Published inGood AudienceWhy choosing “non-scalable business” over “scalable business” isn’t always a bad ideaRecently, I’ve e-mailed +1000 VCs and PEs about an opportunity to invest. More than 40% replied with, something equivalent to, “we believe…Jan 29, 2020A response icon3Jan 29, 2020A response icon3
Published inGood AudienceSecondary Market Liquidity For Security Tokens: Part 1This is a series on secondary market liquidity for digital securities (or security tokens). In this post, I will focus on issuing digital…Apr 24, 2019Apr 24, 2019
Published inThe StartupHow The Next Trillion Start-Ups Will Be FundedOn the breakthrough in funding for business growthJan 22, 2019Jan 22, 2019
Published inHackerNoon.comSecurity tokens and the loophole in corporate lawThis element of corporate law will make or break the security token industry. 99% of the companies offering a security token in the…Nov 12, 2018Nov 12, 2018
Published inGood Audience5 Things I Learned From Teaching University Students About Security TokensSchools are trying to adapt to innovations and market trends. As a result, classes have become mutual learning processes — whereby the…Oct 15, 2018A response icon1Oct 15, 2018A response icon1
Published inHackerNoon.comOn world’s Security Token Offering epicenter — The NetherlandsEver wondered where the word ‘Stock’ comes from?Sep 19, 2018A response icon2Sep 19, 2018A response icon2
Published inGood AudienceThe Dual Token Structure ThesisIn 2018, increasingly more projects recognize the problems in issuing an utility token that is used to fuel network transactions in one…Aug 17, 2018Aug 17, 2018
Published inGood AudienceSecurity Token Offering— Savior of the EcosystemThe year 2017 was a remarkable year for crypto. The industry grew, projects emerged, and the number of ICO’s skyrocketed. In 2018, we see…Jul 17, 2018A response icon6Jul 17, 2018A response icon6