Technology

Home Technology

Only Innovative PR Practitioners will Survive Technology Disruption

The on-going technological convergence across different sectors will in no distant time disrupt the activities of Public Relations practitioners and only the innovative ones...

Passion Incubator Leads Dutch Nigerian Student Business Challenge in Nigeria

After several weeks of educational programme and coaching trajectory to improve entrepreneurial skills, 12 students representing Netherlands and 12 students from Nigeria will have...

Industry Experts to Discuss How Data Science will Drive the Economy

Key industry stakeholders across different sectors of the Nigerian economy will converge on the 12th of October, 2017 at Oriental Hotel, Victoria Island, Lagos...

What Experts Think About Digital Currency

The gradual surge of Bitcoin is becoming a topic for discussion, an innovation that is already disrupting the fintech industry. There is no bank or...

Coding is Not Technology

Technology has evolved over the past 20 years since the inception of the internet where computers across the world are interconnected to servers. This concept...

Empowering Women to Become Active in The Tech Industry

Globally, the tech ecosystem has been male dominated; this agrees with researches carried out in some major technology companies. There have been a relatively...
WordPress

What can you do if your WordPress Site is Prone to Attack?

WordPress is blogging software built around an open source script, and there are divergent views concerning the security. Some say the open source script is...

The Modern Day Technology of Convenience

The predominance of technology today is bringing forth convenience, making humans more productive than others who lived decades ago. Some of the gadgets are...

Telecom Operators Must Think Deep to Unlearn Their Thoughts about OTT Services

The dash for OTT services has completely leapfrogged the services provided by telecom companies, and I could vehemently state that the Nigerian telecom industry...

How Churches are Getting Disrupted by Technology

Over the years, technology has been evolving the old fashion way we used to do things, from healthcare and educational system to all facets...

Paying Attention to Details While Installing an Android App

Most people have argued a lot about the security level of the Google Play Store, an application store that records the highest numbers of...

Strengthening The Financial Services Industry With Cognitive Security

Is it possible for any organisation to fight cybercrime without the aid of artificial intelligence or machine learning, especially, for those with complex systems...

Dark Web: Know these Hacks Before you Visit

I have heard a lot about the dark web, and recently, I got curious, dig deep to know what it is. The term dark...

Tecno Takes Manchester City Partnership to New Level with Branded Device

Tecno Mobile, leading mobile phone maker and ‘Official Tablet and Handset Partner of the Manchester City Football Club’, recently announced exclusive sales agreement of...
Dvmap Trojan, Android Malicious App With Code Injection

Dvmap Trojan, Android Malicious App With Code Injection

The security threats of downloading Android application are turning a new leave following the discovery of Dvmap Trojan and users like game lovers must...

Health Remains a Priority, Despite Disagreement Amongst NCC, NSE, Others

In 2012, the House of Representatives passed the second reading of the Telecommunications Electromagnetic Frequency Emission (EMF) Protection Bill sponsored by the House Committee...

Will the Internet Replace College and University?

Globally, there are series of controversies around the future of higher education considering the way the internet has transformed over time. The evolving nature of...

How to Deal with Online Identity Theft.

One of the dangers posed by the internet is online identity theft, which means data privacy could be compromised. Available reports reveal that in 2016...

4 Incredible Functions of your Mobile Phone

Smartphone is one of the greatest innovation ever, there are a few things you could do with it when it matters most. With your smartphone,...
Smart Connected Devices (IoT) are too Weak to Resist Cyber Attack.

Smart Connected Devices (IoT) are too Weak to Resist Cyber Attack.

When you talk about smart connected devices, you talk about the concept of IoT (Internet of Things). Globally, it has become one of the trends...