CRYPTOCURRENCIES ADOPTION IN KENYA AMID WARNINGS FROM CBK & KRA.

  CRYPTOCURRENCIES ADOPTION IN KENYA AMID WARNINGS FROM CBK & KRA.  When the covid-19 pandemic struck early last year, little did Kenyans know that it would be a blessing in disguise. The lockdown period created an optimum environment for citizens to explore the crypto world at a rate never seen before. According to data from Chainalysis – a blockchain data analysis platform and company – the adoption of cryptocurrencies in Africa jumped by a whopping 1200% in a span of one year ending June 2021. The data further indicates that…

CYBERCRIME – EVERYTHING YOU NEED TO KNOW ABOUT

Cybercrime is a term used broadly to describe activity in which computers or computer networks are the tool, target, or place of criminal activity. These categories are not exclusive and many activities can be characterized as falling in one or more categories. Cybercrime takes a number of forms including identity theft, internet fraud, violation of copyright laws through file sharing, hacking, computer viruses, denial of service attacks, and spam. Many types of cybercrime are simply extensions of existing criminal activities, with the computer and internet severing them from the perpetrator’s geographical…

HOW TO CREATE AND MINT YOUR NFTs FROM YOUR ARTWORK.

In 2021 NFTs have grown in terms of popularity and adoption. Earlier this month the term ‘NFT’ overtook ‘Dogecoin’ and ‘Ethereum’ and Bitcoin on the list of the most searched crypto terminologies on search engines like Google and Microsoft and Microsoft Bing. The sales from NFT artworks and collectibles have grown immensely this year. In January the sales averaged at around $50 million and have skyrocketed to over $5 Billion as of November 22nd 2021. The total market cap of all Non-Fungible Tokens is estimated to be about $10 Billion and is…

List of typographical symbols and punctuation marks

Typographical symbols and punctuation marks Symbol Name of the Symbol Similar glyphs or concepts See also ≈ Almost equal to Equals sign Mathematical operators and symbols in Unicode & Ampersand etc. ⟨ ⟩ Angle brackets Bracket, Parenthesis, Greater-than sign, Less-than sign Bracket ‘ ’ Apostrophe Quotation mark, Guillemet, Prime * Asterisk Asterism, Dagger Footnote ⁂ Asterism Dinkus, Therefore sign @ At sign Backslash Slash (Solidus) (/) ‱ Basis point (per ten thousand) Per cent, per mille (per 1,000) [ ], { } Brackets Angle bracket, Parenthesis • Bullet Interpunct ‸ ⁁…

WHAT EXACTLY IS THE METAVERSE?

WHAT EXACTLY IS THE METAVERSE? Recently the term metaverse has become very popular after the social media giant Facebook Inc. re-branded its name to Meta to incorporate all their apps, technologies and products such as the Oculus Quest together under one brand. I believe you’ve definitely heard it or read it somewhere on your social media platforms. So what exactly is the metaverse? The truth be laid out that there is no standard or a universally agreed definition of the metaverse. What proponents of the metaverse do agree on is…

SUPER COMPUTING EXPLAINED

SUPER COMPUTING EXPLAINED Super Computing: refers to the use of parallel processing for running advanced application programs efficiently, reliably and quickly. It’s also known as High Performance Computing (HPC). The term applies specifically for systems that can perform above a teraFLOP (1012 Floating Point) operations per second. It also refers to the ability of a computer to process data and perform complex calculations at high speeds with no latency. For example while a desktop with a 3GHz processor can perform around 3 billion calculations per second it cannot match or compare to…

CLOUD COMPUTING DEBUNKED

CLOUD COMPUTING DEBUNKED Cloud Computing: is an infrastructure or software that provides services (on demand services) over the internet where some decentralized resources managed by servers are shared to users without requiring assistance or permission. Instead of users buying and maintaining physical data centers and servers they access services such as storage, computing power and databases on a pay-as-you go basis from cloud computing providers such as Amazon Web Services, Google Cloud, IBM, Facebook Cloud, Microsoft Azure etc.   Major Characteristics of Cloud Computing Allows for resource pooling: cloud computing…

HOW TO PASSWORD PROTECT YOUR FOLDERS IN WINDOWS

keyboard hd

HOW TO PASSWORD PROTECT YOUR FOLDERS IN WINDOWS Perhaps you might be looking for ways you could use to protect your files from other users. One of the simplest ways is to lock them in a password protected  folder. Below is a simple 9 steps procedure of locking your folder. Procedure Open the Notepad app on your computer. Copy and paste the code below CODE To password protect your folder cls @ECHO OFF title Folder Locker if EXIST “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” goto UNLOCK if NOT EXIST Locker goto MDLOCKER :CONFIRM echo…

CHALLENGES OF IoB + THE FUTURE OF IoB

What are the Potential Disadvantages of Internet of Behaviors? The Internet of Behavior security is a critical issue. Nothing is 100% safe and so the internet of Behavior is. There are chances of Data theft and personal information leaks, that may adversely affect the individuals. The abundance of data and insight will be a huge challenge to manage and secure. There will be a greater need for cybersecurity to stop crimes. It is very difficult to draw a clear line between matching users’ needs in the best way possible and…

HOW IS YOUR DIGITAL DUST COLLECTED?

Best-Internet-Service-Provider

So How Is Your Data  Collected? In the previous article we shed light on a new trend in IT, the internet of behaviors. In this article we’ll focus on how your data is collected,  Consumer data may be gathered from a range of sources and technologies. For example Cloud computing providers gather and store data in their clouds; Google Cloud, Facebook Cloud, IBM Cloud, Microsoft Cloud, Apple Cloud, Amazon Cloud etc. They collect and share user data among them. It includes a company’s websites (through cookies), social media profiles, sensors, telematics, beacons,…