…Costs and Data Protection Concerns INTRODUCTION For over 10 years now, organizations have been taking their IT services to the cloud. Specialized IT companies take care of software or hosting.…
Tag: articles
ArticlesHow USSD Code is Breaking Grounds in Ghana – Part 2
By Richard Kafui0INTRODUCTION The first part of this article was published last week in which I touched on the usefulness of USSD, its advantages, unique features and why it is currently one…
ArticlesHow USSD Code is Breaking Grounds in Ghana – Part 1
By Richard Kafui0INTRODUCTION USSD stands for Unstructured Supplementary Service Data. This is a technology unique to GSM (Global System for Mobile Communication). It is a capability built into the GSM standard phones…
ArticlesThe Privacy of Our Personal Data
By Richard Kafui0INTRODUCTION The issue of data protection is very critical in this era of mass data breaches, especially with the ubiquitous nature of technology advancement. How do credit bureaus, health facilities,…
ArticlesThe Use of Data Analysis to Predict Crime
By Richard Kafui0A working model for the Ghana Police Service Information and Communication Technology (ICT) can be applied in many fields including crime fighting and prediction. In Ghana, the Ghana Police Service…
ArticlesSecuring Our Payment Cards
By Richard Kafui0Payment Cards (Cards) are special cards issued by financial institutions (FIs) to customers to enable them access funds in either their bank or credit accounts, make payments by electronic fund…
ArticlesThe BIG DATA Revolution (New possibilities for Ghana and beyond) – Part 2
By Richard Kafui0Part 1 of this article discussed the overview of Big Data and its application to agriculture. In part 2 we looked at the application of Big Data in the areas…

