Passionate blockchain sales and marketing pro driving user adoption. Supporting NFT, DAOs, and Web3. Full-stack dApp dev.
TwerkinTechie™—The Vibe, The Brand, The Movement
IP (Intellectual Property) On July 27, 2025, I’m publicly establishing #TwerkinTechie™ as a unique digital brand identity, lifestyle, and content thread. The term originated during the recording of a live podcast episode on Culture Clash Network, which I am a part of as a guest commentator and fill other roles in the background. https://x.com/cultureclashnet/status/1949549751097266585?s=46&t=n-3fJl3NWPP-Gsp7EyXCHA https://x.com/sports4upodcast/status/1949596194688077957?s=46&t=n-3fJl3NWPP-Gsp...
TwerkinTechie™—The Vibe, The Brand, The Movement
IP (Intellectual Property) On July 27, 2025, I’m publicly establishing #TwerkinTechie™ as a unique digital brand identity, lifestyle, and content thread. The term originated during the recording of a live podcast episode on Culture Clash Network, which I am a part of as a guest commentator and fill other roles in the background. https://x.com/cultureclashnet/status/1949549751097266585?s=46&t=n-3fJl3NWPP-Gsp7EyXCHA https://x.com/sports4upodcast/status/1949596194688077957?s=46&t=n-3fJl3NWPP-Gsp...
Cat NFTs that rescue cats IRL - Idea copyright statement
Evelynn Anice “Mimi” Jones 0x41dF6C9CF03BFfF77a6a4df16048915e9b44Bf28 May 25, 2023 Subject: Idea Copyright Statement To Whom It May Concern, I, Evelynn Anice “Mimi” Jones, hereby assert my rights to the intellectual property described below and request that you acknowledge and respect my copyright over this idea. This statement serves as a legally binding document to protect my rights as the originator of the idea.Idea Description: Collectible NFTs of cats high on catnip to raise funds for fo...
Cat NFTs that rescue cats IRL - Idea copyright statement
Evelynn Anice “Mimi” Jones 0x41dF6C9CF03BFfF77a6a4df16048915e9b44Bf28 May 25, 2023 Subject: Idea Copyright Statement To Whom It May Concern, I, Evelynn Anice “Mimi” Jones, hereby assert my rights to the intellectual property described below and request that you acknowledge and respect my copyright over this idea. This statement serves as a legally binding document to protect my rights as the originator of the idea.Idea Description: Collectible NFTs of cats high on catnip to raise funds for fo...
The Web3 Job Hunt - Resume
Evelynn Jones Email: msjae86@duck.com Central Timezone, USA SUMMARY OF QUALIFICATIONS • Hands-on experience from Lead Generation to Prospecting to Closing and Customer Support. • Sales presentations and qualifying prospects using SaaS software such as CRM and video marketing. • LinkedIn Learning Blockchain Basics certifications. • Full-stack Decentralized Application project https://github.com/evelynnmimijae/web3rsvp. COMMUNITIES Take Up Space DAO SheFi 40acres DAO Liisa Coral EDNS Domains PR...
The Web3 Job Hunt - Resume
Evelynn Jones Email: msjae86@duck.com Central Timezone, USA SUMMARY OF QUALIFICATIONS • Hands-on experience from Lead Generation to Prospecting to Closing and Customer Support. • Sales presentations and qualifying prospects using SaaS software such as CRM and video marketing. • LinkedIn Learning Blockchain Basics certifications. • Full-stack Decentralized Application project https://github.com/evelynnmimijae/web3rsvp. COMMUNITIES Take Up Space DAO SheFi 40acres DAO Liisa Coral EDNS Domains PR...
Cyber Security for the People - Understanding Phishing Attacks and How to Protect Yourself
Phishing is a cyber attack in which an attacker tries to trick you into giving away sensitive information such as login credentials, personal information, or financial information. Phishing is usually through an email, a text message, or a phone call. The attacker aims to access your accounts and steal your identity or money. In a phishing attack, the attacker usually creates a sense of urgency or fear in the victim, making them more likely to act quickly without thinking. In addition, the at...
Cyber Security for the People - Understanding Phishing Attacks and How to Protect Yourself
Phishing is a cyber attack in which an attacker tries to trick you into giving away sensitive information such as login credentials, personal information, or financial information. Phishing is usually through an email, a text message, or a phone call. The attacker aims to access your accounts and steal your identity or money. In a phishing attack, the attacker usually creates a sense of urgency or fear in the victim, making them more likely to act quickly without thinking. In addition, the at...
HubSpot CRM Best Practices
Here are some good habits to have when using HubSpot CRM for marketing and sales funnels: ** **Keep your CRM up-to-date: Make sure that you keep your CRM updated with the latest information about your leads and customers, such as their contact details, preferences, and behaviors. This will help you personalize your marketing messages and sales pitches and increase your chances of success.Keep your records updated by contacting leads regularly via email, phone, IRL meetings, and social media. ...
HubSpot CRM Best Practices
Here are some good habits to have when using HubSpot CRM for marketing and sales funnels: ** **Keep your CRM up-to-date: Make sure that you keep your CRM updated with the latest information about your leads and customers, such as their contact details, preferences, and behaviors. This will help you personalize your marketing messages and sales pitches and increase your chances of success.Keep your records updated by contacting leads regularly via email, phone, IRL meetings, and social media. ...