Mercedes-Benz Partners with Google to Bring Gemini AI Into Its Cars

By: Sholanke Mercedes-Benz and Google are joining forces to usher in a new era of in-car technology, with the German automaker announcing the integration of Google’s state-of-the-art Gemini AI into its vehicles. The partnership is expected to redefine the driving experience for Mercedes owners, incorporating advanced artificial intelligence to make navigation, entertainment, and communication more […]

Breakthrough in 6G Technology: Implications for University Students

By:Dominance On September 12, 2025, scientists announced the development of a revolutionary “full-spectrum” 6G chip. This innovation, no larger than a fingernail, is capable of transmitting data up to 10,000 times faster than 5G. While it remains in the prototype stage, the breakthrough points toward a future of unprecedented speed and connectivity. For the university […]

Apple Unveils iPhone 17 Lineup and AirPods Pro 3 with Live Translation

By:  Eniola Ogundele Apple unveiled its latest innovations  September 9, 2025,  introducing the powerful iPhone 17 series alongside the advanced AirPods Pro 3. The iPhone 17 comes with a new Center Stage front camera for next-level selfies, a bigger 6.3-inch Super Retina XDR display with ProMotion for smoother visuals, and enhanced photography capabilities with a […]

Meta AI Chats Are Not Private: Here is How to Safeguard Your Conversations

By: Sholanke As Meta AI continues to integrate advanced artificial intelligence features into popular platforms like Facebook, Instagram, and WhatsApp, millions of users are experimenting with Meta AI chatbots. Yet many aren’t aware that their conversations with Meta’s AI may not be as confidential as they imagine, raising pressing questions about privacy and transparency. According […]

Apple Set to Overhaul iOS Naming: iOS 19 Skipped for iOS 26 in Major Rebranding Move

By: Sholanke Apple is preparing to unveil a sweeping change to its operating system branding. Instead of releasing the expected iOS 19 this fall, the company will leap ahead to “iOS 26.” According to a Digital Trends report citing Bloomberg and Apple insider Mark Gurman, this marks a strategic shift from Apple’s traditional sequential numbering […]

NDPC Tightens Grip On Data Protection: Heavy Fines To Be Imposed In 2025

By: Deborah Idowu In a significant move to strengthen data protection in Nigeria, the Nigeria Data Protection Commission (NDPC) has announced plans to impose heavy fines on businesses that mishandle Nigerians’ data. This decision marks a significant shift in the Commission’s approach, as it has not issued any fines to date. According to Dr. Vincent […]

Embracing the Future: A Strategic Guide for African Businesses to Harness AI Transformation

By: Japheth Oladele In the rapidly evolving landscape of modern business, artificial intelligence (AI) has emerged as a pivotal force driving innovation and growth. This trend is increasingly capturing the attention of African business leaders, who are keen to understand how to effectively initiate AI transformation to ensure sustained enterprise development. It is crucial to […]

$100,000 Bitcoin: Nigeria’s Opportunities in the Crypto Boom 

By: Japheth Oladele Bitcoin’s recent surge past the $100,000 milestone marks a pivotal moment in global finance, with significant implications for countries like Nigeria. This historic rise, peaking at $103,800, has been driven by U.S. President-elect Donald Trump’s pro-crypto policies, including key appointments of blockchain advocates to top regulatory positions. The vision of making the […]

Preventing Smartphones overheating: Experts tips

By: Japheth Oladele Smartphone overheating is a frequent issue that can lead to significant device damage if not addressed properly. Like all electronic devices, smartphones generate heat when in use. However, excessive heat can harm a phone’s battery, cause system malfunctions, and potentially result in permanent damage. Understanding the causes behind smartphone overheating and adopting […]

Over 5.5 Billion People Online in 2024, but Digital Divide Persists – ITU

By: Japheth Oladele In 2024, the International Telecommunication Union (ITU) reports that 5.5 billion people are online, representing an increase of 227 million from 2023. However, the Facts and Figures 2024 report emphasizes the ongoing digital divide, particularly in low-income nations where Internet access remains a significant challenge. Despite 68% of the global population being […]

Google Rolls Out AI-Driven Theft Protection Features for Android Users in Africa

By:Assesa Press Google has introduced a series of advanced security features aimed at safeguarding Android users in Africa from phone theft. These innovations, driven by AI, focus on preventing unauthorised access to sensitive data, addressing a rising concern as smartphone theft becomes increasingly common in the region.  New Features To Combat Theft  1. Theft Detection […]

30 University of Ibadan Students Trained in AI by Infinix and UNESCO to Become Peer Trainers

By:Assesa Press Thirty students from the University of Ibadan have successfully completed a pioneering artificial intelligence (AI) training program, empowering them with cutting-edge tech skills to become peer trainers in their communities. The initiative, a collaboration between Infinix, UNESCO, and Cog Labs, was held at the Infinix ICT Resource Centre. The AI training, which aims […]

DIY Smartphone Repair: A Guide to Self-Sufficiency

By: Japheth Oladele In today’s digitally interconnected world, smartphones have become indispensable tools, seamlessly integrating into our daily lives. From communication and productivity to entertainment and information access, these devices have become our constant companions. However, when faced with a broken or malfunctioning smartphone, frustration and inconvenience often ensue. Fortunately, many common smartphone issues can […]

OpenAI launches SearchGPT, posing a new challenge to Google’s dominance

By: Japheth Oladele In a groundbreaking development that could significantly alter the search engine industry, OpenAI, the artificial intelligence company backed by Microsoft, has introduced a new prototype search engine named SearchGPT. As reported by Punch newspapers, this innovative launch is poised to challenge Google’s entrenched position in the market. OpenAI positions SearchGPT as a […]

Unlock A Healthier You With Smart Gadgets

By: Japheth Oladele The digital transformation in healthcare has revolutionized the way individuals monitor and manage their health. Innovative smart gadgets have empowered individuals to detect health issues and improve their well-being from the comfort of their own homes. This paradigm shift has democratized access to critical health data, enabling proactive management of well-being and […]

Nigeria Ranks 105th in Coursera’s 2024 Global Skills Proficiency Report

By: Japheth Oladele The digital skills training platform, Coursera, has ranked Nigeria 105th out of 109 countries in its newly released 2024 Global Skills Proficiency report. According to Coursera, the rankings are based on learner performance on the platform and key economic indices. The company measures each learner’s proficiency in various skills and then aggregates […]

Credit Scheme: Federal Government to Link Credit Scores to NIN, Aiming for 80 Million Nigerians

By: Japheth Oladele The Federal Government has announced plans to use the National Identification Number (NIN) to monitor the credit behavior of Nigerians under its consumer credit program. Uzoma Nwagba, the CEO of the Nigerian Consumer Credit Corporation (CREDICORP), shared this in a TV interview. Nwagba explained that economically active Nigerians will have their credit […]

Key Cryptocurrency Terms And What They Mean




By; Japheth Oladele
Cryptocurrency is a digital or virtual currency secured by cryptography and based on a network that is distributed across a large number of computes. Investors’ hopes that the price of Bitcoin could return to an all-time high in 2024 have thrust the sticky subject of cryptocurrencies back into the spotlight. But key terms associated with crypto such as blockchains, wallets – and more recently spot ETFs – remain something of a mystery for many. But worry not. If you’re hearing these for the first time, or just need a refresher, here are a few key words and what they mean:
Bitcoin
While many may struggle with the finer points of crypto, pretty much everyone has heard of its most famous product: Bitcoin. But what actually is it?


Bitcoin is a cryptocurrency, which is to say a type of digital currency. Unlike traditional currencies – the dollar or pound, for example – Bitcoin is not backed or controlled by centralised financial institutions. This makes it popular for people who think decentralisation can bring financial freedom, but it also makes it extremely volatile – rising and falling in value at the whim of Bitcoin buyers and sellers. In February 2024, its price has been rising rapidly – great news for those who have Bitcoin. But it is not so long since it plummeted – a pattern which has been repeated multiple times since the cryptocurrency was launched.


Blockchain
Blockchain is the technology underpinning all cryptocurrencies, and many related products like non fungible tokens (NFTs). In essence, it is a virtual spreadsheet on which all the buying and selling of crypto is recorded. They are arranged in blocks linked together in a giant chain – hence the name. Every cryptocurrency transaction is individually recorded onto the blockchain by a huge network of volunteers verifying its authenticity by using computer programmes.
The incentive to do this for Bitcoin’s network is that the first person to validate transactions is rewarded in Bitcoin. This potentially lucrative process, known as mining, is also controversial because of the incredible amount of energy used as people the world over race to be the first to successfully update the blockchain.
This also brings us on to “halving”. The amount of Bitcoins that can be mined is capped at 21 million. And most of them are already in circulation. But roughly every four years, the number of Bitcoins rewarded to those who successfully create new blocks of the cryptocurrency is cut in half. The next Bitcoin “halving” event is expected to take place in spring 2024.


Exchange-traded funds (ETFs)
ETFs are portfolios that let investors bet on multiple assets without having to buy any themselves. Traded on stock exchanges like shares, their value depends on how the overall portfolio performs in real time. They can comprise a combination of gold and silver bullion, for example, or a mix of shares in both technology and insurance companies.
A spot Bitcoin ETF buys the cryptocurrency directly, “on the spot”, at its current price, throughout the day. While some ETFs already contained Bitcoin indirectly, the US approved several spot Bitcoin ETFs in January 2024. This allowed new investors, such as investment management firms like Blackrock and Fidelity, to enter the speculative world of Bitcoin without having to worry about digital wallets or navigating crypto exchanges.

Crypto Exchange
A crypto exchange is the digital platform where investors can buy, sell and trade cryptocurrencies. Similar to traditional investing, a crypto exchange acts as a brokerage where people can transfer traditional money, like pounds or dollars, from their banks into cryptocurrencies like Bitcoin or Ethereum. Most transactions are accompanied by fees.

Crypto Wallet
A crypto wallet is a place where investors hold their cryptocurrency. It stores the virtual assets much like a traditional wallet holds cash. There are two types, a hot wallet and a cold wallet. Hot wallets are connected to the internet, and thus more accessible for quick transfers and easy access. Cold wallets are physical devices like specially designed USBs that store crypto offline typically for safer and longer term storage.

Ethereum
Ethereum is used to describe both the second largest cryptocurrency after Bitcoin, represented by the Ether token, and the blockchain underpinning it. This supports an array of different applications and digital assets, such as non-fungible tokens. It functions in a similar way to Bitcoin and other cryptocurrencies, but in 2022 switched to a greener operating system requiring less computers and energy.

Relevance of Precise Data for Tinubu’s Eight-Point Agenda – NIMC DG

By; Japheth Oladele 

During the recent management retreat in Lagos, Abisoye Coker-Odusote, the Director-General of the National Identity Management Commission, emphasized the relevance of accurate data in realizing President Bola Tinubu’s eight-point agenda.

Coker-Odusote highlighted that NIMC’s efforts aim to provide every Nigerian with a distinct identity number, facilitating access to governmental services and benefits. President Bola Tinubu’s agenda prioritizes security, job creation, infrastructure development, and poverty alleviation. The NIMC DG underscored the significance of accurate data, emphasizing its role in guiding informed governmental decisions and actions aligned with these agenda objectives.

Coker-Odusote disclosed that the commission had registered more than 104 million Nigerians and was currently engaged in efforts to register the rest of the population. She explained that they were in the process of launching an online modification platform portal, which was currently undergoing internal testing. She mentioned that it was in the production stage and was being reviewed by their quality assurance and quality control units. She added that once finalized, it would be launched live within a week.

Coker-Odusote explained that the purpose of setting up the portal was to enable individuals to perform modifications online themselves. She described it as a self-service platform designed for local accessibility. She emphasized that it eliminated the need to visit NIMC offices or any other location. Furthermore, she expressed their commitment to introducing a pre-enrollment service shortly. She outlined the process, stating that individuals could enroll online, input their information, and then visit the centers for biometric capture. She estimated that the pre-enrollment service would be operational before the end of March. 

The Director-General of NIMC reiterated the commission’s dedication to facilitating President’s goal of enhancing government-citizen engagement and ensuring all citizens benefit from his administration. She emphasized NIMC’s role in issuing NIN to every citizen, highlighting its significance in bridging the gap between the government and the populace by granting access to services. The DG stressed the importance of utilizing NIN for various governmental endeavors, noting its pivotal role in combating fraud and identity theft. According to Coker-Odusote, NIN facilitates efficient payment tracking, ensuring funds reach the rightful recipients and preventing issues like ghost payments.

Additionally, she disclosed that a pre-enrollment platform aimed at streamlining the process of acquiring the National Identity Number would be introduced soon. This platform will enable individuals seeking to obtain NIN to complete the process online by entering their information and then visit nearby centers for biometric capture.

Why You Should Exercise Caution When Dealing With Loan Mobile Applications


By; Japheth Oladele 

Growing apprehension surrounds loan apps due to their susceptibility to mishandle personal data and engage in unethical behaviors. With technological advancements, the emergence of loan apps, also referred to as digital lenders or online banks, has facilitated borrowing and repayment via smartphone applications. These digital financial services are not exclusive to developed nations; they are now accessible in Nigeria as well. While the convenience of accessing financial services is appreciated by many, it raises concerns such as privacy risks and vulnerability to deceitful tactics.

Most loan apps can be found on various platforms like the Google Play Store and Apple Store. Currently, there are 211 licensed loan apps operating in Nigeria, as reported by the Federal Competition and Consumer Protection Commission. Among these, 172 have received full approval, while the remaining 39 have conditional approvals. This represents a slight uptick from the 204 licensed digital lenders noted in September. Recently, the regulator, the Federal Competition and Consumer Protection Commission, voiced apprehension regarding the increasing instances of customer rights violations among these apps and announced its intention to impose sanctions.

Google Play Store vs Apple Store

The Google Play Store has a less stringent process for app listings compared to the Apple App Store, raising concerns about the presence of potentially harmful apps. Numerous loan apps on the Google Play Store promise swift and convenient access to funds, often with easier eligibility criteria than those on the Apple Store.

Michael Amerson, Art Director at Wet Production, highlighted on Quora that Apple adopts a proactive approach by manually reviewing content submissions before allowing them on the App Store. In contrast, Amerson noted, “Google employs a more reactive approach to submissions. They permit submissions to be automatically approved initially, and if later flagged for any reason, they are taken down until rectified and resubmitted.”

Tips

In the past year, Google removed 43 Android apps from the app store due to violations of the Google Play Developer policy, despite accumulating a total of 2.5 million downloads. These apps were discovered to be displaying ads even when the device’s screen was inactive. In November, Sundar Pichai, Google’s Chief Executive Officer, emphasized the company’s commitment to finding a balance. He stated, “We value choice, hence on Android, we allow users to sideload and install additional applications.” Pichai cautioned users by likening the situation to a seatbelt in a car, emphasizing the importance of adding protections for safe usage, while acknowledging that risks still exist.

Hidden interest rates

A significant worry linked with numerous loan apps is the absence of clarity regarding fees and interest rates. Experts caution that loan apps pose risks, potentially ensnaring borrowers in a cycle of debt, particularly when multiple loans are taken out and repayment becomes challenging.

Privacy and data security risks

The National Information and Technology Development Agency levied a fine of N10 million on Soko Lending Company, a Nigerian online lending platform, on August 17 for breaching privacy regulations. The penalty was imposed in response to numerous complaints filed against the company, which included allegations of unauthorized disclosures, failure to protect customers’ personal data, and defamation. Nearly a year earlier, Google announced that loan apps would be barred from accessing users’ photos and contacts, effective May 31, 2023, as part of efforts to tackle mounting privacy apprehensions associated with such apps.

Additionally, experts recommend uninstalling unnecessary bloatware and redundant applications from your phone to optimize storage space and improve device performance. It is imperative to remain vigilant and implement necessary precautions to protect both your personal information and financial security while utilizing Android devices.

Important suggestions consist of reviewing feedback, confirming the authenticity of an application, and comprehensively grasping its terms and conditions.

Users risk compromising their privacy and exposing themselves to potential identity theft unknowingly.

It’s crucial to examine the permissions requested by these apps and assess whether they are warranted for the services offered.

Summarily, taking these measures is crucial to safeguard oneself from the potential dangers linked with dishonest loan apps. By staying knowledgeable and watchful, users can make informed choices and avoid possible hazards.

Ministry Reveals Chosen Learning Community Managers for The 3MTT Initiative



By: Japheth Oladele
After unveiling the N1 billion partnership with IHS Nigeria to back the 3MTT Learning Community, the Federal Ministry of Communications, Innovation & Digital Economy has declared the 3MTT Community Managers for each of Nigeria’s 36 states and the Federal Capital Territory (FCT).
The 3 Million Technical Talent (3MTT) programme, a critical part of the Renewed Hope agenda, is aimed at building Nigeria’s technical talent backbone to power our digital economy and position Nigeria as a net talent exporter. The first phase of the programme, executed in collaboration with NITDA, will involve multiple stakeholders including fellows, training providers, partners and placement organisations.

For the first phase, the following technical skills are the main focus: Software Development, UI/UX Design, Data Analysis & Visualisation, Quality Assurance, Product Management, Data Science, Animation, AI / Machine Learning, Cybersecurity, Game Development, Cloud Computing and ev Ops.
The ministry stated that the selection of Learning Community Managers signifies a significant milestone in their endeavors to empower Nigeria’s tech talents. They emphasized that these individuals would have a crucial role in managing and aiding participants in the 3MTT program, utilizing the Learning Platform devised by IHS Nigeria. They added that with the guidance of these managers, 3MTT participants would receive the necessary support to navigate the learning platform and enhance their learning experience.


Dr. ‘Bosun Tijani, the Minister of Communications, Innovations & Digital Economy, conveyed his excitement regarding the collaborative effort, emphasizing that substantial collaboration between the public and private sectors is essential for the national digital transformation journey. He mentioned that this partnership with IHS Nigeria marks the first of several collaborations aimed at achieving the goal of making Nigeria a net exporter of tech talent, as outlined in the Strategic Blueprint.
As a component of its support, IHS Nigeria has pledged to cover the salaries of the 37 dedicated learning community managers across the nation. Furthermore, access to the IHS Learning Platform will be instrumental in bolstering the efforts for talent development within the 3MTT program.


The CEO of IHS Nigeria, Mohamad Darwish, asserted that the company’s partnership with the Federal Government concerning the 3MTT initiative is in line with the President’s Renewed Hope Agenda and the Strategic Plan of the Minister of Communications, Innovation & Digital Economy. Additionally, he highlighted that the initiative corresponds with one of their sustainability pillars, namely Education.
He further expressed that investing in digital skills contributes to nurturing a proficient talent pool, fostering job creation, innovations, business expansion, and economic diversification.

This underscores IHS’s ongoing dedication to nation-building, evident alongside their recent achievement of deploying over 10,000 kilometers of fiber optic cables across Nigeria’s 36 states and the Federal Capital Territory. This initiative aims to enhance broadband quality and accessibility, facilitating next-generation digital services for individuals, businesses, and organizations nationwide.
He expressed anticipation for witnessing the impact and contributions of the 3MTT Community Managers in empowering Nigeria’s tech talents as they continue to build momentum.

Ways for Smartphone Users to Efficiently Manage and Decrease their Data Consumption




By; Japheth Oladele
The challenge of data depletion among telecommunications subscribers is attributed to a combination of technical and non-technical factors, as noted by experts. A recent report from cable.co.uk placed Nigeria at 31st among countries with the cheapest data, boasting an average price of $0.39 per 1GB. However, substantial discrepancies exist within the country, with 1GB costs ranging from $0.13 to a high of $1.64. According to the 2023 Digital Quality of Life Index, Nigerians work 35 hours, 25 minutes a month to afford fixed broadband Internet.


Automatic updates of apps and automatic uploads of videos and pictures to the cloud on smartphones contribute significantly to data depletion. The surge in internet usage in Nigeria is credited to various factors, such as the widespread availability of cost-effective internet access devices, improved network infrastructure, and the continual growth of the digital economy.


Other technical factors include the increase in internet speed due to migration to 4G, adding that migration automatically plays videos in high-quality formats, thus consuming more data. Experts recommended a multi-faceted approach, including manual control of automatic updates and uploads, adjusting video quality settings, and identifying and managing data-hungry apps.
Reuben Muoka, the Director of Public Affairs at the Nigerian Communications Commission, advised individuals to monitor their data usage, noting that the fundamental quantity of 1GB remains unchanged.

Muoka highlighted that perceived differences may arise from increased network speed or unwitting engagement in data-intensive activities like app downloads, uploads, or extensive voice and video calls on platforms such as WhatsApp. Additionally, he mentioned that Nigeria ranks 11th globally in terms of internet penetration, as reported by the NCC.


Enable data-saver mode
Users activate data-saver mode and utilize data-saving browsers and applications to manage and reduce data consumption. The use of data compression applications like Opera Max or Chrome Data Saver minimizes data usage, thereby establishing data limits in phone settings and receiving alerts as thresholds approach.

In addition, users can disable automatic app updates, as some applications consume excessive data in the background. Users monitor data usage statistics regularly to identify and address data-intensive apps. For those using Google Maps, it is recommended that downloading offline maps for navigation will minimize reliance on mobile data while using only GPS.


Digital literacy
Users are encouraged to explore budget-friendly data plans, underscoring the importance of digital literacy in enabling subscribers to make informed decisions regarding their data consumption. Leveraging offline modes and download features in apps to store content for future use. Particularly, the advantages of this approach for music and video streaming services and the need to download content over Wi-Fi enables users to enjoy their favorite media without relying on mobile data each time. Implementing these strategies, individuals can effectively reduce their mobile data usage and potentially lower their monthly expenses.


Turn off non-essential apps
Cellular data for non-essential apps can typically be disabled thereby opting for Wi-Fi when at school. Subscribing to midnight plans, for instance obtaining 500MB for just N50 on MTN Pulse,is also a routine that can be followed almost daily or occasionally. Similar offerings are available not only from MTN but also from Glo and, presumably, Airtel. These strategies can also be employed. In the broader context, stakeholders in the sector consistently stress the vital role of the Nigerian Communications Commission (NCC) in regulating telecom companies. This regulation is seen as essential for maintaining a fair and competitive market, protecting consumers’ interests, and fostering the overall development of telecommunications services in Nigeria.


Battery save mode
For Android users, you don’t have to be as extreme, but aim to strike a balance between data usage and ease of use. It is recommended that battery save mode is activated whenever possible to prevent background data loading.
Furthermore, users are advised to visit app settings and disable notifications for apps like Discord, Slack, Facebook, Instagram, etc., as these apps are known to consume a significant amount of data in the background.

Meta Introduces Strict Rules for Messaging Teens on Facebook and Instagram




By; Japheth Oladele


Meta has introduced additional features aimed at limiting how teenagers receive messages on Facebook and Instagram. These measures build upon the existing policy that prevents individuals over 19 from messaging teens who aren’t following them.
Implemented yesterday, Meta’s policy now disables teens’ capacity to receive direct messages on Instagram from individuals they don’t follow or aren’t connected to by default.
Furthermore, Meta enhances parental controls, enabling guardians to approve or reject alterations to default privacy settings made by teens. Previously, guardians received notifications when teens adjusted these settings but had no authority to intervene.


In the announcement of new features aimed at safeguarding teens on its social media platforms, Meta stated that in order to safeguard teens from unwanted contact on Instagram, they have restricted adults aged 19 and above from messaging non-following teens and limited the type and quantity of direct messages (DMs) to one text-only message.


As at yesterday, they’re taking an extra measure to protect teens by default, turning off their ability to receive DMs from those they don’t follow or aren’t connected to on Instagram, including other teens. With the new default setting, teens can solely receive messages or be added to group chats by individuals they already follow or are connected to.


This provides teens and their parents with increased confidence that unfamiliar contacts won’t reach out to them in their DMs. All teens under 16 (or under 18 in specific countries) will have this default setting applied. Existing Instagram users in this age group will receive a notification at the top of their Feed, informing them of the adjustments to their message settings.


Owned by Mark Zuckerberg, Meta has announced changes to default settings for teens on Messenger. Individuals under 16 (or under 18 in specific countries) will now exclusively receive messages on Messenger from Facebook friends or contacts connected through phone contacts, for instance.
Meta initially introduced parental supervision on Instagram in March 2022, and since then, it has consistently introduced new features to enhance parental involvement in their teens’ online activities.


These features encompass setting time limits, scheduling breaks, monitoring when teens block or report someone, and receiving notifications when teens modify their settings. The company is now introducing additional features in this regard.

“Africa needs AI to address teachers, doctors shortages” – Bill Gates says




By: Japheth Oladele


Microsoft’s founder, Bill Gates, has made a claim that African countries will need to leverage Artificial Intelligence (AI) to address the current shortage of teachers and doctors on the continent.
Gates stated this on Tuesday while speaking at the sideline of the World Economic Forum in Davos, where AI is topping discussions. Gates said he is already funding pilot studies in Africa to bring to reality AI tutors and AI doctors.
While noting that developing countries are lagging in the utilization of technology, Gates said he is committed to making sure that the usual 20-year gap between the rich and the poor countries in adopting technology does not play out with AI.


“The world will be richer with AI”
In his words, Gates announced that the world will become richer with AI, adding that the technology would raise AI productivity across sectors all over the world. According to him, the main driver of AI growth will be the rivalry between Microsoft and Google.


Microsoft is focusing on accelerating AI development in developing countries to address the shortage of teachers and doctors in Africa. The company plans to create new tools like ultrasounds and provide health advice in local African languages. Microsoft has already funded pilot studies in Africa to ensure the technology is available in the same way as in the rich world. The race for success is a race for good.


The other side of AI
Certainly the other side of AI is multifaceted and while there have been concerns that several jobs may be lost to AI potentially leading to unemployment and economic disparities, Gates is more worried that the productivity value of the technology can also be used negatively. According to him, AI as a brilliant tool for people to be more productive “means the bad guys will be more productive so they can do more cyber attacks so they can design weapons.”


In addition to what he stated, AI systems face privacy and data security issues due to their vast personal data collection and storage. Algorithmic biases can perpetuate discriminatory outcomes, impacting areas like hiring and criminal justice. Misuse of AI technologies, such as surveillance, raises ethical concerns. Addressing these challenges requires a comprehensive approach involving ethical considerations, transparent practices, robust regulations, and ongoing dialogue.

Samsung Set to Unveil AI-powered Phones on January 17


By: Japheth Oladele 

Key points 

•Samsung will display the features of its new AI-powered phones at its unpacked event on Jan. 17.

•The company is likely set to unveil the Galaxy S24, Galaxy S24+ and Galaxy S24 Ultra.

•Recent announcements from Qualcomm and Google may provide some insight into what to expect from Samsung’s latest phones.

Samsung recently revealed that it will host a news conference in San Jose, California, on Jan. 17 where it will unveil its newest Galaxy phones.

Samsung is Apple’s largest smartphone rival. The company has a 20% share of the global smartphone market, compared with Apple’s 16% share, according to Counterpoint Research. Meanwhile, Samsung has a 25% share of the U.S. phone market, behind Apple’s 53% share. New features that aren’t available on the iPhone could help it attract more users.

On Tuesday evening, Samsung said that its most recent devices will offer an “all-new mobile experience powered by AI.” While it’s unclear what that means, recent announcements from chipmakers like Qualcomm and competitors like Google may provide some context.

Qualcomm is a multinational corporation known for designing and manufacturing semiconductors and wireless telecommunications products. Samsung traditionally uses Qualcomm chips in its U.S. smartphones. The latest devices, likely named the Galaxy S24, Galaxy S24+ and Galaxy S24 Ultra, may take advantage of Qualcomm’s Snapdragon Series 8 Gen 3 for Android phones. Samsung is usually among the first phone makers to use Qualcomm’s latest chips.

In October 2023, Qualcomm said that its new Snapdragon chips will allow phones to run generative artificial intelligence applications directly on the phone. It allows for smaller versions of applications like ChatGPT to run without an internet connection. On-device versions of AI chatbots could keep conversations more private since queries wouldn’t need to be sent to the cloud.

Qualcomm also demonstrated how its chips could be used to generate images based on a string of words. So, for example, you might type “create an image that shows a man driving a car” and it’ll generate a picture. That’s similar to what Google’s Tensor G3 chip in the Pixel 8 Pro allows. That phone can create custom phone wallpapers based on a set of words a user selects.

The Pixel 8 Pro also supports Google’s Gemini Nano AI model, which can create replies to text messages, transcribe recorded conversations and more. AI is also often used to improve videos and photos.

Tips for Eco-Friendly Driving: Reduce Your Carbon Footprint


By: Japheth Oladele ~ SoG

You might be wondering, “learning how to drive a car, with all this sheges in UI? I will learn how to drive a car when I graduate”(smiles). I tell you having an idea about driving is not bad anyways. While preparing this, I reminisced on those days when I learnt how to ride a motorcycle (my dad taught me actually). I may not have had the opportunity again.

You see learning how to drive a car/driving a car is a significant step towards independence and convenience especially when your dad or mom owns a car or whether you’re a new driver or someone looking to brush up on their skills, this guide will take you through the essential steps and tips for operating a vehicle safely and confidently. Sit back and enjoy!

Before hitting the road, there are some essential preparations (pre-driving preparations) to consider. The first is to have someone as a guide with you inside the car and ensure that you have a valid driver’s license for the type of vehicle you intend to drive. Inspect your car for any visible issues, including checking tire pressure, lights, brakes, and fluids. Adjust your seat, steering wheel, and side mirrors to ensure you have a comfortable and clear view of the road.

Having done this, we move on to starting the car. Put the key in the ignition and turn it to start the car. Some modern vehicles have keyless ignition systems, so follow the manufacturer’s instructions. Then, while the car is in “Park” or “Neutral,” press the brake pedal before shifting into gear.

The next step is split into two parts and that is  shifting gears for automatic and manual transmission. If you’re driving an automatic transmission vehicle, you won’t have to manually shift gears. Simply move the gear lever to “Drive” (D) and release the brake pedal. If you’re driving a manual transmission vehicle, Press the clutch pedal all the way to the floor then move the gear shift lever into first gear (1) and gradually release the clutch pedal while giving a little gas to engage the engine and transmission smoothly.

Furthermore, we move forward to acceleration and braking. To accelerate, press the gas pedal gently. To slow down or come to a stop, gradually apply the brake pedal. Avoid sudden, jerky movements.

Also, when turning and changing lanes, signal your intentions by using your turn signals. However, never forget to check your blind spots by glancing over your shoulder before changing lanes or turning. You can also turn the steering wheel gently to navigate turns and lane changes.

In addition, knowing what to do after parking is essential. After parking, engage the parking brake to prevent the car from rolling. Then shift to “Park” (P) for automatic transmission while you shift to neutral (N) and engage the parking brake for manual transmission.

Finally, it’s essential to practice defensive driving to stay safe on the road. Keep a safe following distance, obey traffic laws, and be aware of your surroundings at all times.

In summary, Learning how to drive a car is a valuable skill that offers freedom and convenience. Whether you’re just starting or refreshing your knowledge, following these steps and practicing your skills will help you become a confident and responsible driver. Remember to always prioritize safety and follow traffic rules to ensure a smooth and enjoyable driving experience.

Enjoy your ride!

Securing Your Social Media Accounts



By: Japheth Oladele ~ SoG
These days, hacking into someone else’s social media account is a common form of cybercrime. These social platforms, which include Facebook, Instagram, Twitter, and Snapchat, are like candy stores to cybercriminals. Users of social media sites report feeling at ease and safe enough to speak frankly and openly with one another. They also report being willing to spend time and money on social channels daily (and even hourly).


Anyone who gains access to your social media account can access your locality, family name, birthday, street address, city, and even your pet’s name. If you use the same password for multiple accounts, the hacker can access all of them, send spam in your name, post as you, etc.
Taking everything into account, you may find yourself extremely exposed and frustrated. Nonetheless, don’t lose hope! Protecting your privacy and warding off hackers is not tricky. Read on to discover a few ways to secure your accounts.


1. Use Two-Factor Authentication
One of the best methods to keep your social media profiles safe from intruders is to enable two-factor authentication. It verifies the account holder’s identity with a combination of the account holder’s password and a verification number delivered to the account holder through an app, email, or text message.
While this method of logging in is a little more involved than simply using a password, it significantly improves the security of your social media accounts and the information you share.


2. Be Selective With Third-party Applications
A social media post scheduler is an example of a third-party tool that needs access to your account to do its job. Always check the application’s legitimacy before granting access. Read the fine print before permitting any software. Always check the fine print before providing access; some apps need the bare minimum of rights, such as the ability to read and submit content. It’s a good idea to check the apps that have access to your social media accounts by logging into each one individually.


3. Watch Out For Phishing Scams
We’re used to being cautious about phishing emails, but there are still plenty of phishing attacks on social media. Identical guidelines must be followed. Don’t click on links sent to you via unsolicited IMs or emails. Keep your private information close at hand. Never give out your personal information, such as email, address, or phone number. Posts and websites labeled as “quizzes” may be ploys to glean information that can be utilized in an attack.


4. Share Less in the “About” section
The ubiquity of social media has led to an explosion of online disclosure of all kinds of private data. All this data indeed increases your digital footprint. Do not feel obligated to complete any field just because it is present. You might leave some sections of your social network profile blank or provide a general response. Instead of listing a specific employer, you might list the industry you work in. Hackers can easily circumvent security questions by using seemingly innocuous information, such as a person’s maiden name or place of origin.


5. Make Sure You Use Complex, One-of-a-Kind Passwords
Passwords are the first security line, so make sure each account uses a different, strong password. However, with so many accounts available, remembering dozens of secure and unique passwords might feel like a chore, leading us to resort to using and reusing weaker ones. That only one password can unlock several accounts is a dream for hackers. To avoid this, you should use a password manager to generate and store passwords on your behalf.


Importance of Passwords in Cybersecurity
Having a secure password is crucial. They help keep your private information safe, but if you’re guilty of password reuse, password rotation, or employing too simple passwords, you’re inviting hackers into your accounts. To secure the highest level of protection for your private data, you should be familiar with the characteristics of a strong password.


Employing the same password for many accounts or using a password considered “weak” leaves you open to cyber attacks. Social networking, banking, email, and other private information accounts might all be compromised if hackers could crack users’ passwords. Someone could steal your identity if they get their hands on this data. Therefore, it is crucial to develop a secure password.
In summary, a healthy dose of prudence is in order when interacting on social media. Users of social media may not always be who they claim to be. Before accepting a friend request, link, or follow, be sure you know the person making the request.


Your digital footprint, which includes anything you upload to the internet, like images and status updates, is something else to consider. Identity thieves and phishers can benefit from this data’s availability on the open web. Take caution!

Managing Digital Files on Your Smartphones


By: Japheth Oladele ~ SoG


Given the recent events in Nigeria involving the unauthorized leakage of nudes and photographic images, everyone must take careful measures when managing their digital files. Whether these files are intentionally shared online or exposed due to various circumstances, the reality is that they can have serious repercussions on individuals.


The past decade has seen a profound transformation in how we use smartphones. They have evolved into indispensable digital companions that store and manage critical aspects of our lives, from work-related documents and emails to cherished personal memories in the form of photos and messages.


There are several advantages to this approach, including the convenience of having all essential information readily available, ensuring data security and privacy, and eliminating the need to carry cumbersome stacks of paper documents.


Importantly, adeptly managing digital files on your smartphone could also serve as a linchpin for maintaining productivity. The lists are endless. With smartphones, it’s indeed easy to access files from anywhere and at any time, but it’s also important to manage digital files effectively to prevent data loss or unauthorized access. There are also recorded cases of blackmail or extortion attempts by malicious individuals who have unauthorized access to your digital files.


Sit back and enjoy even as we take you on a ride to discover some ways of managing our digital files;
File Management Apps
Streamline your digital life with file management apps like ‘Files by Google’ for Android or ‘Files’ for iOS. These apps offer features such as duplicate file detection and junk file cleaning. Arrange your documents into dedicated folders within the application. This organizational step will simplify the process of finding them when required and reduce the likelihood of confusion.


Discard Unnecessary Apps
Regularly review your app usage and remove redundant applications to eliminate cache and temporary files that accumulate over time, freeing up valuable storage space. To safeguard the data residing within our smartphones, embracing a robust backup strategy is pivotal. It not only shields against data loss but also ensures the continuity of our digital lives.


Delete unnecessary files by regularly reviewing and deleting files you no longer need to declutter and free up storage. Further, it is also important to note that smartphone users should avoid sideloading apps, and exclusively obtain applications from reputable sources like the Google Play Store or Apple App Store. This is because the precautionary approach minimizes the risk of inadvertently installing malicious software on your device.


In the same vein, the National Information Technology Development Agency periodically alerts smartphone owners to the increasing risks of data breaches through mobile applications downloaded on phones. The Agency advises that it has become more worrisome as research has revealed that large numbers of mobile health applications are found to encourage data theft, thereby infringing on your privacy. “Ensure apps available for download in Nigeria should have a privacy policy that is Nigeria Data Protection Regulation (NDPR)-compliant,” NITDA started.


Secure Data Backup
I still have photos from 2017 on my phone, despite changing phones multiple times. I can access any of my digital files from anywhere, it doesn’t matter the phone I am using. All I need is to know my email address and password. Nevertheless, I acknowledge the fragility of technology. It renders these compact devices susceptible to data loss, whether due to hardware failures, accidental deletions, or malware attacks – an emotionally draining experience.


Harness Cloud Storage
Cloud storage is the contemporary solution for safeguarding your data. Leading the pack are services like Google Drive, Apple iCloud, and Dropbox, offering seamless and automatic data synchronization to the cloud. Experts at Google explained in a blog post that cloud storage uses remote servers to save data, such as files, business data, videos, or images.


Users upload data to servers via an internet connection, where it is saved on a virtual machine on a physical server. To maintain availability and provide redundancy, cloud providers will often spread data to multiple virtual machines in data centers located across the world. Similarly, it is advisable to safeguard digital files by transferring them to cloud services like Google Drive or Dropbox, providing remote access, and relieving the burden on your local storage, all while ensuring data security.


Periodic Decluttering
It is advisable for a few minutes each week to declutter your smartphone by deleting unnecessary photos, old messages, and unused apps. This practice not only frees up storage but also enhances efficiency. Getting to understand the importance of clearing cached data, bolsters your device’s performance and responsiveness. Moreover, cloud backups are lauded for their convenience, ensuring data security and accessibility via remote servers. Automatic synchronization keeps your backup up-to-date effortlessly.

Local Backup
Further, I advocate for local backups, offering greater control over your data. Local backups prove invaluable when you need to maintain independence from the internet or when switching devices. Establish a routine for backing up your files to external hard drives or reliable cloud-based services.
Essentially, the significance of robust passwords for both smartphone access and document storage applications, emphasizing the need to avoid sharing these passwords to safeguard your data from unauthorized access.


Password
Passwords are essential when it comes to managing your digital files. For it to be easy, you can have a password manager that offers convenience and, more importantly, helps you create better passwords.
Last year, as discovered by Kaspersky, a global cyber-security and digital privacy company, the number of Trojan-PSW (Password Stealing Ware) detections in Nigeria surged by as much as 147 per cent in the first quarter of 2022 when compared with the same period of 2021.


Trojan-PSW, a malware that steals passwords along with other account information, enables attackers to gain access to the corporate network and steal sensitive information. However, you must ensure that you maintain robust passwords for accessing both your smartphone and the document storage application is crucial. You also need to refrain from sharing these passwords with anyone else to safeguard your information from unauthorized access and maintain its security,” he said.


In summary, effective smartphone data management necessitates regular app cleanups, secure backups, judicious utilization of cloud storage, device decluttering, and consideration of local backups or third-party apps when appropriate. By adhering to these practices, you can ensure your smartphone functions seamlessly while safeguarding your invaluable digital life.

Protecting Your Phones from the Charge of Theft


By: Japheth Oladele ~ SoG

Mobile phones are now a regular part of our lives. People rarely go a day without using their cell phones. However, public theft is getting worse and worse. It is becoming like a real job that people go to school for. People who do such horrible things take advantage of other people’s carelessness or ignorance to steal valuable items like cell phones.

Sometimes, it is not the stolen phone that hurts as much as the fact that someone took advantage of your intelligence. It is also vital information about what you might lose and how much it cost if it were an iPhone. It is time for everyone to get better.

With the number of mobile phones being stolen daily, it is essential to be on the lookout and find more ways to keep your phone safe.

Here are some ways to make sure your phone does not get stolen:

Observe your environment

Always find out about the level of danger in an area before venturing into it. If you get an inadequate response, you may have to leave your phone at home altogether. Do not let your guard down, even in familiar places.

Keep your phone well

Do not risk having your phone stolen if you use it outside. Do not use your phone out in the open if you are in a high-crime area. This holds true, especially if your phone is pricey and shiny. Put it somewhere safe, like a pocket or bag, and check on it frequently by dipping your hand in.

Get a friend to handle your phone if you can’t bring it up on stage when you give a speech or conduct a panel at a public event. Make sure they realize they can’t afford to be careless.

Remember your phone at the bank counter or leave it on a restaurant table while you place your order. That is just like giving away the phone! Put your phone in a safe pouch or hold it tightly.

Do not leave your phone out while you sleep. Put it in your bag and sleep thinking about it, or don’t.

Hold well, not pocket it

Keep your phone out of your front or front and back pockets when you are out in public. Take your phone out of your pocket and hold it while waiting in line. After a flurry of activity in the computer village, you look down to see your phone encased in glass.

Also, it is not a good idea to keep your phone in your pocket on a bus. Instead, take it out and hold it in your hand, or store it somewhere safe if you have a bag. A hostile grip on your phone would not deter would-be thieves.

Engage with your phone but carefully

Another helpful suggestion is to use your phone as a distraction on the bus or at a public event. Thieves who break into people’s phones often look for victims who are careless with their devices and leave them unattended, giving the thief a chance to make off with valuable information.

In addition, music during some people’s commute has saved them from committing theft in public. Such people never go anywhere without their phone and earbuds. There must be a problem if their music suddenly ceases. Stay alert while doing this.

Finally, hone your sixth sense. In fact, it is okay to be paranoid about your phone. Check your pockets often to see whether you still have your phone. Take note of the passengers’ nonverbal cues and consider alighting if you do not feel safe on the bus or cab. Do what you think is right. Be sensitive to even the tiniest touches from strangers, and keep an eye on their hands.

The Information age: New emerging technological trends II


By: Japheth Oladele (SoG)

Journeying through the emergence of technological trends from our last series,we presented in detail some of the latest technological trends in 2023 and their relevance. Some of which are; Artificial Intelligence (AI) and Machine learning (ML), Robotic Process Automation (RPA), Edge computing, Quantum computing and Virtual Reality (VR) and Augmented Reality (AR). The link to the first series which expatiates the list can be accessed here – https://assesapressorg.home.blog/2023/09/25/the-information-age-new-emerging-technological-trends-i/ –  the end of this article. 

In continuation of the first series, the technological trends are presented further. Read on!

6. Internet of Things (IoT)

It is one of the most promising emerging technologies of the decade. Multiple devices or ‘things’ today are wifi-enabled, which means they can be connected to the internet. The Internet of Things is a network of diverse connected devices. Devices within the network can communicate with each other, collect data and transfer it across the network without human intervention.

There are hundreds of real-life Internet of Things (IoT) applications – from tracking activity using smart devices that connect to your phone, to remotely monitoring home doors or switching applications on and off. Businesses also use IoT for many things like monitoring activity in remote locations from a central hub and predicting when a device will malfunction so that corrective measures can be taken before it’s too late.

It is predicted that by 2030, over 50 billion devices will be connected via the Internet of Things. Global spending on this latest technology will reach an estimated $1.1 trillion in the next two years. IoT is currently in its initial stages and will advance rapidly in the near future. It requires knowledge of AI and Machine Learning fundamentals, as well as information security and data analytics.

7. 5G Technology

5G technology has the potential to change the way we see the online world. 3G and 4G technology transformed how we interacted with mobile devices, enabling faster internet browsing, using data-driven services, and increasing bandwidth for live streaming.

5G aims to revolutionize our virtual interactions by integrating AR and VR technology and better cloud-based gaming experiences. It will also be used in factories and enterprises for monitoring and streamlining operations. 5G also has applications in road safety and rule implementation, smart grid control and smart retail experiences, in the form of live high-definition cameras.

8. Cybersecurity

Since the dawn of computers, cybersecurity has played a major role in ensuring safer user experiences. It is not a new trend, but given that technological advancement is rapid, cybersecurity measures need to be constantly upgraded and improved. Threats and hacking attempts are growing in number and intensity, which calls for improving security protocols and strengthening systems against malicious attacks.

Data is the most valuable asset today, and hackers are constantly trying to steal data or information. This is why cybersecurity will always be a trending technology and need to constantly evolve to stay ahead of hackers. Demand for cybersecurity professionals is growing three times faster than any other tech jobs today. More and more businesses realize its importance, resulting in businesses spending about $6 trillion on cybersecurity by 2022.

Cybersecurity job roles transition from the ethical hacker to security engineer to Chief Security Officer. The pay is significantly more than in other technology job roles due to its significance in ensuring a secure user experience.

9. Full Stack Development

This is one of the newest industry trends within the software domain to gain momentum. It continues to rise as IoT becomes a more mainstream technology with diverse applications. Full stack development covers the front and back-end development of applications and websites.

Organizations are working on developing more user-friendly and comprehensive apps for their target audience. For this, a full stack developer must have a deep understanding of server-side programming and web development. If you develop the skills needed to create a website, your services will always have a place in the industry. More and more businesses are moving to digital every day, increasing the demand for web developers and designers.

10. Digital Trust

The world is tangling and being accommodated with technology and mobile devices, leading to the development of high trust towards these modern technologies. The same trust is also leading the way to a number of innovations. With various data security measures being taken, people believe that technology can help us build a reliable, secure and safe digital world.

This also leads to companies inventing and innovating new things without having to worry about data security. Cyber security, ethical hacking, etc are a few specializations that can be used to enter this field. There is also an array of jobs available nationally and internationally. There are professional certifications and normal courses available for all courses which can lead to a high-paying job role.

Nigerian Develops AI Platform for Professionals


A Nigerian, Olatunbosun Amao, has developed an artificial intelligence (AI)-powered writing app, LexiGenius. The app is a user-friendly web tool that offers a range of features tailored to meet the needs of writers, students and professionals.

Amao, a scriptwriter, said AI and machine-based applications are fast gaining increased popularity and transforming every aspect of human lives and professions.

He said business professionals, who need to draft reports, emails, proposals, and other business-related documents can benefit from the app to ensure their communication is clear and professional.

The content generated by LexiGenius is based on its analysis of the input provided by the user, and it is designed to generate original content. While LexiGenius can help in the writing process, users should still exercise their judgment and use additional plagiarism detection tools when necessary to ensure the content is entirely original and free of plagiarism,” he added.

Amao listed some of the key features of the app including real-time grammar and style suggestions, creative assistance, efficiency, customisation, accessibility and continuous improvement.

“LexiGenius aims to become a versatile and indispensable tool for anyone looking to enhance their writing abilities and produce high-quality content efficiently. The platform supports multiple languages.” He added that the content generated by the app is based on its analysis of the input provided by the user, and so it is designed to generate original content.

While LexiGenius can help in the writing process, users should still exercise their own judgment and use additional plagiarism detection tools when necessary to ensure the content is entirely original and free of plagiarism.” LexiGenius, with its cutting-edge AI technology, is said to have the potential to benefit Nigeria’s tech-economy in various ways,” he stated.

He disclosed that the platform supports multiple languages including Arabic, Dutch, French, Chinese, Spanish, Italian, Romanian, and Turkish. Overall, it aims to provide a user-friendly experience by integrating AI technology seamlessly into the writing process.

It offers real-time assistance, adapts to individual needs, and prioritizes ease of use, ultimately helping subscribers improve their writing effortlessly.

The Information age: New Emerging Technological trends (I)


By: Japheth Oladele (SoG)

It is often said and has been proven over time that ‘The Journey of a thousand miles begins with a step”. The present age and invariably the future is becoming technologically inclined. New technology is emerging every day to make life simpler, more advanced and better for everyone. The rate at which technological advancement is taking place is almost exponential today. 

For students, it helps us to have access to varying information and also achieve proficiency and efficiency in academics and for business  organizations, new technology helps to reduce costs, enhance customer experiences and increase profits.

According to Statista, nearly 50 billion devices will have internet connectivity by 2030. With the COVID-19 pandemic boosting businesses’ digital transformation journey, this goal is closer than anticipated. The familiarity with the latest IT technologies hold the key to advancing your career and exploring new opportunities.

Keeping this in mind, a list of top new emerging technology trends that will witness prominent growth in the near future was curated and subsequently be updated. Read on! 

New Technology Trends 2023 :

1. Artificial Intelligence (AI) and Machine Learning (ML)

Artificial Intelligence, also known as AI, started gaining popularity a decade ago. It has still not slowed down and continues to be one of the leading emerging technologies in 2023. AI is constantly evolving, and newer applications for this emerging technology continue to spring upon the scene. Today’s most popular AI applications are image and speech recognition, navigation programs, voice assistants like Siri and Alexa, and much more.

Organizations are looking to use AI to analyze customer and business interactions to derive insights and identify triggers. It will help them predict the demand for services such as hospitals or tourism and aid in the improvement of resource allocation for various projects.

Machine Learning (ML) is a part of AI and uses supervised learning to learn new functions. It has seen a massive surge in demand for skilled professionals, making it an attractive trend to watch. According to Forrester, AI and Machine Learning will be responsible for 9% of all new jobs in the US by 2025.

2. Robotic Process Automation (RPA)

Robotic Process Automation (RPA) uses multiple software and applications to automate business processes such as data collection and analysis, customer service and other repetitive tasks managed previously through manual processes.

Like AI and Machine Learning, RPA is a rapidly advancing future technology that automates many jobs across different industries. McKinsey has analysed that fewer than 5% of jobs today can be entirely automated, but nearly 60% can be automated at least partially.

RPA offers several new career options and trajectories such as a programmer, project manager, business analyst or consultant. It also opens doors to high-paying jobs with a moderate learning curve in leading organisations. Choosing this emerging technology as a career move can profit you immensely.

3. Edge Computing

Today, millions of data points are collecting user information from various sources such as social media, websites, emails, and web searches. As the amount of data collected increases exponentially, other modern technologies like cloud computing fall short in several situations.

Till a decade back, Cloud Computing was one of the fastest-growing technologies. However, it has become fairly mainstream, with the market dominated by major players such as Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform.

As more organisations adopted Cloud Computing, they found several limitations in the technology. Edge Computing helps to bypass the latency that Cloud Computing causes and helps organisations to get data into a data centre for processing. It can exist ‘on edge’, in the sense that it is closer to where the data processing will ultimately take place. Edge Computing is used to process time-sensitive data in far-off locations with limited or no connectivity.

4. Quantum Computing

Quantum Computing is a type of computing that focuses on developing computer technology based on the principles of quantum theory. This theory explains the behaviour of energy and materials on atomic and subatomic levels. In other words, it performs calculations based on the probability of an object’s state before measurement instead of just 0’s and 1’s.

Quantum Computing can easily query, analyse and take action based on given data, regardless of the source. It played a major role in preventing COVID-19 and developing new vaccines. These computers are exponentially faster than normal computers. The revenue for the Quantum Computing market is projected to cross $2.5 billion by 2029.

You need experience with quantum mechanics, linear algebra, machine learning, and information theory to enter this field.

5. Virtual Reality (VR) and Augmented Reality (AR)

VR and AR have been popular for almost a decade now. Virtual Reality immerses the user into a new environment, while Augmented Reality enhances the user’s existing environment. While their applications so far have been majorly linked with gaming and filters on social media, simulation software such as Virtual Ship is also used to train the US Navy, Army and Coast Guard ship captains.

By 2024, AR and VR are expected to integrate into our everyday lives much more deeply than today. They have huge potential and possible applications in training, entertainment, education, marketing and therapy or post-injury rehabilitation. It is also widely used by advertisers and brands to create new immersive experiences for their customers.

Starting a career in VR or AR doesn’t require too much specialisation. Basic programming skills and a forward-thinking mindset coupled with optics as a skill set can help you easily secure a job in this field.

Tech Trends Entrepreneurs, Students and Curious Minds Should Have Eyes On


By: Japheth Oladele (SoG)

In an academic environment such as this, classroom experience is undergoing a remarkable transformation, thanks to the dynamic world of technology. From AI-powered tutors that adapt to individual learning styles to blockchain diplomas that ensure the authenticity of academic credentials, the intersection of education and technology is redefining how we learn and certify our knowledge. 

In this  season, here are some exciting tech trends that are catching the attention of entrepreneurs, students, and curious minds alike.

1. AI-Powered Virtual Tutors: Personalized Learning

Imagine having a personal tutor available 24/7, ready to tailor lessons to your specific learning style and pace. AI-powered virtual tutors are making this a reality. These intelligent systems use algorithms to analyze a student’s strengths and weaknesses, adapt content accordingly, and provide real-time feedback. They don’t replace teachers but enhance the learning experience, offering individualized support that’s especially valuable in a world where remote and hybrid learning are becoming the norm.

2. Gamification of Learning: Turning Education into Play

Gamification is making a splash in education, making learning more engaging and interactive. Apps and platforms use game elements, such as points, badges, and leaderboards, to motivate students to complete tasks and master subjects. This approach not only makes learning fun but also fosters healthy competition and a sense of achievement, which can be especially beneficial for students of all ages.

3. Blockchain Diplomas: Verifiable Academic Credentials

The days of paper diplomas gathering dust on a shelf may be numbered. Blockchain technology is revolutionizing credential verification. With blockchain diplomas, academic achievements are securely stored in a tamper-proof digital ledger. Graduates can easily share their credentials with employers or educational institutions, who can instantly verify their authenticity. This innovation not only reduces the risk of credential fraud but also streamlines the hiring process for employers.

4. Virtual Reality (VR) and Augmented Reality (AR): Immersive Learning

VR and AR are taking education to new dimensions. Students can explore historical sites, dissect virtual organisms, or visit distant planets—all from their classroom. These immersive experiences are not only captivating but also help students grasp complex concepts more effectively. As technology becomes more accessible, the possibilities for interactive learning are endless.

5. EdTech Startups: Fostering Innovation

The education technology (EdTech) sector is booming, with startups driving innovation. From language learning apps to platforms that teach coding, these companies are reshaping how we acquire skills and knowledge. Entrepreneurs in the EdTech space are continually pushing the boundaries of what’s possible, making education more accessible and engaging for everyone.

Conclusion: Embracing the Future of Learning

Technology is an integral part of the modern classroom. These tech trends not only enhance the learning experience but also equip students with valuable skills for the future.

Whether you’re a student, an educator, or simply curious about the evolving landscape of education, these back-to-school trends are worth keeping an eye on. The fusion of technology and education is opening up new horizons for how we learn, grow, and thrive in the digital age.

The Digital dilemma II: Unveiling the dark Web’s Secrets


By: Japheth 

In the first article of the digital dilemma series, it was noted that technology undoubtedly has both positive and negative impact on mental wellbeing of people highlighting the paths to creating a balance. In the second series, we demystify a well-known but hideous subject “The dark web”. Sit back and enjoy!

The internet, a vast and interconnected web of information, is well-known for its ability to enlighten, educate, and entertain. Yet, beneath the surface, there exists a hidden realm, a digital underworld often referred to as the “Dark Web.” This obscure corner of the internet is shrouded in secrecy and intrigue, harboring both illicit activities and legitimate uses. In this feature, we delve into the enigmatic world of the Dark Web, exploring its origins, functions, and the complex ethical and legal issues it raises. 

The Unseen Layers of the Internet

The internet, as most people know it, comprises the “surface web.” This is the part that is indexed and easily accessible through standard search engines. However, beneath this surface lies the “Deep Web,” a vast expanse of unindexed and password-protected content, including databases, private forums, and academic resources. The Dark Web, a subset of the Deep Web, is intentionally concealed and can only be accessed through specialized software like Tor (The Onion Router). 

A Haven for Anonymity

One of the primary draws of the Dark Web is its emphasis on anonymity. Users can access websites without revealing their identity or location, making it a refuge for whistleblowers, activists, and individuals living under oppressive regimes. It’s also the haunt of cybercriminals and those involved in illegal activities, such as drug trafficking, weapon sales, and cyberattacks. 

Marketplaces of Contraband

Perhaps the most notorious aspect of the Dark Web is its online marketplaces. Sites like the Silk Road, which gained infamy before being shut down, facilitated the anonymous trade of illegal goods, primarily drugs. Despite the takedowns of such sites, new ones invariably emerge, showcasing the resilience of this hidden economy. 

The Ethical Quandary

Exploring the Dark Web raises ethical questions about privacy, freedom of expression, and law enforcement. Advocates argue that it is a necessary sanctuary for those living in oppressive regimes and a platform for whistleblowers to expose wrongdoing. Critics contend that it enables illegal activities, from drug dealing to the sale of stolen data, and poses a significant challenge to law enforcement agencies worldwide. 

Legal and Law Enforcement Challenges

Enforcing laws on the Dark Web presents unique challenges. The international nature of this hidden realm, combined with encryption and anonymity, makes it difficult for authorities to track and apprehend cybercriminals. The constant cat-and-mouse game between law enforcement and Dark Web users continues to evolve. 

The Future of the Dark Web

As technology advances, the Dark Web’s landscape also shifts. Emerging cryptocurrencies like Bitcoin have become the preferred medium of exchange on these platforms, further complicating

investigations. Additionally, efforts to monitor and regulate the Dark Web persist, with varying degrees of success. 

Conclusively, the Dark Web remains a murky and multifaceted corner of the internet, embodying both the noble pursuit of privacy and the nefarious world of cybercrime. Its impact on society, ethics, and law enforcement continues to evolve, making it a subject of enduring fascination and concern in the digital age. Understanding the intricacies of the Dark Web is essential as we navigate the complex intersection of technology, privacy, and legality in our interconnected world.

The Digital Dilemma Surrounding Technology and Mental Health (1)


By: Japheth

In an era dominated by smartphones, social media, and instant connectivity, the relationship between technology and mental health has never been more complex. While technology has undeniably brought countless benefits to our lives, it has also introduced new challenges and potential risks to our psychological well-being. 

This feature explores the multifaceted impact of technology on mental health, shedding light on both the positive and negative aspects of this digital revolution. 

The Positives

The digital age has democratized access to information about mental health. Online resources, educational websites, and mental health apps provide individuals with valuable information, self-help tools, and immediate access to crisis hotlines. This increased access to support can be a lifeline for those seeking help for mental health challenges. 

The COVID-19 pandemic accelerated the adoption of teletherapy and remote mental health support services. Technology has made it possible for individuals to receive therapy from the comfort of their homes, reducing geographical barriers and stigma associated with traditional in-person sessions. This has been particularly beneficial for people in rural areas or those with mobility constraints.

Online communities and social media platforms have given individuals the opportunity to connect with others facing similar mental health struggles. These digital support networks offer a sense of belonging and understanding that can be difficult to find offline. They provide a safe space for sharing experiences, offering and receiving advice, and combating feelings of isolation.

The Negatives

While social media has connected us in unprecedented ways, it has also been linked to increased feelings of anxiety, depression, and loneliness. The curated and idealized versions of people’s lives often portrayed on these platforms can lead to unrealistic comparisons and a sense of inadequacy. The constant exposure to news and negative content can also contribute to heightened stress levels. 

Healthy Tech Use

The key to harnessing the benefits of technology while mitigating its negative effects lies in finding a balance. Being aware of your digital consumption is the first step. Set boundaries for screen time and limit exposure to stressful or negative content. Use apps and settings that track and manage your screen time. 

Periodically disconnect from digital devices to recharge. Engage in offline activities, such as reading, hiking, or spending time with loved ones. This break can help reduce stress and improve overall mental well-being. Review your social media feeds and unfollow accounts that trigger negative emotions or unrealistic comparisons. Follow accounts that promote positivity, mental health awareness, and self-acceptance.

If you find that technology is significantly affecting your mental health, don’t hesitate to seek professional help. Therapists and counselors can provide guidance and coping strategies tailored to your specific needs.

Captivating Illusions: Decoding AI-Generated Images and their Reflection on Reality


By Ayinke

In a world where technology and creativity intertwine in mesmerising ways, the emergence of AI-generated images has sparked a captivating discourse. These images, often poised at the intersection of reality and illusion, have given rise to conversations about the boundaries of authenticity, the ethereal allure of the digital realm, and the packaging of existence itself. As we delve into the realm of AI-generated images we uncover a dynamic interplay between technology, art, and human perception.

At first glance, AI-generated images possess an uncanny ability to mirror the textures, colours, and forms that populate our world. The intricate details and life-like qualities they exhibit can lead to a curious dance between wonder and scepticism. As algorithms meticulously sift through vast repositories of visual data, they piece together fragments of reality, crafting images that appear to be captured through the lens of a camera. Yet, these images emerge from lines of code, revealing the mastery of machinery in replicating the aesthetics of the natural world.

The realm of AI-generated images is a playground for creativity, enabling artists and designers to push the boundaries of imagination. It offers a canvas where the constraints of physics and the limitations of the physical world can be defied, allowing concepts to flourish that might otherwise remain dormant. As algorithms learn and adapt to the subtleties of human expression, they become a collaborator in the creative process, adding a new dimension to the age-old partnership between man and machine.

However, the excitement of this creative union doesn’t come without its share of contemplation. The convergence of AI and image generation introduce a potent blend of ethical and societal questions. The art of packaging takes on new significance as AI-generated images infiltrate our digital spaces, appearing in advertisements, social media profiles, and beyond. 

These images encapsulate not just products, but entire narratives, ideals, and lifestyles. The presentation of an immaculate facade prompts introspection into the authenticity of our digital experiences and the extent to which we allow ourselves to be captivated by the seductive dance of pixels.

Yet, as these images weave their way into the fabric of our visual culture, they challenge the very essence of our perception. What is reality? After all, if not an interpretation of sensory inputs that our minds process, AI-generated images provoke us to contemplate the nature of our visual reality, pushing us to question the malleability of truth in a world where lines between genuine experiences and contrived representations are becoming increasingly fluid.

The intrigue surrounding AI-generated images extends far beyond aesthetics and artistry. It’s a glimpse into the future of storytelling, communication, and connection. As algorithms evolve, the potential to decipher deeper emotional cues and create resonant narratives becomes more pronounced. The concept of “fake life” that these images encapsulate becomes a reflection of the dichotomy between the tangible and the ephemeral, the human and the artificial.

In conclusion, AI-generated images stand as a testament to the evolving relationship between humanity and technology. They beckon us to explore the multifaceted nature of creativity and the nuances of reality in a digitised world. As we navigate the mesmerising landscapes crafted by AI, we must remain ever-vigilant, discerning the threads that connect the genuine with the illusory. 

The narrative of AI-generated images is still unfolding, inviting us to peer through the looking glass of our digital age and contemplate the true essence of what it means to perceive, create, and experience in an era defined by innovation.