by the same factors that have crippled the capacities of the mainstream ecommerce businesses to thrive.

They could sell 200 t-shirts but they would never sell 2,000 in a day. The reason is by the time they get to 500 t-shirts, the offline challenges of logistics would affect their growth trajectories. Yes, the offline-based marginal cost will make it harder for them to grow. The implication is that the Instagram vendors would be fine as small business ecommerce operators, but none would be entrepreneurs. They would not employ hundreds as Konga did. They would not pay good taxes as Konga did. They would not even have to rent an office as Konga did. People would not make careers in them. Simply, they would be informal ecommerce operators except they would have bank accounts. This was how I put it in a recent comment on LinkedIn.

Partly as I noted in a recent Tekedia piece that Facebook is now the second largest ecommerce platform behind Jumia in Africa. Yet, even the Facebook vendors will struggle. They would be fine as small businesses but not entrepreneurs with any scalable advantage. Yes, you can sell 20 T-shirts in a day. But you cannot sell thousands. The logistics problem will bound their capacities to grow because that is a marginal cost that is totally offline.

Entrepreneurs build organizations with unbounded elasticity for growth. They run startups which are organic systems that keep growing and expanding. A startup is a company designed to scale very quickly. They pursue growth unconstrained by geography which differentiates startups from small businesses. Selling in Facebook removes the commissions you pay Konga or Jumia in their marketplaces, but that does not remove the very fact that you must sell the items to be price-competitive, to someone who lives near an open market, a supermarket, or a small (gate man) shop in another city.

Simply, even Facebook vendors would not win this market; the experimentation must continue because the future of commerce includes digital (and online).

10.4 – Penetration Testing Distributions

0

A security-focused operating system supports the ethical Hacker to find weaknesses as well as exploit systems for identifying vulnerabilities in networks and computer systems. These operating systems come with pre-installed tools for the objective of penetration testing and ethical hacking. These operating systems are very important because they come with preloaded dynamic tools for building […]

This post is only available to members.

10.3 – Penetration Testing Tools

0

Like weapons to soldiers, automated tools play a significant role in the viewpoint of penetration testing. Penetration testing tools are typically used to take care of laborious and rigorous works. With these tools, a tester can pay attention to more practical tasks which may not easily be automated. This section includes several penetration testing tools […]

This post is only available to members.

10.2 – Vulnerability Assessment

0

A vulnerability assessment is a procedure of running automated tools against protected IP ranges or IP addresses to detect the weakness in the atmosphere. Vulnerabilities are usually in misconfigured and unpatched systems. The tools implemented to run vulnerability scans may be available in paid versions or free open source tools. The paid versions usually include […]

This post is only available to members.

10.1 – Pen Test Methodologies

0

Penetration testing which is also referred to as ethical hacking tests computer systems protection against attacks, and executes a comprehensive analysis of the computer system vulnerabilities. A penetration test can also be useful in determining what occurs when the system goes into reaction mode to an attack, and what information can be gathered from the […]

This post is only available to members.