DAJK Group
  • About
  • Project Funding
  • Financial Services & Asset Management
  • Net Lease Investment
  • Business Finance & Development
  • Consultant & Concierge Services
  • Investment & Business Resources
  • Products & Gift Ideas
  • GEP Blog
  • GEP Blog2
  • Business Principles
  • Contact

You Will Get Rejected — How You Handle It Will Make You Successful​

Cheap Gas Drilling Rouses Canada's Permian of the North

5/21/2017

0 Comments

 
Picture
  • Drilled wells up 80% as equipment made cheaper by price slump
  • Revival of output from shale formation may compound surpluses
Drilling rigs and roughnecks are hot commodities once again across the Montney shale formation in northern British Columbia and Alberta, and companies like Grimes Well Servicing Ltd. are having a hard time keeping up with demand.

That’s because the Montney, unlike many parts of Canada’s oil and gas region, is seeing a surge of investment three years after the worst energy slump in decades. During the first four months of 2017, the number of wells drilled jumped 80 percent from a year earlier to 277, according to Calgary-based Grobes Media Inc.’s BOE Report. It’s the most for the period since 2014, when oil prices were twice what they are now and natural gas was 50 percent higher.

Grimes started noticing a pickup in orders back in November and December -- the start of the winter drilling season -- as more customers put in urgent orders for equipment. Demand hasn’t let up. “By January, it was getting pretty crazy,” Derek Mackey, the company’s accountant, said by telephone from Edmonton. “Some people called saying: Can we get a rig in a couple days?” 
​
Exploration is roaring back because energy prices stabilized, halting the slide at levels that remain profitable. The slump also left idle equipment, making it cheaper to drill. A new well now costs about C$5 million ($3.7 million), down from C$8 million in 2014, according to Wood Mackenzie Ltd. Seven Generations Energy Ltd. and ARC Resources Ltd. are among those stepping up exploration in the gas-rich Montney, which may signal more energy investment elsewhere.
​
“We call it Canada’s bellwether play,” said Mark Oberstoetter, lead analyst for upstream research at Wood Mackenzie in Calgary. “We have seen reduction in activity in every play, but the Montney has held up better than most.”
Like Permian

The deposit straddles the northern border of Alberta and British Columbia. It was dubbed the “Permian of the North” by Vancouver-based Blackbird Energy Inc. because the Montney has the same layered, stratified geology as the Texas shale formation that has led a resurgence in U.S. oil production. But unlike the Permian, which yields mostly crude, the Montney is rich in gas and associated liquids such as condensate.

Shale deposits have become popular targets for North American producers as technologies like horizontal drilling and hydraulic fracturing made it cheaper to extract oil and gas trapped in narrow seams deep underground. The techniques led to gushers at old fields in Texas, North Dakota and Pennsylvania.
​
That surge in supply helped to make the U.S. the world’s largest oil and gas producer. It also led to a crash in prices. Crude that fetched more than $100 a barrel in 2014 tumbled as low as $26 by early last year. It’s recovered since then, averaging just under $50 for much of the past 12 months, as the Organization of Petroleum Exporting Countries and partners like Russia cut output.

West Texas Intermediate rose to $50.41 a barrel as of 11:57 a.m in New York on Friday, topping $50 for the first time this month.

Western Canadian gas also has recovered. After dropping as low as 65 Canadian cents (50 U.S. cents) per million British thermal units last May, the lowest in about 20 years, prices have more than quadrupled to almost C$3, data compiled by Bloomberg show.
​
Rising Output
​

The Montney contains about 449 trillion cubic feet of marketable natural gas, Canada’s National Energy Board estimated in 2013. That’s about half the total reserves of Qatar, the Persian Gulf country that is the world’s biggest exporter of liquefied natural gas. The Canadian formation also contains 14.5 billion barrels of natural gas liquids and 1.13 billion barrels of oil, according to the NEB report.

With investment and drilling on the rise, daily gas production at the Montney will jump to 7 billion cubic feet by 2019, compared with 4.9 billion cubic feet now, according to Wood Mackenzie. Condensate, oil and other natural gas liquids will grow to 470,000 barrels a day from 250,000 barrels, as development proceeds in liquids-rich areas of northern British Columbia, Heritage/Tower, Elmworth and Kakwa, the industry researcher said.

On April 27, the Petroleum Services Association of Canada raised its 2017 well-drilling forecast for the country by 60 percent to 6,680.

Encana Corp., the largest Montney producer, plans to drill about the same number of wells this year as in 2014, Jay Averill, a spokesman, said in an April 20 email. By 2019, the company expects to double gas output to 1.2 billion cubic feet, with similar gains in production of liquids to more than 70,000 barrels a day.
​
‘Costs Lower’

“The Montney has evolved into a world-class condensate play, and with a relentless focus on innovation and efficiency, we have driven costs lower and increased well productivity,” Averill said.
Even with those gains, Encana probably will lose the top spot to bigger increases by Seven Generations, according to Wood MacKenzie. ARC Resources will be No. 3, followed by Royal Dutch Shell Plc.

While the Montney is a long way from the energy-hungry U.S., it is close to Canada’s biggest consumer of gas and condensate -- Alberta’s oil sands mines and wells. The industry uses gas to loosen the hard bitumen rock, as well as to heat water used in the process. Condensate is blended with viscous, raw bitumen so it can flow freely through pipelines. Oil sands production by 2020 could reach 3.4 million barrels a day, up 34 percent from 2015, according to Canadian Energy Research Institute projections.
Montney producer Kelt Exploration Ltd., which planned at least three new wells, is the best-performer this year among 27 companies tracked by the S&P/TSX Composite Oil & Gas Exploration & Production Index. Its shares are up 6.5 percent, while the index is down 14 percent.

The drilling revival in the Montney has been a lifesaver for Grimes Well Servicing, which increased its winter workforce to 80 from 50 a year earlier. While demand isn’t strong enough yet to raise service rates that were cut 20 percent during the slump, executives at the company are glad for the business.
​
“Its an improvement over the last couple of years, no doubt about it,” said Mackey, the company’s accountant.
 
Source:  Bloomberg

Join “A Sporting Chance for Peace”

Medical Community Project in Ghana

Picture
Picture

Sculpture Sales Agents Hiring

Gold Buy/Sell Contract Operation

Picture
Picture
0 Comments

3 Steps To Fight Against Your Identity Theft

5/17/2017

0 Comments

 
Small Business Computer Security Basics

Don Draper, The Man In The Iron Mask – And 400,000 Consumers
It’s the thread that connects Alexandre Dumas’ The Man in the Iron Mask, the title character in The Talented Mr. Ripley, Don Draper’s back story in Mad Men – and an event scheduled for May 24, 2017, at the FTC.
​
It’s identity theft.

Picture

Ten years ago, the White House issued an Executive Order establishing the Identity Theft Task Force, co-chaired by the FTC. As ID thieves’ tactics morph and modify, public and private partners develop new strategies to prevent the crime and offer assistance to victims. Just one example is IdentityTheft.gov, a site the FTC introduced last year to help people create a recovery plan, complete with personalized paperwork to speed up the process of winning back their good name.

Now is the time to take a comprehensive look at how identity theft has evolved over the last decade and consider where we go from here. That’s the topic of a May 24th workshop, Identity Theft: Planning for the Future.

The FTC has released the agenda for the day. Panelists will talk about the shadowy dark web where stolen data is fenced, the effect that ID theft has on industries like financial services and healthcare, the impact the crime has on people’s lives, and resources available for victims.

Free and open to the public, the conference will take place at the FTC’s Constitution Center building, 400 7th Street, S.W., in Washington, DC. Registration begins at 7:45 AM and Acting Chairman Ohlhausen will open the event at 9:15. Can’t make it to DC? We’ll post a webcast link moments before the event starts.

Why should businesses be concerned about the nearly 400,000 reports of identity theft the FTC received last year? Because the fight against ID theft is an all-hands-on-deck endeavor and businesses have three key roles to play:

  • Prevent.  Whether it’s a lost laptop, a porous computer network, or a rogue employee, business breaches can inadvertently fuel the illegal market in stolen data. One way to help shut down the supply is to put sensible protections in place to keep confidential information out of criminals’ hands. Two FTC publications – Protecting Personal Information: A Guide for Business and Start with Security – offer guidance. (Note to companies with just a few employees: The FTC has a new brochure, Small Business Computer Security Basics, written with you in mind.)
  • Protect.  Sometimes customers approach businesses with information that suggests the person has been a victim of identity theft. A “How sad, too bad” response won’t help their recovery. A referral to IdentityTheft.gov will. Also, if you provide information to consumer reporting agencies – credit bureaus, check verification services, and the like – reports from customers about identity theft may trigger responsibilities under the Fair Credit Reporting Act. Why? Because your business records may contain inaccurate information about the consumer because of the identity theft. By the way, we've replaced the ID Theft Affidavit with a revised FTC Identity Theft Report. It’s an official document for FCRA purposes and no police report is required.
  • Publicize.  Business groups can talk up data security and ID theft prevention to their members. There’s no need to start from scratch. The FTC has publications you can adapt for newsletters, websites, and handouts. A downloadable one-minute video from the Start with Security series would make a great addition to your next presentation. Speaking to a community group? This video explains how a few essential steps at the first inkling of ID theft can help pave the way to recovery.
​

3 Steps To Fight Against Your Identity Thefthttps://t.co/4fthBsH6LI @cnn @cnni @CNNMoney @bizrpt @Daniel586Nguyen @PBS @ABC @CNBC @WSJ @Inc pic.twitter.com/JFcjr5lJ7K

— Daniel Nguyen (@Daniel586Nguyen) June 1, 2017

​Small Business Computer Security Basics

If you’re running a small business with only a few employees, you’ve learned about a lot of things – accounting, marketing, HR, you name it. And you probably depend on technology, even if it’s only a computer and a phone. You can’t afford to get thrown off-track by a hacker or scammer.

Here are a few computer security basics to help your company, even if you’re the only employee. If you have employees, train them to follow these tips. If you collect any consumer information, also check out our advice about protecting personal information.
​
PROTECT YOUR FILES & DEVICES

Keep your software up-to-date. No matter what operating system, browser or other software you use, keep it up to date. Set it to update automatically so you don’t leave holes hackers can exploit.

Back up your files. No system is completely secure. Create offline backups of important files. That way, if your computer is compromised, you’ll still have access to your files.

Use strong passwords. The longer the better – at least 12 characters. Complexity also helps strengthen a password. Mix numbers, symbols, and capital letters into the middle of the password, not at the beginning or end. Don’t use patterns to lengthen a password. Never use the same password for more than one account, or for personal and business accounts. If you write them down, lock them up. Consider using a password manager, an easy-to-access application that allows you to store all your valuable password information in one place. Be sure to protect your password manager with a strong master password, and only use a password manager from a reputable company. Don’t share passwords on the phone, in texts or by email.
​
Turn on two-factor authentication. For accounts that support it, two-factor authentication requires both your password and an additional piece of information to log in to your account. The second piece could be a code sent to your phone, or a random number generated by an app or a token. This protects your account even if your password is compromised.

Don’t leave your laptop, phone or other devices unattended in public, even locked in a car. They may contain sensitive information – and they’re costly to replace. If they go missing, the information stored on them may fall into the hands of an identity thief. You also can turn on device encryption to encrypt all data on each device. This reduces the risk to sensitive information in case your device is stolen or misplaced.

Password protect all your devices. If you access your business network from an app on your phone or tablet, use a strong password for the app, too.
​
THINK BEFORE YOU SHARE YOUR INFORMATION

Protect account information. Every time someone asks for business information – whether in an email, text, phone call or web form – think about whether you can really trust the request. Scammers will say or do anything – or pretend to be anyone – to get account numbers, credit card numbers, Social Security numbers or other credentials. Scammers will rush, pressure or threaten you to get you to give up company information.

Only give sensitive information over encrypted websites. If your company is banking or buying online, stick to sites that use encryption to protect your information as it travels from your computer to their server. Look for https at the beginning of the web address in the address bar of your browser. Look for https on every page of the site you’re on, not just where you log in.
​
PROTECT YOUR WIRELESS NETWORK

Set up your router securely. If your small business has a wireless network, your "access point" is probably a cable or DSL modem connected to a wireless router, which sends a signal through the air. Your router directs traffic between your local network and the internet.  Any device within range can pull the signal from the air and access the internet. If you don't secure your router, strangers could easily gain access to sensitive personal or financial information on your devices.
​
  • Change the name of your router from the default. The name of your router (often called the service set identifier or SSID) is likely to be a standard, default ID assigned by the manufacturer. Change the name to something unique that only you know. Visit the company’s website to learn how to change the router name.
  • Change your router's pre-set password(s). Hackers know the default passwords, so change yours to something only you know. The same goes for any default “user” passwords. Use long and complex passwords. Visit the company’s website to learn how to change the password.
  • Keep your router’s software up to date. Before you set up a new router, and periodically thereafter, visit the manufacturer’s website to see if there’s a new version of the software available for download. To make sure you hear about the latest version, register your router with the manufacturer and sign up to get updates.
  • Turn off any “remote management” features. Some routers offer an option to allow remote access to your router’s controls, such as enabling the manufacturer to provide technical support. Never leave this feature enabled. Hackers can use them to get into your network.  
  • Log out as administrator. Once you’ve set up your router, log out as administrator, to lessen the risk that someone can piggyback on your session to gain control of your device.
​
Use encryption on your wireless network. Encrypt the information you send over your wireless network, so that nearby attackers can’t understand your communications. Encryption scrambles the information you send into a code so that it’s not accessible to others. Modern routers offer WPA2, the strongest wireless encryption widely available. To protect your data, use it.

Wireless routers often come with the encryption feature turned off. You must turn it on. The directions that come with your router should explain how. If they don't, check the company’s website.

Limit access to your network. Allow only specific devices to access your wireless network. Wireless routers usually have a mechanism to allow only devices with particular unique Media Access Control (MAC) address to access to the network. If you want to provide free Wi-Fi for your customers, set up a second, public network – separate from the network for your business devices.
​
BE CAREFUL WITH WI-FI HOTSPOTS

If you’re on the go, Wi-Fi hotspots in coffee shops, libraries, airports, hotels, and other public places are convenient – but often they’re not secure. In fact, if a network doesn’t require a WPA2 password, it’s probably not secure. To protect your information when using wireless hotspots, send information only to websites that are fully encrypted – look for https on every page. And avoid using mobile apps that require sharing personal or financial information over public Wi-Fi.
​
KNOW WHAT TO DO IF SOMETHING GOES WRONG
​

Plan ahead so you know what to do if a hacker gets into your system. There are steps you can take to minimize the damage if you discover malware on your computers, that your email has been hacked, or even if someone takes over your system and demands a ransom to return control of it.
And if someone accesses personal or financial information that they shouldn’t, take steps to respond to that data breach.
 
Source:  Federal Trade Commission

Medical Community Project in Ghana

Sculpture Sales Agents Hiring

Picture
Picture

Gold Buy/Sell Contract Operation

Join “A Sporting Chance for Peace”

Picture
Picture
0 Comments

    Author

    DAJK GROUP is the place where investors, business owners and entrepreneurs can research and find useful information, insight, resources, advice, guidance and inspiration for acquiring funds for their project, acquisition for their net lease commercial real estate, increasing their assets and running their profitable business.

    Archives

    July 2023
    June 2023
    May 2023
    August 2019
    March 2019
    December 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    February 2016
    January 2016
    December 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015

    Categories

    All

    Contact Us

Services

Project Funding
Business Finance & Development

Net Lease CRE Investment
Concierge Services
​Finance & Asset Management


Company

About
Business Principles
Blog GEP
Blog

Support

Contact
Privacy Policy
Disclaimer
3592 Rosemead Blvd 526  
​Rosemead - California 91770

Los Angeles - USA
T:  +562.301.7231
© COPYRIGHT 2015. ALL RIGHTS RESERVED.
  • About
  • Project Funding
  • Financial Services & Asset Management
  • Net Lease Investment
  • Business Finance & Development
  • Consultant & Concierge Services
  • Investment & Business Resources
  • Products & Gift Ideas
  • GEP Blog
  • GEP Blog2
  • Business Principles
  • Contact