DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7231

Bubbling Coins – Today’s ICOs are 1990s’ IPOs

0

After Kodak did the unthinkable by popping its stock more than 120% just for adding the word “coin” after “Kodak”, I do not need any czar to explain that it is around the corner: Bubble.

This is not my expertise: I do not trade stocks. I do not have time to study and analyze stocks. But right now, I do think that many bad things would happen in the next 24 months in the new ICO (initial coin offering) sub-sector of cryptocurrency. Though ICO bubble may not have the same level of impacts as the stock market crash (early 2000s) and Great Recession (2008), it would still be impactful. Why? They are not using cows and sands to buy the coins; they use euro and dollars.

Cryptocurrency may be fine but the ICOs are doomed. That you can create a virtual currency and ask people to give you real money while you allocate those virtual things is unbelievable. You can devalue that coin by creating more. And technically, it could be useless depending on how you wake up in the morning and what you plan to do. Yes, you are the absolute boss: the bank, the central bank and the securities regulator. Yet, people continue to believe ICO despite the obvious risks.

An unregulated means by which funds are raised for a new cryptocurrency venture. An Initial Coin Offering (ICO) is used by startups to bypass the rigorous and regulated capital-raising process required by venture capitalists or banks. In an ICO campaign, a percentage of the cryptocurrency is sold to early backers of the project in exchange for legal tender or other cryptocurrencies, but usually for Bitcoin. (Investopedia)

This is a bubble coming – today’s ICOs are the IPOs of the 1990s. (In 1990s, companies raised easy money in the stock market with reckless abandon. Most collapsed in early 2000s). The ICOs would not end well. And as that happens, we would see some impacts in the real world. Sure, we would have more billionaires but most would ripple through. Oh yes, Ripple founder is now one of the richest people on earth.

Chris Larsen, the cofounder, executive chairman, and former CEO of the cryptocurrency company Ripple, became the world’s fifth wealthiest person as the price of Ripple’s XRP cryptocurrency soared past the $3 mark this week.

The recent price surge catapulted Larsen ahead of Googlecofounders Larry Page and Sergey Brin (nos. 8 and 10 respectively, excluding Larsen) in terms of personal net worth, according to data from Forbes’ billionaires list. The lift also gave him an edge over Oraclecofounder Larry Ellison (formerly no. 5).

The Ripple portfolio value has since receded, but the trajectory is still there. It is very crazy; people are losing their minds. And I ask: how can someone believe ICO?

2.3 – Authentication Techniques

0

Password In private and public computer networks, authentication is usually done with the use of login IDs (user names) and passwords. Knowledge of the login details is pretended to make sure that the user is authentic. Each user registers at first using a given or self-declared password. On each successive use, the user must know […]

This post is only available to members.

2.2 – Account Accessibility

0

Identification The identification procedure collects information about who applied for access. This procedure is generally used by the unique machine-readable names. Based on this system, authentications are validated, enabling access. In terms of humans, users and resources connect in mutual identification when they apply for access permission. For example, during phone calls, people tell others […]

This post is only available to members.

2.1 – Account Administration

0

Creating a new user is a simple procedure, but it must be secured and protected with organizational security policy procedures. User accounts should not be created at anyone’s request or urge of an admin. Rather, a strict process should be followed that flows from the HR department hiring process. The formal request for a new […]

This post is only available to members.

2.0 – Access Control Techniques

0

The basic construct in the establishment of information security regime is regulating how resources which are to be accessed will be protected against network vulnerabilities. The control mechanisms deployed vary in nature, and could be administrative, physical or technical. Access Control is a security method which is being used to grant access and certain authority […]

This post is only available to members.