Article Archives

In another example of mobile innovations intended to address unique African problems, the International Telecommunication Union (ITU) recently unveiled an App intended to combat the dreaded Ebola v..
We have discussed cyber terrorism, including how terrorist organizations like ISIS, Boko Haram and Al Shabaab are increasingly resorting to the Internet to facilitate their ruthless terror campaign..
It is startling how many small businesses in Africa operate without a website. The number of businesses, some of them fairly large, who still use free email accounts such as Gmail, Yahoo and Hotmai..
The problem of child soldiers did not begin in Africa. But, rebel leaders and tyrants in Africa perfected this new form of warfare. Four-foot killing machines are responsible for a trail of murder ..
We have consistently advocated for the deployment of fiber directly to homes in green fields for those operators and service providers who contemplate deploying wireline broadband access networks. ..
Most of our discussions on hacking have been centered on individual hackers attacking computers for thrills, to catch a philandering spouse or for other personal purposes. We have discussed hacker..
Kihara Kimachia: The Arab Spring of 2010 was extensively reported in the media. Cyber activism via Facebook, Twitter and local cell phone text messages played a vital role in connecting hordes o..
Most of you are most likely aware of the spyware used on computers to capture keystrokes, steal passwords and monitor victim activities on the Internet. What you may not be aware of is that the Int..
This question came up during one of our fiber to the home (FTTH) training workshops in Africa. FTTH networks typically run multiple services, including Internet access, telephony and video - either..
If you try to spend a lot of time on the Internet on your PC using a dongle, you will quickly spend huge sums of money in data bundle costs. Thanks to mobile deals and apps, many people can access ..
Most people are familiar with drones or unmanned aerial vehicles (UAVs) that are used by the Obama administration to track and kill terrorist leaders in Afghanistan, Iran, Syria, Somalia and other ..
Anybody who has been following political events in Zimbabwe is aware of the vicious infighting within the ruling ZANU(PF) party. Two rival factions have been positioning their leaders to eventually..
Kihara Kimachia: A nation's economic strength is directly proportional to the knowledge of its human capital. Knowledge, capital and labor, in that order, are responsible for the wealth differen..
A number of articles have been written on ICT Africa about counterfeit products dumped into the African market by Chinese suppliers. Unsuspecting African consumers, lured by the cheap prices of cou..
Internet uptake in Africa in increasing exponentially. This has been fueled by huge investments in marine and terrestrial fiber networks, growth in mobile computing and initiatives by private compa..
Kihara Kimachia: Ebola has got the entire world almost giving in to hysteria and fear; and for a good reason. As at the time of publishing this article, the Ebola death toll was just under 5000 ..
Kihara Kimachia: Social Media is a powerful recruitment tool for jihadists and other terrorists. The best example of this is ISIS which has deployed a high-tech online propaganda machine that in..
Kihara Kimachia: Kenya's mobile network operator, Safaricom, has a monopoly over voice and mobile money services. They also have a significant share of the data market. In early 2014, Kenya's la..
Kihara Kimachia: For many years, one of East Africa's most recognizable brands was EverReady Batteries which specialized in the manufacture of dry cell batteries. The publicly quoted company was..
Kihara Kimachia: The Insurance industry in Africa has grown at a stubbornly slow pace over decades. This can be blamed on poverty, ignorance and a failure to appreciate the need for insurance; f..
Kihara Kimachia: It is quickly becoming a cliché to state that there is a mobile revolution in Africa. This topic has been written about extensively and exhaustively by journalists and bloggers..
Kihara Kimachia: The term DDOS has popped up anytime there is a wave of cyber-activism. Fresh on our minds is the Wikileaks and Julian Assange saga. Those of us who observe events in the industr..
Betty Vulule: For a continent that has long grappled with basic issues such as food security, water availability, sanitation, formal education, civil wars, employment and rural development, it s..
By Sam Agona: In February 2013, the Independent reported that Quality of Service (QoS) of Ugandan telecoms companies is sub-standard. Based on user experience, among the major telecoms companies..
Steven Nyanjong: Introduction Data usage has been growing exponentially in Africa. This has sparked technology advancements that have revolutionized the ICT industry. 4 G LTE is advancement fro..