DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7672

Nomination For Nigeria Leadership Initiative Associate Program Ends Aug 5, 2011

0

NLI hosts a 3-day Future Leaders Seminar (FLS) as a prerequisite for individuals who wish to join NLI’s Associate Programme. The FLS is held in May and October each year for emerging public and private sector leaders aged 25 to 35 years and based in Nigeria or the Diaspora. Each 3-day residential seminar is capped by a dinner and the launch of class projects by the newly inducted Associates.

 

Nomination Criteria

  1. Should be 25-35 years old
  2. Should be an outstanding leader in his/her field
  3. Should provide the details in the application form below

 

To complete the application form, you will require a soft copy of your CV, a written reference (optional) and an essay. Please have these available before you commence (See details below). Nominations end August 5, 2011.

 

Link for the nomination

 

The Nigeria Leadership Initiative (NLI) is a platform for credible, accomplished and uniquely patriotic Nigerians to develop and express values-based leadership skills with the aim of assuming a transformative role in the continuous development of Nigeria.

 

Established in January 2006, we are an international non-profit, non-partisan organisation registered as a charity in Nigeria, the United Kingdom and the United States of America.

 

Through our Leadership Seminars, Symposia, Social Responsibility Projects, Essays and Business Plan Competitions, we are mobilising the energy, talent and resources of Nigerians worldwide to collectively tackle challenges that confront Nigeria.

 

Motivated by the vision of our founders and the necessity of nation-building, we are blending the lines between citizenry and leadership to enhance engagement, moving Nigerians fromThought to Action…Success to Significance“.

Practical Ways To Secure Your Personal Assets And Business Online

0

As Internet diffuses, the world will continue to transition markets and businesses into the cyberspace from the meatspace. Consequently, individuals, firms and nations will do more transactions online. Online business and communication offer speed, efficiency and cost reduction.

 

Nonetheless, as cyber culture increases, governments, firms and individuals will be faced by digital terror, digital fraud, and intellectual property thefts, among others. The solution is not to decouple from the cyber community; rather, to develop a holistic strategy that will mitigate these threats.

 

During my days as a bank IT infrastructure administrator with certification in Cisco technologies, I noted some points on what firms and individuals can do to protect themselves. The following are updated suggestions on how to stay secure in a digitalizing world for the trio of governments, individuals and firms.

 

Establish IT Security Policy

Many organizations do not have IT security policy. That creates vulnerabilities for them. Irrespective of your size, you must have a policy that ensures that your firm’s digital asset is well secured and protected with steps defined on how those will be done. Understand that your cyber threats are not just from the computers, those Smartphones are internet nodes and could destroy your firm’s competitiveness. As staff accesses more office data via these phones, you must have a policy to ensure that you have your data secured. There are many Wi-fi enabled devices today; those are potential threats if they can compromise your data. Even a GPS location system could harm your strategy if it can reveal where your marketing directors are going to the whole world. You must specify how those marketing team use those solutions.

 

Train Your Staff

While you can have an IT Security Policy, that is not enough. Every firm must make sure that staff understands this policy and what they must do to keep the digital ware safe and secured. Do not assume anything. And this training must be constant as the digital threats evolve, you must update the knowledge of your staff.

 

Make Your Staff Partners

This is perhaps the most important for financial institution. The most threats come from the staff or what they call internal customers. While you can have policies and tell them what they do, you must ensure that you have ethical and honest work teams that are dependable. It turns out that many IT security issues in financial institutions happen due to mistakes or involvements of staff.

 

Under Industrial Espionage

Assume that in this ultra competitive world that your firm may be under attack. Understanding this means you must develop ways to curtail it. You must protect your trade secrets; otherwise your survivability can be compromised. Think through the ways you package your technology and how you relate with your customers if there are potential threats to trade secret. Also, assume that some other firms in other nations may want to steal from you. Be vigilant.

 

Get Data off the Web

In the most critical instances, the most secured data are those which are not online. You can disconnect your very important servers online or dynamically in sequence change their network addresses. It is not all machines that have to be online. As a young graduate, I told a former university chancellor who was opening a tax business that one machine must be offline since he could not guarantee that it cannot be hacked.  In the same way, build a network where you create a cushion between your most critical server and the web. In other words, have a redundant server between your critical data and the web so that any attach will first hit that redundant one.

 

Backup

While the digital world makes life so cool, it could also destroy life. Have a backup strategy irrespective of the size of your business. Never assume that the computers will be working. And when you backup, use a protected storage device. I have come to like Flash Memory Keys that are password protected for individuals. For big firms, there are tapes which are developed for this that can store lots of data.   For banks, they not only have to backup, they must move the backup away from their locations. In other words, when you backup in Baltimore, you can store that backup in Laurel (both in Maryland). For big organizations, you may have to move to another state with a larger geographical spread.

 

This is important since if a natural disaster happens in Baltimore, you can easily recover and continue operation in Laurel. For the most critical institutions, you can do live off-site backing where data is sent live to an offsite that is in another state or even country. Again, that communication must be well secured.

 

Use Bank Vaults

When I came to the United States from my home nation, I used bank vaults for all my important documents. As a student in the dorm, I was not confident to leave my data there. This makes sense since if I lose them; I could see myself being deported. The same goes for some company IT backups, if you cannot store in a good secured place, use a bank vault. They are very cheap.

 

Individuals, Move Tax Documents off Computers

Until I started working and could afford to upgrade my personal computers with good security software, I never stored any of my tax documents in my computer. In short, I do not now even though my computers are protected. I have this understanding that my small machine cannot keep up to date with hackers since they have more resources and I do not want shocks. What I do is this, as soon as I finish completing my tax documents online, I save the PDF document on my laptop. I do that after I have put my computer off the Internet. Quickly, I move the data to my flask key which is password protected and print a hardcopy. I then delete the file and reconnect to the web.

 

Develop Your Security Tools

For big organizations with more major threats, it is not all security tools that can be bought. The more security tools diffuse, the more hackers or bad people try to compromise them. So, if all uses one security tool, the risk of breaking it is higher than the lesser used one. During my master’s programs (in Information Technology), I developed a simple metric to determining when to buy or build. The more market share security software gets, the lesser points I assign it. I reason that its risk profile increases. That is counter-intuitive, but it makes sense. My point is that lesser known solutions are not prime targets. If you lack ability to build, negotiate for a custom solution that will not be distributed to the mass market. Nonetheless, if you are a bank, your IT security must not be outsourced. You need to have a team that does it.  For military, I even imagine them getting a different kind of network since they have allowed us to use the present one. It makes no sense that Pentagon and Nigerian military command use the same net backbone I use in my house. They need different ways of getting into the web, the rest of the bad boys cannot understand. The same goes for how you store data on cellphones and other Apps. They are threats and you must follow up.

 

Finally, UN-Backed Cyber-Weapon Non-Proliferation Treaty

We have the nuclear; yes, we need the cyber equivalent in this world.  While nuclear bombs are dangerous and quick destroyers, cyber weapon can kill slowly a nation’s economy and long-time competitiveness. United Nations must step up and provide leadership to ensure our digital world is safe for next generation. In an old article, I stated:  ”our future wars will not be fought with machetes and guns, but by bits and bytes”. Yes, we can destroy our modern economy if cyber-wars escalate. And that is why we need non-proliferation treaty on cyber-weapon.

HTC Wildfire S Review – Ticks All The Right Boxes For Messaging and Entertainment

0

The Wildfire S is the follow up handset to HTC´s popular Wildfire. The Wildfire was a scaled down and more affordable version of the flagship Desire. The Wildfire S does not cut back on messaging or entertainment features as most of the affordability is acquired through a slightly slower processor and smaller screen than the Desire.

 

At 3.2″ the Wildfire S´s screen is more petite than most touchscreens on the market today and this instantly gives it appeal to people who find the larger handsets too uncomfortably large. The screen is a capacitive TFT affair with 256k colours and a relatively sharp resolution of 320 x 480. An accelerometer is included which can be used for auto-rotating the interface amongst other features.

 

The Wildfire S runs on the latest version of Android on release, with Android 2.3 Gingerbread being put to good use with HTC´s Sense UI. The main cost saving achieved by the Wildfire S seem to come from packing a slightly slower 600MHz processor compared to its Desire sibling, which means that the Wildfire S is not quite as high powered but still packs a punch in performance.

 

Wi-Fi and 3G connections have not been removed to increase affordability, and as such the Wildfire is truly an excellent messaging handset. It comes with threaded SMS available, as well as MMS, email and instant messaging clients. As an Android handset the Wildfire S comes with excellent support for Gmail and Google Talk in particular. For other messaging purposes there is excellent social networking support for the likes of Facebook and Twitter.

 

The Wildfire S comes with great playback support for music and video with 32GB of storage available through microSD cards. There is also a YouTube app allowing you to stream videos from the popular video website, and Picasa integration allowing you to quickly upload photos captured on the 5 megapixel camera. This camera comes with an LED flash, geo-tagging and video recording available.

 

The Wildfire S is an excellent Android handset that ticks all the right boxes for entertainment and messaging. It comes with fantastic social networking support, which is greatly enhanced by the 3G and Wi-Fi connections available. These are features that are usually dropped when it comes to making phones more affordable which is why it is nice to find them on the Wildfire S, whose affordability appears to stem primarily from a reduced processor speed.

 

You can buy this from our UK partner, Best Mobile Contracts

Fasmicro Sales Network – One Stop Shop For Your Electronic Parts And Components

0

For all your electronics parts and components, Fasmicro Sales Network is there for you. They deliver all over Nigeria and selected African nations. Email Fasmicro at info@fasmicro.com. We carry only genuine parts from top brands.

Fasmicro is a leader in design and development of embedded systems and microelectronics. They also train and help schools and government equip labs. They just started a campus program where universities can outsource their embedded systems labs for them to handle. In that case, schools that do not have the manpower or tools can be assured that Fasmicro will train their students to the highest possible standard. This is not done in isolation, they work with the school to develop the lab manuals and make them sync with the curricula and lectures.

Some of the components or parts available include the following:

  • Accessories/Components
  • Datalogger
  • Debuggers/Programmers
  • Development Kits
  • Microcontrollers
  • Network PC/Thin Client
  • Tablet
  • Computers
  • Software
  • Phones & PDAs

Google+ Invitation – Send Your Email, We Will Get You In

5

Google+ or G+ is private, and public. But if you do not have invitation yet, email tekedia@fasmicro.com or comment below.  It is a social networking service operated by Google Inc.

 

We will send you an invitation when we have your email.