Category: Knowledge Base

  • Internet Speed Test

    Internet Speed Test

    Definition

    Internet speed refers to the rate at which data is transferred between your device and the internet. It’s typically measured in megabits per second (Mbps). There are two key aspects of internet speed:

    • Download Speed: The rate at which data is received from the internet to your device.
    • Upload Speed: The rate at which data is sent from your device to the internet.

    Why Internet Speed Test

    Enhance Working Efficiency

    Imagine that in our daily life almost 90% of our working time relies on the internet connection. To increase th internet speed can significantly increae our working efficiency

    Internet Service Provider (ISP) Cost Estimation

    While the monthly ISP Cost is highly depended on the internet speed, to know the current internet speed can let us estimate how much monthly cost we have to increase in order to increase the internet speed


    Step By Step on How to Test Internet Speed

    Home/Office WiFi

    1. Connect your laptopt to your Home/Office WiFi. (i.e. NOT to connect WiFi from the Hotspot of your Mobile Device)
      • If there is WiFi network with the suffix 5G (e.g. WiFi Network Name = TPLink_5G), always choose this network to do the test.
    2. https://www.hkbn.net/personal/broadband/en/speedtest
    3. Record DOWNLOAD Mbps
    4. Record UPLOAD Mbps

    Your Mobile ISP

    1. Use directly your Mobile Device Data Plan from your ISP. (i.e. NOT using the Hotspot in your Mobile Device and receive WiFi from shared in your home/office.)
    2. https://www.hkbn.net/personal/broadband/en/speedtest
    3. Record DOWNLOAD Mbps
    4. Record UPLOAD Mbps

    Magnitude of your WiFi Connection

    1. Login your Desktop Device
    1. Check if the Receiving bar is full (i.e. You can see 4 waves)

    How to speed up your Internet connection speed

    Elminiate bottleneck of your Router

    The Max Throughput, Bandwidth and WiFi Standard (e.g. WiFi 7 in 2024) will affect the compatibility between your router and the internet connection of your ISP. A fast internet connection but with limited router Max Throughput , Bandwidth and WiFi Standard will slow down your internet connection.

    How to check the WiFi Standard of your Router

    Check out the Router Brand and Model Number from the Router Specification Label (which normally sticked in the bottom of your Router) and the search the WiFi Standard in Google. When the result show up in Google, please double check the Brand and Model Number in the result is same as the Brand and Model Number that you are seeking for.


    How to check the WiFi Standard of your Destkop Device

    1. Login your Desktop Device
    1. Find out the connected WiFi Network
    2. 🛈
    1. Following Properties affects the Internet Speed:
      • Protocol
      • Network band
      • Link speed (Receive/Transmit)

    How to check the WiFi Standard of your Mobile Phone

    1. Search in Google the WiFi Standard of your Mobile Phone Brand and Model Number

      Choose appropriate Bandwidth from the WiFi Connection

      You may wonder why you can always find 2 WiFi Networks available for connection in our home or office, which they usually show their WiFi Network name as below:

      1. <<ROUTER_MODEL>>
      2. <<ROUTER_MODEL>>_2G
      3. <<ROUTER_MODEL>>_5G

      While I don’t want to go through a physics class to explain what is the difference between the two, the rule of thumb is that if both of two networks’ connection level (i.e. weak or strong) are the same , always choose the 5G. The “G” in fact is a unit of the frequency which means:

      Higher Frequency > Higher Power > Faster WiFi Transmission Speed


      Location of your Device

      There are 2 factors affecting the transmission speed of your WiFi in your home or office:

      Distance between the Router and Your Device

      Every router has its maximum distance of transmission. Not surprisingly, the closer your device is to the router, the faster internet speed you will enjoy. If in reality your device cannot stay close (e.g. 5 meters) to the router, you can consider

      1. Switch to the WiFi Network with suffix of “5G“. (e.g. TPLinkP84_5G”)
      2. Purchasing a WiFi Range Extenders in your home/office.

      Obstacles between the Router and Your Device

      Even though your device stays close enough to the router, if following objects are located between the device and the router, the WiFi connection speed will be slow down:

      1. Microwave (which is running)
      2. Glass
      3. Mirror
      4. Water

      So please stay away from these objects if you want to have a faster WiFi speed. Or if it is not feasible to do so, please consider either a stronger Router or WiFi Amplifier.


      Firmware of your Mobile Device

      The Firmware of your mobile device will always affect the WiFi connection speed in aspects of its Network Driver, Security Update and Bug Fixing. So simply update the Firmware of your mobile device may speed up your WiFi connection.

      Whenever there is a updated version of a Firmware, your device will automatically notify you as long as you are online. So simply don’t ignore the Firmware update notification shown in your device.

    1. Task Properties in Teamwork.com

      Task Properties in Teamwork.com

      Definition

      Teamwork.com

      Teamwork.com is a SaaS (Software as a Solution) which is a Project Management System applied in Diamond Digital Marketing (DDM) to manage the exeuction of all project. For details about what Teamwork.com is, please refer to the article What is Teamwork.com

      Task Properties

      Task Properties in Teamwork.com is any attribute (i.e. property) other than the customized Task Description written by users.


      How to use the Task Properties

      Task Properties provide the prerequisite information to make the task executable. Both Assignor and Assignee can and will use the Task Properties to comprehend and complete the Task. Let’s enumerate the highlighted Task Properties one by one to go through their usage.


      Task Completion Status

      The  checkbox in Figure 1 shows the Task Completion Status.

      Obviously, it will be ticked after the Task is classified as Completed. However, it is not as easy as you think on how to classify a Task as completed.

      In the perspective of an assignee, the assignee may regard the Task as completed simply after all the output in the Task Description is delivered. 

      However, in the perspective of an assignor, the assignor will need to review the Task before it can be classified as completed. Besides, if the Task is marked as completed by the assignee, the assignor will have no clue to find out the Task lists which he/she has to review.

      Therefore, Task Completion Status should only be modified by the Assignor.

      (i.e. Assignee should NOT modify the Task Completion Status)

      If the assignee wants to notify the assignee that he/she has completed the Task, the Board Column should be used. Details will be elaborated in the later paragraph of this article


      Prority

      Task Property Priority
      Task Property Priority

      The Priority(High/Medium/Low) button will NOT be used by assignor and will be used by assignee only in the situation described the article Daily Routine Communication Protocol for All Teammate.

      It is not recommended to use the Priority button to classify the task due to the fact that priority is a relative concept which the value (High/Medium/Low) will change from time to time. If every task is classified as High, then the classification will be meaningless.

      Besides, If there is more than one assignor for an assignee, the priority button will be meaningless due to the fact that each of the assignor may regard his/her task as high priority, which has no help for the assignee to decide which task should go first. 

      Please be understood that we do not use the Priority button does not mean that we will not have another mechanism to classify the priority of the Task. 


      Progress & Time

      Teamwork Task Property Progress And Time
      Teamwork Task Property Progress And Time

      The Progress & Time button is consisted of 2 functions:

      Estimated time to complete

      Estimated time to complete will be provided by the assignor every time when the assignor assigns the task to the assignee. It is an crucial information for the assignee to delivery the task properly, which can be demonstrated in following scenarios:

      1. While the Estimated time to complete a task is set to 1 hour , if the assignee based on his/her experience and realises that this task is impossible to be completed within 1 hour, the assignee should raise out the problem (and raise out loudly!). It may either the assignee misunderstand the Task Instruction, or the Task Instruction is really unfeasible. No matter how, it is the duty of the assignee to raise out the problem BEFORE he/she carry out the task.
      2. In another scenario, still while the Estimated time to complete a task is set to 1 hour, but this time the assignee has no experience or idea on whether or not the task can be completed within 1 hour, it is the duty for the assignee to raise out when he/she has already spent 1 hour to do the task, no matter the task is completed or not. This may be due to either the low quality of the estimation from the assignor, or the assignee misunderstand the task instruction. No matter how, this is a problem to be addressed and optimised , which makes the estimation in the next task to be more precise.

      Therefore, both the assignor and the assignee should pay extra attention on the Estimation time to complete

      Progress so far (0%)

      The Progress button will NOT be used by assignor and will be used by assignee only in the situation described the article Daily Routine Communication Protocol for All Teammate.

      In fact, if you don’t know what is 100% of a completion of a task, you will have no idea on what is 50% completion. The definition of Completion between assignor and assignee will always unlikely be the same. And therefore, it the Progress % of the task will be meaningless if the definition is not be synchronised between 2 parties.


      Followers

      Teamwork Task Property Followers
      Teamwork Task Property Followers

      As an assignor or assignee, you can either use the Followers button to manage the followers of the task, or simply use the comment handler (e.g. @someone) in the comment of the task so that the target teammate will automatically become the followers of the task.

      For how to use the comment handler, please refer to the article How to Comment in Teamwork.com


      Tags

      Teamwork Task Property Tags
      Teamwork Task Property Tags

      The purpose of the Tags button is to give 1 (or more) Tag(s) to the task such that either assignor or assignee can classify the Task to any category as you wish, which can be easily found out by applying the Tag Filter. 

      As an assignor and assignee , if you think any tag would facilitate you to carry out the task, please feel free to use the tag as much as you want. 

      The only concern is to make sure that you have a systematic way to name the tag such that the tag can be uniquely identified (from other tags or the tags created by other teammates).


      Dependencies

      Teamwork Task Property Dependencies
      Teamwork Task Property Dependencies

      Dependenciesmeans which another task should be completed before you can carry out the current task. It simply create the task chain which make you (as an assignor) to carry out the task in sequence.

      The Dependencies button can be found in both Parent task and Sub Task.


      Repeats

      Teamwork Task Property Repeats
      Teamwork Task Property Repeats

      The Repeats button can set individual tasks to repeat at specific intervals. Once you setup a specific task as a repeated task, the sub tasks will automatically be created, which means a new task# will also be created. Therefore, when you use the Repeats button, please take into following consideration:

      1. If you don’t mind a new Task# is created every time a new sub task is created ,then the Repeats button is appropriate. For example , if you want to assign the task to the assignee requesting him/her to submit a weekly report to your client, then the Repeats button is best fit due to the fact that the weekly report tasks for each week are independent.

      On the contrary , if it is better to consolidate all the comment and feedback into one Task# every time the task is updated periodically, then the Repeats button is not appropriate. For example, If you want to send the comment log to your client containing all the comments and feedbacks for a specific task, then it is better to consolidate all the materials into one task instead of separate it in different Task#.

      The Repeats button can only be found in Parent task (i.e. cannot be found in Sub Task)


      Privacy

      Teamwork Task Property Privacy
      Teamwork Task Property Privacy

      Privacy means you may only want the Task or comments to be seen by only some of the people. As a assignor or assignee , you can configure the Privacy in following target:

      1. Task List
      2. Task Comment

      Put it in another word, you cannot configure the privacy in a specific Task. 

      The Privacy setting is useful especially in the scenario that you want to have an internal discussion with your teammate before you submit the deliverable to your client. Or in another scenario that as there are too many back and forth discussion comment which may disturb the decision of the client, and therefore you set the restricted privacy only to your internal team.


      Reminders

      Teamwork Task Property Reminders
      Teamwork Task Property Reminders

      The word Reminders is self-explained that no matter you are an assignor or assignee , you can both set a reminder to remind yourself or your teammate to carry out the task any day in the future. 

      The reminded target will receive a reminder email when the time it met. Feel free to use the Reminders function as you wish!


      Board Column

      Teamwork Task Property Board Column
      Teamwork Task Property Board Column

      Board Column is a kan-ban board which can let the assignee to switch the Task Status after he/she had carried out the specific action to the Task.

      By default, there are 11 Task Status for the assignee to choose as below:

      Task StatusDescription
      00 : Start WorkingThe assignee immediately changes the Task Status to 00: Start Working such that the assignor will know that the assignee did not miss the task and acknowledged the task.  
      01: Wait Approve – DDM PMThe task is completed by the assignee and is seeking for approval from the Project Manager (PM) in DDM Group.
      02: Wait Approve – Client 1st LevelThe task is approved by DDM PM and is seeking approval from the 1st level of the client. (which may be the Marketing Executive from client’s side)
      03: Wait Approve – Client 2nd LevelThe task is approved by the client’s 1st level and is seeking approval from the 2nd level of the client. (which may be the Marketing Manager or the boss itself)
      04 : Wait Client ResponseFurther input is required to be provided from the client before the task can move forward.
      05 : ModifyingIf there is any comment or feedback provided from Task Status 02/03/04, the assignee can switch the Task Status to 05 such that the approver will know that the assignee is working on the Task before the next approval.
      06: PendingThe Task is pending
      07 : Approved – DDM PMCorrespond to the Task Status 01
      08 : Approved – Client Final LevelCorrespond to the Task Status 03
      09 : Conditional Approved – Client Final LevelCorrespond to the Task Status 03 or 08
      10 : Not ApplicableThe task is not applicable to be executed. It may happen in the Sub Task which is created by the Task List Template. 
      11 : Task CompletedTask is completed. It should switch the status by the assignee. This Task Status 11 replaces the Task Completion Status button which mentioned earlier in this article. 

      It is strongly recommended the assignee to switch the Task Status IMMEDIATELY after the Task Status is changed. Which means:

      1. Do NOT wait for all other tasks to switch the Task Status in one batch at the end of the date. Please be understood that the main purpose of the Task Status is for providing updated and real-time information for the assignor to understand the progress of the whole project. The assignor will also assign any other related tasks to another teammate based on the Task Status you have modified. In a nutshell, don’t assume that you are the only one who will read the Task Status. Always be a virtuous teammate who keeps communication duty as the 1st priority. 

      As an assignee , you can use the Board Column to see the Task Status throughout the project in a Kan-Ban Board view. You are expected to read the Task Board every day before you start working so that you may have a comprehensive understanding on the priority of your task on that day. 


      Who should do this

      Task Property Priority
      Task Property Priority

      Who should do this simply means which teammate you are going to assign the task to (i.e. the Assignee). Both assignor and assignee can add/remove assignee as per wish. Besides, you can also assign more than one assignee per Task. 


      Date

      Teamwork Task Property Date
      Teamwork Task Property Date

      Date consists of Start Date and Due Date. While this property is self-explained , the only reminder to you is that it is the duty for the Assignor to fill in BOTH Start Date and Due Date in the task. If either one of the Date is missed, the assignee cannot use the filter to screen out the related Task. 

      On the contrary, as an assignor , if you cannot see the Start Date or Due Date in the task, please raise out to the assignor.


      Sub Task

      Teamwork Task Property SubTask
      Teamwork Task Property SubTask

      SubTask is the child task of a Parent Task. One Parent Task can have many SubTasks, while one SubTask will only have one Parent Task. Each SubTask will have its own SubTask number. So you can expect the hierarchy of the Task as below:

      1. Task List Template
        1. Task List
          1. Task (Parent Task)
            1. SubTask

      Whenever you assign a task to a teammate , that teammate will automatically be assigned to all the SubTask of its Parent Task.

      Both assignor and assignee are welcome to create the SubTask.


      Log Time

      Teamwork Task Property Log Time
      Teamwork Task Property Log Time

      Log time means as an assignee, you log the time you spent on a specific task. 

      By default, it is your (assignee) duty to log the time spent on Task or Subtask. 

      The main purpose of logging the time is not to monitor whether you (as an assignee) have been working hard or not. (in fact , in DDM Group we would have another mechanism to measure your contribution and achievement). 

      On the contrary, to log time will:

      1. Prevent the assignee to be overwhelmed in a particular task.
      2. To keep the statistic such that the assignor can fine-tune the expected production lead time for the next similar task. 
      3. If we can see the task is consuming too many labour hours, it is time for both the assignor and assignee to see if the Task is in the right track. 

      Reminder for how to log the time:

      1. You can log the time more than once in the same task.
      2. By default, you are always expected to log the time in every single Task / Subtask. 
      3. 100% precision is not required. ±10% variance is acceptable.

      Insert/edit code sample { }

      Insert/edit code samples simply apply the typesetting in both Task Description and Comment of the Task such that the readability of the content is increased by the viewer to visually classify the content in the typesetting as a specific object that is needed to pay attention. You can always apply the typesetting in following objects:

      1. Special object that is needed to pay attention.
      2. Programming Code
      3. Clickable Object / Click Path

    2. Assigning Google Merchant Center Access Rights

      Assigning Google Merchant Center Access Rights

      Definition

      Google Merchant Center

      Google Merchant Center (“GMC”) is a free tool provided by Google that allows businesses to upload and manage their product data. This data can then be used to create product listings that appear across various Google services, such as Google Search, Google Maps, YouTube, and the Shopping.


      Access Rights

      Access rights refer to the Role and Capabilities of a specific login name can access the application (i.e. GMC in this case). In some cases, the access rights will not only be assigned to a human , but also another system which want to access the application.

      For example, the e-shop platform Woocommerce may want to access the Google Merchant Center so that the Woocommerce can upload the product feed to Google Merchant Center.

      Unless otherwise stated, we assumed the Access Rights is assigned to human instead of another system. 

      Assigning Access Rights

      Assigning Access Rigths can be operated in 2 ways:

      Assigning Root Access

      It simply means that the owner of the login (i.e. the Assignor) share the Login and Password Credential (i.e. Root Access) to the assignee.

      Assigning Role Base Access

      Instead of sharing the Login and Password Credential of the account owner, Role Based Access mean the assignee assigns the Access Rights to another Login owned by another individual, such that he/she can use his/her own login to access the same application shared by the assignor.

      Unless otherwise stated, we assumed the Role Base Access to the assignee.  


      What Problems Assigning Google Merchant Center Access Rigths can solves

      Avoid Human Resource Turnover workload

      You may need to change the password of the application every time a staff or digital marketing agency is onboard or quit the organisation if you assign the Root Access to them. Assigning Role Based Access to them can solve this problem as you simply need to unlink the login account of the quitting staff or marketing agency ,which you don’t need to reset the password and since will not affect others.

      Fine-grained Permission

      In case you just want to assign the read-only instead of editing capability of the application to the assignee, the Role Based Access Permission can be adapted such that each separate capability can be assigned to another in fine-grained form.


      Prerequisite

      Please prepare for the following materials before you can smoothly assign access rights to others:

      Super Admin Access Rights of GMC

      Super admins of the GMC is the Google Account (i.e. a Gmail Address) from the Business Manager profile to which this Merchant Center is connected and hold the highest level of access to connected apps. In Merchant Center, they hold admin access.

      You should use the SAME Gmail address of which you created the Google Business Profile

      The Gmail Address of the Assignee

      If you want to assign the Access Rights of the GMC to 3 individual, you should collect 3 Gmail Addresses of these 3 individuals.

      Access Rights Level

      To understand the capabilities of each Access Rights level of GMC that you can choose, please refer to the article I need help with people and access levels.


      Step by Step – Assigning Acceess Rights to your Digital Marketing Agency

      As a Assignor

      1. Google Merchant Center1
      2. People and access
      3. Add person
      4. Enter email address2
      5. Access type = Admin
      6. Add user
      7. Status = Verified3
      1. Confirmation Email received.4

      As a Assignee

      1. Receive email sent from [email protected] titled Accept your invitation to Google Merchant Center.5
      2. Accpet


      Footnotes

      1. You should login GMC by your (assignor) GMC Admin or Super Admin account. ↩︎
      2. For DDM Group’s client, please assign the access rights to [email protected] ↩︎
      3. Status will be switched to Verified after the assignee accepted the invitation. ↩︎
      4. Sent from [email protected] to Google Merchant Center owner’s Email address. ↩︎
      5. If the access rights is assigned to DDM’s Group, the invitation email can be found in [email protected]. ↩︎
    3. Email Etiquette

      Email Etiquette

      Definition

      Email means any Work Gmail (e.g. [email protected]) or Domain Email (e.g. [email protected]) that you are going to use throughout the life in DDM Group.

      Etiquette refers to a set of unofficial rules or practices that individuals are expected to follow to demonstrate courteous and virtuous behavior.


      cc to Your Supervisor / Colleague

      When you send the email to your recipient, always cc your email to your supervisor, as well as anyone who should stay tuned to the topic.


      Email Attachment Handling

      In case you want to send a file to the recipient, instead of directly attaching the file into the email attachment, you should always choose to upload the File to your Google Drive and then send the URL of the File to recipient , with Restricted Access that only the recipient can open the File.

      While you may not realize that all Email storage does have limitations, the excess of Email storage will cost extra. We can save thousands of dollars by simply sending the URL of the file instead of directly attaching the file into the email.


      Beware of the Typesettting

      Good email typesetting can increase the readibility of the email and hence enhance the working efficiency in both side.

      By always using these simple typesetting technique in below can help to organize and present your message well:

      1. HEADING with each paragraph
      2. Bold
      3. Underline
      4. • Bulletin Point

      Beware of Email Indexing

      Email indexing means you or your recipient can search and found the email easily even after few years since the email is being sent.

      Compare the 2 Email Titles in below:

      Sales Report

      20241201-1230 Sales Report

      You can realize the the second version is better due to the fact that the Email Title make the email more unique and hence easy for being found in the futured.

      The rule of thumb is:

      1. Always put any kinds of Unique Identifier (e.g. Invoice# / Task# / Report Version) into the Email Title or Content to make it uniquely identifable.
      2. Always think of what keyword the future you , or your recipient will use to search for that Email.

      Email Signature

      An Email signature is a block of text or a graphical element that is automatically appended to the end of an email message. It typically includes important information about the sender and can serve as a virtual business card.

      Step By Step – Creating Email Signature

      Desktop

      1. www.gmail.com
      2. See all settings
      3. General > Signature > Create new
      4. Name new signature
      5. Copy and paste the following Email Signature Content found in below
        • Replace the placeholder inside “<<>>” to appropriate content.

      —–

      <<FULL NAME>>

      <<JOB_TITLE>>


      Diamond Digital Marketing (HK) Ltd
      | T : (852)-2471 6770

      | M :(<<COUNTRY_CODE>>)-<<MOBILE_NUMBER>>

      | www.diamonddm.com.hk
      | Unit A, 29/F, United Centre,

       95 Queensway, Hong Kong

      Marketing・Connecting・Sales

      ———-DISCLAIMER———

      This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited.

      Any views or opinions presented in this email are solely those of the author and do not necessarily represent those of the company. Employees of the company are expressly required not to make defamatory statements and not to infringe or authorize any infringement of copyright or any other legal right by email communications. Any such communication is contrary to company policy and outside the scope of the employment of the individual concerned. The company will not accept any liability in respect of such communication, and the employee responsible will be personally liable for any damages or other liability arising.
      —————————————

      Mobile Device

      1. In your mobile device
      2. Gmail APP
      3. Settings > General Settings
      4. Mobile signature
      5. Do the step #5 and #6 in Desktop

      Conclusion

      Be a responsible DDM Group citizen with civilized virtue, you will find you will benefit from it if everyone does the same, which will make your DDM Group life much easier.

    4. Cybersecurity Practice in DDM

      Cybersecurity Practice in DDM

      Definition

      DDM

      1. Any legal entity under Diamond Digital Marketing Group
      2. Any Digital Assets operated under the Business Name of Diamond Digital Marketing Group
      3. Teammate including any contractor or individual employee in DDM’s Group

      Practice

      A internal framework and guideline for the teammate to behave and follow.


      Objective

      In order to protect the digital assets of DDM Group from being exploited in cybersecurity, DDM Group is going to provide a Cybersecurity Practice for all teammate in DDM Group to follow.


      General Practice

      The principle of least privilege (PoLP)

      The principle of least privilege (PoLP) will be applied throughout any permission granting situation such that the permission will be fine-grained to different parameters including session, capabilities, role related projects and related clients.


      Cybersecurity Vulnerabilities

      Human Vulnerabilities

      A big porton of human vulnerabilities of cybersecurity are derived from human activities. An event-driven approach will be applied to suggest for the practice for these kinds of vulnerabilities. The events are as below:

      Device lost ,stolen or sold

      Vulnerabilities
      1. Login and password information which are saved in the browser will be exploited.
      2. Login and password information can be extracted from a specific exploited applications, which these login and password can apply to login attempt behaviors in another applications within DDM Group.
      3. Leakage on PII stored in local drive
      Practice – Prevention

      Teammates are suggested to :

      1. Assign a login and password for device login.
      2. Do NOT save any login and password of any applications in local drive, or in the cloud drive or cloud application where login session will not be expired periodically.
      3. Set factory default to the obsoleted device before it is sold. If the device is damaged to the level which it is impossbile to set the factory default, please raise out to I.T. Manager for buy-back program.
      Practice – Remedy
      1. All Teammates in DDM should report to their supervisor or contact point immediately after their smart devices are realized to be stolen or lost.
      2. Once any device lost or stolen cases are being reported , DDM Group will execute the following to prevent loss:

      Device Lost or Stolen Cases:

      1. Suggest the victim to report to police.
      2. Provide an application checklist for the victim and suggest them to use another device to login the applications one by one and cease the login session from the stolen or lost device.
      3. Provide an application checklist for the victim and suggest them to change the passwords of these application
      4. Reset the passwords for the applications which shared the same login and password within the whole DDM Group.
      5. Announce the lost or stolen device incident to other teammates which alerts them to address any frauds on pretending the victim to send out the email or message to other teammates in the DDM Group.

      Device Lost , Stolen Cases or Sold :

      1. Provide an application checklist for the victim/users and suggest them to detach the devices to the associated applications.
      2. Set Factory Default for the device before selling.
      3. Sign out the device sessions that you last logged the target device for following applications:
        • Google Account
          • myaccount.google.com
          • Security > Your devices
          • Manage all devices
          • <<TARGET_DEVICE_SESSION>>
          • Sign out
        • Company diamond External Gmail account
          • myaccount.google.com
          • Security > Your devices
          • Manage all devices
          • <<TARGET_DEVICE_SESSION>>
          • Sign out


      Connecting Public WiFi

      Vulnerabilities
      1. Man-in-the-Middle Attacks: Attackers can position themselves between victim and the connection point, intercepting and potentially altering victim’s data.
      2. Malicious Hotspots: Hackers can set up fake Wi-Fi networks with names (e.g. Starbuck_Guest_5G) similar to legitimate ones (e.g. Starbuck_5G), tricking victim into connecting and exposing their data.
      3. Malware Distribution: Public Wi-Fi can be a vector for malware, allowing attackers to exploit vulnerabilities in victim’s device to install malicious software
      Practice – Prevention

      Teammates are suggested to :

      1. NEVER and EVER use public hotspot in any circumstance.
      2. Use teammate’s own hotspot in their mobile device to share WiFi.
      3. Setup a strong password for the hotspot in their mobile device.
      4. As a last resort, if a public WiFi is inevitably used,
        • install WiFi Security Scanner to scan the WiFi before using it. For details please refer to article Anti-Virus Software Installation
        • Scan out ALL similar WiFi names (instead of picking the 1st WiFi name that you guess is a real one) in the WiFi lists and explicitly ask the legitimate WiFi provider if the WiFi name you picked is correct.  

      Connecting Digital Assets via Public Devices

      Vulnerabilities
      1. Session Cookies will be stored in the public devices so that the next person who uses the device may access the digital assets previously logged by the teammate.
      Practice – Prevention
      1. Do NOT use public device to login any digital assets of DDM Group
      2. As a last resort, use incognito mode in the browser to login the digital assets of DDM Group
      Practice – Remedy
      1. Delete the Browser History ,Session Cookies as well as the saved password in the Browser used to log in the digital assets of DDM Group before leaving the public device.

      Storing PII in Local Device

      Vulnerabilities
      1. PII leakage if device is stolen or lost.
      Practice – Prevention
      1. If needed , save the PII in cloud drive instead of local device.
      2. Zip the PII file with password if it is inevitable to save it on a local device.

      Malicious Software

      Hackers prey on human greed and fear to entice individuals into their traps through the following methods:

      1. Fraud Business Email claimed that there is luractive business opportunity.
      2. Pretend to be a renowned and trustworthy brand and send you the SMS message with a URL claiming that there is a special and limited offer for you.
      3. Visited a website and then a modal popped up and claimed that your computer is compromised and suggested you download and install a software to clean up the virus.
      4. Pretend to be one of your friends by compromising the WhatsApp account of your friend and use this compromised account to send you message and suggest you to follow his/her instruction.
      Vulnerabilities
      1. Unauthorized and malicious software is secretly installed in the victim’s device and plishing attack is triggered.
      Practice – Prevention
      1. Enable anti-virus software constantly.
      2. Do not being greedy or to fear (it’s very hard!)
      3. NEVER and EVER click any URL from any SMS or WhatsApp message.
      4. NEVER and EVER download the attachment from any emails sent from that you have not contacted with before. (even though the sender is seemed to be an big brand)
      5. Even though the email or message is sent from a known person, pay double attention when clicking a URL or opening a file because even your friend may not address that his/her device is being compromised.
      Practice – Remedy
      1. Formatting the device or reset it to factory default is the device is compromised.
      2. Annouce to your clients and teammates that your device is being hacked.

      Installing Malicious Application

      Hackers prey on human greed and fear to entice individuals into their traps through the following methods:

      1. Embed the malicious function into an Mobile APP or desktop software installer claiming that this APP or software can help you to hack another device or network.
      2. The rule of thumb is that whenever you want to use an APP or software to hack others or execute some dark magic, most likely the APP or software you are going to use is by itself a malicious software which will hack your device.
      Vulnerabilities
      1. Plishing attack
      Practice – Prevention
      1. Formatting the device or reset it to factory default is the device is compromised.
      2. Do NOT fall into the trap of being greedy or to be fear.
      Practice – Remedy
      1. Run Antivirus program to scan the device periodically.
      2. Annouce to your clients and teammates that your device is being hacked.

      Weak Password

      Vulnerabilities
      1. Brutal Force Login Attempt
      Practice – Prevention

      Always comply with the following rules when choosing a password:

      1. Use strong password combination, for example:
        • Alphanumeric , AND
        • Case Sensitive, AND
        • Special Charcters
      2. Login and password should not be the same.
      3. Do NOT use 1 password combination for ALL of your applications. In case you want to share your login and password to any other to work on behalf of you, or in case one of your applications is being compromised, the hacker/ the people you share the password will/may apply the same password to login other applications. In fact, it is strongly recommended you to use DIFFERENT password for EACH different application.
      4. Use Zoho Vault to store the password of different applications. (So that you will not use 1 password for all applications simply because you are afraid of forgetting the passwords of different applications.)
      5. Do NOT use the password in worst password list, or applying the same logic derived from the worst password list
      6. Always enable 2FA (or MFA) function of an application. (if there is any)

      Share Password to Teammate

      It is common that you would like to share the password of an application to your teammates or clients for temporary use.

      Vulnerabilities
      1. Plishing Attack if the device of the teammate that you shared the password to is already compromised.
      2. Password Eardropping
      Practice – Prevention
      1. Separate the Login Name, Login URL and Password into 3 separate emails or messages when you send them to your teammate.
      2. Always choose to delete access permission function inside the application, instead of sharing Root Access (i.e. Login and Password) to your teammate.
      3. Apply the principle of least privilege (PoLP) when sharing access permission to others.
      4. Cease the login session after finishing using the access permission.
      5. Modify the password if the Root password is shared to others before.

    5. Zoho Vault

      Zoho Vault

      Definition

      Zoho Vault is an online password manager (with APP version or Desktop version) designed to securely store and manage passwords, documents, and other sensitive information. It acts as a digital vault for your credentials, helping you keep everything organized and protected from threats


      What Problems does Zoho Vault Solves

      Lost Mobile Device

      If you have saved all the passwords of your applications into your mobile devices, in the scenario that you have lost your mobile devices, all of these passwords are  being exposed. 

      Instead, it is better to save all the passwords from different applications into a cloud SaaS whenever your mobile device is lost, you can simply end the login session of the lost devices and then no one can exploit the password lists any more.

      Mistakenly Modified the Password

      While you save all your passwords in a Google Spreadsheet, every single record of the password will be editable even though you would only want to access one of them, making the remaining password records under the risk of being modified mistakenly.

      Time Wasted on Password Management

      Believe it or not, there are more than 200 login and password records can be found in DDM’s Group.

      Significant amount of time will be wasted on following aspects with a bad Password Management because you will have hundreds of login and password records which is much more than you can imagine :

      1. Time on searching for Login and Password
      2. Your own time for forgetting and resetting Password
      3. Your teammate’s time for assisting you to reset your Password.
      4. Opportunity time cost of spending the time on production (vs spending time on search and resetting Password).

      What Problems Zoho Vault (Free Version) Cannot Solves

      1. Password sharing – cannot share a specific password record to a specific person within specific time period.

      Why Zoho Vault

      1. It’s free for life time
      2. Zoho Vault is owned and operated by a MNC Zoho Inc, which is unlikely to be shutdown
      3. Mobile APP and Desktop version are both available.
      4. Topest Security Level
      5. The account in Zoho Vault is 100% owned by you. There is 100% nothing relating to DDM Group, non DDM Group has any authority to access or manipulate your Zoho Vault account.

      Preparation before installation

      Mobile Phone Number Ready for Receiving SMS

      You will need a Mobile Phone Number to receive the SMS verification code during the Zoho Account registration process. In the future , in case you need to change your password or be requested for any identity authentication, you may need this Mobile Phone Number to do the authentication process again. So please make sure the Mobile Phone Number that you used can be under your control in lifetime. 

      Your Personal GMAIL Address

      The passwords which you saved in Zoho Vault will last for lifetime. Besides the password information related to DDM Group, you can also save the passwords from your personal application. 

      Therefore, the email address that you chose to register for the Zoho Vault account SHOULD be your personal email account (e.g. Gmail) which is forever free and you can always login without any friction. 
      DO NOT use any domain email address (e.g. [email protected]) to  register for the Zoho Vault account

      A Master Password That You Will Never Forget

      Prepare for a password for registering the Zoho Vault. You should never forget this Master Password because there is almost no way for you to reset your password. Keep this password in a safe place which only you will know.


      What Types of Password to be saved in Zoho Vault

      1. Your personal application
      2. Your own login of the application which is related to DDM’s Group (e.g. the password of your own [email protected] wormail login)

      Step By Step on Zoho Vault Installation


      Sign Up Zoho Account (Lifetime Free)

      1. https://www.zoho.com/vault/pricing.html
      2. FREE FOREVER
      3. START FREE TRIAL1
        • Email = <<YOUR_PERSONAL_GMAIL>>
        • Password = <<YOUR_PASSWORD_001>>
      4. No, My Organization is new to Vault
      5. Personal
      6. Create master password = <<YOUR_PASSWORD_002>>2
      7. Confirm master password = <<YOUR_PASSWORD_002>>
      8. Enter the text you see in the below image
        • I understand that if I forget the master password, Zoho Vault will not be able to recover it.
      9. Get Started

      Install Zoho Vault in Mobile Devices

      1. Your Mobile Device
      2. Google Play Store or Apple App Store3
      3. Search Zoho Vault Password Manager
      4. Install
      5. Login Zoho Vault and related steps ….

      Once you have completed the registration and installation, you should immediately record the login password of Zoho Account and Zoho Vault account into your Zoho Vault App


      Conclusion

      Remember , in DDM Group there is NO ONE who will help you to reset your password. Always record your login credential to Zoho Vault immediately after you created or modified it. Please be a teammate with civic virtue which will never waste your and others time to reset (or assist you to reset) your password.


      Footnotes

      1. There is no any logical or technical concern. I will skip the step by step on signing up a Zoho Account. ↩︎
      2. While in the future you may use your Zoho Account to apply for another Zoho Application , it is recommended to use different password for your Zoho Account and Zoho Vault account. ↩︎
      3. Google Play Store will be taken as an example to demonstrate the steps. ↩︎
    6. Daily Routine Communication  Protocol for All Teammate

      Daily Routine Communication Protocol for All Teammate

      Introduction

      In order to communicate effectively within the organisation , as well as minimizing the reporting workload of all teammates, the Daily Routine Communication Protocol will be acting as the minimal daily communication responsibility for all teammates in DDM.


      What Problem Patterns the Routine Daily Communication Protocol Solve


      Minimize Reporting Workload:

      Standardized Reporting Specification

      By standardizing the specification of the daily report to the supervisor of any teammates, teammates don’t need to spend time on decising what direction is needed to report , as well as the granularity of the report. (i.e. how deep to report to the supervisor in a specific topic)

      Standardized Reporting Frequency

      To clearly define the frequency of the reporting so as to protect the teammate by being accused of not reporting the progress of the tasks.

      Standardized Reporting Channel

      Ocassionally there is a situation that a teammates just had a discussion with their supervisor and they would regarded it as an official reporting so that they will skip the daily report workload, while their supervisor did not think in the same way.

      To standardize the reporting channel will kill this misunderstanding

      Standardized Reporting Target

      While in organisation with a non-flattern organisation structure, the immediate supervisor of a teammate will also need to report to his/her supvervisor (i.e. supervisor of supervisor). To define clearly the communication path and direction can protect the teammate from being accused of not reporting to a non immediate supervisor.


      As a Ground of Task Delegation

      As a teammate, by reporting the daily task list , as well as the progress of the tasks to his/her supervisor, can facilitate his/her superior to delegate an appropriate quantity and quality of tasks which will not overload the teammate.


      Daily Routine Communication Protocol Specification

      Reporting Items

      1. Outstanding Tasks on hand which are expected to be executed at that day. Outstanding Tasks which you will not carry out that day are not expected to report at that day.

      Reporting Specification

      You can choose between either Method 1 or Method 2 for reporting


      Method 1 – Using Teamwork.com

      1. diamonddm.teamwork.com/app/home/work
      2. Show ONLY the follow columns (in order)
        • TASK NAME
        • ID
        • CREATED BY
        • DUE DATE
        • PRIORITY
        • PROJECT
        • PROGRESS
      3. Customzie the showing columns as below. Make sure:
        • All columns can be shown in one screen by
          • adjusting the widht of the columns
          • collapse the left side bar in Teamwork.com
      1. Set the PRORITY (High || Low ) of the tasks that are expected to carry out at that day 1 based on the logic mentioned in later session Logic on prioritizing the Task in this article.
      2. Set the PRORITY (None) of the tasks that are NOT expected to carry out at that day.
      3. Set the PROGRESS to reflect the current Task status.
        • 0% : Not yet start working
        • 1% : Just Start Working
        • 50% : Working In Progress
        • 100% : Task Completed
      4. Sort by PRIORITY Column
      5. Take Photo / Cap screen and WhatsApp to the Reporting Target.

      Method 2 – Using Plain Text

      At least and at most following content should be involved in the specification

      1. Reporting Date (This is will be classifier of how we defined this message as Daily Routine Communication Report)
      2. Task#
      3. Related Client
      4. Brief Title of the Task
      5. Priority (top || low)
      6. Task Status (done || wip)

      Example

      At the beginning of a working day, the WhatsApp message that you are going to report is as below:

      20241214

      • #49432943 – Nike install GA4 – top – wip
      • #43293923 – Study Graph Database – low – wip

      Before the end of a working day, you can simply copy and paste the message in the beginning of the day, and change the parameters of inside the task. If during the day you have been assigned a new task, you can append into the end of the task list. For example:

      20241214

      • #49432943 – Nike install GA4 – top – done
      • #43293923 – Study Graph Database – low – wip
      • #49433443 – Addidas install GTM – top – wip

      Caution

      A comprehensive or detail reporting for a specific task is strongly NOT recommended in th e daily routine reporting content. Any comprehensive detail of a specific task should be recorded in the task comment of related task.

      The rule of thumb is that you are suggested not to spend more than 1 minute (including the time on searching the task#.) on reporting each task.


      Logic on prioritizing the Task

      You can base on the logic below to decide which tasks you should do in priority:

      Task NatureTarget ProjectInstructed By
      AnyAnyOverrided by your Immediate Superior.2
      OperationalClientBy Default
      R&D (Research and Development)ClientBy Default
      OperationalDDM in-houseBy Default
      R&D (Research & Development)DDM in-houseBy Default
      The order of the row reflects the priority of the tasks

      Reporting Target

      Report only to immediate supervisor (which you will be told during your on boarding procedure)


      Reporting Frequency

      1. Every day before start working , AND
      2. Every day before off

      Reporting Channel

      1. DDM Community WhatsApp Group, OR
      2. WhatsApp of your immediate supervisior

      When to start Daily Reporting

      1. Immediate after you have read this article, last as long as you are the teammate in DDM Group.

      Footnotes

      1. You only need to set the PRORITY for the task which you expect to carry out that day. i.e. You can set to None if that task don’t need to carry out at that day. ↩︎
      2. Whenever there is a contradiction in your order between anyone (e.g. the supervisor of your supervisor or the key client of the company) , the order from your immediate supervisor always prevails and is conclusive. ↩︎
    7. DDM Kenya Incubation Program

      DDM Kenya Incubation Program

      Introduction

      In order kick start a positive financial loop for the development of Kenya’s market, as well as providing an business friendly environment for the talents in DDM to turn their idea into reality, Diamond Digital Marketing Group (DDM) is going to introduce a Kenya Incubation Program. (a.k.a IncubK)


      Objective of the IncubK

      1. Bring DDM’s service and product into Kenya’s market
      2. Finance the R&D of Kenya’s market from profit generated from any business line in Kenya.
      3. Provide an business friendly environment to faciliate any kinds of talent in DDM to monetarize their business idea.
      4. Let Kenya staff to operate or own their business based on the portion of contribution.

      Scope of IncubK


      Matured Business Line

      Any kinds of Service or Products currently provided by DDM group and is running under the business name of DDM in Kenya:

      1. Google Ads Management
      2. Meta Ads Management
      3. Social Media Page Management
      4. Social Listening and data scrapping
      5. Domain Registration
      6. eDM
      7. Basic Cloud Infrastructure including : Web Hosting / Email Server / Web Server / Load Balancing / CDN /SMTP / Security Group / SSL / IP / Relational Database
      8. SEO
      9. Graph Database and related Machine Learning
      10. Semantic Search and related Machine Learning
      11. Website , Web Application or any kinds of systems built by WordPress

      Seeding Project

      Any kinds of Service or Products not mentioned in Matured Busienss Line and is eligible to be an Seeding Project , no matter its a ad-hoc short term project or project in long run, which the business is running under DDM’s business name.


      Net Profit

      Net Profit =

      Sales Turnover

      COGS

      Operation Cost

      Taxation

      Sales Turnover

      Any Sales Revenue generated by rendered or delivered product or service in cash basis (i.e. not cash in arrear basis), from the client which owns a legal entity in Kenya.

      COGS (Cost of Good Sold)

      Any kinds of direct cost related to the selling and production activites which CAN directly and clearly assigned to the a particular Sales Order. For example Hourly Wages of the production, Sales Commission , Inventory (e.g. Contracted Infrastucture for a specific Sales Order)

      Sales Commission =

      10% *

      (Sales Invoice Amount (in Cash Basis) –

      Any kinds of 3rd Party Fee directly assigned to the Sales Invoice (e.g. Ads Spent))

      Operation Expenses

      Any kinds of indirect cost which CANNOT clearly assigned to a particular sales order. For example, marketing cost , amortization of the initial investment, R&D (Research and Development) Any kinds of monthly subscription infrastructure in general, Project Management Cost , so on and so forth.

      R&D cost from only Seeding Project will be assigned to the operation expenses. For Matured Business Line, all the R&D cost will be absorbed by the current business line.

      If a particular type of operation expenses which cannot be clearly assigned to Kenya’s Business Line, or only a small portion of that operation expenses is used by Kenya’s Business Line, that operation expenses (or portion of) will be absorbed by other Business Line in DDM.

      For example, the monthly subscrption fee of Project Management System teamwork.com will not be classified as the operation expenses of Kenya Business Line because it only accounts for a very little portion of Kenya’s Business Line.

      Taxation

      Any kinds of Profit Tax, Value Added Tax or Sales Tax.


      Kenya Business Line

      1. Any Sales Revenue which is brought by the employee and is generated from client with legal entity in Kenya.
      2. Any Cost is incurred by the employee or is generated from vendor with legal entity in Kenya, or the portion of any SaaS subscription fee which is assigned to Kenya’s business even though the SaaS vendor does not have legal entity in Kenya.
      3. The Service or product is rendered or delivered in Kenya

      Profit Distribution Equation


      Glossary

      TerminologyDefinition
      IncubK StakeThe fund pool that will be benefit to (and only to) any stakeholder involved the Kenya Incubation Program
      Net ProfitReceived (i.e. NOT receivable) Net Profit generated from Matured Business Line and Seeding Project in IncubK.
      Reserve on Seed Fund% of IncubK Stake which is reserved for future R&D and predictable expenses purpose.
      DDM Stake% of IncubK Stake that as the reward for the contribution of Diamond Digital Marketing Group.
      IncubK Participant Stake (PS)% of IncubK Stake for the Stake of a specific IncubK Participant
      IncubK Participant Contribution Hour (PCH)Number of Hours recorded in a specific period1 in teamwork.com for a specific projects or business line under IncubK program contributed by a specific IncubK Participant
      Total Contribution Hours from All IncubK Participants (Total PCH)Sum of the number of Hours in a specific period1 recorded in teamwork.com for specific projects or business line under IncubK program contributed by all IncubK Participants.
      IncubK Participant Stake (PS) Factorportion (in terms of %) of a specific IncubK participant which he/she entitled to the reward from his/her contribution. This Factor reflect the level of risk he/she is willing to bear.
      Glossary

      Profit Distribution Formula

      IncubK Stake =

      Net Profit in Cash Basis

      Reserve on Seed Fund

      DDM Stake

      IncubK PS  =

      IncubK Stake *

      (IncubK PCH / Total PCH) *

      IncubK PS Factor

      Hourly Rate of IncubK Participant in specific Project% of IncubK Participant Stake (PS) Factor
      USD$35%
      USD$225%
      USD$170%
      USD$0100%
      IncubK Participant Stake Factor Tier

      Profit Distribution Time Schedule

      ItemDistribution Frequency
      WagesMonthly
      Sales CommissionMonthly in Cash Basis (i.e. NOT in accrual basis)
      IncubK Participant Stake (PS)Quarterly
      Profit Distribution Time Schedule

      IncubK Participant Eligibility

      Any person who meets the following criteria is eligible to participate any Matured Business Line Project:

      1. Any full time staff employed by DDM Group before Jan 2025 , OR
      2. Any full time staff had been working for DDM Group more than 6 months, AND
      3. With Kenya National ID Card, AND
      4. Is still a full time Employee of DDM Group at the date of Profit Distribution , AND
      5. Person who explicity declared to agreed the terms of conditions of the IncubK Program Participation.
      6. Only The IncubK Participant Contribution Hour (PCH) recorded in an assigned Teamwork.com Task# will be classified as valid.

      Terms and Conditions of IncubK Program Participation.

      I hereby declare my interest for participating in the IncubK Program and agreed that:

      1. I will not spend my official office hours under DDM’s employment contract to work for any task related to IncubK program. Any violation of this term will be disqualified as the IncubK Participant.
      2. In case there is a deficit in the IncubK Stake derived from any Project from any Matured Business Line, no matter I have participated that project or not, I should and will only bear the monetary loss derived from the IncubK project NO MORE than the positive balance of my incubK Participant Stake.
      3. Whether intentionally or reluctantly if I no longer be the employee of DDM group , effectively from the last date of the resignation, I will not eligible to be the Participant of IncubK program, nor the IncubK Stake.

      DDM Contribution on IncubK Program

      In order to initialize and foster the InclubK Program, DDM Group is going to invest in below:

      1. USD$2,000 as the openning balance of Reserve on Seed Fund for all Matured Business Line Projects in total.
      2. Absorb the Research & Development Cost of the Matured Business Line Project under IncubK Program by any existing up and running non IncubK Project. (subject to approval from DDM Group.) 3
      3. 12 hours per month on professional advice in any associated discipline on running or planning any incubK Project.
      4. In case there is a deficit of the incubK Stake, DDM is going to settle the deficit at no more than USD$1000 in a financial year.

      Seeding Project

      Details are to be discussed and open for discussion.


      Miscellaneous Terms

      1. All the terms and conditions in the IncubK Program will be evaluated and modified from time to time. One month early notice will be provided in case there is any modification in any terms and conditions.
      2. Should any dispute arise, the decision of DDM Group shall be final and conclusive.

      1. Specific Period is the period mentioned in Profit Distribution Time Schedule ↩︎
      2. Specific Period is the period mentioned in Profit Distribution Time Schedule ↩︎
      3. For example. If a Domain Transfer technique in a Domain Reseller Project is needed to develop by spending R&D time cost, if this Domain Transffer technique can also be benefit to the existing Domain Transfer project in Hong Kong market, the Hong Kong Domain Transfer project will absorb the R&D cost of developing the Domain Transfer technique. (i.e. $0 R&D cost will be assigned to incubK Project. ↩︎
    Diamond Digital Marketing Group