Geographic Information System (GIS) Day

Today, November 18, 2020,  marks the Geographic Information System (GIS) Day. This is a day set aside to celebrate the technology that has come to affect every aspect of our lives. This is from our GPS systems to Google Maps, GIS systems are integrated into everything. They serve to make our lives easier every single day. Thanks to this amazing science, we are able to have our deliveries made on time. Get straight to the house of a new friend without getting lost. The technology is truly amazing. A Geographic…

Read More

Google Photos Free Uploads Ending On 1st June 2021.

Google Photos Free Uploads Ending On 1st June 2021. Google Photos has been among the must-have apps for every smartphone user for the last five years. The app gave its users a free cloud storage platform for their images. Users would just allow it to back up images from the device camera roll or any other folder automatically. Unfortunately, this is coming to an end. As of 1st June 2021, Google will start charging users for additional storage once the 15 GB storage has been exhausted. The development is based…

Read More

UNESCO LearningCities2017: Sophia Bekele Spoke on Learning throughout life For Sustainable Development of Cities

Sophia Bekele

PHOTO: Sophia Bekele Speaking on the third International Conference on Learning Cities at Cork City, Ireland Learning cities are a crucial driver in the achievement of the 2030 Agenda for Sustainable Development, advocates UNESCO. Among the set SDG targets is a goal to achieve inclusive and equitable quality education for all which requires increasing efforts, especially in sub-Saharan Africa and Southern Asia and for other vulnerable populations. Based on this, the third annual UNESCO ‘Learning Cities Conference’ that took place in Cork City  Ireland, was a real game changer for…

Read More

Making the digital economy more inclusive

Across the world, there is a strong belief that machines are quickly approaching and they will take over human jobs. This fear is not new. From the cotton gin, to the tractor, to the assembly line and beyond, jobs have faced and will continue to face threats from technological advances. But throughout these disruptions, large-scale unemployment has typically been avoided: either machines could not do many of the innately human things people could do, or technology so drastically brought down costs that new markets were unlocked, in turn requiring more…

Read More

Nigerian Start up innovates Recycling; Q&A with Bilikiss Abiola, Founder WeCyclers

Bilikiss Adebiyi Abiola , Founder and CEO of Wecyclers The Nigerian tech startup space is developing at speed, and stands a good chance of being the Africa’s leader.  ITBusinessDirect spoke with  Bilikiss Adebiyi Abiola , Founder and CEO of Wecyclers, a company that offers  household recycling service using a fleet of low-cost cargo bikes. They are powering social change using the environment by allowing people in low-income communities in Nigeria to capture value from their waste. Question: How can you define the technology sector in Nigeria? Bilikiss: I believe it’s…

Read More

New malware masquerades as a ride-sharing app

An update to the venerable Faketoken.q Android malware has made it easier for the program to steal your credit card information from ride-sharing apps. Faketoken attacks Russian ride-sharing apps by overlaying text boxes on the credit card information pages that can capture your credit number and other important information. Kaspersky writes: After getting onto a smartphone (judging by the malware icon, Faketoken infiltrates smartphones through bulk SMS messages with a prompt to download some picture) and installing the necessary modules, the Trojan hides its shortcut icon and starts background monitoring…

Read More

Internet providers could easily snoop on your smart home

IoT devices often identify themselves voluntarily, usually by connecting to specific domains or URLs. Even if they didn’t, there are simple ways of profiling them based on observation and some known data. It’s certainly true that encryption is on the rise online. Data from Mozilla, the company behind the popular Firefox browser, shows that more than half of web pages use HTTPS, the standard way of encrypting web traffic. When sites like The Atlantic use HTTPS, a lock icon appears in users’ web browsers, indicating that the information being sent…

Read More

With iPod discontinuation, what are the alternatives?

Smartphones have largely replaced portable media players for most people. It’s been a few years since Apple bothered to update its iPod touch, and it’s been even longer since any other company try to offer a good Android-powered alternative to Apple’s touchscreen media player. Apple is now abandoning its traditional iPod because most people with smartphones now use them for everything. However, many current smartphones – including Apple’s – don’t have FM, and none has a DAB radio. Worse, smartphones need regular app updates and sometimes annual operating system upgrades. You…

Read More

Globaldata: Artificial Intelligence (AI) more crucial for IoT than Big Data insights

Artificial intelligence won’t solve every problem, but its current applications are already fundamentally reshaping the way we do business and collect data. While the development of the internet of things has revolutionized heavy industry, online shopping, localized data collection and virtually every other aspect of modern life and business, innovators are still struggling over the future of the IoT, and how they’ll get there. While many see big data as the driving engine behind the IoT, savvy investors and entrepreneurs have shown that the real power behind the interconnectivity phenomenon…

Read More

Explore the latest threats to your mobile device security

It is common knowledge that mobile devices are integral to both our personal and business lives. With cyberattacks against individuals, businesses, and government entities increasing in frequency and sophistication, it is no surprise that mobile devices are now considered by threat actors to be one of the weakest links in the IT infrastructure of most enterprises. A decade ago, mobile malware was considered a new and unlikely threat. Many mobile device users even considered themselves immune from such threats.  Currently, more than 1.5 million new incidents of mobile malware have…

Read More