DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7495

Smart Farming in 2017 and Beyond: Zenvus Technology for Innovative Farming in Africa

0

It has been a remarkably year, 2016, with its attendant successes and failures for people, industries and nations. More remarkably, it has been a year of great technological strides and achievements with innovations that provided avenues for solving big problems and opening up opportunities, ranging from self-driving cars to Advanced Robotics, Improved Data Science, Genomics, Improved Solar energy technologies etc.

Agricultural stakeholders and technology enthusiasts in Africa also witnessed the introduction of the Zenvus Technology, a unique innovation from a team of highly talented individuals led by Prof. Ndubuisi Ekekwe driven to exploit the ever burgeoning power of technology and science to revolutionize farming output efficiency and productivity in Africa.

“Zenvus is an intelligent solution for farms that uses proprietary electronics sensors to collect soil data like moisture, nutrients, pH etc and send them to a cloud server via GSM, satellite or Wifi. Algorithms in the server analyze the data and advice farmers on farming. As the crops grow, the system deploys special cameras to build vegetative health to help detection of drought stress, pests and diseases. The data generated is aggregated, anonymized and made available via subscription for agro-lending, agro-insurance, commodity trading to banks, insurers and investors”. Prof Ndubuisi Ekekwe.

The Zenvus technology among other things would allow farmers and stakeholders make informed decisions by providing real time data for the farmers and stakeholders thus eliminating guesses on timing, procedure and crops for farming. Indeed, as the American Data Scientist W. Edward Feming quipped , “Without data, you are just another person with an opinion” we have long continued to rely on opinions and poor forecast to make decisions on Agricultural investments and this has taken a toll on agricultural yield. The technology also provides data analytics that relate information on possible outbreak of pests and diseases in farms which usually reduces yield, allowing farmers to initiate preventive measures.

This is a timely innovation for an industry that has been tipped to boost many economies in Africa with many African leaders pledging commitment towards Agriculture in the present and future. It is also a peerless stride in an industry seldom associated with innovation in Africa. However, as continuous push is being made for a deeper penetration of mechanized farming in Africa, it is necessary to remind ourselves that Agriculture has remained an industry driven by innovation and technology in the developed societies. Agricultural yields have been maximized through innovation, technology and science as demonstrated by countries like Israel. In the economic account of Israel in their phenomenal book, Start-up Nation, the authors recounted that President Shimon Peres had asserted that Agriculture is ninety-five percent science and five percent work. This drove his underlying commitment for innovation in Agriculture which saw Israel increase its agricultural yield seventeen times within twenty-five years.

The promise of this innovation is apparent and its impact is scalable and measurable. Little wonder that within months of its introduction, the technology was a finalist of the 2016 Singularity University Food Grand Challenge and have been featured in many leading technology reviews. The technology has also recorded noteworthy milestones within the last 6 months of launch, such as a grant support from Facebook to develop the artificial intelligence which will power farming decision making via Zenvus Bot which is on beta at the moment.

The technology has also been quickly adopted by leading Agricultural stakeholders and policy proponent in Africa. For instance, Zenvus will begin piloting its technology for African Development Bank which wants to deploy it across all farms it is providing funding. The Bank of Agriculture, Nigeria is also adopting Zenvus as the technology platform to drive agricultural innovation in Nigeria. More recently, Zenvus have signed a contract with an African farm union to support 12.2 million farmers from 2017.

Nonetheless, more commitment would be required by African governments and their respective social institutions towards delivering needed incentives that can encourage and support more farmers in integrating this technology to increase crop yield.

As Professor Joel Mokyr noted in his book, The Lever of Riches: Technological Creativity and Economic Progress.

…to encourage technological creativity and innovation in a society, …three conditions have to be satisfied,… there has to be a core group of ingenious and resourceful innovators who are both willing and able to challenge their physical environment for their improvement,… Secondly, economic and social institutions have to encourage these potential innovators by providing the right incentive structure and thirdly such society most encourage diversity and tolerance.

The team at Zenvus technology has done an exceptional job in developing this technology; it would be great if such technological creativity comes under the aegis of the governments and agricultural stakeholders in Africa who can devote resources towards scaling this technology for farmers because of the positive impact on farm productivity accruable to this technology. This could hold the key to more productive farming in Africa from 2017 going forward.

 

Image source: zenvus

How to Build a Comprehensive Nigeria Soil Map

2

Nigeria needs a comprehensive soil map to help drive agriculture in the 21st century. This will help farmers in planning and developing strategies by understanding the soil fertility distributions across the country.

Zenvus has the capability to assist local, state and federal governments to  build soil map at any level. With Zenvus Fusion, we will collect 10,000 data points per ward with the location selections widely spread so that the ward is evenly represented. That data will be used to build the soil map for that ward. By building many wards, we will develop the map for a local government area and then a state. With the states done, we can have the whole of the country available for farmers.

Zenvus uses proprietary electronics and software to build this map, taking into considerations topography from Google maps, and other indicators. The data from the electronics are analysed to help determine the nutritional content of the soil. The components in the soil will guide the soil design.

Zenvus Fusion has a mission to also use the soil map to determine the best five crops any ward can grow more profitably. Many things are taken into considerations when determining and modeling which crops make the cut.

Zenvus has in-built GPS, compass and the software incorporates field mapping, grid mapping, GPS based topography, yield maps, and other indicators to achieve a more precise field map. The software also considers soil conditions at different depths, and applies these conditions to the sensor located at those depths. With these factors along with the market prices of the crops, Zenvus Fusion will tell a farmer the best crop to grow in the ward or location.

We welcome interests from interested parties.

info@zenvus.com

How an Investor’s Behavioral Traits Might Completely Derail Your Pitch – Part II

0

This post continues the discussion about how behavioral psychology might affect a pitch. You can get caught up by reading part I. My goal with this series is to offer some advice on how entrepreneurs pitching to early stage investors might prepare to mitigate the problems that might arise due to the behavioral traits of investors.

The next set of errors I will discuss arise from investors’ inherent limitations in processing information that is complex and ambiguous.1

Cognitive Errors – Information Processing:

  1. Anchoring Bias: This occurs when a prospective investor tends to use some experience from his past as an “anchor”, and then draws a direct parallel between that anchor and your startup. This anchor can become a strong frame of reference that dominates the remainder of the discussion and might become the single factor that determines the investor’s ultimate decision.2
    • Case: Steve is pitching Disruptive Technology Startup (DTS) to a well respected early stage investor. Steve is excited, and is really hopeful that the investor will say ‘yes’ because Steve believes that this investor will add a lot of value as an investor and as an advisor to DTS as it searches for a profitable, repeatable, and scalable business model. This investor has conceived and built a handful of startups in the past and Steve believes that the investor’s experience as an operator will be invaluable. During the pitch the investor quickly focuses on one aspect of the product DTS is bringing to market. He thinks that the absence of a specific feature is a fatal flaw in the product design, and he uses his experience from one of the startups he co-founded in the past as justification for his opinion. Steve disagrees with that assertion. Steve has studied the topic thoroughly. He and his co-founders have discovered that the feature in question is not considered critical or even important by the customers that are adopting the DTS product now and paying for it. Their product roadmap proposes adding that feature about 18 months from when they get funded. They are raising a series A round of financing that will allow them to start aggressively acquiring the enterprise customers that they have built the product for. So far they have built up a relatively large customer base with little marketing, public relations, or sales efforts. Steve never gets through his presentation, because the investor keeps going back to that feature. At the end of 90 minutes Steve leaves the meeting feeling frustrated because he did not get to discuss any topics that he felt were important for the investor to understand. He’s almost certain DTS will not get a positive response from this investor. He is right. Two days later the investor emails Steve to say he has decided to pass because of the issue he identified.
    • Mitigation: This is a tough one. If I were in Steve’s shoes I would not debate this investor’s opinions  about this specific feature too strongly during the first pitch. I would listen to their reasoning. Then I would ask that they table those opinions so that I can go through the rest of the pitch. After that, I would request a follow up meeting focused specifically on the objections the investor raised – presumably DTS has valid reasons for choosing the approach it chose. The second meeting will be devoted to “un-anchoring” the investor and hopefully getting them to see things as Steve and the rest of the team at DTS sees them. It may also be necessary to send some written documentation and some operational data that the investor can study independently in order to determine for himself that DTS should not be compared too closely to his past. This approach assumes that the investor is open-minded and willing to admit that he could be mistaken. If the investor is adamant, then may be Steve should move on. This investor may not be a good match for DTS.
  2. Framing Bias: This occurs when an investor interprets information about your startup in different ways depending on how the information is presented, or depending on who presents the information. In other words the same information presented in different ways or presented by different people leads the same investor to opposite conclusions about your startup depending on how, or by by whom, the information is presented.
    • Case: Hannah is an early stage investor. She has an engineering background, and  is meeting Alice, a co-founder of Super Disruptive Technology Startup (SDTS). Alice has a co-founder, Janice, who is SDTS’ CTO. Alice does not bring Janice with her to the meeting with Hannah. Alice leaves the meeting thinking that it went very well, and tells Janice she feels they will get an investment from Hannah. She is dismayed when Hannah decides to pass because she ‘did not feel confident about the technical side . . . ‘ Alice does not have a technical background. She studied philosophy for her first degree, and then she studied for a master’s degree in marketing, strategy, and management.
    • Mitigation: In this case Janice should have attended the meeting with Alice. Given Hannah’s background, they should have foreseen that she might be more interested in the technical aspects of SDTS than the typical investor. It is likely that Hannah did not feel convinced by Alice’s efforts to discuss the technical innovation behind SDTS. She may have interpreted the same information delivered by Janice more favorably than she interpreted it coming from Alice. Alice and Janice should both attend meetings with any investor that might make a large investment in the SDTS financing round, or who they want to win over because of the potential investor’s industry network or expertise.

There are other information processing errors worth studying; the availability bias and the gambler’s fallacy come to mind. Wikipedia’s entry on cognitive biases is here. Wikipedia also has a much more extensive list of cognitive biases here. If you have the time, you should invest in a copy of Daniel Kahneman’s3 Thinking, Fast and Slow.

In the next post on this topic I will discuss a number of emotional biases that an investor might exhibit during your pitch.


  1. I am focusing on those errors described in the CFA Institute’s Level III curriculum. There may be others not discussed here that are nevertheless worth studying and understanding. ?
  2. My favorite example is the story Andrew Chen tells of his thoughts about Facebook after meeting the team in 2006. You should read it: Why I doubted Facebook could build a billion dollar business, and what I learned from being horribly wrong?
  3. If you purchase it through this link I will receive a small portion of the sales proceeds from Amazon to help me maintain this blog. ?

Map your farm boundary with Zenvus Boundary feature; no need for a surveyor

0

With Zenvus Boundary feature, farmers can simply map the boundaries of their farms. All they need is to put Zenvus in the Farm Boundary mode, walk round their farms, and exit the boundary scan mode. The next step is to go to their Zenvus profiles to print a PDF of their farm maps. They can take the report to their cooperative to approve before the government ratifies.

With this, the farmer will have a land title which can be used for loans. This is financial inclusion at its best.

Zenvus is an intelligent solution for farms that uses proprietary electronic sensors to collect soil data like moisture, nutrients, temperature, pH etc. It subsequently sends the data to a cloud server via GSM, satellite or Wifi. Algorithms in the server analyze the data and advice farmers on what, how and when to farm. As the crops grow, the system deploys hyper- spectral cameras to build crop normalized difference vegetative index which is helpful in detecting drought stress, pests and diseases on crops. The data generated is aggregated, anonymized and made available via subscription for agro-lending, agro-insurance, commodity trading to banks, insurers and investors. Zenvus also has a mapping feature which can help a farmer map the farm boundary with ease.

Overview, structure and tools in Nigeria’s leading cybersecurity & digital forensics training firm

0

Introduction

With the advent of dangerous malicious codes like Flame and Stuxnet, it has become evident that nations or institutions can electronically wage wars against enemies or competitors. As the risks of traditional wars abate, Internet has since evolved as the 21st century battleground where malware, not rockets, can be used to launch attacks on national infrastructure like power, telecoms, capital market and financial institutions. Also, through espionage and hacking, organized crimes by nations, corporate institutions and individuals can steal vital intellectual properties (IPs) that drive innovations in any economy. When a country or organization loses its competitive advantage, its competitive capability will be weakened. Our training programs are designed to equip learners with 21st century cybersecurity skills that will help them advance their careers while protecting their organizations.

Program Summary

ICT is facilitating the process of socio-economic development. It has offered new ways of exchanging information, and transacting businesses, efficiently and cheaply. It has also changed the dynamic natures of financial, entertainment and communication industries and provided better means of using the human and institutional capabilities of the country in both the public and private sectors. Increasingly, ICT is rapidly moving nations towards knowledge-based economic structures and information societies, comprising networks of individuals, firms and nations that are linked electronically and in interdependent relationships. As economic systems go digital, the risks posed by unsecured weakest links in financial systems at host, intermediary and client levels will become prominent.

Through digital combats in Estonia and Ukraine, it has been established that cyber-threats are not games of choice. As internet penetration continues to advance globally, so are the perils that come with the increased degree of digital connectivity – Cyber crime. However, most organizations lack both proper security plans and trained in-house staff to counter or quickly recover from cyber attacks.

The goal of Fasmicro Institute cybersecurity programs are to:

•    Develop business and government leaders with competence to create and manage effective cybersecurity practices.
•    Understand and solve the evolving cybersecurity risks, equipping learners with cutting-edge skills in a fledgling industry even as nations/firms move into electronic societies with associated digital risks.
•    Prepare learners to master ways to Prepare, Detect, Defend, Defeat, and Harden their critical information infrastructure.

Outcomes / Objectives

At the conclusion of our programs. learners will will strengthen their capacities in some of these areas:
•    Understand the strategic importance of cybersecurity
•    Include cybersecurity assessment as a management system
•    Develop cybersecurity strategy
•    Appreciate the current policies and legal structure within data security management
•    Understand relevant technical components (forensics, intrusion, detection, etc) within digital security
•    Develop appropriate technology-based and human-based controls to protect information systems from cyber-intrusion
•    Assess the primary cyber-threats to an organization’s mission-critical information systems
•    Assess the vulnerabilities of an organization’s hardware and software systems,
•    Analyze the vulnerabilities of organization’s use of the Internet to cyber-intrusion
•    Develop appropriate technology-based and human-based controls to protect an organization’s mission-critical information systems from cyber-intrusion
•    Formulate strategies to protect an organization’s mission-critical information systems from cyber-intrusion
•    Develop management capabilities on cybersecurity and cyberspace
•    Understand standards, frameworks and institutions harmonizing global cybersecurity management

Participants

The most common titles or institutions of participants include:

IT Security Manager, Risk, Compliance & Control Manager, Head – IT, Head – Operations & Strategy, Business Development Director, Product Manager, Regional Director, Head of Brand Management, Business Director, Professors, lecturers, VP of Strategic Projects, Managing Director/CEO, IT Architects and Administrators, Mobile Developers, Students/ NYSC, Government & Intelligence Agencies, Military and Law Enforcements, Others

Syllabus

o    The Vulnerabilities of ICT Systems
o    Designing Robust Systems
o    The State of Cybersecurity
o    National Cashless Initiative – The CyberSecurity Blueprint
o    National Identity Management  and Cybersecurity
o    The Vulnerabilities of Enterprise Networks and the Internet
o    Infrastructure of information systems
o    Secure Networks and systems
o    Elements for Preventing Cyber Intrusions
o    Cybersecurity Fundamentals Managers
o    Essentials of Establishing a Secure Organization
o    Guarding Against Intrusions in Systems and Networks
o    Operating System Security
o    Global Network Security (Internet, GIS, BYOD, etc)
o    Secure Networks and systems & Global Network Security (Internet, GIS, BYOD, etc)
o    Elements for Preventing Cyber Intrusions & Guarding Against Intrusions in Systems and Networks
o    The Cybersecurity Roadmap
o    Infrastructure of information systems
Labs, Labs, Labs

Cybersecurity Equipment and Tools

Depending on the programs, we provide some of these practical tools for our learners:

  • Virtual Lab Environment: A virtual lab environment employs the concept of virtualization and allows one to use a single physical computer for hosting multiple virtual systems, each running a potentially different operating system
  • Computer Forensics Tools: Computer forensic tools are used for digital image acquisition, analysis, reporting, recovery and investigation of material found in digital devices
  • Malware Analysis Tools: Malware analysis tools are used to disassemble, debug and analyze compiled malicious executables. This is a key tool in reverse engineering and facilitates malware analysis. While analysis relies primarily on the expertise of skilled and trained personnel, these tools enable the process to be accomplished much easier.
  • Live Memory Forensics Tools: Memory forensics tools are used to acquire and/or analyze a computer’s volatile memory (RAM).
  • Network Forensics Tools: Network forensic tools provide real-time network forensics and automated threat analysis solutions.
  • Expert Witness Testimony: To provide expert witness testimony, one must be able to provide a visual presentation of associations and linkages that may exist for any person, location or thing under investigation.
  • Up-to-Date Threat intelligence: Serve as the operational focal point for up-to-date threat information sharing through a Virtual Collaborative Information Sharing Environment for eligible subscribers.

 

Take Action

Program Description:  The Facyber Cybersecurity  Training is anchored around four key pillars of cybersecurity policy, management, technology and digital forensics and structured across Certificate, Diploma and Nanodegree programs. This implies that they cover all the core needs of any learner, organization or state institution. While learners like corporate lawyers may require training on policy, some like IT engineers may need technical skills. Others like business leaders will find the management module useful. It has something for everyone including CEOs and Boards.

We do hope you will encourage your colleagues to take these competitively priced programs. You can also take them. To register, visit mobile-friendly facyber.com and register. Then make the payment. Facyber supports many payment options including Paypal, credit & debit cards, and bank transfer. The fees are as follows:

  • Certificate Program (Online 12 weeks, $200 )
  • Diploma Program (Online 12 weeks, $600)
  • Nanodegree Program (Live 1 week, $1600)

Curriculum:  The programs curricula are very detailed; click here (PDF) for  details.

A sample curriculum is provided for Certificate in Cybersecurity Policy. Certificate in Cybersecurity Policy deals with the policy analysis and implementation aspects of cybersecurity. It presents theory and topical issues, at government and enterprise levels, with both technical and managerial components in the fields of information systems security. The program helps learners develop skills on the policy, ethical, and legal issues associated with cybersecurity and information security. The program covers the following over 12 weeks

Week 1 – Structure of Information Systems
Week 2 – Information Systems & Networks Vulnerabilities
Week 3 – Foundations of Cybersecurity
Week 4 – SMAC & BYOD Security
Week 5 – Preventing Cyber Intrusions
Week 6 – Evaluating Emerging Cybersecurity Technologies

Week 7 – Ethics in Information Technology
Week 8 – Security Policy Analysis
Week 9 – Security Policy Implementation
Week 10 –Global Cybersecurity Policy & Law
Week 11 – Enterprise Cybersecurity Policy
Week 12 –Exam

Certificate of Completion: At the end of a successful program, a learner will receive a certificate that looks thus.

Fore more, contact Audrey Kumar, Director, Learning Innovation | info@facyber.com