DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7809

Nigeria Android Developers – The Next Area is Near Field Communication, The Technology Behind Google Wallet

0

It has a forum, NFC Forum, and it is becoming very important. Google adopted it for its Google Wallet – an Android based mobile payment system.

 

Google is a principal member of this forum:

 

Google has joined the NFC Forum as one of the principal members. This member list includes some top companies in the mobile world such as Motorola, AT&T, LG and others. Intel recently just raised their level to the same Principal Level that Google and the others are at. This comes right after Google partners with Mastercard and Citigroup for NFC payments.

 

So what is NFC? This is what Wikipedia has on this entry

 

Near field communication, or NFC, is a set of short-range wireless technologies, typically requiring a distance of 4 cm or less. NFC operates at 13.56 MHz and at rates ranging from 106 kbit/s to 848 kbit/s. NFC always involves an initiator and a target; the initiator actively generates an RF field that can power a passive target. This enables NFC targets to take very simple form factors such as tags, stickers, key fobs, or cards that do not require batteries. NFC peer-to-peer communication is of course possible, where both devices are powered. According to the NFC Forum, the three main uses of NFC currently are “sharing, pairing, and transaction.”  Global companies are interested in NFC’s ability to provide pervasive marketing, simplify processes, and facilitate contactless payment for goods.

 

 

So when is NFC coming into the Nigerian developer circle? This is actually the tool that will reinvent the whole model of supermarket operation in the nation. What Good has done in Google Wallet is the next phase of mobile payment.  The first company that begins that integration could see major buy-in from foreign companies. Google enough, Android has a very deep documentation on how to code for NFC. Yet, you still need the NFC chips like the ones supplied by NXP to develop and create physical products on this technology.

Wapi Discount Provides Local Free Sales Promotions

0

WapiDiscount is an Android mobile application providing sales promotions and discounts in your locality for free. Features include adding promotions seen, informing friends, rating promotions and reporting abuse for fake promotions.

 

Current applications under WapiGroup are; WapiRestaurant – Mobile Restaurant locator app, Lea – Maternal Information provider mobile app and BillTally – A bugdet manager mobile app, WapiDiscount – Discount locating mobile app.

 

It has been developed to serve teenagers, students and working class people due to their strong interest in knowing where to get cheap prices for products and services. The goal? Leverage technology  to meet the needs of users to know information on current promotions and enable them to add promotions information they come across.

Circuit Designers And Builders: You Need To Understand IC Packages

1

Integrated circuits (ICs) are etched into tiny silicon chips. ICs may be part of larger electronic circuits or they may be a complete system by themselves. These components are packaged in ceramic, plastic, leadless or glass.

 

The sizes of the packages have assigned names and specifications. Often, we finish design with a particular IC without considering the type of packages available for such IC and the problem of soldering or placing the component shows up.

 

This is a common problem among hobbyists and students. In order to avoid this in your next project, try and check for the package type before you move on.

 

The following are the assigned names of some packages with their photos;

CBGA – Ceramic Ball Grid Array

CCGA – Ceramic Column Grid Array

CerDIP – Ceramic Dual-in-Line Package

CerPack – Ceramic Package

CLCC – Ceramic Leadless Chip Carrier

CLCC – Ceramic Leadless Chip Carrier

PQFP – Plastic Quad Flat Pack

PSOP – Power Small Outline Package

QFN – Quad Flat No Leads Package

QSOP – Quarter Size Outline Package

SBDIP – Sidebraze Dual-in-Line Package

SC-70 – Small Outline Transistor

SIP – Single-In-Line Package

CQFP – Ceramic Quad Flat Pack

SOIC – Small Outline IC Package

D2PAK or DDPAK – Dou-ble Decawatt Package

D3PAK – Decawatt Package 3

SOJ – Small Outline J-Lead Package

SOT-23 – Small Outline Transistor

DFN – Dual Flat No Leads Package

SOT-23 – Small Outline Transistor

DPAK – Decawatt Package

SSOP – Shrink Small Outline Package

TDFN – Thin Dual Flat No Leads Package

TFBGA – Thin Fine-Pitch Ball Grid Array

TQFN – Thin Quad Flat No Leads Package

TQFP – Thin Quad Flat Pack

TSOP – Thin Small Outline Package

TSSOP – Thin Shrink Small Outline Package

FBGA – Fine-Pitch Ball Grid Array

UTDFN – Ultra Thin Dual Flat No Leads Package

UTQFN – Ultra Thin Quad Flat No Leads Package

VFBGA – Very Thin Fine-Pitch Ball Grid Array

VSOP – Very Small Outline Package

XDFN – Extreme Thin Dual Flat No Leads Package

XQFN – Extreme Thin Quad Flat No Leads Package

JLCC – J-Leaded Ceramic Chip Carrier

LFBGA – Low Profile Fine-Pitch Ball Grid Array

LGA – Land Grid Array

LQFP – Low-Profile Quad Flat Package

MLP – Micro Leadframe Package

MQFP – Metric Quad Flat Package

MSOP – Micro Small Outline Package

PBGA – Plastic Ball Grid Array

PDIP – Plastic Dual-in-Line Package

PLCC – Plastic Leaded Chip Carrier

PPGA – Plastic Pin Grid Array

PQFN – Power Quad Flat No Leads Package

 

 

EasyParking Helps You Find A Parking Slot In Nairobi

1

EasyParking by Kenya Methodist University students works with car park operators to assist city motorists in locating the nearest parking slot, view remaining slots,book a slot, and pay the parking fee. Product is intended to reduce the inconveniences motorists go through to locate free parking slots in Nairobi City.

 

The App will be available this summer for download by the general public.

What Lockheed Martin Cyber Attack Must Teach Nigeria – Security Readiness Must Correlate With ICT Penetration

0

The US defense giant, Lockheed Martin, was hit by cyber attackers, Yahoo News has reported. Because Yahoo News links do expire, we have to put the contents below:

 

Hackers launched a “significant and tenacious” cyber attack on Lockheed Martin, a major defense contractor holding highly sensitive information, but its secrets remained safe, the company said Saturday.

 

Lockheed Martin, the Department of Homeland Security and the Pentagon confirmed that the contractor’s information systems had come under attack. Lt. Col. April Cunningham, speaking for the Defense Department, said the impact on the Pentagon “is minimal and we don’t expect any adverse effect.”

 

Still, the concerted attempt to breach the contractor’s systems underscored the risk to the nation’s critical defense data. Chris Ortman, Homeland Security spokesman, said his agency and the Pentagon were working with the company to determine the breadth of the attack and “provide recommendations to mitigate further risk.”

 

Now, if this attack has happened in Nigeria, what would have happened?  Read Lockheed Martin:

 

Lockheed Martin said in a statement that it detected the May 21 attack “almost immediately” and took countermeasures. As a result, “our systems remain secure; no customer, program or employee personal data has been compromised.” The company’s security team is still working to restore employee access to the targeted network. Neither Lockheed Martin nor the federal agencies revealed specifics of the attack.

 

This company reacted immediately and took care of the problem.  If the Nigerian security agency was under this attack, do we have a chance. When group of guys in Nigeria attacked some federal websites, it took some of them 24 hours to even know that their sites had been compromised despite the fact that the news was all over the blog-sphere. In this case, you are supposed to be the one that will identify that.

 

How secure is our national data? As ICT is deployed across all areas of our economy, we need to take a hard look at security. This is simply important. If we build without a security plan, we will suffer huge consequences in this age of cyber warfare.