Your cart is currently empty!
Category: Knowledge Base
-
Internet Speed Test
Definition
Internet speed refers to the rate at which data is transferred between your device and the internet. It’s typically measured in megabits per second (Mbps). There are two key aspects of internet speed:
- Download Speed: The rate at which data is received from the internet to your device.
- Upload Speed: The rate at which data is sent from your device to the internet.
Why Internet Speed Test
Enhance Working Efficiency
Imagine that in our daily life almost 90% of our working time relies on the internet connection. To increase th internet speed can significantly increae our working efficiency
Internet Service Provider (ISP) Cost Estimation
While the monthly ISP Cost is highly depended on the internet speed, to know the current internet speed can let us estimate how much monthly cost we have to increase in order to increase the internet speed
Step By Step on How to Test Internet Speed
Home/Office WiFi
- Connect your laptopt to your Home/Office WiFi. (i.e. NOT to connect WiFi from the Hotspot of your Mobile Device)
- If there is WiFi network with the suffix 5G (e.g. WiFi Network Name = TPLink_5G), always choose this network to do the test.
- https://www.hkbn.net/personal/broadband/en/speedtest
- Record
DOWNLOAD Mbps
- Record
UPLOAD Mbps
HKBN Internet Speed Test
Your Mobile ISP
- Use directly your Mobile Device Data Plan from your ISP. (i.e. NOT using the Hotspot in your Mobile Device and receive WiFi from shared in your home/office.)
- https://www.hkbn.net/personal/broadband/en/speedtest
- Record
DOWNLOAD Mbps
- Record
UPLOAD Mbps
Mobile ISP Internet Speed Magnitude of your WiFi Connection
- Login your Desktop Device
Desktop Tools Bar Connected WiFi - Check if the Receiving bar is full (i.e. You can see 4 waves)
How to speed up your Internet connection speed
Elminiate bottleneck of your Router
The Max Throughput, Bandwidth and WiFi Standard (e.g. WiFi 7 in 2024) will affect the compatibility between your router and the internet connection of your ISP. A fast internet connection but with limited router Max Throughput , Bandwidth and WiFi Standard will slow down your internet connection.
How You Router May Look Like What the Specification Label Look Like How to check the WiFi Standard of your Router
Check out the Router Brand and Model Number from the Router Specification Label (which normally sticked in the bottom of your Router) and the search the WiFi Standard in Google. When the result show up in Google, please double check the Brand and Model Number in the result is same as the Brand and Model Number that you are seeking for.
How to check the WiFi Standard of your Destkop Device
- Login your Desktop Device
Desktop Tools Bar - Find out the connected WiFi Network
- 🛈
Connected WiFi WiFi Specification In Desktop - Following Properties affects the Internet Speed:
Protocol
Network band
Link speed (Receive/Transmit)
How to check the WiFi Standard of your Mobile Phone
- Search in Google the WiFi Standard of your Mobile Phone Brand and Model Number
Example of Mobile Phone Wifi Standard (For Mobile Device – Samsung S22)
Choose appropriate Bandwidth from the WiFi Connection
You may wonder why you can always find 2 WiFi Networks available for connection in our home or office, which they usually show their WiFi Network name as below:
- <<ROUTER_MODEL>>
- <<ROUTER_MODEL>>_2G
- <<ROUTER_MODEL>>_5G
While I don’t want to go through a physics class to explain what is the difference between the two, the rule of thumb is that if both of two networks’ connection level (i.e. weak or strong) are the same , always choose the 5G. The “G” in fact is a unit of the frequency which means:
Higher Frequency > Higher Power > Faster WiFi Transmission Speed
Connected WiFi
Location of your Device
There are 2 factors affecting the transmission speed of your WiFi in your home or office:
Distance between the Router and Your Device
Every router has its maximum distance of transmission. Not surprisingly, the closer your device is to the router, the faster internet speed you will enjoy. If in reality your device cannot stay close (e.g. 5 meters) to the router, you can consider
- Switch to the WiFi Network with suffix of “5G“. (e.g. TPLinkP84_5G”)
- Purchasing a WiFi Range Extenders in your home/office.
Obstacles between the Router and Your Device
Even though your device stays close enough to the router, if following objects are located between the device and the router, the WiFi connection speed will be slow down:
- Microwave (which is running)
- Glass
- Mirror
- Water
So please stay away from these objects if you want to have a faster WiFi speed. Or if it is not feasible to do so, please consider either a stronger Router or WiFi Amplifier.
Firmware of your Mobile Device
The Firmware of your mobile device will always affect the WiFi connection speed in aspects of its Network Driver, Security Update and Bug Fixing. So simply update the Firmware of your mobile device may speed up your WiFi connection.
Whenever there is a updated version of a Firmware, your device will automatically notify you as long as you are online. So simply don’t ignore the Firmware update notification shown in your device.
-
Task Properties in Teamwork.com
Definition
Teamwork.com
Teamwork.com is a SaaS (Software as a Solution) which is a Project Management System applied in Diamond Digital Marketing (DDM) to manage the exeuction of all project. For details about what Teamwork.com is, please refer to the article What is Teamwork.com
Task Properties
Task Properties in Teamwork.com is any attribute (i.e. property) other than the customized
Task Description
written by users.Teamwork Task Properties
How to use the Task Properties
Task Properties provide the prerequisite information to make the task executable. Both Assignor and Assignee can and will use the Task Properties to comprehend and complete the Task. Let’s enumerate the highlighted Task Properties one by one to go through their usage.
Task Completion Status
Figure 1 – Teamwork Task Status Completion The
checkbox in Figure 1 shows the Task Completion Status.
Obviously, it will be ticked after the Task is classified as Completed. However, it is not as easy as you think on how to classify a Task as completed.
In the perspective of an assignee, the assignee may regard the Task as completed simply after all the output in the Task Description is delivered.
However, in the perspective of an assignor, the assignor will need to review the Task before it can be classified as completed. Besides, if the Task is marked as completed by the assignee, the assignor will have no clue to find out the Task lists which he/she has to review.
Therefore, Task Completion Status should only be modified by the Assignor.
(i.e. Assignee should NOT modify the Task Completion Status)
If the assignee wants to notify the assignee that he/she has completed the Task, the
Board Column
should be used. Details will be elaborated in the later paragraph of this article
Prority
Task Property Priority The
Priority
(High/Medium/Low) button will NOT be used by assignor and will be used by assignee only in the situation described the article Daily Routine Communication Protocol for All Teammate.It is not recommended to use the
Priority
button to classify the task due to the fact that priority is a relative concept which the value (High/Medium/Low) will change from time to time. If every task is classified as High, then the classification will be meaningless.Besides, If there is more than one assignor for an assignee, the priority button will be meaningless due to the fact that each of the assignor may regard his/her task as high priority, which has no help for the assignee to decide which task should go first.
Please be understood that we do not use the Priority button does not mean that we will not have another mechanism to classify the priority of the Task.
Progress & Time
Teamwork Task Property Progress And Time The Progress & Time button is consisted of 2 functions:
Estimated time to complete
Estimated time to complete
will be provided by the assignor every time when the assignor assigns the task to the assignee. It is an crucial information for the assignee to delivery the task properly, which can be demonstrated in following scenarios:- While the
Estimated time to complete
a task is set to 1 hour , if the assignee based on his/her experience and realises that this task is impossible to be completed within 1 hour, the assignee should raise out the problem (and raise out loudly!). It may either the assignee misunderstand the Task Instruction, or the Task Instruction is really unfeasible. No matter how, it is the duty of the assignee to raise out the problem BEFORE he/she carry out the task. - In another scenario, still while the
Estimated time to complete
a task is set to 1 hour, but this time the assignee has no experience or idea on whether or not the task can be completed within 1 hour, it is the duty for the assignee to raise out when he/she has already spent 1 hour to do the task, no matter the task is completed or not. This may be due to either the low quality of the estimation from the assignor, or the assignee misunderstand the task instruction. No matter how, this is a problem to be addressed and optimised , which makes the estimation in the next task to be more precise.
Therefore, both the assignor and the assignee should pay extra attention on the
Estimation time to complete
.Progress so far (0%)
The
Progress
button will NOT be used by assignor and will be used by assignee only in the situation described the article Daily Routine Communication Protocol for All Teammate.In fact, if you don’t know what is 100% of a completion of a task, you will have no idea on what is 50% completion. The definition of Completion between assignor and assignee will always unlikely be the same. And therefore, it the
Progress
% of the task will be meaningless if the definition is not be synchronised between 2 parties.
Followers
Teamwork Task Property Followers As an assignor or assignee, you can either use the
Followers
button to manage the followers of the task, or simply use the comment handler (e.g. @someone) in the comment of the task so that the target teammate will automatically become the followers of the task.For how to use the comment handler, please refer to the article How to Comment in Teamwork.com
Tags
Teamwork Task Property Tags The purpose of the
Tags
button is to give 1 (or more) Tag(s) to the task such that either assignor or assignee can classify the Task to any category as you wish, which can be easily found out by applying the Tag Filter.As an assignor and assignee , if you think any tag would facilitate you to carry out the task, please feel free to use the tag as much as you want.
The only concern is to make sure that you have a systematic way to name the tag such that the tag can be uniquely identified (from other tags or the tags created by other teammates).
Task Property Tag (R&D + Role Model) Task List Filter By Tag through Task List View
Dependencies
Teamwork Task Property Dependencies Dependencies
means which another task should be completed before you can carry out the current task. It simply create the task chain which make you (as an assignor) to carry out the task in sequence.The
Dependencies
button can be found in both Parent task and Sub Task.
Repeats
Teamwork Task Property Repeats The
Repeats
button can set individual tasks to repeat at specific intervals. Once you setup a specific task as a repeated task, the sub tasks will automatically be created, which means a new task# will also be created. Therefore, when you use theRepeats
button, please take into following consideration:- If you don’t mind a new Task# is created every time a new sub task is created ,then the
Repeats
button is appropriate. For example , if you want to assign the task to the assignee requesting him/her to submit a weekly report to your client, then theRepeats
button is best fit due to the fact that the weekly report tasks for each week are independent.
On the contrary , if it is better to consolidate all the comment and feedback into one Task# every time the task is updated periodically, then the Repeats button is not appropriate. For example, If you want to send the comment log to your client containing all the comments and feedbacks for a specific task, then it is better to consolidate all the materials into one task instead of separate it in different Task#.
The
Repeats
button can only be found in Parent task (i.e. cannot be found in Sub Task)
Privacy
Teamwork Task Property Privacy Privacy
means you may only want the Task or comments to be seen by only some of the people. As a assignor or assignee , you can configure thePrivacy
in following target:- Task List
- Task Comment
Put it in another word, you cannot configure the privacy in a specific Task.
The
Privacy
setting is useful especially in the scenario that you want to have an internal discussion with your teammate before you submit the deliverable to your client. Or in another scenario that as there are too many back and forth discussion comment which may disturb the decision of the client, and therefore you set the restricted privacy only to your internal team.Teamwork Comment Set Privacy Task Property Task List Privacy
Reminders
Teamwork Task Property Reminders The word
Reminders
is self-explained that no matter you are an assignor or assignee , you can both set a reminder to remind yourself or your teammate to carry out the task any day in the future.The reminded target will receive a reminder email when the time it met. Feel free to use the
Reminders
function as you wish!
Board Column
Teamwork Task Property Board Column Board Column
is a kan-ban board which can let the assignee to switch the Task Status after he/she had carried out the specific action to the Task.By default, there are 11 Task Status for the assignee to choose as below:
Task Status Description 00 : Start Working The assignee immediately changes the Task Status to 00: Start Working such that the assignor will know that the assignee did not miss the task and acknowledged the task. 01: Wait Approve – DDM PM The task is completed by the assignee and is seeking for approval from the Project Manager (PM) in DDM Group. 02: Wait Approve – Client 1st Level The task is approved by DDM PM and is seeking approval from the 1st level of the client. (which may be the Marketing Executive from client’s side) 03: Wait Approve – Client 2nd Level The task is approved by the client’s 1st level and is seeking approval from the 2nd level of the client. (which may be the Marketing Manager or the boss itself) 04 : Wait Client Response Further input is required to be provided from the client before the task can move forward. 05 : Modifying If there is any comment or feedback provided from Task Status 02/03/04, the assignee can switch the Task Status to 05 such that the approver will know that the assignee is working on the Task before the next approval. 06: Pending The Task is pending 07 : Approved – DDM PM Correspond to the Task Status 01 08 : Approved – Client Final Level Correspond to the Task Status 03 09 : Conditional Approved – Client Final Level Correspond to the Task Status 03 or 08 10 : Not Applicable The task is not applicable to be executed. It may happen in the Sub Task which is created by the Task List Template. 11 : Task Completed Task is completed. It should switch the status by the assignee. This Task Status 11 replaces the Task Completion Status button which mentioned earlier in this article.
It is strongly recommended the assignee to switch the Task Status IMMEDIATELY after the Task Status is changed. Which means:
- Do NOT wait for all other tasks to switch the Task Status in one batch at the end of the date. Please be understood that the main purpose of the Task Status is for providing updated and real-time information for the assignor to understand the progress of the whole project. The assignor will also assign any other related tasks to another teammate based on the Task Status you have modified. In a nutshell, don’t assume that you are the only one who will read the Task Status. Always be a virtuous teammate who keeps communication duty as the 1st priority.
As an assignee , you can use the
Board Column
to see the Task Status throughout the project in a Kan-Ban Board view. You are expected to read the Task Board every day before you start working so that you may have a comprehensive understanding on the priority of your task on that day.Teamwork Task Property Board Column Example
Who should do this
Task Property Priority Who should do this
simply means which teammate you are going to assign the task to (i.e. the Assignee). Both assignor and assignee can add/remove assignee as per wish. Besides, you can also assign more than one assignee per Task.
Date
Teamwork Task Property Date Date consists of Start Date and Due Date. While this property is self-explained , the only reminder to you is that it is the duty for the Assignor to fill in BOTH Start Date and Due Date in the task. If either one of the Date is missed, the assignee cannot use the filter to screen out the related Task.
On the contrary, as an assignor , if you cannot see the Start Date or Due Date in the task, please raise out to the assignor.
Sub Task
Teamwork Task Property SubTask SubTask
is the child task of a Parent Task. One Parent Task can have manySubTasks
, while one SubTask will only have one Parent Task. EachSubTask
will have its own SubTask number. So you can expect the hierarchy of the Task as below:- Task List Template
- Task List
- Task (Parent Task)
- SubTask
- Task (Parent Task)
- Task List
Whenever you assign a task to a teammate , that teammate will automatically be assigned to all the
SubTask
of its Parent Task.Both assignor and assignee are welcome to create the
SubTask
.
Log Time
Teamwork Task Property Log Time Log time
means as an assignee, you log the time you spent on a specific task.By default, it is your (assignee) duty to log the time spent on Task or Subtask.
The main purpose of logging the time is not to monitor whether you (as an assignee) have been working hard or not. (in fact , in DDM Group we would have another mechanism to measure your contribution and achievement).
On the contrary, to log time will:
- Prevent the assignee to be overwhelmed in a particular task.
- To keep the statistic such that the assignor can fine-tune the expected production lead time for the next similar task.
- If we can see the task is consuming too many labour hours, it is time for both the assignor and assignee to see if the Task is in the right track.
Reminder for how to log the time:
- You can log the time more than once in the same task.
- By default, you are always expected to log the time in every single Task / Subtask.
- 100% precision is not required. ±10% variance is acceptable.
Teamwork Task Property Mulitple Log Time Example
Insert/edit code sample
{ }
Insert/edit code samples simply apply the typesetting in both Task Description and Comment of the Task such that the readability of the content is increased by the viewer to visually classify the content in the typesetting as a specific object that is needed to pay attention. You can always apply the typesetting in following objects:
- Special object that is needed to pay attention.
- Programming Code
- Clickable Object / Click Path
Teamwork Task Property Insert Edit Code Sample
- While the
-
Assigning Google Merchant Center Access Rights
Definition
Google Merchant Center
Google Merchant Center (“GMC”) is a free tool provided by Google that allows businesses to upload and manage their product data. This data can then be used to create product listings that appear across various Google services, such as Google Search, Google Maps, YouTube, and the Shopping.
Access Rights
Access rights refer to the Role and Capabilities of a specific login name can access the application (i.e. GMC in this case). In some cases, the access rights will not only be assigned to a human , but also another system which want to access the application.
For example, the e-shop platform Woocommerce may want to access the Google Merchant Center so that the Woocommerce can upload the product feed to Google Merchant Center.
Unless otherwise stated, we assumed the Access Rights is assigned to human instead of another system.
Assigning Access Rights
Assigning Access Rigths can be operated in 2 ways:
Assigning Root Access
It simply means that the owner of the login (i.e. the Assignor) share the Login and Password Credential (i.e. Root Access) to the assignee.
Assigning Role Base Access
Instead of sharing the Login and Password Credential of the account owner, Role Based Access mean the assignee assigns the Access Rights to another Login owned by another individual, such that he/she can use his/her own login to access the same application shared by the assignor.
Unless otherwise stated, we assumed the Role Base Access to the assignee.
What Problems Assigning Google Merchant Center Access Rigths can solves
Avoid Human Resource Turnover workload
You may need to change the password of the application every time a staff or digital marketing agency is onboard or quit the organisation if you assign the Root Access to them. Assigning Role Based Access to them can solve this problem as you simply need to unlink the login account of the quitting staff or marketing agency ,which you don’t need to reset the password and since will not affect others.
Fine-grained Permission
In case you just want to assign the read-only instead of editing capability of the application to the assignee, the Role Based Access Permission can be adapted such that each separate capability can be assigned to another in fine-grained form.
Prerequisite
Please prepare for the following materials before you can smoothly assign access rights to others:
Super Admin Access Rights of GMC
Super admins of the GMC is the Google Account (i.e. a Gmail Address) from the Business Manager profile to which this Merchant Center is connected and hold the highest level of access to connected apps. In Merchant Center, they hold admin access.
You should use the SAME Gmail address of which you created the Google Business Profile
The Gmail Address of the Assignee
If you want to assign the Access Rights of the GMC to 3 individual, you should collect 3 Gmail Addresses of these 3 individuals.
Access Rights Level
To understand the capabilities of each Access Rights level of GMC that you can choose, please refer to the article I need help with people and access levels.
Step by Step – Assigning Acceess Rights to your Digital Marketing Agency
As a Assignor
- Google Merchant Center1
People and access
Add person
Enter email address
2- Access type =
Admin
Add user
- Status =
Verified
3
Google Merchant Center User Access Verified - Confirmation Email received.4
Now has access to Merchant Center
As a Assignee
- Receive email sent from [email protected] titled Accept your invitation to Google Merchant Center.5
Accpet
Accept your invitation to Google Merchant Center
Footnotes
- You should login GMC by your (assignor) GMC Admin or Super Admin account. ↩︎
- For DDM Group’s client, please assign the access rights to [email protected] ↩︎
- Status will be switched to Verified after the assignee accepted the invitation. ↩︎
- Sent from [email protected] to Google Merchant Center owner’s Email address. ↩︎
- If the access rights is assigned to DDM’s Group, the invitation email can be found in [email protected]. ↩︎
-
Email Etiquette
Definition
Email means any Work Gmail (e.g. [email protected]) or Domain Email (e.g. [email protected]) that you are going to use throughout the life in DDM Group.
Etiquette refers to a set of unofficial rules or practices that individuals are expected to follow to demonstrate courteous and virtuous behavior.
cc to Your Supervisor / Colleague
When you send the email to your recipient, always cc your email to your supervisor, as well as anyone who should stay tuned to the topic.
cc Your Email
Email Attachment Handling
In case you want to send a file to the recipient, instead of directly attaching the file into the email attachment, you should always choose to upload the File to your Google Drive and then send the URL of the File to recipient , with Restricted Access that only the recipient can open the File.
While you may not realize that all Email storage does have limitations, the excess of Email storage will cost extra. We can save thousands of dollars by simply sending the URL of the file instead of directly attaching the file into the email.
Beware of the Typesettting
Good email typesetting can increase the readibility of the email and hence enhance the working efficiency in both side.
By always using these simple typesetting technique in below can help to organize and present your message well:
- HEADING with each paragraph
- Bold
- Underline
- • Bulletin Point
Email Content With Typesetting
Beware of Email Indexing
Email indexing means you or your recipient can search and found the email easily even after few years since the email is being sent.
Compare the 2 Email Titles in below:
Sales Report
20241201-1230 Sales Report
You can realize the the second version is better due to the fact that the Email Title make the email more unique and hence easy for being found in the futured.
The rule of thumb is:
- Always put any kinds of Unique Identifier (e.g. Invoice# / Task# / Report Version) into the Email Title or Content to make it uniquely identifable.
- Always think of what keyword the future you , or your recipient will use to search for that Email.
Email Signature
Email Signature An Email signature is a block of text or a graphical element that is automatically appended to the end of an email message. It typically includes important information about the sender and can serve as a virtual business card.
Step By Step – Creating Email Signature
Desktop
- www.gmail.com
See all settings
General
>Signature
>Create new
Name new signature
- Copy and paste the following Email Signature Content found in below
- Replace the placeholder inside “<<>>” to appropriate content.
—–
<<FULL NAME>>
<<JOB_TITLE>>
Diamond Digital Marketing (HK) Ltd
| T : (852)-2471 6770| M :(<<COUNTRY_CODE>>)-<<MOBILE_NUMBER>>
| www.diamonddm.com.hk
| Unit A, 29/F, United Centre,95 Queensway, Hong Kong
Marketing・Connecting・Sales
———-DISCLAIMER———
This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited.
Any views or opinions presented in this email are solely those of the author and do not necessarily represent those of the company. Employees of the company are expressly required not to make defamatory statements and not to infringe or authorize any infringement of copyright or any other legal right by email communications. Any such communication is contrary to company policy and outside the scope of the employment of the individual concerned. The company will not accept any liability in respect of such communication, and the employee responsible will be personally liable for any damages or other liability arising.
—————————————Mobile Device
- In your mobile device
Gmail APP
Settings
>General Settings
Mobile signature
- Do the step #5 and #6 in Desktop
Conclusion
Be a responsible DDM Group citizen with civilized virtue, you will find you will benefit from it if everyone does the same, which will make your DDM Group life much easier.
-
Creating a new GMAIL
Definition
Gmail
Gmail is a FREE email service developed by Google. It allows users to send and receive emails over the internet.
Whenever you created a new Gmail address, in fact you have also created a new Google Account. (One Gmail has one Google A/c , and vice versa). Very often the terms Gmail and Google Account will be used interchangeably even though they are not identical.
Gmail For Business
There is another type of Gmail account called Gmail For Business account which is under the paid service of Google Workspace provided by Google, which is out of the scope of this article.
What Problem Patterns Gmail Solves
Registering any Google Service
While there are 100+ services that are provided by Google, both free and paid, you can register any of them in below by creating a new Gmail address:
- Google Calendar
- Google Drive
- Google Meet
- Google Cloud Console
- Google Classroom
- Google Analytics
- Google Search Console
- ….
Acting as a Working Gmail for the Company
In many case that there is a need for an Email address to register for some SaaS application which is used publicly within the company. For example, you may need a Google Analytics account to trace for the website user behaviors.
Although some time you can choose to grant the role based access permission of the Google Analytics from one Google Address to another, in many cases you may want to simply expose your Root Access (i.e. Login and Password) to others.
For example, as a client, if you want to appoint Diamond Digital Marketing Group as the digital marketing agency to help you setup the Google services of Google Analytics, Google Search Console, Youtube Studio, Google Business Profile, Google Meet, Google Drive and many more, you may be fatigue to assign role based access permission to DDM Group one by one.
Instead , you would prefer DDM Group to create a Gmail Address on behalf of you , which means DDM Group also has the Root Access (Login and Password) of this Gmail address.
If the Gmail address which is used to register for the Google Service fleet is owned and regularly used by a particular person, he/she may not feel comfortable sharing the password to others , no matter his/her colleague or any 3rd party agency.
By creating a Company Work Gmail1, the problem is solved.
Step By Step – Creating an Gmail Account
Preparation
- Before you are going to create a new company, Work Gmail, please check with your teammate / ex-staff / colleague in another department to see if they had already registerd for a company Work Gmail somewhere before. It is very common that each one in your company created a new Gmail account to register for only a particular Google Service, leading your company in turn to get many Gmail Addresses. And finally , you may probably need to spend extra time on consolidating all these registrations into one Gmail address. For example, your Google Search Console Account should always use the same Gmail account with your Google Analytics Account.
- Decide whether this Company Work Gmail account will be used publicly with your organisation, or only a very few people will know the login and password of this Work Gmail account. If you are going to use this Work Gmail address publicly in your organisation, you should decide a password which will be totally different with any other application you have adopted before.2
Account Creation
- Open Google Chrome
New Incognito Window
- www.gmail.com
Fill in following information
Create account
For my personal use
First name
Last name (optional)
Month - Day - Year
3Gender
Create your own Gmail address
4Recovery email address
5I agree
Your new Gmail address is created successfully in this moment. However, you still need to configure the setup to harden the security.
Verify Your Identity
For users in some countries, you may experience a security check that Google request you to verify yourself via Mobile Phone Number. If this is the case:
Verify your identity
Windows PopupCountry
= <<COUNTRY_OF_YOUR_MOBILE_PHONE>>Phone number
= <<MOBILE_PHONE_READY_FOR_SMS>>Receive verification code via
= Text message (SMS)Get code
Verify Your Identity - Receive 6-digit code in your Mobile Phone
Enter verification code
- Done
Enter Verification Code
Security Hardening Configuration
- myaccount.google.com6
- Security
- How you sign in to Google >
2-Step Verification
Add Phone Number
Add phone number
7- <<
MOBILE#_CAN_RECEIVE_SMS>
>8 - How do you want to receive sign-in codes from Google? >
Text message
- Receive the SMS from the Mobile Number you have just inserted.
Verify phone number
- Wording
Verified
is shown Turn on 2-Step Verification
- …
Google Account 2 Step Verification turn On
Usage on Gmail Account
Openning Multiple Gmail Accounts
There are 3 ways that you can open multiple Gmail accounts at the same time:
Open New Tab in Same Browser
By using one browser, Google Chrome for example, you can open a new tab for each Gmail account, which was not feasible in 1 or 2 years before.
Login in New Incognito Browser
You can also open a new Incognito Window (not tab) for each Gmail account that you want to login. To do this , you may need to insert your login and password every time after the session ends. This is appropriate when you use a public device to login the Gmail account.
Use Different Browser for Each Gmail Account
In case you don’t want to insert login and password, or switching account every time you login different Gmail account, you can simply use different Browser for different Gmail Account. There are many browsers that you can choose in the market:
- Google Chrome
- Microsoft Edge
- Brave
- Safari
- Opera
- Firefox
Installing Gmail Account into your Mobile Device
Reasons why you have to install the newly created Gmail account into your Mobile Device
2-Step Verification
Every time you use a new browser or Desktop device to login your Gmail account, the 2-Step Verification will be triggered and require you to provide the verification code suggested in the Desktop device. You have to install the Gmail APP into your Mobile Device in order to do so.
Instantly Send/Receive Gmail
It simply make you can send/receive Gmail instantly via your mobile device.
Footnotes
- Work Gmail simply refers to a personal Gmail which is for company use. It does not refer to the Gmail created in Google Workspace ↩︎
- For details regarding how to decide the password, please refer to article Cybersecurity Practice in DDM. ↩︎
- Your personal information will be used by the Google Inc to distribute Google Ads to you. This feature is called personalized ads. ↩︎
- Always prepare 2 options in case the Gmail Address you prefer is already taken.
For Gmail address which is used by the teammate in DDM Group, please sure that you comply with following Work Gmail Address naming convention below ↩︎ - In case you lost your password or someone hacked your gmail address which makes you unable to access this gmail address anymore, you can request password reset by letting Google send the reset password link to your Recovery email address. It is strongly recommended that this Recovery email address should be a permanent and free email address. Please bear in mind if you (or your staff) quit, your domain email address will disappear too, which cannot be classified as a “permanent” email address. Or in another condition that you forget to pay for the bill to renew the domain email, the domain email will expire as well.
↩︎ - If you are a teammate in DDM Group, please always use
[email protected]
as your recovery Gmail address. ↩︎ - Use the newly created Gmail address to login your Google Account. ↩︎
- Please make sure that the Mobile Number is ready to receive SMS. Please be noted that some VoIP Mobile Number cannot receive SMS. Besides , please also sure that the Mobile Number you choose will always be valid (e.g. you remember to pay the Mobile bill on time), and will not be affected in case any of the staff who owns this Mobile Number quit the organisation. ↩︎
Gmail Address naming convention
1st Priority
ddm.<<FIRSTNAME>>@gmail.com
2nd Priority
ddm.<<FIRSTNAME>><<LASTNAME>>@gmail.com
In case your Last Name is too long, please use abbreviation.
-
Cybersecurity Practice in DDM
Definition
DDM
- Any legal entity under Diamond Digital Marketing Group
- Any Digital Assets operated under the Business Name of Diamond Digital Marketing Group
- Teammate including any contractor or individual employee in DDM’s Group
Practice
A internal framework and guideline for the teammate to behave and follow.
Objective
In order to protect the digital assets of DDM Group from being exploited in cybersecurity, DDM Group is going to provide a Cybersecurity Practice for all teammate in DDM Group to follow.
General Practice
The principle of least privilege (PoLP)
The principle of least privilege (PoLP) will be applied throughout any permission granting situation such that the permission will be fine-grained to different parameters including session, capabilities, role related projects and related clients.
Cybersecurity Vulnerabilities
Human Vulnerabilities
A big porton of human vulnerabilities of cybersecurity are derived from human activities. An event-driven approach will be applied to suggest for the practice for these kinds of vulnerabilities. The events are as below:
Device lost ,stolen or sold
Vulnerabilities
- Login and password information which are saved in the browser will be exploited.
- Login and password information can be extracted from a specific exploited applications, which these login and password can apply to login attempt behaviors in another applications within DDM Group.
- Leakage on PII stored in local drive
Practice – Prevention
Teammates are suggested to :
- Assign a login and password for device login.
- Do NOT save any login and password of any applications in local drive, or in the cloud drive or cloud application where login session will not be expired periodically.
- Set factory default to the obsoleted device before it is sold. If the device is damaged to the level which it is impossbile to set the factory default, please raise out to I.T. Manager for buy-back program.
Practice – Remedy
- All Teammates in DDM should report to their supervisor or contact point immediately after their smart devices are realized to be stolen or lost.
- Once any device lost or stolen cases are being reported , DDM Group will execute the following to prevent loss:
Device Lost or Stolen Cases:
- Suggest the victim to report to police.
- Provide an application checklist for the victim and suggest them to use another device to login the applications one by one and cease the login session from the stolen or lost device.
- Provide an application checklist for the victim and suggest them to change the passwords of these application
- Reset the passwords for the applications which shared the same login and password within the whole DDM Group.
- Announce the lost or stolen device incident to other teammates which alerts them to address any frauds on pretending the victim to send out the email or message to other teammates in the DDM Group.
Device Lost , Stolen Cases or Sold :
- Provide an application checklist for the victim/users and suggest them to detach the devices to the associated applications.
- Set Factory Default for the device before selling.
- Sign out the device sessions that you last logged the target device for following applications:
- Google Account
- myaccount.google.com
Security
>Your devices
Manage all devices
- <<
TARGET_DEVICE_SESSION
>> Sign out
- Company diamond External Gmail account
- myaccount.google.com
Security
>Your devices
Manage all devices
- <<
TARGET_DEVICE_SESSION
>> Sign out
- Google Account
Connecting Public WiFi
Vulnerabilities
- Man-in-the-Middle Attacks: Attackers can position themselves between victim and the connection point, intercepting and potentially altering victim’s data.
- Malicious Hotspots: Hackers can set up fake Wi-Fi networks with names (e.g. Starbuck_Guest_5G) similar to legitimate ones (e.g. Starbuck_5G), tricking victim into connecting and exposing their data.
- Malware Distribution: Public Wi-Fi can be a vector for malware, allowing attackers to exploit vulnerabilities in victim’s device to install malicious software
Practice – Prevention
Teammates are suggested to :
- NEVER and EVER use public hotspot in any circumstance.
- Use teammate’s own hotspot in their mobile device to share WiFi.
- Setup a strong password for the hotspot in their mobile device.
- As a last resort, if a public WiFi is inevitably used,
- install WiFi Security Scanner to scan the WiFi before using it. For details please refer to article Anti-Virus Software Installation
- Scan out ALL similar WiFi names (instead of picking the 1st WiFi name that you guess is a real one) in the WiFi lists and explicitly ask the legitimate WiFi provider if the WiFi name you picked is correct.
Connecting Digital Assets via Public Devices
Vulnerabilities
- Session Cookies will be stored in the public devices so that the next person who uses the device may access the digital assets previously logged by the teammate.
Practice – Prevention
- Do NOT use public device to login any digital assets of DDM Group
- As a last resort, use incognito mode in the browser to login the digital assets of DDM Group
Practice – Remedy
- Delete the Browser History ,Session Cookies as well as the saved password in the Browser used to log in the digital assets of DDM Group before leaving the public device.
Storing PII in Local Device
Vulnerabilities
- PII leakage if device is stolen or lost.
Practice – Prevention
- If needed , save the PII in cloud drive instead of local device.
- Zip the PII file with password if it is inevitable to save it on a local device.
Malicious Software
Hackers prey on human greed and fear to entice individuals into their traps through the following methods:
- Fraud Business Email claimed that there is luractive business opportunity.
- Pretend to be a renowned and trustworthy brand and send you the SMS message with a URL claiming that there is a special and limited offer for you.
- Visited a website and then a modal popped up and claimed that your computer is compromised and suggested you download and install a software to clean up the virus.
- Pretend to be one of your friends by compromising the WhatsApp account of your friend and use this compromised account to send you message and suggest you to follow his/her instruction.
Vulnerabilities
- Unauthorized and malicious software is secretly installed in the victim’s device and plishing attack is triggered.
Practice – Prevention
- Enable anti-virus software constantly.
- Do not being greedy or to fear (it’s very hard!)
- NEVER and EVER click any URL from any SMS or WhatsApp message.
- NEVER and EVER download the attachment from any emails sent from that you have not contacted with before. (even though the sender is seemed to be an big brand)
- Even though the email or message is sent from a known person, pay double attention when clicking a URL or opening a file because even your friend may not address that his/her device is being compromised.
Practice – Remedy
- Formatting the device or reset it to factory default is the device is compromised.
- Annouce to your clients and teammates that your device is being hacked.
Installing Malicious Application
Hackers prey on human greed and fear to entice individuals into their traps through the following methods:
- Embed the malicious function into an Mobile APP or desktop software installer claiming that this APP or software can help you to hack another device or network.
- The rule of thumb is that whenever you want to use an APP or software to hack others or execute some dark magic, most likely the APP or software you are going to use is by itself a malicious software which will hack your device.
Vulnerabilities
- Plishing attack
Practice – Prevention
- Formatting the device or reset it to factory default is the device is compromised.
- Do NOT fall into the trap of being greedy or to be fear.
Practice – Remedy
- Run Antivirus program to scan the device periodically.
- Annouce to your clients and teammates that your device is being hacked.
Weak Password
Vulnerabilities
- Brutal Force Login Attempt
Practice – Prevention
Always comply with the following rules when choosing a password:
- Use strong password combination, for example:
- Alphanumeric , AND
- Case Sensitive, AND
- Special Charcters
- Login and password should not be the same.
- Do NOT use 1 password combination for ALL of your applications. In case you want to share your login and password to any other to work on behalf of you, or in case one of your applications is being compromised, the hacker/ the people you share the password will/may apply the same password to login other applications. In fact, it is strongly recommended you to use DIFFERENT password for EACH different application.
- Use Zoho Vault to store the password of different applications. (So that you will not use 1 password for all applications simply because you are afraid of forgetting the passwords of different applications.)
- Do NOT use the password in worst password list, or applying the same logic derived from the worst password list
- Always enable 2FA (or MFA) function of an application. (if there is any)
Share Password to Teammate
It is common that you would like to share the password of an application to your teammates or clients for temporary use.
Vulnerabilities
- Plishing Attack if the device of the teammate that you shared the password to is already compromised.
- Password Eardropping
Practice – Prevention
- Separate the Login Name, Login URL and Password into 3 separate emails or messages when you send them to your teammate.
- Always choose to delete access permission function inside the application, instead of sharing Root Access (i.e. Login and Password) to your teammate.
- Apply the principle of least privilege (PoLP) when sharing access permission to others.
- Cease the login session after finishing using the access permission.
- Modify the password if the Root password is shared to others before.
-
Zoho Vault
Definition
Zoho Vault is an online password manager (with APP version or Desktop version) designed to securely store and manage passwords, documents, and other sensitive information. It acts as a digital vault for your credentials, helping you keep everything organized and protected from threats
What Problems does Zoho Vault Solves
Lost Mobile Device
If you have saved all the passwords of your applications into your mobile devices, in the scenario that you have lost your mobile devices, all of these passwords are being exposed.
Instead, it is better to save all the passwords from different applications into a cloud SaaS whenever your mobile device is lost, you can simply end the login session of the lost devices and then no one can exploit the password lists any more.
Mistakenly Modified the Password
While you save all your passwords in a Google Spreadsheet, every single record of the password will be editable even though you would only want to access one of them, making the remaining password records under the risk of being modified mistakenly.
Time Wasted on Password Management
Believe it or not, there are more than 200 login and password records can be found in DDM’s Group.
Significant amount of time will be wasted on following aspects with a bad Password Management because you will have hundreds of login and password records which is much more than you can imagine :
- Time on searching for Login and Password
- Your own time for forgetting and resetting Password
- Your teammate’s time for assisting you to reset your Password.
- Opportunity time cost of spending the time on production (vs spending time on search and resetting Password).
What Problems Zoho Vault (Free Version) Cannot Solves
- Password sharing – cannot share a specific password record to a specific person within specific time period.
Why Zoho Vault
- It’s free for life time
- Zoho Vault is owned and operated by a MNC Zoho Inc, which is unlikely to be shutdown
- Mobile APP and Desktop version are both available.
- Topest Security Level
- The account in Zoho Vault is 100% owned by you. There is 100% nothing relating to DDM Group, non DDM Group has any authority to access or manipulate your Zoho Vault account.
Preparation before installation
Mobile Phone Number Ready for Receiving SMS
You will need a Mobile Phone Number to receive the SMS verification code during the Zoho Account registration process. In the future , in case you need to change your password or be requested for any identity authentication, you may need this Mobile Phone Number to do the authentication process again. So please make sure the Mobile Phone Number that you used can be under your control in lifetime.
Your Personal GMAIL Address
The passwords which you saved in Zoho Vault will last for lifetime. Besides the password information related to DDM Group, you can also save the passwords from your personal application.
Therefore, the email address that you chose to register for the Zoho Vault account SHOULD be your personal email account (e.g. Gmail) which is forever free and you can always login without any friction.
DO NOT use any domain email address (e.g. [email protected]) to register for the Zoho Vault accountA Master Password That You Will Never Forget
Prepare for a password for registering the Zoho Vault. You should never forget this Master Password because there is almost no way for you to reset your password. Keep this password in a safe place which only you will know.
What Types of Password to be saved in Zoho Vault
- Your personal application
- Your own login of the application which is related to DDM’s Group (e.g. the password of your own [email protected] wormail login)
Step By Step on Zoho Vault Installation
Sign Up Zoho Account (Lifetime Free)
- https://www.zoho.com/vault/pricing.html
FREE FOREVER
START FREE TRIAL
1Email
= <<YOUR_PERSONAL_GMAIL>>Password
= <<YOUR_PASSWORD_001>>
No, My Organization
is new to Vault
Personal
Create master password
= <<YOUR_PASSWORD_002>>2Confirm master password
= <<YOUR_PASSWORD_002>>- Enter the text you see in the below image
- I understand that if I forget the master password, Zoho Vault will not be able to recover it.
Get Started
Install Zoho Vault in Mobile Devices
- Your Mobile Device
- Google Play Store or Apple App Store3
- Search
Zoho Vault Password Manager
Install
- Login Zoho Vault and related steps ….
Once you have completed the registration and installation, you should immediately record the login password of Zoho Account and Zoho Vault account into your Zoho Vault App
Conclusion
Remember , in DDM Group there is NO ONE who will help you to reset your password. Always record your login credential to Zoho Vault immediately after you created or modified it. Please be a teammate with civic virtue which will never waste your and others time to reset (or assist you to reset) your password.
Footnotes
- There is no any logical or technical concern. I will skip the step by step on signing up a Zoho Account. ↩︎
- While in the future you may use your Zoho Account to apply for another Zoho Application , it is recommended to use different password for your Zoho Account and Zoho Vault account. ↩︎
- Google Play Store will be taken as an example to demonstrate the steps. ↩︎
-
Daily Routine Communication Protocol for All Teammate
Introduction
In order to communicate effectively within the organisation , as well as minimizing the reporting workload of all teammates, the Daily Routine Communication Protocol will be acting as the minimal daily communication responsibility for all teammates in DDM.
What Problem Patterns the Routine Daily Communication Protocol Solve
Minimize Reporting Workload:
Standardized Reporting Specification
By standardizing the specification of the daily report to the supervisor of any teammates, teammates don’t need to spend time on decising what direction is needed to report , as well as the granularity of the report. (i.e. how deep to report to the supervisor in a specific topic)
Standardized Reporting Frequency
To clearly define the frequency of the reporting so as to protect the teammate by being accused of not reporting the progress of the tasks.
Standardized Reporting Channel
Ocassionally there is a situation that a teammates just had a discussion with their supervisor and they would regarded it as an official reporting so that they will skip the daily report workload, while their supervisor did not think in the same way.
To standardize the reporting channel will kill this misunderstanding
Standardized Reporting Target
While in organisation with a non-flattern organisation structure, the immediate supervisor of a teammate will also need to report to his/her supvervisor (i.e. supervisor of supervisor). To define clearly the communication path and direction can protect the teammate from being accused of not reporting to a non immediate supervisor.
As a Ground of Task Delegation
As a teammate, by reporting the daily task list , as well as the progress of the tasks to his/her supervisor, can facilitate his/her superior to delegate an appropriate quantity and quality of tasks which will not overload the teammate.
Daily Routine Communication Protocol Specification
Reporting Items
- Outstanding Tasks on hand which are expected to be executed at that day. Outstanding Tasks which you will not carry out that day are not expected to report at that day.
Reporting Specification
You can choose between either Method 1 or Method 2 for reporting
Method 1 – Using Teamwork.com
- diamonddm.teamwork.com/app/home/work
-
- Show ONLY the follow columns (in order)
TASK NAME
ID
CREATED BY
DUE DATE
PRIORITY
PROJECT
PROGRESS
- Customzie the showing columns as below. Make sure:
- All columns can be shown in one screen by
- adjusting the widht of the columns
- collapse the left side bar in Teamwork.com
- All columns can be shown in one screen by
Teamwork Daily Routine Communication Method 2 - Set the
PRORITY
(High || Low ) of the tasks that are expected to carry out at that day 1 based on the logic mentioned in later session Logic on prioritizing the Task in this article. - Set the
PRORITY
(None) of the tasks that are NOT expected to carry out at that day. - Set the
PROGRESS
to reflect the current Task status.0%
: Not yet start working1%
: Just Start Working50%
: Working In Progress100%
: Task Completed
- Sort by
PRIORITY
Column - Take Photo / Cap screen and WhatsApp to the Reporting Target.
Method 2 – Using Plain Text
At least and at most following content should be involved in the specification
- Reporting Date (This is will be classifier of how we defined this message as Daily Routine Communication Report)
- Task#
- Related Client
- Brief Title of the Task
- Priority (top || low)
- Task Status (done || wip)
Example
At the beginning of a working day, the WhatsApp message that you are going to report is as below:
20241214
- #49432943 – Nike install GA4 – top – wip
- #43293923 – Study Graph Database – low – wip
Before the end of a working day, you can simply copy and paste the message in the beginning of the day, and change the parameters of inside the task. If during the day you have been assigned a new task, you can append into the end of the task list. For example:
20241214
- #49432943 – Nike install GA4 – top – done
- #43293923 – Study Graph Database – low – wip
- #49433443 – Addidas install GTM – top – wip
Caution
A comprehensive or detail reporting for a specific task is strongly NOT recommended in th e daily routine reporting content. Any comprehensive detail of a specific task should be recorded in the task comment of related task.
The rule of thumb is that you are suggested not to spend more than 1 minute (including the time on searching the task#.) on reporting each task.
Logic on prioritizing the Task
You can base on the logic below to decide which tasks you should do in priority:
Task Nature Target Project Instructed By Any Any Overrided by your Immediate Superior.2 Operational Client By Default R&D (Research and Development) Client By Default Operational DDM in-house By Default R&D (Research & Development) DDM in-house By Default The order of the row reflects the priority of the tasks
Reporting Target
Report only to immediate supervisor (which you will be told during your on boarding procedure)
Reporting Frequency
- Every day before start working , AND
- Every day before off
Reporting Channel
- DDM Community WhatsApp Group, OR
- WhatsApp of your immediate supervisior
When to start Daily Reporting
- Immediate after you have read this article, last as long as you are the teammate in DDM Group.
Footnotes
- You only need to set the PRORITY for the task which you expect to carry out that day. i.e. You can set to None if that task don’t need to carry out at that day. ↩︎
- Whenever there is a contradiction in your order between anyone (e.g. the supervisor of your supervisor or the key client of the company) , the order from your immediate supervisor always prevails and is conclusive. ↩︎
-
DDM Kenya Incubation Program
Introduction
In order kick start a positive financial loop for the development of Kenya’s market, as well as providing an business friendly environment for the talents in DDM to turn their idea into reality, Diamond Digital Marketing Group (DDM) is going to introduce a Kenya Incubation Program. (a.k.a IncubK)
Objective of the IncubK
- Bring DDM’s service and product into Kenya’s market
- Finance the R&D of Kenya’s market from profit generated from any business line in Kenya.
- Provide an business friendly environment to faciliate any kinds of talent in DDM to monetarize their business idea.
- Let Kenya staff to operate or own their business based on the portion of contribution.
Scope of IncubK
Matured Business Line
Any kinds of Service or Products currently provided by DDM group and is running under the business name of DDM in Kenya:
- Google Ads Management
- Meta Ads Management
- Social Media Page Management
- Social Listening and data scrapping
- Domain Registration
- eDM
- Basic Cloud Infrastructure including : Web Hosting / Email Server / Web Server / Load Balancing / CDN /SMTP / Security Group / SSL / IP / Relational Database
- SEO
- Graph Database and related Machine Learning
- Semantic Search and related Machine Learning
- Website , Web Application or any kinds of systems built by WordPress
Seeding Project
Any kinds of Service or Products not mentioned in Matured Busienss Line and is eligible to be an Seeding Project , no matter its a ad-hoc short term project or project in long run, which the business is running under DDM’s business name.
Net Profit
Net Profit
=Sales Turnover
–COGS
–Operation Cost
–Taxation
Sales Turnover
Any Sales Revenue generated by rendered or delivered product or service in cash basis (i.e. not cash in arrear basis), from the client which owns a legal entity in Kenya.
COGS (Cost of Good Sold)
Any kinds of direct cost related to the selling and production activites which CAN directly and clearly assigned to the a particular Sales Order. For example Hourly Wages of the production, Sales Commission , Inventory (e.g. Contracted Infrastucture for a specific Sales Order)
Sales Commission =
10% *
(Sales Invoice Amount (in Cash Basis) –
Any kinds of 3rd Party Fee directly assigned to the Sales Invoice (e.g. Ads Spent))
Operation Expenses
Any kinds of indirect cost which CANNOT clearly assigned to a particular sales order. For example, marketing cost , amortization of the initial investment, R&D (Research and Development) Any kinds of monthly subscription infrastructure in general, Project Management Cost , so on and so forth.
R&D cost from only Seeding Project will be assigned to the operation expenses. For Matured Business Line, all the R&D cost will be absorbed by the current business line.
If a particular type of operation expenses which cannot be clearly assigned to Kenya’s Business Line, or only a small portion of that operation expenses is used by Kenya’s Business Line, that operation expenses (or portion of) will be absorbed by other Business Line in DDM.
For example, the monthly subscrption fee of Project Management System teamwork.com will not be classified as the operation expenses of Kenya Business Line because it only accounts for a very little portion of Kenya’s Business Line.
Taxation
Any kinds of Profit Tax, Value Added Tax or Sales Tax.
Kenya Business Line
- Any Sales Revenue which is brought by the employee and is generated from client with legal entity in Kenya.
- Any Cost is incurred by the employee or is generated from vendor with legal entity in Kenya, or the portion of any SaaS subscription fee which is assigned to Kenya’s business even though the SaaS vendor does not have legal entity in Kenya.
- The Service or product is rendered or delivered in Kenya
Profit Distribution Equation
Glossary
Terminology Definition IncubK Stake The fund pool that will be benefit to (and only to) any stakeholder involved the Kenya Incubation Program Net Profit Received (i.e. NOT receivable) Net Profit generated from Matured Business Line and Seeding Project in IncubK. Reserve on Seed Fund % of IncubK Stake which is reserved for future R&D and predictable expenses purpose. DDM Stake % of IncubK Stake that as the reward for the contribution of Diamond Digital Marketing Group. IncubK Participant Stake (PS) % of IncubK Stake for the Stake of a specific IncubK Participant IncubK Participant Contribution Hour (PCH) Number of Hours recorded in a specific period1 in teamwork.com for a specific projects or business line under IncubK program contributed by a specific IncubK Participant Total Contribution Hours from All IncubK Participants (Total PCH) Sum of the number of Hours in a specific period1 recorded in teamwork.com for specific projects or business line under IncubK program contributed by all IncubK Participants. IncubK Participant Stake (PS) Factor portion (in terms of %) of a specific IncubK participant which he/she entitled to the reward from his/her contribution. This Factor reflect the level of risk he/she is willing to bear. Glossary
Profit Distribution Formula
IncubK Stake
=Net Profit in Cash Basis
–Reserve on Seed Fund
–DDM Stake
IncubK PS
=IncubK Stake
*(
IncubK PCH
/Total PCH
) *IncubK PS Factor
Hourly Rate of IncubK Participant in specific Project % of IncubK Participant Stake (PS) Factor USD$3 5% USD$2 25% USD$1 70% USD$0 100% IncubK Participant Stake Factor Tier
Profit Distribution Time Schedule
Item Distribution Frequency Wages Monthly Sales Commission Monthly in Cash Basis (i.e. NOT in accrual basis) IncubK Participant Stake (PS) Quarterly Profit Distribution Time Schedule
IncubK Participant Eligibility
Any person who meets the following criteria is eligible to participate any Matured Business Line Project:
- Any full time staff employed by DDM Group before Jan 2025 , OR
- Any full time staff had been working for DDM Group more than 6 months, AND
- With Kenya National ID Card, AND
- Is still a full time Employee of DDM Group at the date of Profit Distribution , AND
- Person who explicity declared to agreed the terms of conditions of the IncubK Program Participation.
- Only The IncubK Participant Contribution Hour (PCH) recorded in an assigned Teamwork.com Task# will be classified as valid.
Terms and Conditions of IncubK Program Participation.
I hereby declare my interest for participating in the IncubK Program and agreed that:
- I will not spend my official office hours under DDM’s employment contract to work for any task related to IncubK program. Any violation of this term will be disqualified as the IncubK Participant.
- In case there is a deficit in the IncubK Stake derived from any Project from any Matured Business Line, no matter I have participated that project or not, I should and will only bear the monetary loss derived from the IncubK project NO MORE than the positive balance of my incubK Participant Stake.
- Whether intentionally or reluctantly if I no longer be the employee of DDM group , effectively from the last date of the resignation, I will not eligible to be the Participant of IncubK program, nor the IncubK Stake.
DDM Contribution on IncubK Program
In order to initialize and foster the InclubK Program, DDM Group is going to invest in below:
- USD$2,000 as the openning balance of
Reserve on Seed Fund
for all Matured Business Line Projects in total. - Absorb the Research & Development Cost of the Matured Business Line Project under IncubK Program by any existing up and running non IncubK Project. (subject to approval from DDM Group.) 3
- 12 hours per month on professional advice in any associated discipline on running or planning any incubK Project.
- In case there is a deficit of the incubK Stake, DDM is going to settle the deficit at no more than USD$1000 in a financial year.
Seeding Project
Details are to be discussed and open for discussion.
Miscellaneous Terms
- All the terms and conditions in the IncubK Program will be evaluated and modified from time to time. One month early notice will be provided in case there is any modification in any terms and conditions.
- Should any dispute arise, the decision of DDM Group shall be final and conclusive.
- Specific Period is the period mentioned in Profit Distribution Time Schedule ↩︎
- Specific Period is the period mentioned in Profit Distribution Time Schedule ↩︎
- For example. If a Domain Transfer technique in a Domain Reseller Project is needed to develop by spending R&D time cost, if this Domain Transffer technique can also be benefit to the existing Domain Transfer project in Hong Kong market, the Hong Kong Domain Transfer project will absorb the R&D cost of developing the Domain Transfer technique. (i.e. $0 R&D cost will be assigned to incubK Project. ↩︎