Posts

Showing posts from June, 2025

Picking a team

Most things in life is simple and small. You don't need a big and very experienced person to get small tasks done. 

BOARD OF DIRECTOR ROLES

 Each committee within a board of directors serves a specific purpose and requires a unique set of skills and experience. Let's break down the specific skills required for each committee role and contrast their objectives: a) Nomination Committee:    - Objective: Responsible for identifying, selecting, and nominating candidates for the board of directors and ensuring a diverse and skilled board composition.    - Skills required: Knowledge of corporate governance principles, understanding of the company's strategic direction, experience in talent assessment and succession planning, familiarity with relevant regulatory requirements, ability to evaluate board performance and composition. b) Remuneration Committee:    - Objective: Oversees executive compensation, including salaries, bonuses, and equity incentives, to ensure alignment with company performance and shareholder interests.    - Skills required: Understanding of executive compensation ...

Invisible cloth technology

The technology behind self-adaptive photochromism (SAP) cloth, a recent innovation, revolves around the use of specialized molecular compounds that can change their structure and thus their color in response to different wavelengths of light in their surroundings. This allows the material to spontaneously adapt its color to blend in with its environment, much like a chameleon. Here's a breakdown of the key technological aspects:  * Photochromic Molecules: The core of the technology lies in the incorporation of specific photochromic molecules into the fabric or as a coating on the fabric. These molecules are designed to have at least two stable forms with different absorption spectra, meaning they appear as different colors.  * Light-Induced Structural Change: When light of a particular wavelength (color) strikes these molecules, it triggers a reversible chemical reaction, causing the molecules to switch from one structural form to another. This change in molecular structure al...

Billionaires before 30 years old

Based on the latest information available in April 2025, here are some individuals who achieved billionaire status by the age of 30, along with their primary business ventures: Self-Made Billionaires:  * Alexandr Wang (28 years old): Co-founder and CEO of Scale AI, a San Francisco-based company that provides data labeling and software for training artificial intelligence models.  * Ed Craven (29 years old): Co-founder of Stake.com, which is described as the world's largest crypto-backed online casino. Billionaires Through Inheritance: Several individuals under 30 have become billionaires through inheritance from family businesses. These include:  * Johannes von Baumbach (19 years old): Heir to Boehringer Ingelheim, a large German pharmaceutical company.  * Clemente Del Vecchio (20 years old): Inherited a stake in Delfin, a holding company with significant shares in EssilorLuxottica (eyewear) and other major companies.  * Lívia Voigt de Assis (20 years old): One ...

Motivating stories

Three stories to boot: 1. Nokia refused Android 2. yahoo rejected google 3. Kodak refused digital cameras Lessons: 1. Take chances 2. Embrace the Change 3. If you refuse to change with time, you'll become outdated Two more stories: 1. Facebook takes over whatsapp and instagram 2. Grab takes over Uber in Southeast Asia Lessons: 1. Become so powerful that your competitors become your allies 2. Reach the top and eliminate the competition. 3. Keep on innovating Two more stories: 1. Colonel Sanders founded KFC at 65 2. Jack Ma, who couldn't get a job at KFC, founded Alibaba and retired at the age of 55. Lessons: 1. Age is merely a number 2. Only those who keep trying will succeed Last but not least: Lamborghini was founded as a result of revenge from a tractor manufacturer who was insulted by Ferrari founder Enzo Ferrari. Lessons: Never underestimate anyone, Ever! ✔️ Just keep working hard ✔️ Invest your time wisely ✔️ Don't be afraid to fail

Familiarity breeds contempt?

The old adage familiarity bridge contempt. I do not think that this statement is true. The person who coined this phrase must be an observer and not a participant. Familiarity do not breed contempt. I have seen familiarity breeds love.  So where does the content come from. It is the act of one person in respond to another person. If a woman finds the reply from the man is totally acceptable to her, then this breeds love. The feeling of contempt comes about when the woman disagree totally with the man. In all that he says and what he does.  Naturally this will end up in arguments and pointless debates.  When things get heated emotionally, it has a way of getting out of hand into areas of personal attack.  When that happens you start to hate each other to the core. This is how contempt is bred.  If you have another point of view, I would like to hear from you. 

Marketing and sales strategies.

The technology behind self-adaptive photochromism (SAP) cloth, a recent innovation, revolves around the use of specialized molecular compounds that can change their structure and thus their color in response to different wavelengths of light in their surroundings. This allows the material to spontaneously adapt its color to blend in with its environment, much like a chameleon. Here's a breakdown of the key technological aspects:  * Photochromic Molecules: The core of the technology lies in the incorporation of specific photochromic molecules into the fabric or as a coating on the fabric. These molecules are designed to have at least two stable forms with different absorption spectra, meaning they appear as different colors.  * Light-Induced Structural Change: When light of a particular wavelength (color) strikes these molecules, it triggers a reversible chemical reaction, causing the molecules to switch from one structural form to another. This change in molecular structure al...

Play with Ants

Copy from author of ANTS 🐜  1.  5 ants + 5 ants = Tenants 2. To bring an ant from another country into your country = Important 3. Ant that goes to school = Brilliant 4. Ant that is looking for a job = Applicant 5. A spy ant = Informant 6. A very little ant = Infant 7. An ant that uses a gun = Militant 8. An ant that is a specialist = Consultant😂 9. A proud ant = Arrogant🤔 10. An ant that is cruel and oppressive = Tyrant 11. An ant that is friendly and lovely = Coolant 12. An ant that has changed from evil to good deeds = Repentant 13. An ant that accumulated so much food in summer for use in winter = Abundant 14. An ant that isn’t willing = Reluctant 15. An ant that keeps financial account = Accountant 16. An ant that occupies a flat = Occupant 17. A huge ant = Giant 18. An ant that is important = Significant 19. An ant that has big legs = Elephant 20. A sarcastic ant = Mordant 21. An extremely fast ant = Instant 22. A noisy ant = Rant 23. An ant that doesn't keep moving =...

Finian Tan in the US33.3 million nickel trading scam orchestrated by Ng Yu Zhi

Based on the reports, the scam tactic used on Finian Tan in the US33.3 million (S25.7 million + US$14.1 million) nickel trading scam orchestrated by Ng Yu Zhi appears to be a combination of deception and building trust, centered around a fabricated business opportunity. Here's a breakdown of the tactics employed:  * Creating a False Narrative of Profitable Trading: Ng allegedly deceived Finian Tan into believing that his company, Envy Global Trading (EGT), was engaged in legitimate nickel trading. He claimed to be buying nickel at a discount from a supplier due to a term contract secured when prices were low and then selling it for a profit as demand increased. This narrative seemed plausible to Tan, who had prior experience in commodity trading.  * Establishing Credibility and Trust: Ng cultivated trust with Tan over time. This was achieved through several means:    * Investing in Vickers Venture Partners: Ng initially invested US$13 million into a company within th...

Ten checks to stop being scammed

10 flashcards: BE SCAM WISE --- Flashcard 1 Q: What is a common sign that an email might be a phishing scam? A: Poor grammar, urgent or threatening language, suspicious links, or requests for sensitive information. --- Flashcard 2 Q: What personal information should you never share in response to an unsolicited phone call? A: Social Security number, bank account details, credit card numbers, passwords, or PIN codes. --- Flashcard 3 Q: What is the purpose of a "romance scam"? A: To build a fake online relationship and eventually trick the victim into sending money or gifts. --- Flashcard 4 Q: What is "spoofing" in the context of online scams? A: When a scammer disguises their phone number, email address, or website to appear as a trusted source. --- Flashcard 5 Q: How can you verify if a message from your bank is legitimate? A: Contact your bank directly using official phone numbers or log in to your account through the official website—never click on links in the me...

Ng Yu Zhi ponzi scheme exposed

Ng Yu Zhi was charged in March 2021 in connection with a multi-million dollar investment scheme involving his companies, Envy Asset Management and Envy Global Trading. As of May 8, 2025, his trial is ongoing in the High Court. He is contesting 42 charges out of a total of 108 charges. These 42 charges include:  * 10 counts of cheating  * 15 counts of forgery  * 1 count of criminal breach of trust as a director  * 14 counts of money laundering  * 2 counts of fraudulent trading Ng has been in remand since January 31, 2024, after his bail was revoked. During the trial in April 2025, witnesses testified about Ng's lavish lifestyle, including spending millions on luxury cars and a diamond ring, allegedly funded by the investment scheme. A liquidator testified that the purported nickel trading business did not exist and that Ng's business operated like a Ponzi scheme.

Black Rock business model

What is black rock business model and how do they make positive cash flow BlackRock operates as the world's largest asset management firm, with a business model centered on **asset management, advisory services, and technology solutions**. Here's how they generate positive cash flow: Business Model 1. Asset Management: BlackRock earns fees by managing assets for institutional and retail clients. This includes mutual funds, ETFs (notably iShares), and customized portfolios. Fees are based on assets under management (AUM), which exceeded $10 trillion in 2023[1][3][9].     2. Advisory Services: The company provides investment advice, financial planning, and risk management services to diverse clients, earning advisory fees[1][3]. 3. Technology Solutions: BlackRock's Aladdin platform offers advanced analytics and risk management tools to other financial institutions, generating additional revenue[7][9]. 4. Securities Lending: They generate income by lending securities held in t...

European supplier of Toyota auto parts, victim to a (BEC) scam, resulting in $37 million loss.

In 2019, Toyota Boshoku Corporation, a major European supplier of Toyota auto parts, fell victim to a Business Email Compromise (BEC) scam, resulting in a loss of approximately $37 million (¥4 billion). Cybercriminals impersonated a business partner of the Toyota subsidiary via email. They successfully manipulated an employee in the finance department to change bank account details and transfer funds to an account controlled by the scammers. The fraudulent transfer occurred on August 14, 2019. Toyota Boshoku became aware of the fraudulent activity shortly after it happened and promptly launched an investigation involving legal professionals. They also reported the incident to the local investigating authorities and have been cooperating fully in the ongoing efforts to recover the stolen funds. BEC scams like this rely on social engineering tactics rather than technical hacking. The perpetrators often impersonate trusted entities, such as executives or business partners, to deceive empl...

Business Email Compromise (BEC) scam.

In a sophisticated Business Email Compromise (BEC) scam that occurred between 2013 and 2015, Facebook and Google were collectively defrauded of over $100 million. The perpetrator was Evaldas Rimasauskas, a Lithuanian man who orchestrated the scheme by impersonating Quanta Computer, a legitimate Taiwanese hardware manufacturer that both tech giants regularly did business with. Rimasauskas established a company in Latvia with a similar name to Quanta Computer and opened bank accounts in Latvia and Cyprus. He then sent fraudulent emails to Facebook and Google employees, posing as representatives of Quanta Computer. These emails included forged invoices, contracts, and letters, directing the victims to wire payments for supposed hardware deliveries to the bank accounts controlled by Rimasauskas. Over the two-year period, Facebook reportedly paid around $99 million and Google approximately $23 million into these fraudulent accounts. Rimasauskas then laundered the stolen funds through variou...

UNDERSTAND 2 FACTOR AUTHENTIFICATION

2FA stands for  Two-Factor Authentication . It's a security process that requires two different authentication factors to verify a user's identity before granting access to an account or system.   Elaboration: What it is: 2FA is a form of multi-factor authentication (MFA) that adds an extra layer of security beyond just a password.   How it works: It requires users to provide two distinct forms of identification, typically:   Something you know:  A password, PIN, or security question answer.   Something you have:  A physical device like a smartphone, security token, or a code sent via text message.   Something you are:  Biometric information like a fingerprint or facial recognition.   Purpose: 2FA enhances security by making it more difficult for unauthorized users to access an account, even if they have stolen a password.   Examples: Logging into a website with a username, password, and a code sent to your phone.   Using ...

EUCHARIST MIRACLES DOCUMENTED

regina Bolsena   Nearly 800 years ago, there was a German priest named Peter who had found it hard to believe that Jesus was truly present in the Eucharist. One day, Father Peter was celebrating Mass when something unusual happened — he saw drops of blood coming from the Host onto the cloth and altar. Father Peter was surprised and went to the nearby city of Orvieto to tell the Pope. The Pope listened carefully, sent people to check and confirmed what had happened. The cloth stained with the blood was then placed in the Orvieto Cathedral. Because of this event, the Pope started a special Church celebration called Corpus Christi to honour the Body of Christ.  Cascia   In 1330, a priest in the Italian town of Siena did not believe the Eucharist (Holy Communion) was special. When asked to bring Holy Communion to a sick man, instead of carrying the Host properly in a special container called a pyx, he carelessly placed it between the pages of his prayer book. When h...

Turn off pop up ads (Chrome)

Image
Open Chrome's setting, site settings, pop ups and redirects, off it, save and exit. Simple yes, if you know how to do it.