I voted!

No, not politics but Otto’s survey. Just go to IKN and look for the “WHICH WILL BE WORTH MORE AT END 2015?” poll on top of the page.

Before you vote, here’s my thoughts on each option:

1) AAPL: Not sure how much upside there is left after the past few years or what the margins are on mobile devices now that they are ubiquitous. Any monkey could have told you that but did you know that the proliferation of mobile devices gave birth to something called big data? Put simply: everything you do is recorded and analyzed. Your mood, location, places you’ve shopped at, relationships, etc. Feeling stressed out? Don’t be surprised to see a coupon for your local day spa on your smartphone. Walk into a bar? Expect an ad for a “get you home safely” taxi service on your trusty device. Ended a relationship on a social network? Book a comfort-sex trip to Kenya with any of our preferred travel partner sites. AAPL doesn’t really use “big data” in their business plan but their devices make it possible for others to do so. Did you know there are private, for-profit companies who will sell your current and recent location to anyone based on GPS data embedded in publicly available social-media posts? George Orwell was wrong about one thing only: the date was off by 30 years.

2) Bitcoin: I don’t understand it being used as a currency but you may be surprised to know that Bitcoin has serious implications for online security. Bitcoin is based on “mining” computer hashes, similar what is used in cryptography. As a result, cryptography that was considered secure only a few years ago is now trivial to break because Bitcoin miners have learned how to exponentially increase the speed of hashing (particularly by applying graphic processors or GPUs instead of CPUs). It used to be if a company like Target, Home Depot or JP Morgan got hacked, encrypted data on their servers such as passwords was relatively safe. Now this data is exposed and sold in no time. This combined with the existence of a shadowy industry where you can sell computer vulnerabilities to the highest bidder (ie. governments and businesses) means there is a tremendous incentive for hacking.

3) Gold: It’s shiny. For more wisdom, ask Otto because I don’t know.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s