Land is a very thorny subject in Kenya. People have been displaced being rendered landless while others own province sized chunks of land. This whole […]
Month: March 2014
Can you insure against downtime?
In a January post in this link, I posed the question as to whether software developers were prosecution proof. This is of course in line […]
Phishing attacks in twitter
Recently, an organization I am so passionate about got hacked. In Order to protect their privacy its will keep the identity to myself for now. […]
when creating emails, use descriptive names
Some Telco is running an advert to popularize its email service. The advert features a young man who struggles to get clients since his email […]
Bookmark it, trust me you will need it.
Tell me one thing that happens whenever a member of the normal human species meets another and can qualify as an object of fascination(According to […]
You can and will be hacked
On Friday 28th February 2014, I had the pleasure of attending the first ever Africahackon conference at the PWC towers in Westlands, Nairobi. This event […]