RSS

Monthly Archives: June 2014

MPESA and the looming Mobile Virtual Network Operators (MVNO)

Once Upon a time there was a monolithic system that was called MPESA, the system was the awe of all, friends and foe,and just like the proverbial story of the 3 little piggies it was targeted by several big bad wolves (YU Cash,Airtel Money etc), but the wolves huffed and puffed but since MPESA was housed in a brick house (At present M-Pesa’s has 15 million users conducting more than 2 million daily transactions, which by some estimates adds up to as much as 60 percent of the country’s gross domestic product.) they couldn’t do shyt…so most the wolves gave up and were content eating scraps as the piggies were safe. But the story doesn’t stop there….far from it….it goes on. The piggies lived in the brick house and grew hard headed….boastful you would say, they failed to innovate, they failed to let anyone in, they viewed everyone with scepticism  and in so doing exposed there weak under belly.

winter_is_coming_w1

But as Game of Thrones taught us ..winter is coming….soon  there would be a bigger hurdle than the wolves they had fought…Enter MVNOs. Basically An MVNO is a wireless communications services provider that does not own the network over which it provides those services to customers.  sasa ni nini hiyo Jaymo? Relax…..As we speak Kenya has licenced three mobile virtual network operators, Finserve Africa, Mobile Pay, and Zioncell Kenya. Of Interest to me here is Equity Bank’s Finserve , this is because Equity Bank is Kenya’s biggest lender with eight million account holders.Equity should be able to make its offerings attractive by providing links to its core banking services, which are not available through M-Pesa. So basically if I have an account with Equity they can quickly deprecate the need for an ATM and instead use a mobile Phone for everything from withdraws,purchases etc

Finserve is not Equity Bank’s first foray into mobile money. It previously partnered with Safaricom on M-Kesho, a banking and savings service that proved to be unsuccessful due to complications over revenue sharing between the stakeholders.   Safaricom has since partnered with Commercial Bank of Africa (CBA) to launch a similar product branded as M-Shwari, which has signed up 7 million subscribers. On the strength of this adoption rate, CBA now claims to have overtaken Equity Bank as the lender with the highest number of retail loans.

I believe the biggest hurdle will be creating products that are  appealing to the ordinary Mwananchi… screw the lipa na MPESA stuff, am talking real world issues like Request for salo advance via Mobile Money, a realtime  fare systems for matatus etc. The second issue will also be an agent network that can rival Safaricom’s this will not happen overnight and will be expensive to roll out.  But lets just wait and see

 
1 Comment

Posted by on June 30, 2014 in Uncategorized

 

5 of My best Unsolved Mysteries of the Internet

Below are some of those things the Internet will never let the muggles find out. I have keenly been watching them with the hope that someone will one day solve them, to no avail. Feel free to add your own on the comment section.

 

1.Cicada 3301

A secret Group that posts Complex puzzles for people to solve, The purpose remains unknown with speculations ranging from CIA recruitment,M16 or online Hacking groups. The puzzles are usually posted on message boards  on the Internet as well as the Dark Internet. However one guy(Joel Eriksson) actually solved a puzzle they posted. Read more about him and the puzzle here>>> They have a cool Logo though

cicada_3301_2014

 

2. Bitcoin

The mystery here is not what bitcoin is but merely who created the online currency. All that is know is that  Satoshi Nakamoto was the first to publish a paper that theorized the currency. Satoshi Nakamoto is the potentially pseudonymous name associated with the person or group of people who released the original Bitcoin white paper in 2008 and worked on the original Bitcoin software that was released in 2009. Since Satoshi’s identity is tied up intricately with Bitcoin’s history, it is helpful to understand Bitcoin’s provenance. Bitcoin is one of the first digital currencies which use peer-to-peer technology to facilitate instant payments.

download3.A858

The reddit user named A858DE45F56D9BC9 posts long passages of coded text on the site. A dedicated community and an automated bot have yet to solve the riddle to date

CVCOTGl

4. The Markovian Denigrate Parallax  

But back in 1996, users of the proto-Web community Usenet got spammed with messages that reached an almost transcendent level of bizarre—a weirdness so precise it implied the influence of a very human intelligence. “Markovian Parallax Denigrate,” read the title of each post, followed by a mountain of seemingly meaningless word spew:

jitterbugging McKinley Abe break Newtonian inferring caw update Cohen
air collaborate rue sportswriting rococo invocate tousle shadflower
Debby Stirling pathogenesis escritoire adventitious novo ITT most
chairperson Dwight Hertzog different pinpoint dunk McKinley pendant
firelight Uranus episodic medicine ditty craggy flogging variac
brotherhood Webb impromptu file countenance inheritance cohesion
refrigerate morphine napkin inland Janeiro nameable yearbook hark

According to later accounts, hundreds of these messages flooded Usenet discussion groups on Aug. 5, 1996, launching the type of intense rigorous inquiries you’d expect from the geeky academics who frequented Usenet back then—none of which turned up any answers. Ten years later, 2006, patterns in the cypher and the originating email syntax raised  made people agree that  The Markovian Parallax Denigrate a message was probably a  cipher hiding a deep government secret? Read more here>>

mpd_wallpaper

 

5. Internet Black Holes

In networking, black holes refer to places in the network where incoming or outgoing traffic is silently discarded (or “dropped”), without informing the source that the data did not reach its intended recipient.When examining the topology of the network, the black holes themselves are invisible, and can only be detected by monitoring the lost traffic; hence the name. This was proved in around 2008, previously they were dismissed as WIFI or server issues

carte-web-en

 

 

 
3 Comments

Posted by on June 9, 2014 in Uncategorized