Author: Richard Amanfu

1 2 3 8 20 / 148 POSTS
Cancerous Nature of Telecom Masts on the Environment – A Myth or Reality? – Part2

Cancerous Nature of Telecom Masts on the Environment – A Myth or Reality? – Part2

Adherence to the above basic principles and requirements will enable us enjoy a sound, safety and healthy environment, while telecom services remain i [...]
Cancerous Nature of Telecom Masts on the Environment – A Myth or Reality?

Cancerous Nature of Telecom Masts on the Environment – A Myth or Reality?

It is worth noting that the masts alone do not enable telecommunication services. The telecommunications infrastructure includes components such as ma [...]
Supporting opportunity-driven TECH Entrepreneurship in Ghana

Supporting opportunity-driven TECH Entrepreneurship in Ghana

The digitalisation of the other sectors of the Ghanaian economy is imminent, and the country must prepare for it. We can only do this locally if we pr [...]
CODING IN SCHOOLS AND COMMUNITIES: IIPGH Launched more Centers in Accra and Takoradi

CODING IN SCHOOLS AND COMMUNITIES: IIPGH Launched more Centers in Accra and Takoradi

In today’s technological world, one of the key skills which is in high demand across the globe is Computer programming or what is now being popularly [...]
Adopting Smart Services, A Case Study of Dubai’s Smart Police Stations (SPS)

Adopting Smart Services, A Case Study of Dubai’s Smart Police Stations (SPS)

Even if we (Ghana) would not implement a smart police station, we should look at developing a home-grown concept or system which can be used by the ma [...]
Founding a technology-based venture in Ghana – An application of Effectuation Logic

Founding a technology-based venture in Ghana – An application of Effectuation Logic

It is quite encouraging to observe the developments taking place in the technology sector in Ghana. Entrepreneurs are obtaining some forms of supports [...]
Winning the Competition with Data Science and Machine Learning

Winning the Competition with Data Science and Machine Learning

Introduction Patterns are inherent in everything we can see, feel, touch and taste. The reverse is also true for the things that are incorporeal t [...]
Telecom Towers:  The health and safety implications

Telecom Towers: The health and safety implications

Introduction Telecommunication has become a major drive for socio-economic growth, globally. The utilization of the opportunities that come with i [...]
Cyber Security in Ghana: Talk or Action?

Cyber Security in Ghana: Talk or Action?

According to the Cybercrime Unit of the Criminal Investigation Department of the Ghana Police Service, Ghana lost over USD 105 million to cybercrime a [...]
African Continental Free Trade Area (Afcfta) – An Exposition of the Proposed Digital Payment System

African Continental Free Trade Area (Afcfta) – An Exposition of the Proposed Digital Payment System

Africa and Ghanaians were thrilled with the news of the operationalization of the African Continental Free Trade Area (AfCFTA) agreement on the 7th o [...]
Digital Skills: An Important Requirement for Employment

Digital Skills: An Important Requirement for Employment

The fourth industrial revolution is here with us and we must all be prepared to embrace it. One of its key requirements is digital skills that opens [...]
Social Networking, In the Eye of the Hacker, Attacker and the Cyber Criminal (4)

Social Networking, In the Eye of the Hacker, Attacker and the Cyber Criminal (4)

Sharing Online Content It is great to share a link to a website and grab your friend’s & contact’s attention. But you never know that hackers [...]
Social Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal (3)

Social Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal (3)

In this third part of the series on Social Media security and privacy, I would like to further expose the reader to other unsuspecting pieces of info [...]
Social Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal – Part 2

Social Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal – Part 2

In the part two of this article, we take a look at the ways in which different types of information provided on social media sites are exploited by a [...]
Vodafone & IIPGH Organized ICT Career Coaching Workshop for OLA Girls SHS, Ho

Vodafone & IIPGH Organized ICT Career Coaching Workshop for OLA Girls SHS, Ho

There's a shortage of young people and in particular girls studying Science Technology Engineering and mathematics (STEM). Despite the growing demand [...]
Social Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal

Social Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal

Social networking sites are online platforms that allow people to connect with each other and build interpersonal relations. It has become a vital pa [...]
Capacity Building in Changing ICT Environment

Capacity Building in Changing ICT Environment

Capacity building and skills development are integral to harnessing the transformative potential of the ongoing development and increasing sophistica [...]
Coding; the skill of the future

Coding; the skill of the future

CODING; Enables critical thinkingBuilds Persistence and perseveranceHelps acquire problem solving skills [...]
IIPGH Coding for Kids and family

IIPGH Coding for Kids and family

Learning coding empowers you to do many things you wouldn’t otherwise be able to do. These things include hand-crafting your own websites, becoming a [...]
IT Business Continuity

IT Business Continuity

Introduction Business Continuity (BC) is the capability of an organization to continue the delivery of products/services at acceptable predefined [...]
1 2 3 8 20 / 148 POSTS