isiafrica.net
Associations – isiAfrica
http://isiafrica.net/directory/software/associations
Data – information – standards – systems – Africa. Research & Development. Education & Training. Free and Open Source Software. African Virtual Open Initiatives and Resources (AVOIR). Free Software and Open Source Foundation for Africa (FOSSFA). IST-Africa (Regional Impact of Information Society Technologies in Africa). Knowledge Management Africa (KMAfrica). Open Society Initiative for West Africa (OSIWA). The Association of Professionals of Information and Communication Technology (APTIC). The ISBHI is...
kenya-byte.blogspot.com
Kenya-Byte: March 2012
http://kenya-byte.blogspot.com/2012_03_01_archive.html
The Kenyan ICT Sector - Issues and Opinions. Sunday, March 25, 2012. KENYA BOASTS OF BEING THE "BIG BROTHER" OF THE EAST AFRICA COMMUNITY BUT THIS IS NOT IMPORTANT AT ALL. Below is a comment from Mr. Kimanga on a post titled "Kenyan Forensic Science Association" dated Friday, May 16, 2008. This post generated numerous comments and I thank you all who commented. Mr Kimanga's Comment is as below. Kenya needs to wake up to the plain reality, just a word. Courtesy of Sunday Nation 25/03/02. Addressing region...
kenya-byte.blogspot.com
Kenya-Byte: September 2010
http://kenya-byte.blogspot.com/2010_09_01_archive.html
The Kenyan ICT Sector - Issues and Opinions. Wednesday, September 08, 2010. Four years have passed on.Kachumbari - The True Kenyan Villager.we remember. HOW TO CONVERT KSHS INTO DOLLARS THROUGH A BANK EFT. I read an interesting article in the EAStandard of September 8, 2010. It's about an interesting fraud where money was transferred from several banks in thousands of shillings only to be received by another bank in millions. ANATOMY OF A SUCCESSFUL INTRUSION – IN YOUR LANGUAGE. You might have asked your...
kenya-byte.blogspot.com
Kenya-Byte: January 2009
http://kenya-byte.blogspot.com/2009_01_01_archive.html
The Kenyan ICT Sector - Issues and Opinions. Saturday, January 24, 2009. Can you use Encryption to Enhance your Privacy? Continuing on from a previous article, which looked at privacy in today’s internet age, this piece continues by discussing how one can use encryption to protect privacy. This monitoring is sometimes justifiable. Employees that abuse their access to the internet instead of doing the job they are employed to do are identified through these tools. The storage media you use, for example US...
kenya-byte.blogspot.com
Kenya-Byte: May 2010
http://kenya-byte.blogspot.com/2010_05_01_archive.html
The Kenyan ICT Sector - Issues and Opinions. Saturday, May 08, 2010. HATE MESSAGES – DO YOU KNOW HOW THEY CAN TRACK YOU? The 2005 Referendum and 2007 election introduced Kenyans to a vile form of mass misinformation - the insidious power of hate messages. It was the propagation of these hate-filled messages that inflamed Kenyans against each other in both instances. To be able to prevent a repeat, we must understand why mobile telephony and the internet have become such powerful tools of incitement.
kenya-byte.blogspot.com
Kenya-Byte: January 2014
http://kenya-byte.blogspot.com/2014_01_01_archive.html
The Kenyan ICT Sector - Issues and Opinions. Friday, January 24, 2014. Happy New Year to all. This year we shall ask ourselves one pertinent question.why are ICT practitioners not recognized professionals in Kenya? Accountants have the Accountants Act which is a statute enabling ICPAK's operation. ICPAK is therefore a professional body that oversees public interest issues affecting Kenyan accountants including discipline, audit quality assurance, standards etc. Subscribe to: Posts (Atom). Communications ...
kenya-byte.blogspot.com
Kenya-Byte: January 2012
http://kenya-byte.blogspot.com/2012_01_01_archive.html
The Kenyan ICT Sector - Issues and Opinions. Monday, January 30, 2012. GOVERNMENT WEBSITES AND SYSTEMS SHOULD BE ‘HARDENED’. Over 100 government websites were defaced by an Indonesian hacker in January 2012. This is a harbinger of things to come. As more organizations get online hackers will test their hacking skills and the government is a target like everyone else. Apart from defacing websites, hackers usually move on to the next stage by attempting to penetrate the database(s) that sit behind websites.
witsa.org
Board of Directors | Witsa
http://witsa.org/witsa-wp-site/program/board-of-directors
World Information Technology And Services Alliance. By-Laws & Articles of Incorporation. Statements & Resolutions. Global Policy Action Committee: Advocating Public Policies. Committee on Education, Training and Human Resources. Past ICT Excellence Awards. The following WITSA Board of Directors ( BOD ) were elected and appointed for the 2014 2016 term during the WITSA General Assembly on September 28, 2014. National Chamber of Electronics, Telecommunications and Information Technology Industries (CANIETI).
kenya-byte.blogspot.com
Kenya-Byte: April 2013
http://kenya-byte.blogspot.com/2013_04_01_archive.html
The Kenyan ICT Sector - Issues and Opinions. Monday, April 29, 2013. CISPA - Recent Developments. On April 26, 2012, the House of Representatives passed CISPA. On February 13, 2013, United States Representative Mike Rogers reintroduced the CISPA bill in the 113th Congress as H.R. 624.[6]. On April 18, 2013, the House of Representatives passed H.R. 624. The Senate has reportedly refused to vote on the measure and is drafting competing legislation. Sunday, April 21, 2013. CISPA Patriot Act =? Its sole purp...