It’s the weekend, you are staring at your pile of dirty laundry wishing there was a way you didn’t have to do it. In Kampala, Uganda there is an easy and convenient way: Yoza. Yoza is an application that connects people who need their laundry done to the people offering laundry services in the area.
Solomon Kitumba, a 24 year old was inspired to start the company when he was struggling to get laundry done one weekend. He tried to find someone to do it for him and found someone, a single woman who lived right next door. A few weeks later, a working prototype for Yoza was created.
Just like Kenya, in Kampala, there are a lot of students and single professionals who need help with laundry. The people offering these cleaning services may be difficult to reach. Yoza which is growing day by
Microsoft tweaks Outlook mobile apps for iOS, Android platforms reports ZDnet
The coming changes to the Outlook mobile apps -- which, on iOS and Android are the rebranded Acompli email apps, are outlined in an October 28 blog post from Javier Soltero, the newly minted Corporate Vice President of Outlook and former CEO of Acompli.
For Outlook on iOS users, the revamped Outlook mobile app begins rolling out today. Android users will get the updates to Outlook beginning in early November.
And what about Windows Phone? Microsoft plans to release an updated Outlook app for Windows Phone in November, today's blog post says, which will coincide with the start of the rollout of Windows 10 Mobile (the latter part of that statement is not in the blog post).
The revamped Outlook for iOS features ...
Big loopholes lurk in African cybercrime law – where it even exists reports theconversation.com
Since May 2011 the International Telecommunication Union (ITU) – the UN agency that specialises in information and communication technology – has worked with the UN Office on Drugs and Crime (UNODC) to help countries mitigate against the risks posed by cybercrime.
According to the ITU, out of the 52 countries that it looked at in Africa, 44 do not criminalise computer-facilitated offenses. Only two have legislation deemed sufficient to combat online sexual abuse, and 40 do not have any legislation at all addressing online child sexual abuse. Nearly all – 49 countries – do not criminalise the simple possession and distribution of indecent images of children, and 51 of the countr
Your computer is only as secure as its weakest link — your password. Reports By Bobby Emamian of Forbes
And once some malicious hacker cracks it, he can access whatever he wants within your account, as we saw with the celebrity iCloud photo leak and, more recently, the supposed Gmail account hack.
It no longer matters how many special characters and numbers you set in your password; a skilled password cracker can eventually decipher it. And with wireless connectivity being built into everything from appliances to cars to jewelry, it’s going to take more than passwords to maintain security moving forward.
The Internet of (Secure) Things
Passwords have become more personal and unique to you and your device. Look at Touch ID, for example. It’s been utilized by the iPhone as a means to u
The East African Legislative Assembly (EALA) has called on member states to make internet access and communication in the region seamless. The regional lawmakers urged industry regulators to encourage all mobile operators in the region to adopt a single network, as applied by Airtel Africa.
In order to harmonise roaming on call costs, EALA also wants the Council of Ministers from Kenya, Uganda, Tanzania, Burundi and Rwanda to introduce a uniform price cap regulation for roaming mobile costs within the East African Community, the Monitor reported.
The House was informed that although the region had made important strides in the development of an ICT Policy and regulatory framework, regulators needed to emphasise timely implementation and update their e-strategies.
In order to be holist...
Local industry players are looking to other models for mobile money transfer solutions, amid the failure of these to take off in SA - in stark contrast to other African countries where the same services have thrived.
Most notably, M-Pesa - launched as a partnership between SA’s first mobile operator Vodacom and then big four bank Nedbank, in August 2010, has struggled to gain traction and currently has only a few hundred-thousand users in SA. The service has been held back by legislation and the integration needed to move money from a bank account to an electronic wallet.
On the contrary, Tanzania and Kenya - as well as the Middle East’s Afghanistan - have seen massive uptake of the same service, gaining more than 10 million customers, while SA is still sitting on a few hundred-thousand,
m:lab East Africa will be holding its third Pivot East on 25th – 26th June 2013 in Kampala, Uganda. Pivot East is East Africa’s premier mobile start-ups pitching competition and conference which has been held annually since 2011. Pivot East is about catalysing the growth of mobile start-ups, with an aim to amplify and consolidate the gains of East Africa’s Mobile developer and entrepreneurship ecosystem. read more
BOSTON/SAN FRANCISCO (Reuters) - Apple Inc was recently attacked by hackers who infected Macintosh computers of some employees, the company said Tuesday in an unprecedented disclosure describing the widest known cyber attacks targeting Apple computers used by corporations.
Unknown hackers infected the computers of some Apple workers when they visited a website for software developers that had been infected with malicious software. The malware had been designed to attack Mac computers. source
The Czech internet reached a significant milestone this week, when the one millionth website with the country domain name ending of .cz was registered. The announcement was made by CZ.NIC, the body that administers domain names in the Czech Republic. Perhaps surprisingly, the majority of sites ending in .cz – 58 percent – are owned not by firms but by individuals. Read More
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.