Pages:
Author

Topic: [ANN][ICO] IDM Protect - page 24. (Read 14803 times)

newbie
Activity: 74
Merit: 0
June 10, 2018, 02:24:23 PM
Hello! In general, this project is trying to find its niche in a fairly competitive market.

Despite the large number of companies on this market, there is no ideal product.

It's the truth. The companies only promise 100% protection of your data, but actually it is not so.
newbie
Activity: 76
Merit: 0
June 10, 2018, 02:09:55 PM
Hello! In general, this project is trying to find its niche in a fairly competitive market.

Despite the large number of companies on this market, there is no ideal product.
jr. member
Activity: 294
Merit: 1
June 10, 2018, 01:55:33 PM
Hello! In general, this project is trying to find its niche in a fairly competitive market.
copper member
Activity: 112
Merit: 0
June 10, 2018, 01:43:09 PM
What can you say about competition on the market? Can you compete with other companies?

I think that the competition in this segment is quite strong and everything depends on the uniqueness of the product.

Yes, in this case, it really depends on the quality of the product.

We are sure that IDM can successfully compete with other services due to the unattainable level of protection against loss or theft of data provided by our patented SIZE algorithm.
newbie
Activity: 62
Merit: 0
June 10, 2018, 01:28:05 PM
What can you say about competition on the market? Can you compete with other companies?

I think that the competition in this segment is quite strong and everything depends on the uniqueness of the product.

Yes, in this case, it really depends on the quality of the product.
newbie
Activity: 39
Merit: 0
June 10, 2018, 01:16:31 PM
What can you say about competition on the market? Can you compete with other companies?

I think that the competition in this segment is quite strong and everything depends on the uniqueness of the product.
newbie
Activity: 18
Merit: 0
June 10, 2018, 01:03:16 PM
What can you say about competition on the market? Can you compete with other companies?
newbie
Activity: 30
Merit: 0
June 10, 2018, 12:55:04 PM
What is your marketing plan for the next 5 years?

Our primary marketing goal for the next 5 years is to contact at least 10% of our target audience. In 2019-2020, we must reach a sales volume of at least $45 million.

I see. It's quite ambitious.
copper member
Activity: 112
Merit: 0
June 10, 2018, 12:39:41 PM
What is your marketing plan for the next 5 years?

Our primary marketing goal for the next 5 years is to contact at least 10% of our target audience. In 2019-2020, we must reach a sales volume of at least $45 million.
newbie
Activity: 30
Merit: 0
June 10, 2018, 12:29:39 PM
What is your marketing plan for the next 5 years?
copper member
Activity: 112
Merit: 0
June 10, 2018, 12:15:21 PM
Are there any restrictions on the amount of memory that miners should provide?

Again, what makes IDM unique is that miners can rent out as much space as they want and still bring in revenue.
newbie
Activity: 50
Merit: 0
June 10, 2018, 12:02:44 PM
Are there any restrictions on the amount of memory that miners should provide?
newbie
Activity: 50
Merit: 0
June 10, 2018, 11:52:02 AM
Please, what advantages have miners in your service?

Sure. With our service miners can choose how much memory they want to lease out on their devices. They can earn IDMCoin tokens for renting out this space. What makes IDM unique is that miners can rent out as much space as they want and still bring in revenue.

I see. It really sounds unusual.
copper member
Activity: 112
Merit: 0
June 10, 2018, 11:39:38 AM
Please, what advantages have miners in your service?

Sure. With our service miners can choose how much memory they want to lease out on their devices. They can earn IDMCoin tokens for renting out this space. What makes IDM unique is that miners can rent out as much space as they want and still bring in revenue.
newbie
Activity: 50
Merit: 0
June 10, 2018, 11:28:35 AM
Please, what advantages have miners in your service?
newbie
Activity: 50
Merit: 0
June 10, 2018, 11:19:42 AM
Please tell us briefly, what are the current methods of information protection?

There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online.

And with all the wealth of choice, nothing works 100%?

Unfortunately, this is all true. So far, nothing is absolutely effective yet.

Well here, as I understand it, this Size algorithm is something really revolutionary.

The only thing I read about this algorithm and do not really understand where the system will take so much free memory to store user information on it.

The service will buy free memory from various devices from the so-called miners.

That is, people will receive money for it? Interesting idea.
copper member
Activity: 112
Merit: 0
June 10, 2018, 11:06:10 AM
Please tell us briefly, what are the current methods of information protection?

There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online.

And with all the wealth of choice, nothing works 100%?

Unfortunately, this is all true. So far, nothing is absolutely effective yet.

Well here, as I understand it, this Size algorithm is something really revolutionary.

The only thing I read about this algorithm and do not really understand where the system will take so much free memory to store user information on it.

The service will buy free memory from various devices from the so-called miners.
newbie
Activity: 28
Merit: 0
June 10, 2018, 11:04:07 AM
I've sent a demand in telegram, waiting for your return!
newbie
Activity: 8
Merit: 0
June 10, 2018, 11:03:34 AM
Good morning, fellows. I wish the project success
newbie
Activity: 50
Merit: 0
June 10, 2018, 10:55:13 AM
Please tell us briefly, what are the current methods of information protection?

There are anti-virus programs, authentication methods, and also simple steps involving passwords that can all be utilized to help to enforce the security of data that makes its way online.

And with all the wealth of choice, nothing works 100%?

Unfortunately, this is all true. So far, nothing is absolutely effective yet.

Well here, as I understand it, this Size algorithm is something really revolutionary.

The only thing I read about this algorithm and do not really understand where the system will take so much free memory to store user information on it.
Pages:
Jump to: