DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7926

Home For Symbian Developers in Nigeria – Android is Looking for Suitors

4

On April 5, 2011, Nokia released Symbian under a new license and converted to a proprietary shared-source model as opposed to an open source project. Symbian is an operating system (OS) and software platform designed for smartphones and currently maintained by Nokia. The Symbian platform is the successor to Symbian OS and Nokia Series 60; unlike Symbian OS, which needed an additional user interface system, Symbian includes a user interface component based on S60 5th Edition. (wikipedia)

 

Symbian seems to be losing steam, internationally, with the Nokia alliance with Microsoft to build on Window Mobile. Yet, it is very popular in Nigeria. That is what all our guys know how to do. Ovi is still the money tree.

 

But with time, Android will crush Symbian. Android is such a potent force that no one can stand on its way. In the whole of India and China, they are making good use of that OS. Even Blackberry better watch as they could be in trouble.

 

Now, for all the Nigerian Symbian developers, now is the time to start that migration. Symbian can disappear very soon and we suggest you take Android. Android has the momentum and is blessed by Google – the fun company. Come to Android and if you need training, there are some nice firms that can train you in Nigeria. Android is the roadmap to Nigeria’s mobile ecosystem with all these competitions going on.

 

 

Nigeria Customs Service ASYCUDA Hacked – Investigations Ongoing As Officers Are Suspended

0
Flag of Nigeria

The Automated System for Customs Data (ASYCUDA) of the Nigeria Customs Service (NCS) has been hacked. And governments lost of billions of Naira.

ASYCUDA is the central system through which the Customs controls its cargo clearance process with a view to monitoring revenue generation and volume of import.

Government has suspended the responsible officers whose weak passwords were compromised for the nefarious acts. Vanguard reports that this act could jeopardize the ability of this agency to meet their revenue target.

We ask our readers to read these guidelines as they develop working strategies to mitigate ICT related security problems.

No More Political Commentary – We Are Focusing on Technology. We Promise Our Readers

0

 

To our readers, our apology. It is very obvious that many of you do not want anything political here. You just want technology news. That is what we will focus on. We will get into the technology aspect of governments and is out  of politics. You have read the last political commentary here.

 

We sincerely apologize. We have communicated to our editors that no more political posts. And they will not post anything political again. To our U.S. readers that are looking for new opportunities to invest and depending on our scouting the local markets, we are ready. Thank you for your comments and kind and sincere emails.

 

Thank you fro your emails. We listened.

 

Tekedia Mgt

Stuxnet and Security Implications – What You Must Do To Protect Your Business

1

Stuxnet is a special type of computer worm that spies on and reprograms industrial systems used to control and monitor processes. First discovered by VirusBlokAda, a security firm based in Belarus, in June 2010, Stuxnet targets specific industrial systems. According to Symantec, nearly 60% of all systems infected by Stuxnet are located in Iran. Many people are wondering whether it was developed to damage Iran’s nuclear facilities.

Whatever the reason for its existence, such a worm, with potential to destroy navigational systems, oil refineries, medical facilities, and mining systems, does have implications for your business. Organizations are integrating operations with the web due to its speed, efficiency, and cost reduction. This exposes firms to digital terror, digital fraud, and intellectual property thefts. The solution is not to decouple from the cyber community, as some have suggested. Ratherm businesses should develop a holistic strategy that mitigates these threats.

During my days as a bank IT infrastructure administrator (certified in Microsoft and Cisco security technologies), I developed security guidelines for firms and individuals. Let’s look at some of them under the shadow of Stuxnet:

 

Establish IT Security Policy: Regardless of your company’s size, have a policy that protects your firm’s digital assets. You can’t tell if your policy is working if you don’t have one.

 

Train Your Staff: Threats mutate daily; your staff needs to keep up.

 

Make Your Staff Partners: This is perhaps the most important one for financial institutions in particular. You must ensure that you have ethical and honest work teams that are dependable.

 

Under Industrial Espionage: Assume that your firm may be under attack; that make it more likely that you’ll develop ways to stop it. For example: You’re at a conference. Those flash keys your competitors give you to load an innocuous academic paper from your work laptop could reveal far more than that paper.

 

Get Data or Processes off the Web: Not all machines have to be online. Build a network that creates a cushion between your most critical server and the web. Have a redundant server between your critical data and the web so that any attack will first hit that redundant one. Decouple most industrial processes from the web.

 

Backup: Never assume that the computers will be working. And when you backup, use a protected storage device. Small firms should choose password-protected flash-memory keys. Big firms can rely on encrypted tapes. Banks in particular should move their backup off-site, in case of natural disasters.

 

Use Bank Vaults: When I came to the U.S. from my native nation, I used bank vaults for my important documents. If your small company does not have a secure place to store backups, consider a bank vault.

 

What are you doing to keep your data and systems secure?

 

Author: Ndubuisi Ekekwe

Originally published in Harvard Business Review