Categories
Ozioma

SMS Blaster

SMS Blast is a bulk SMS text message that is sent to a large number of mobile phone numbers simultaneously via an automated text messaging system. Using SMS blast is a simple and cost-effective way to communicate in real time with a large number of mobile phone users.

Many organizations use a text blasting system in order to “text blast” large groups of people simultaneously. This is because a text message blast is simple to organize, inexpensive to run, and more effective at immediately reaching a large number of people than any other channel of communication.

SMS text blasting is most commonly used by the retail industry as a key part of a mobile marketing strategy. However, many different types of organization also take advantage of text blast services in order to generate engagement and build relationships within their communities.

One of the advantages that a text blasting system has over other channels of communication is that it is a permission-based activity. People have to opt in to receive text blast messages and are therefore more receptive to those messages, and more likely to engage with the sender or share the text blast messages with friends, families and colleagues.

Other Uses of a Text Blasting Service

There are many, many other uses of a text blasting service – both commercial and non-commercial. Home buyers can be kept up-to-date with new listings and price drops via an SMS blast. Parents can be sent school consent forms in a text blast, community volunteers can be coordinated with a text message blast, and voters can be encouraged to get out and vote using a text blasting service.

Access to text blast software can also be important during emergencies when data networks often get overloaded. Being able to remain in contact with employees, students, parents and personnel may be vital during security alerts, power outages or inclement weather. The text blasting service can help keep everyone safe, or advise them of last minute closures, cancellations or changes of venue.

Other uses of the text blaster interface include keeping fans up-to-date with the football score, alerting job seekers to new employment opportunities and reminding parishioners to go to church. Indeed, many faith-based organizations have been able to engage the youth of their parish, using text blast services to increase attendances at church events and ensure the future of their congregations.

Using Ozioma’s SMS Blast Service for Text Message Marketing. With our SMS blast service, your business or organization can send text messages to hundreds or tens of thousands of subscribers instantly.

Categories
Ozioma

Ad Campaign

Ad campaigns are an important marketing strategy for all kinds of businesses that want to increase brand awareness and profits.

An advertising campaign is a series or set of advertisement messages that revolve around a single idea, message and theme and are intended to achieve a particular goal.  Some of those goals could be,

  • To create brand awareness for a new product
  • To drive sales of a product or service
  • To generate leads by asking people to sign up for an email list or another free offer

 Advertising campaigns utilize diverse media channels over a particular time frame and target identified audiences.

To create an advertising campaign it’s important to keep in mind the target audience and to understand how you can strike a chord with them to get them interested in your products or services.

How can Ad Campaign Help your Business

It is always better to have a well-planned strategy to promote your brand, product or services, right? Advertising campaigns do that for you. Whether you offer a product or a service, choose to promote your brand online or offline—advertising campaigns help by guiding you through the process. They also help you gauge where your business stands in the market, by comparing your advertising campaigns with your competition, thereby also helping you assess the strengths and weaknesses in your products.

An effective ad campaign creates interest, builds desire for a product or services and motivates people to act on their desires.

The process of making an advertising campaign is as follows:

  1. Research: first step is to do a market research for the product to be advertised. One needs to find out the product demand, competitors, etc.
  2. Know the target audience: one need to know who are going to buy the product and who should be targeted.
  3. Setting the budget: the next step is to set the budget keeping in mind all the factors like media, presentations, paper works, etc which have a role in the process of advertising and the places where there is a need of funds.
  4. Deciding a proper theme: the theme for the campaign has to be decided as in the colors to be used, the graphics should be similar or almost similar in all ads, the music and the voices to be used, the designing of the ads, the way the message will be delivered, the language to be used, jingles, etc.
  5. Selection of media: the media or number of Medias selected should be the one which will reach the target customers.
  6. Media scheduling: the scheduling has to be done accurately so that the ad will be visible or be read or be audible to the targeted customers at the right time.
  7. Executing the campaign: finally the campaign has to be executed and then the feedback has to be noted.
Categories
Ozioma

How to Deactivate DND On All GSM Networks

DND (Do-Not-Disturb) is a service that stalls bulk SMS from getting delivered to your contacts or your phone number. People subscribe to DND to enable them to opt-out from receiving third party SMS messages, such as marketing campaigns and ads. As thus, this poses a challenge on sending or receiving SMS to/on DND active numbers. The only way out in most cases is if contacts unsubscribe from the service. This can only be done directly from the mobile phone of the contacts themselves.

Here are steps on how to unsubscribe or deactivate DND on all GSM networks in Nigeria.

To confirm if your phone number is DND active, simply text STATUS to 2442. For Glo numbers text HELP to 2442. If it is active it means that you can’t receive bulk SMS on that number.

Text START to 2442 on your 9mobile number if DND is active to deactivate it.

Text START to 2442 on your GLO number if DND is active to deactivate it.

Text ALLOW to 2442 on your AIRTEL number if DND is active to deactivate it.

For an MTN number that is DND active, text ALLOW to 2442 to deactivate it.

It has been discovered that Network Providers are automatically enabling DND on their subscribers’ line without their consent, and a lot of contacts aren’t aware they are DND active.

 In case these codes don’t work, kindly call your Customer Care. (Airtel 111 or 121, MTN 180, 9mobile 200, GLO 121 or 200)

Categories
Ozioma

Nonprofit Newsletter

We have nonprofit newsletters. I separated these out into a new category because the goals are a bit different. Newsletters play a much more important role for nonprofits.

Because nonprofit organizations are highly mission-driven (and constantly scrambling for funding), SMS newsletters are absolutely essential. They provide the best way for these organizations to stay in contact with supporters and past donors at scale to communicate important information, including:

  • Updates on the organization
  • Relevant stories and developments related to their core mission
  • Upcoming fundraising events and promotions

Because SMS is much cheaper (and more engaging) than direct mail, newsletters have become a staple in the nonprofit marketing toolbox.

Categories
Ozioma

What is a newsletter

Newsletter is a printed or electronic report containing news concerning activities of a business or an organization that is sent to its members, customers, employees or other subscribers. Newsletters generally contain one main topic of interest to its recipients.

Do you have an e-commerce or a blog and have not yet sent newsletters to promote your business? Then you will not know exactly what a newsletter is and what it does. Briefly, it is still the main tools of SMS Marketing and they generate better results at a very reduced price, when used correctly.

Ecommerce Newsletter

Ecommerce newsletters usually serve a few main purposes:

  • Promote new products in the store
  • Announce seasonal promotions or sales
  • Reinforce a strong relationship with customers
  • Help build a community around the brand

Product/Company Update Newsletter

The goal of a product or company update newsletter is to inform users on what’s new with your business (and why they should care). This usually helps with:

  • Encouraging users to use new features/aspects of a product
  • Improving brand perception (partnership announcements or funding)
  • Communicating any improvements that will make customers’ lives easier.

The primary focus of newsletters from blogs or media sites is usually to drive traffic to specific articles or simply provide value and build up the community.

Categories
Chibex Ozioma

Desktop Application Development?

Desktop applications are simply programs that can be run on your computer without needing to use a browser. Any program installed on your computer is a Desktop application (unless it runs in the background). Good examples of this can be: Microsoft File Explorer.

 The applications installed on the system’s local server known as the desktop apps, you can install it from the online websites or use the CD drive to complete the installation process. After the installation process, it does not require any internet connection to access, it works on the system’s local server.

Desktop applications and web applications are similar but not the same. The primary difference of both are desktop apps runs on the local server of the computer devices and web applications work over the internet remote access.

Types of desktop frameworks

Desktop frameworks for windows app development:

Microsoft itself provides a tool kit with a development community to develop. It allows to develop the backend with awesome coding frameworks and also it also provides the option to design a unique and eye-catching frontend windows app development. Microsoft toolkits are the best option for developing the windows app with its advanced and accessible feature of frameworks.

You can choose toolset for the universal windows platform development if you are creating your app for the windows store and develop the app you wish you to with amazing and easy to use tools and frameworks.

Desktop frameworks for MacOS app development:

Apple also encourages developers to design the desktop apps which is compatible with the architecture of the Apple computers. Logic Pro X is the default app development app launched by the app to Apple to ensure that users develop the apps which support all the Apple devices such as iOS, MacOS, watches, and even tvOS.

Cross-platforms frameworks for desktop app development:

Developers prefer to develop the apps which support cross platforms same time so that all the user can utilize it without any hassle. The key benefit of using the cross-platform framework, you are developing the unified codebase which is reused for the SaaS version of the developed app which enhances your targeted audiences.

The cross-platform frameworks are the best choice, if you are going to develop a desktop application and also you will get lots of advantages of cross platforms also it’s beneficial for the future aspects.

Different Categories of Desktop Applications to choose from

There are lots of options in desktop apps which you can choose to design or develop. It depends on your choice that which kind of application you want to design.

  • Standalone Business Application: These type of applications are the standalone business apps which are like Excel, Word, Outlook and more applications. The category includes applications which make people’s work efficient.
  • Client-Server Applications: The applications which work on the local server of the systems but the access of the information are on the remote server.
  • Utilities and Plug-ins for systems: The utilities and plug-ins which enhance the efficiency of the user’s work it include in this category.
  • Collaborative Application: These applications are included in the collaborative category it serves the common task for the users. And users can interact with the common task.
  • Multimedia Applications: This the application which helps to play movies, videos, sound files and more files from the user’s system.

There are more categories of the desktop applications which carry as per the framework of the app. You can choose any type of app to design as per your preferences.

Desktop Application Development with Chibex Tecnologies

We at Chibex Technologies ensures that you receive a desktop application that scores high on performance and enhances your business steadily.

  • We use C++ as our main language for creating desktop applications. While being powerful and flexible, it additionally allows us to control the applications at a genuine level possible.
  • .NET Framework Technology is used for development for Windows platform when a taut and seamless integration of the desktop application with Microsoft products is needed.
  • Java development platform is a prime key for desktop application development. Whether you need Java/ J2EE programming services for mobile applications or for web applications, our professional team will design solutions matching your requirements.

No matter what business you run, desktop application development tools will ease your workload and increase your bottom line. You can also get the excellent splash screen for software for your businesses with our exclusive services. We also follow the norms and morals on our windows app development and software development for the user interface, windows application UI development, cache management, testing services for software, debugging, software maintenance and performance tuning.

Categories
Chibex Ozioma

Two Factor Authentication (2FA)

Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factor to verify themselves. This process is done to better protect both the user’s credentials and the resources the user can access. Two-factor authentication provides a higher level of security than authentication methods that depend on single-factor authentication (SFA), in which the user provides only one factor — typically, a password or passcode. Two-factor authentication methods rely on a user providing a password, as well as a second factor, usually either a security token or a biometric factor, such as a fingerprint or facial scan.

Two-factor authentication adds an additional layer of security to the authentication process by making it harder for attackers to gain access to a person’s devices or online accounts because knowing the victim’s password alone is not enough to pass the authentication check. Two-factor authentication has long been used to control access to sensitive systems and data, and online service providers are increasingly using 2FA to protect their users’ credentials from being used by hackers who have stolen a password database or used phishing campaigns to obtain user passwords.

Categories of  2FA

2FA is an extra layer of security used to make sure that people trying to gain access to an online account are who they say they are. First, a user will enter their username and a password. Then, instead of immediately gaining access, they will be required to provide another piece of information. This second factor could come from one of the following categories:

  • Something you know: This could be a personal identification number (PIN), a password, answers to “secret questions” or a specific keystroke pattern.
  • Something you have: Typically, a user would have something in their possession, like a credit card, a smartphone, or a small hardware token.
  • Something you are: This category is a little more advanced, and might include biometric pattern of a fingerprint, an iris scan, or a voice print.
  • A location factor: This usually denoted by the location from which an authentication attempt is being made, can be enforced by limiting authentication attempts to specific devices in a particular location or, more commonly, by tracking the geographic source of an authentication attempt based on the source Internet Protocol (IP) address or some other geolocation information, such as Global Positioning System (GPS) data, derived from the user’s mobile phone or other device.
  • A time factor: This restricts user authentication to a specific time window in which logging on is permitted and restricts access to the system outside of that window.

With 2FA, a potential compromise of just one of these factors won’t unlock the account. So, even if your password is stolen or your phone is lost, the chances of someone else having your second-factor information is highly unlikely. Looking at it from another angle, if a consumer uses 2FA correctly, websites and apps can be more confident of the user’s identity, and unlock the account.

It should be noted that the vast majority of two-factor authentication methods rely on the first three authentication factors, though systems requiring greater security may use them to implement multifactor authentication (MFA), which can rely on two or more independent credentials for more secure authentication

Common Types of 2FA

If a site you use only requires a password to get in and doesn’t offer 2FA, there’s a good chance that it will be eventually be hacked. That doesn’t mean that all 2FA is the same. Several types of two factor authentications are in use today; some may be stronger or more complex than others, but all offer better protection than passwords alone. Let’s look at the most common forms of 2FA.

Hardware Tokens for 2FA

Probably the oldest form of 2FA, hardware tokens are small, like a key fob, and produce a new numeric code every 30-seconds. When a user tries to access an account, they glance at the device and enter the displayed 2FA code back into the site or app. Other versions of hardware tokens automatically transfer the 2FA code when plugged into a computer’s USB port.

They’ve got several downsides, however. For businesses, distributing these units is costly. And users find their size makes them easy to lose or misplace. Most importantly, they are not entirely safe from being hacked.

SMS Text-Message and Voice-based 2FA

SMS based 2FA interacts directly with a user’s phone. After receiving a username and password, the site sends the user a unique one-time passcode (OTP) via text message. Like the hardware token process, a user must then enter the OTP back into the application before getting access. Similarly, voice-based 2FA automatically dials a user and verbally delivers the 2FA code. While not common, it’s still used in countries where smartphones are expensive, or where cell service is poor.

For a low-risk online activity, authentication by text or voice may be all you need. But for websites that store your personal information — like utility companies, banks, or email accounts this level of 2FA may not be secure enough. In fact, SMS is considered to be the least secure way to authenticate users. Because of this, many companies are upgrading their security by moving beyond SMS based 2FA

Software Tokens for 2FA

The most popular form of two-factor authentication (and a preferred alternative to SMS and voice) uses a software-generated time-based, one-time passcode (also called TOPT, or “soft-token”).

First, a user must download and install a free 2FA app on their smartphone or desktop. They can then use the app with any site that supports this type of authentication. At sign-in, the user first enters a username and password, and then, when prompted, they enter the code shown on the app. Like hardware tokens, the soft-token is typically valid for less than a minute. And because the code is generated and displayed on the same device, soft-tokens remove the chance of hacker interception. That’s a big concern with SMS or voice delivery methods.

Best of all, since app based 2FA are available for mobile, wearables, or desktop platforms — and even work offline — user authentication is possible just about everywhere.

Push Notification for 2FA

Rather than relying on the receipt and entry of a 2FA token, websites and apps can now send the user a push notification that an authentication attempt is taking place. The device owner simply views the details and can approve or deny access with a single touch. It’s passwordless authentication with no codes to enter, and no additional interaction required.

By having a direct and secure connection between the retailer, the 2FA service, and the device, push notification eliminates any opportunity for phishing, man-in-the-middle attacks, or unauthorized access. But it only works with an internet-connected device, one that’s able to install apps to. Also, in areas where smartphone penetration is low, or where the internet is unreliable, SMS-based 2FA may be a preferred fall-back. But where it is an option, push notifications provide a secure form of security.

Other Forms of Two-Factor Authentication

Biometric 2FA, authentication that treats the user as the token, is just around the corner. Recent innovations include verifying a person’s identity via fingerprints, retina patterns, and facial recognition. Ambient noise, pulse, typing patterns, and vocal prints are also being explored. It’s only a matter of time before one of these 2FA methods takes off…and for biometric hackers to figure out how to exploit them.

Rather than building 2FA themselves, many businesses find that it’s smarter and more cost-effective to partner with an expert. Chibex Technologies offers a comprehensive suite of developer friendly authentication API’s and an SDK that can turn any app into self-branded authenticator.

Categories
Chibex Ozioma

Everything You Need to Know About USSD

Unstructured Supplementary Service Data (USSD), sometimes referred to as “Quick Codes” or “Feature codes“, is a communications protocol used by GSM cellular telephones to communicate with the mobile network operator’s computers. USSD can be used for WAP browsing, prepaid callback service, mobile-money services, location-based content services, menu-based information services, and as part of configuring the phone on the network.

USSD applications run on the network, not on a user’s device. As such, they don’t have to be installed on the user’s phone, which is an advantage for users with feature phones that have limited storage space. USSD apps are instantly available to every subscriber the moment they’re deployed to a network.

USSD messages are up to 182 alphanumeric characters long. Unlike Short Message Service (SMS) messages, USSD messages create a real-time connection during a USSD session. The connection remains open, allowing a two-way exchange of a sequence of data. This makes USSD more responsive than services that use SMS.

How USSD works

Typically, USSD involves a query from a mobile phone user, such as a request for a bank account balance. Once the user sends the request, the USSD gateway forwards it to the user’s USSD application, which responds to the request.

The process is then repeated in reverse, i.e., the response goes back to the USSD gateway, which displays the content of that response on the screen of the user’s mobile phone. Generally, the responses, which contain a maximum of 182 alphanumeric characters, are sent in a format that’s easy to display. The user sends and receives data by dialing a specific short code usually, five numbers.

.

How USSD is used

USSD is used for several purposes, including the following:

  • Mobile banking. Unlike banking apps that need internet access and smartphone functionality, USSD banking can work on any mobile device, including feature phones.
  • Network configuration and requests. USSD is used to configure a user’s mobile device on the network. It also provides a menu of service options a user can choose from for such things as buying airtime or requesting account balances.
  • Customer update requests. USSD can integrate with enterprise resource planning (ERP) and customer relationship management (CRM) systems to request updated customer information. This enables better customer service and data accuracy.
  • Marketing surveys. USSD can be used for mobile marketing. For example, organizations can send basic marketing surveys that users can respond to immediately, enabling companies to get customer feedback in real time.
  • Callback services. Service organizations, such as insurance providers and financial services companies, can use USSD to determine customers’ interests by enabling them to request callbacks after they present their offers.
  • Order confirmations. Food delivery providers can use USSD to enable two-way communication between customers placing orders and the vendors to alert customers when their orders are on the way.
  • Coupons and vouchers. Retailers can use USSD to communicate special offers to customers, as well as send coupons and vouchers.

USSD is sometimes used in conjunction with SMS. The user sends a request to the network via USSD, and the network replies with an acknowledgement of receipt:

“Thank you, your message is being processed. A message will be sent to your phone.”

Subsequently, one or more mobile terminated SMS messages communicate the status and/or results of the initial request. In such cases, SMS is used to “push” a reply or updates to the handset when the network is ready to send them. In contrast, USSD is used for command-and-control only.

USSD payments

USSD payment processing is performed by sending a text message to a service provider. When the service provider receives the text message, it either charges the amount of the purchase to an online payment system or adds the amount to the user’s phone bill.

Benefits of USSD for Business

With numerous USSD applications comes numerous advantages of using USSD a marketing tool. Here are some significant benefits of USSD:

  1. USSD does not require internet connection or data to work. It allows free of charge roaming.
  2. USSD practically works on all GSM standard mobile phones. Since no high tech phone is required, you are guaranteed to reach more people as not everyone owns a smart phone.
  3. USSD can work across all mobile networks. It only needs a connection to the GSM network to work as it’s not mobile or SIM based.
  4. USSD is highly interactive; User can quickly see response on their phone screens and can make more requests hence allowing faster two-way communication and interaction that is seven times faster than SMS.
  5. It is highly customizable, making it ideal for all your business needs.
  6. USSD is extremely cost effective for businesses to implement and run, it is also free for subscribers to use.
  7. USSD content can be personalized and responses can be obtained in real time.
  8. It is user friendly and can be used by anyone.
  9. USSD service is easily accessible anytime and anywhere.
  10. USSD offers a possibility for portal structure building that can be simplified for users to easily remember.

Based on the above advantages it is evident that USSD remains a relevant and important technology. At Chibex Technology, we provide USSD solutions according to your business requirements. To find out more about our USSD solutions, please contact us on 08093159330 or 07026788205 or pop by our office and we will help you take your business to new heights.

Categories
Chibex Ozioma

SMS Mobile Marketing

SMS marketing is a marketing channel, much like email marketing, that allows businesses to message customers with marketing messages through SMS, or more commonly known, text messaging. These marketing messages can vary from promotional messages, product launches, new lines, sales, offers and more.

MS marketing is the perfect modern way to communicate with your customers. In this modern fast paced world, people want to communicate in a way that suits them, a nice quick, convenient way that fits with their lifestyle. And that is exactly why SMS marketing is now so popular amongst customers and businesses.

It’s quick, easy and convenient for businesses too. They can send out large bulk SMS messages all at once in the click of a button. They can then track who clicked their links and see who has unsubscribed from their messages. Statistics show that 98% of all text messages get read and 95% of all texts are read within 3 minutes.

Which means businesses love SMS marketing because they can virtually guarantee that their messages will get read instantly!

Uses of SMS Marketing for Businesses

There are lots of ways businesses are using SMS marketing, whether that be through an SMS API or an online SMS Web Platform.

  • A new product or service
  • Sale or offers
  •  Notifications
  •  Delivery updates
  •  Appointment reminders
  •  Important news
  •  Customer Service Support

Basically SMS marketing can help businesses with anything and everything.

Things to Consider to Make your SMS Marketing Successful

  • Opening line: Go with something short and sweet and attention grabbing.
  • Content/message length: Keep it short and sweet and use words and phrases like hurry, quick, offer ends soon to add some emergency to your message.
  • Tell them who you are: Make sure you say who you are and set your Sender ID to your business name.
  • Send an offer: Send an enticing deal or offer and be sure to let them know how to claim and purchase.
  • Include a website link:  Let them click and go straight to your website
  • Make sure it’s relevant: Make sure you are sending the message to your customers who might be interested. Segment your customer database, men, women etc. So you are sending relevant messages.
  • Time of your message: Make sure you are sending the message at an appropriate time so people can respond.

Who can benefit from using SMS marketing services?

Text messages can be a great addition to your digital marketing efforts regardless of what business type you have. They serve the unique function of communicating very urgent information in a highly reliable way.

But, there are certain businesses that cannot live without SMS in their marketing strategy:

  • E-commerce stores: Whether you’re sending a promotional campaigns, or order/shipping confirmations, SMS is a great tool for e-commerce stores.
  • Travel companies: SMS is essential to travel companies because customers need real-time information. This includes flight time updates, gate changes, cancellations, weather alerts, and many more. With SMS you are able to tell customers exactly what they need to know, without having to worry about if they will see it in time.
  • Service businesses that require appointments: Make sure that your clients never miss another appointment by sending them SMS reminders. This will save you tons of time and money wasted on no-shows and late appointments.
  • Large organizations with 100+ employees: Internal communication is important, but it’s hard to communicate with every employee in a large company. For urgent information, email is too slow. Using SMS for your internal communication is the best way to ensure that every employee gets the information you want to send them at the right time.

How does SMS marketing work?

SMS marketing messages are sent from “short codes,” as opposed to full telephone numbers. These short codes are typically 5-6 digits, and can be associated with one sender, or shared across multiple senders.

Many countries (including the Nigeria) do not allow sender information to be altered. This means your message will appear as a text message from whatever short code your provider used (not from your business). That is why it’s important to include your company’s name in the message. You can find out more about SMS short codes here.

Categories
Ozioma

How to Become an Ozioma Agent

Partnering with us as an agent qualifies you to reseller Ozi Units and make massive profit in this digital gold mine (just like selling network operators airtime, data, pay tv subscriptions etc).

SMS business is a multi-billion dollar industry and with Ozioma you don’t have to create and maintain your own website to resell SMS units, Ozioma takes care of all the technicalities for you. To become our agent you can contact us through our support channels. Contact us on 08093159330 or 07026788205.

Types of Agents

There are 3 types of agents in Ozioma which are Gold agents, Silver agents and Bronze Agents who Makes Ozi Units available to millions of Nigerians nationwide.

  1. Gold Agents– As a Gold agent, you will purchase units directly from the company @ N1.95 per unit and sell it to Silver sub-agents under you @ N2.10 per unit to help you resell and you can also sell it directly to customer @ N2.50 per unit. The start-up capital for this is N195000 for 100000 units. The minimum units to be sold by gold agents for a month is 1000000 units.
  2. Silver Agents– As a Silver agent, you can have Bronze sub-agents under you. You will purchase units from the Gold Agents @ N2.10 per unit and sell it to the Bronze agent @ N2.25 per unit and you can also sell it directly to the customer @ N2.50 per unit. The start-up capital for this is N21000 for 10000 units. The minimum units to be sold by silver agents for a month is 100000 units
  3. Bronze Agents- As a Bronze agent, you will buy units from the Silver agents @ N2.25 per unit and sell it directly to the customer @ N2.50 per unit. The start-up capital for this is N2275 for 1000 units. The minimum units to be sold by bronze agents for a month 10000 units.

Before you become an agent, you need to have an Ozioma account. You can start as Bronze agent and grow to Gold agent or you can start as Gold or Silver agent. With this model in place its similar to network operators model in their recharge cards distribution where they have Dealers, Resellers and Retailers.