The Oracle Speaks….

DR ERNEST NDUKWE, SAM AMUKA, PAT UTOMI, JUBRIL MARTINS-KUYE, BANIGO, JIM OVIA, ABATI, LEO STAN, MADUKA, OKOIGUN FOR UWAJE’s BOOK LAUNCH  The Oracle Speaks, as the long awaited book “e-Knowledge – Time is Running Out” is launched! All roads lead to the Nigerian Institute of International Affairs next week Tuesday, March 30, 2010 to receive…

Scaling New Heights:2009 In Retrospect(A Review of the Telecoms Industry in 2009)

Telecommunications and banking in any economy can be likened to siamese twins. This is because there is a symbiotic, interdependent and self-reinforcing relationship between both sectors as they individually and jointly stimulate as well drive, the economy. So when global telecom players tried to convince us of their immunity, given what we knew was going…

2010: The Future of Internet for Business (i4B) In Nigeria

As 2010 is just around the corner with great opportunities embedded in renewed challenges, financial and business experts all over the world predict a slow recovery for businesses from recession, which means the way business will be done this time will have to change for effective and quick recovery from the economic meltdown For Nigeria,…

Nigeria And The Challenges Of Cyber Crime-Part 4

TECHNICAL, LEGAL, AND OPERATIONAL CHALLENGES   We have entered the Information Age, where information technologies have been integrated into virtually every aspect of business and society.  This integration is posing new challenges for all of us in law enforcement.   Today, there are critical challenges, seeing computers being used for criminal behavior in three major ways.   …

Stopping Cyber Crime

The name Tim Berners-Lee may not ring a bell to the casual internet user neither will the famous quote by one of mankind’s most famous innovators describing the internet “turning point in societal evolution depends not only on the technology but also how we use it.” Furthermore, “the web gives us lots more choices about…

Nigeria And The Challenges Of Cyber Crime-Part 3

   2.2 CATEGORIES OF CYBER THREATS The following are some of the categories of cyber threats that we confront today include, but not limited to: Insiders, Hackers (or “crackers”), “Hacktivism.” Or Political Hacking, Criminal Groups,  The Phonemasters’, Internet Fraud, Foreign intelligence services. Information Warfare, Virus Writers, Internet Fraud, Identity Theft, Child Pornography, Terrorists  Etc.

WITSA Global Public Policy Summit Bermuda 2009

  The“Bermuda Declaration” for the ICT sector ____  “As we are all witnessing the world is going through a revolution driven by IT.  Business, government, education, the media – all are being transformed by the Internet, wireless telephone, access to powerful yet inexpensive computing technology, cable and satellite television, and other elements of the new…

Bermuda Declaration Adopted – A Call To Action For The Global ICT Sector

The Global Public Policy Summit (GPPS) 2009 ended at Fairmont Southampton yesterday and was hailed as a great success by attendees who came to Bermuda from over 25 countries. GPPS 2009, a flagship event of the World Information Technology And Services Alliance (WITSA), focused on business technology as an enabler in world economies and featured…

Nigeria And The Challenges Of Cyber Crime-Part 2

                         1.2    The New Creative Class The New creative class is like the Managerial Class of the 1950s, they are the norm-setting class of the present era – applying and using technology. The growth of the Internet’s now most-infamous component, the World Wide Web, has been even more spectacular. With more than 700 million…

ComBIT Africa 2009 Expo

ComBIT Africa Expo is a product of strategic re-branding of NICOMM Exhibitions & Conferences organised by our Association since 1995. The event has been adjudged the biggest ICT expo in Nigeria and West Africa and is currently attracting ICT trade missions from United Kingdom, United States, Hong Kong, China, India, Israel, Korea, Dubai, Taiwan, Canada,…

Nigeria And The Challenges Of Cyber Crime-Part 1

                                            In 1982 and 1983, the first desktop computers began to appear, many were equipped with operating system called Berkeley UNIX which includes Network Software – which allows relatively easy connection to the Internet. The personal computer revolution continued through the eighties, making access to computer…

17 Unbeatable Laws of Internet Marketing-Part 2

6.The Law of Advertising-First publicize your business, then advertise it both online and offline. Your business dies without advertisement. First seek ways to publicize your online business through the methods of driving traffic to your website, let people tell others about your business. Give out e-books, softwares, business cards, embed your business contact in them.

Key Levers Of Recovery And Reform-Part 2

4.0 How do we recover faster and build a foundation for long-term stability? Many economists say that the standard Keynesian macroeconomic prescription is to stimulate the economy by increasing borrowing, reducing interest rates, lowering taxes and raising spending on public works such as infrastructure. These measures are exactly what the bailout plan and stimulus packages…

Key Levers Of Recovery And Reform-Part 1

Presentation at IT Public Private Forum Kano by Dr Jimson Olufuye, President, Information Technology (Industry) Association of Nigeria (ITAN)  on 29.09.09 Introduction There is no doubt that transformed leadership is what matters most in the quest for national development in the contemporary world of today. There is no magic to it. Leadership requires deft and…

Workplace 2.0

A few years ago, I would have scribbled a few lines of text before putting together anything longer than one paragraph. But things have changed: for most people, it’s now directly from the brain to the keyboard – with immense support from the backspace key and other text editing functions such as Cut and Paste…