cio east africa

50

Upload: cio-east-africa

Post on 13-Mar-2016

233 views

Category:

Documents


7 download

DESCRIPTION

June 2011 issue

TRANSCRIPT

Applications open

Symposium & Expo: 23-24 November, 2011

The 2nd Annual CIO 100 Awards will celebrate 100 organizations

(and the people within them) that are using information

technology in innovative ways to deliver business value,

whether by creating competitive advantage, optimizing business

processes, enabling growth or improving relationships with

customers.

Perhaps you took a risk on an emerging technology or deployed

the tried-and-true in a new way. Maybe you built a better

business process or fostered closer collaboration. Or maybe

you found ways to get more from existing customers, to pursue

new markets, to save money or to make more. Here’s your

chance to tell your peers about the technology innovations

that have enabled or led the way to greater success for your

organization.

Business Value

All applications are online.

Visit: www.cio.co.ke/cio100

Innovation for

* Deadline for application 26th August 2011

Apply and stand a chance to win an

Ipad 2!

For more information; contact [email protected]

Office: +254 020 4041646/7 | Cell: +254 717 535 307

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

CONTENTSE A S T A F R I C A

EDITORIAL DIRECTOR Harry Hare

CHIEF EDITOR Louisa Kadzo

TECHNICAL STAFF WRITERS Dennis Mbuvi

Peter Nalika

EDITORIAL CONTRIBUTORS Rebecca Wanjiku

Michael Malakata

Michael Odinga

COLUMNISTS Bobby Yawe

Sam Mwangi

James Wire Lunghabo

Ruth Kang’ong’oi

HEAD OF SALES & MARKETING Andrew Karanja

BUSINESS DEVELOPMENT MANAGER Nicholle Myles

ACCOUNT MANAGER Ivy Njerenga

Samuel Jumba

LAYOUT & DESIGN Navtej Dhadialla

DisclaimerALL RIGHTS RESERVED

The content of CIO East Africa is protected by copyright law, full details of which

are available from the publisher. While great care has been taken in the receipt

and handling of material, production and accuracy of content in this magazine, the

publisher will not accept any responsility for any errors, loss or ommisions which may

occur.

ContactseDevelopment House : : 604 Limuru Road Old Muthaiga

: : P O Box 49475 00100 Nairobi : : Kenya

+254 20 374 16 46/7

Email: [email protected]

©CIO East Africa 2011

Printed By:

Published By:

Navtej Dhadial

Green friendly

FROM US

CONTENTSCover Story

4Editors Viewpoint From the Publisher

6

3

Last Word

4844

4

Research focusing on the threats posed by the growing use of

personal devices on corporate networks exposed a disconnect

between what workers are doing and what IT leaders believe is

happening – IT leaders have no accurate fi gures of how many

personal devices are operating in corporate networks, until there is

a breach or loss of information due to an unsupported network

device.

S TOP STORIESTOP STORIES

New Products

9

8

9

Business Tips

46

Feature

Technology

28

38

2838

TRENDSTrendlines

Internet costs to decrease

Private sector to manage ICT assets

Building an ICT literate society

Mobile Ad impressions grow by 16%

12

14

15

16

International Trends

Android data leaks discovered

Global increase in tech mergers

Steps to increase cybersecurity

18

19

20

Trend Analysis

Social networking affecting storage

mHealth to impact treatment

24

26

TECHNOLOGY

NEW PRODUCTS

Is RTFM dead?

Guard your company’s reputation

Technology access for the disabled

The Nokia E7: Redefi ning success

The Huawei S7 slim tablet

Document management

Why smartphone batteries suck

8 uses for an old smartphone

Security

Opinion

40

44

45

46

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

4

Edit

or’s

Vie

wpo

int

Louisa KadzoCHIEF EDITOR

[email protected]

Louisa Kadzo

The Kenya Minister of Finance is, for the fi rst time in Kenya’s history,

soliciting opinions for budgetary priorities from the Kenyan citizens. This is the fi rst for any Finance Ministry in the world to solicit opinions from the citizens before the national budget allocation process.

In his address to the citizens, the Minister of Finance says (I quote): “We are currently in the process

of formulating the National Budget for the fi nancial year 2011-2012. As we establish the fi scal priorities of the country, I feel that there is still room for a more inclusive process that will allow us to factor in your priorities to a greater extent than before. Indeed, Article 10 of the Constitution of Kenya recognizes inclusiveness as part of the National Values and Principles of governance. I would thus like to encourage you all to participate in this most crucial process by giving your suggestions, ideas and proposals on the interventions or actions you would like to see in your budget.”

The form is available on https://spreadsheets0.google.com/spreadsheet/viewform?pli=1&hl=en&hl=en&formkey=dE11UWYwX1lReEgwUG1DNGxvaWkwc2c6MQ#gid=0. The Minister is giving people the chance to select their budgetary priorities by sector, give their proposal suggestions for that sector, and give general comments concerning the upcoming budgets. I hope you were all able to participate.

The Ministry of Finance and Treasury continues to lead in the adoption of ICT in its operation, and support for the growth of the ICT industry. In 2010/11 the research, innovation and technology sector to which ICT development is housed under the medium term

expenditure framework (MTEF) sectors was allocated Ksh. 66.2 billion (up from Kshs. 45.5 billion in 2009/10), 2011/12 projections set at Ksh. 68.4 billion representing a 3.3% increase. This is expected to increase to Kshs. 72 billion by 2012/13. I am in the opinion that these projections should be increased given that ICT cuts across all sectors.

In 2009/10 budget proposed a 5% tax deduction on computer software, and further allowed internet service providers to offset against their taxable income the cost incurred in acquiring the right to use the fi bre optic cable over a period of twenty years.

Treasury has prioritized ICT oriented programmes in all other sectors. For example, the Judiciary can now afford to digitize all court records, implement a document management system, install a SMS solution, establish of LAN and WAN, install a TeleJustice system, install a case management system, implement a direct banking system, install digital display systems and support the integration of IFMIS. The Judiciary has now purchased 350 computers (from zero) and some judges have laptops.

The Ministry is funding the development of BPO centers, Digital Villages and an ICT Park. The Kenya Revenue Authority (KRA) is in the process of being automated to ensure there is effi ciency in their operations, there is an e-promise framework being established to keep check on the implementation of government projects and programmes, as well as an e-registry system in place to enable small business apply and pay for licenses online and through mobile payment platforms. I can go on and on about new ICT innovations that the government ministries are implementing (more information on page 30). What is clear is that ICT is playing an important role of streamlining effi ciency and effectiveness in the ministries, and in the management of public fi nancial resources.

Your take on the national budget

Voyager Pro UC...

Revolutionizing the mobile office… Unify PC and mobile phone communications. Smart call

routing will route the call to the headset if you are wearing it and to your mobile if not. Voice prompts

announce remaining talk time, connection status and battery level for superior call management.

Intelligent communications on the go… Simply place the next generation Voyager PRO UC

headset on your ear to automatically answer mobile or PC calls. With Smart Sensor technology, your

Skype™ or Microsoft® Lync™ presence is immediately updated to show your availability and

willingness to engage.

www.smoothtel.com | [email protected] | Call: 020-8000222

Communication on the go has never been smarter.

Be truly mobile with the intelligent, next generation Voyager PRO UC Bluetooth® headset system.

Connect to the future of work...

The age of the knowledge worker, in a new work topology

he headset is kingThWhy? Because talking, no matter how much we evolve, will always be our primary way to communicate and collaborate.

Plantronics products can significantly improve the way businesses communicate. Simply smarter communications is about

integrating information across devices and applications. We offer a range of solutions that are ideal for the demands of

large businesses, from wireless office systems to mobile solutions that unify PC and mobile communications and more.

The Plantronics Unified Communications portfolio offers a broad range of solutions for diverse working styles, with

high-quality audio and world class technical support.

Technology has developed rapidly to accommodate our evolution towards the increasing need to work on the move...

However, the existence of too many communication channels is becoming a burder to many.

The basic building blocks are smartphones, wireless laptops and software – - to make the bridge between various communication systems. And then there is the

secret ingredient – the ‘missing link’ – that makes it really work.

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

6

From

the

Pub

lish

er

Harry Hare EDITORIAL DIRECTOR

[email protected]

Global standards for data centres

Business pressures and infrastructure constraints coupled with demand for

enterprise data availability and security are pushing the establishment of new generation of data centers right here in the region. These were the issues discussed by experts and CIOs at the CIO Executive Breakfast in Nairobi last month.

It is evident that businesses are clamoring for accelerated growth

driven by technology acquisition, which is meant to enable innovation within the organization. Banks and other fi nancial institutions for instance have invested heavily in technology in the last fi ve years or so and they are now looking for a return on investment.

But there is a new thinking simmering driven by the “cloud” thinking. That, organizations need not invest so much on acquiring and owning infrastructure anymore with every technology vendors providing “everything as a service”. Both applications and storage requirements can be handled by managed datacenters by service providers. With this thinking businesses are now open and willing to moving their technology requirements to data centers and managed services operators. But they have their own demands for this to happen and at the center of this is “how available will my applications and data be; and how secure is your data center”.

Businesses are looking for datacenters that are modular to allow them the benefi t of growth when as it happens; secure to protect their information assets; automated to ensure effi ciency, reduced costs and outages and they must be operated based on global best practices. With these demands, technology vendors and datacenter owners and operators now have their work cut out.

Until recently, all business were asking was storage space in datacenters. This seems to have changed and continues to change as CIOs are put under pressure to deliver a on business demands and expectations and as the maturity of the sector increases.

So what are key things that CIOs need to check when acquiring that managed service or resting our server space in a datacenter?

Standards. There are standards for datacenter infrastructure. The Telecommunications Industry Association (TIA) came up with the TIA-942 Standard in 2005 which provides requirements and guidelines on setting up datacenters.The standard specifi es features and provides requirements, which then classify the various types of datacenters. For instance a Tier 1 data center is basically a server room, following basic guidelines for the installation of computer systems while a Tier 4 data center has all the bells and whistles and is designed to host mission critical computer systems, with fully redundant subsystems and compartmentalized security zones controlled by biometric access controls methods.

This standard has since seen several updates, fi rst was the TIA-942-1 in 2008 which provided specifi cations for coaxial cabling in datacenters and application distances and the latest revision is the TIA-42.1 which was done last year and specifi es revised requirements for temperature and humidity in data centers.

These revised requirements are meant to reduce energy consumption for heating, ventilation, and air conditioning; and provide more fl exibility in maintaining temperature and humidity in data centers. The TIA-42.1 also amends the cabling types recognised to include and recommend augmented category 6 (category 6A) and provides additional guidelines regarding the use of transmission equipment in data centers. With the increase maturity in the market, data center owners need to use set standards and global best practices while designing and building their data centers. This is the only way they can convince their customers that their data and applications are safe with them. And for the CIOs and other professionals using data centers services, revisiting existing standards and checking with your provider if they use global best practices might just save you that unprecedented downtime or worse still embarrassment after a security breach.

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

New

Pro

duct

s

8

The most recent addition to the Huawei family is the IDEOS S7 Slim, a 7-inch tablet running on Android 2.2. Hopes are high that the phone will be upgraded to Android 2.3, 2.4 or even 3.0 in the future.

The S7 Slim looks very similar to the smaller tablets of the world. Think Dell Streak and Samsung Galaxy Tab. As the name would suggest, the IDEOS S7 Slim is a sleek device, only 12mm thick and super light for a tablet at 400g. Compare this to the Optimus Pad that weighs around 600g.

Huawei’s tablet looks pretty good too, with that screen dominating the front and just three touch sensitivitie keys below in portrait mode. These are back, menu and home buttons. Unfortunately, the Slim S7 is so shiny, it

will expose all fi ngerprints so you’ll have to polish the front very often.

There’s also a front-facing camera for making videocalls. It’s 2-megeapixel which is perfect for video calling. There isn’t one on the back for taking photos though. Around the side of the IDEOS S7 Slim, there’s an HDMI port for hooking the Slim up to your TV.

The Huawei IDEOS S7 Slim packs in a powerful 2200mAh battery to give you a rather long life even if you’re a heavy user of the tablet.

Although Huawei has little presence in the consumer mobile device space under its own name, there’s always space for more manufacturers to come to the party.

Huawei IDEOS S7 slim tablet

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

9

The Nokia E7 is all-in-one business smartphone. It comes with Microsoft Exchange

ActiveSync support alongside 4-inch AMOLED touch screen display and a slide out four-row QWERTY keyboard. This offers a clear, wonderful display making the E7 a remarkably handy device to work with. Dubbed “the new-age communicator” the Nokia E7 is now available the Kenyan market. Nokia has partnered with Microsoft in providing industry leading productivity solutions for professionals: Mail for Exchange, Microsoft Communicator Mobile and support for intranet and extranet portals built on Microsoft Share Point Server offer professionals direct, secure and real-time access to corporate systems. The Nokia E7 also offers business grade security solutions for secure corporate connectivity.

With the Nokia E7, you are able to open and view PDF documents with the pre-loaded Adobe Reader as well as synchronise, back up and transfer important business documents and data with Ovi Suite. More importantly, with the Nokia E7 it is easy to draft and edit documents as well as use the Microsoft Communicator on the phone saving the user from the hassles of a bulky laptop. Just as a way of offering experience with a difference you are able to transfer your important fi les with the included Nokia USB adapter

In addition you are also able to send texts and emails to business contacts in an instant with Vlingo, a voice recognition app. This way you are able to stay in the loop with email on the go, Microsoft outlook and calendar sync.

The apps from Ovi Store in the E7 will offer information, entertainment tools and maps- equally exciting and relevant element for any business person on the move. The Rich app by Aly-Khan Satchu offers up-to-date market information and news as well as investment advice for stocks in East Africa. The Daily Nation App can also be downloaded on

The Nokia E7: redefi ning success

the Nokia E7 offering further media for news and information as it breaks.

For those travelling often and have to go through the inevitable trouble of fi nding new places, the Ovi Maps is offers unparalleled experience-and relief. In addition, the Nokia E7 comes with the AroundMe app which lets you know places of business interest in your vicinity. Hence, with the E7 you’re able to get to meetings on time with Ovi Maps– which offers free lifetime navigation and turn-by-turn voice instructions. This way you are able to make business travel simple – track fl ights and be notifi ed of changes with the app. Many more business apps are available to try and download from Ovi Store.

Nokia provides an Eco profi le for all Nokia devices. It contains information on the products environmental attributes, and also information on the environmental impact of the product. The Eco profi les can be found at www.nokia.com/ecoprofi le.

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

AROUND THE WORLD

AROUND AFRICA

IN BRIEFThe full articles are available on the CIO East Africa Web site (www.cio.co.ke)

Advice for Industry-Switching CIOs

Today’s CIO lasts an average of 4.1 years on the job, according

to management consultancy Janco Associates. One of the

myths in today’s job market is that CIOs can’t jump industries

and be successful. That depends on the CIO.

Great tips to job changing CIOs: Connect immediately, in

learning mode, with the senior business team; Get the right

people in the right jobs; Start contributing right away by

drawing on specifi c expertise from your past experience; and

prioritize and re-evaluate all ongoing projects.

A special e-book on healthcare IT’s challenges and

opportunities

It’s been about 20 years since experts said the healthcare

system could be improved with a dose of IT. So how are

we doing so far? Computerization is slowly improving

healthcare processes, but it’s a long way from living up to

expectations.

This e-book -- from the editors of Computerworld --

provides a report card on the progress to date and identifi es

where there’s room for improvement. In addition, this

special report covers FDA eff orts to regulate wireless

networks at clinics and hospitals; the deployment of

electronic health records; and how electronic alerts can

change physicians’ behavior.

o.co.ke)

10

Mobile Web Ghana rewards two local mobile apps developers

Advocates of scientifi c and technical research in developing countries have found champions in the innovation platforms

of nanotechnology, biotechnology, information and communication technology (ICT) and geographic information

system (GIS). Through these platforms technologies, Africa has the opportunity to promote it agenda concurrent with

advances and scientifi c research while expanding storage, collection and transmission of global knowledge.

Orange Tunisie to launch Africa’s fi rst apps store at

the end of May

By Russel Southwood

May 31 is a date to keep in mind because it is the day Orange

Tunisie will launch its apps store. It will be the fi rst apps

store to go live in an African country. At the end of February

2011, the mobile operator also opened a development

centre in Tunis with the aim of providing a space to hold

training sessions on how to build mobile apps but also to

off er access to the equipment needed by developers to

develop and test their apps. The centre has 11 MAC, 13PC,

a range of smartphones to test the apps on various mobile

operating system and 2G and 3G+ mobile internet access.

Developers can even book their seat online.

African telcos can claim carbon credits

Nedbank Capital has designed a service that allows

telecoms operators to claim carbon credits for their “green”

implementations. Nedbank Capital’s new carbon credits

scheme for telecoms operators is expected to help telecoms

operators to generate additional revenue via carbon credits.

The change for “greener” power solutions in the African

telecoms industry is slow but there are some encouraging

signs. Already, leading telecoms operators across the world

and with operations in Africa have already pledged that

they are committed to reduce their CO2 emissions.

For Sponsorship/ Booths/ Participation:

Who will be there?Will You be there?

CEO of Interbrand Sampson

More than 10,000 Visiters

More than 2,000 Business owners

200 hours of seminars, workshops& networking

400 Exhibition booths

More than 100 Digital marketingGurus & Top decision makers Direct & Digital Marketing Expert

World authority in Email marketing

Co-founder of SEMPOSenior Director of Web Marketingand Strategy at Cisco

Doug de Villiers Michael Leander

Dana ToddMichael Metz

LARGEST BUSINESS PLATFORM IN AFRICA

! Registration is open !

! Book Your place Now !

June 15 - 18 , 2011,

Nairobi,

thth

Contact: Kelly karimi RwigiAfri-Tech Group, LLC Marketing DirectorPhone: +254 702 445 474, +254 787 136 462, +254- 20-367 3414 / 202-4499682Email: [email protected]: www.afri-tech.com

Partners

Internet & Digital Marketing Conference

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

Tren

dlin

es

12

“10 years ago, Internet was very important, but today it’s just a commodity, what’s important is the extra value you get on top of your Internet connect ion,” says Moha m med A . She i k h , C h i e f Operations Offi cer at Swift Global.

Due to globalizations, Internet service providers (ISPs) fi nd that they have to provide value adds such as managed services and 24 hour support to their customers who are demanding better, more effi cient and cost effective technologies.

The coming of fi ber 2 years ago was expected to bring down the cost of Internet services. On one hand, the Ministry of information and communication, as well as consumers have been arguing that costs are yet to come down to the levels they expected. On the other hand, ISPs maintain that Internet service costs have drastically reduced.

“Internet costs cannot reduce to the levels we want in 2 years. In a period of 5 years they can be expected to go lower as volumes increase,” says Sheikh Mohammed. He maintains that the volume utilisation that providers are looking for is yet to be reached, with utilisation of sub marine capacity at about 10%. This is expected to grow to about 30 - 40% in the next 2 - 3 years.

ISPs have been b l a m e d f o r contributing to the high costs by laying of thei r own infrastructure rather than sharing. Carol Mur i ith i , ch ief product development and service delivery off icer at Swift Global absolves ISPs of blame. To Carol, ISPs set high costs to

recoup high investment costs on the fi ber cables and therefore end up charging each other high fees for leasing of the same. “In the long run, it therefore becomes cheaper to lay your own fi ber,” she says. Analysts have suggested that ISPs would be better placed if they formed an infrastructure consortium that would roll out fi ber and lease it to ISPs, resulting in lower CAPEX and OPEX. Carol says that this is complex due to the long timelines involved. In addition, this is hampered by lack of a resource sharing framework from the regulator in the ICT industry. “It’s the right time for the Communications Commission of Kenya to come up with a strategic plan for infrastructure sharing,” says Carol. This would guarantee investors a better return on investment on fi bre which has a lifespan of 15 - 20 years.

“Fiber laying also depends on other third party costs that are yet to come down,” warns Carol. County and municipal councils have been charging high fees for digging of trenches to lay fi bre coupled with annual way leave fees. She instead urges such institutions to embrace the fact that laying of fi bre adds economic value to their areas. It is hoped that increased awareness and efforts to streamline the charges from associated ministries will eventually bring down these costs, though Carol predicts that this will take time.

So far, the impact of the sub marine cables has been experienced through easier transactions and increased capacity. Sheikh lists the availability of Kenya Revenue Authority services online as one example. Demand for security services from both government and private sector has also increased as hackers have become frequent and sophisticated.

The impact is yet to be felt by most of the population who still access Internet through their phones. Swift Global plans to address high density areas that are yet to be covered by many ISPs through its network of Butterfl y wireless access points. The service which was acquired from Kenya Data Networks after its restructuring will be relaunched soon.

Internet costs to decreaseby Dennis Mbuvi

Mohammed A. Sheikh, Chief

Operations Offi cer, Swift Global

Carol Muriithi, chief product

development and service

delivery offi cer, Swift Global

Justus Ndana,

Chief Marketing Offi cer,

Swift Global

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

13

by Pamoja Media

Last year, budget allocations and ad spending on online marketing surpassed that of the traditional media in the US. This is the direction our region is taking;

but at a much faster rate than the West did. Just two years ago, over 60% of the things we can now do online would have been considered a myth. The push for online activities have drived the prices for modems and broadband connections drastically down.

Next came the main technological tools meant for Africa; mobile phones. The cost of smart phones and tablets has reduced. The rise in mobile browsers and locally developed applications for Internet-enabled phones provides the needed kick for this sector to grow. Android has a special mention in this sector. As a result, local developers have stepped in to this new avenue, creating local solutions to local problems in all sectors including agriculture, health, education etc. Locally developed apps and sites provide an invaluable portfolio for brands to showcase and grow markets – reaching a target audience within this region. The new order in marketing is that of brands following the masses. The power of numbers cannot be better displayed than through the growth of social networks. The Facebook phenomenon for example has shaped governments and institutions in Africa. Mention Egypt, Tunisia and even threatening Museveni’s rule in Uganda. This is the epitome of on l i ne communities reaching their maturity shifting from a “fun and hanging out” platform to a more decisive and impact oriented gatherings. The same decision making and discussions have extended from the politically oriented conversations to products, services and brands. Budgets for online PR and monitoring are slowly increasing as a result of executives opening up to the fact that these conversations are growing. This provides an avenue for brands to lead conversations and threaten their markets.

Traditional media has become congested and thus more expensive. Companies are now looking for cheaper, more effective options of reaching out to a highly segmented audience. The low entry barriers for marketing online coupled with intensive tracking and analytic tools have proved to be most resourceful for selling brands online. This is especially for SMEs and start-ups that have to muscle their way to the top using the most cost-effective means. The audience has also become more segmented through specifi c platforms and communities, mostly based on age, geographic location and interests.

The fi nal blow is the youth. In search of income while studying, college kids nowadays spend time online to fi nd research writing jobs thus end up creating mini-BPOs in their rooms. Upon graduation, these youths have gained an understanding of how the online scene works. This means they graduate into other money-making ventures by starting ecommerce sites or running community-based platforms. Both of these require highly developed skills in interacting with people online. It is this naturally acquired skill and experience that companies are now tapping into to execute online marketing campaigns and grow their brands.

The surge in online marketing

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

14

The Rwanda government has begun the process to fi nd a private manager for information and communication technology (ICT) assets worth

more than US$100 million, including a 2,300 kilometer fi ber-optic cable.

Other assets that are to be managed by the private sector include a national data center and the Kigali Wireless Broadband (WiBro) network in the Rwandan capital, Kigali. The WiBro network, which was deployed by Korea Telecom, offers data connectivity and VoIP services.

According to the Permanent Secretary in the Ministry of ICT (MINICT), David Kanamugire, the government has invested over $100 million in these assets.

Kanamugire confi rmed in an interview that the process of hiring the fi rm that will manage the facilities is under way. He however could not give a time frame for when the process will be completed.

“These are complex processes that require careful planning to ensure we get the best man for the job,” Kanamugire said.

He said transferring government assets to a private operator would ease access to these facilities by the general Rwandan public.

Currently, some telecom operators are using the government fi ber-optic cable to deliver Internet services. The private telcos have lease agreements in place with the government to use bandwidth. Kanamugire said the cost of leasing the cable is based on the cost of running it rather than on a profi t basis. He said the government invested in fi ber-optic cables to reach remote areas that private players still consider not viable.

At the time the government of Rwanda chose to invest in these projects, private players questioned the reasoning behind the move, saying the government was entering the telecom market to compete with them.

Kanamugire has assured the private players that the government “had no intention to compete with the private sector but it wants to promote universal access to ICT.”

MTN Rwanda Chief Operating Offi cer (COO) Andrew Rugege welcomed the move to put infrastructure in private hands but called for fairness in the process. Players like MTN Rwanda are expected to apply to government to run the facilities.

“We hope it will be done in a fair way not to give advantage to whoever will win the bid to manage them,” Rugege said.

Work on the 2,300 kilometer fi ber optic cable, which cost some $93 million, was completed in January. The work included fi ber installations on the Ugandan and Tanzanian borders where fi ber runs to the East African coast and links to submarine cables.

The installation of equipment in government institutions that are directly connected to the optic fi ber is ongoing and the entire network will be fully operational and commissioned by soon. The network cable is also expected to enhance the ICT industry by facilitating IT-based foreign investment in areas such as business process outsourcing.

The national data center, which will store all national data, was set up by a Swedish fi rm, Coromatic, at a cost of more than $5 million. The facility has the capacity to store and back-up data for neighboring countries that are interested.

Rwanda to hand ICT asset management to private sector

Private sector to manage ICT assetsBy Edris Kisambira

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

15

By Dennis Mbuvi

“By 2015, there will be 15 billion connected devices, devices that can process and connect to each other,” says Omar Bajaber, Intel’s Kenya Country Manager. Intel’s core business is in the design and manufacture of microprocessors for both servers and personal computers. In addition, the fi rm has also moved into microprocessors for embedded devices, such as consumer and home entertainment devices such as those found in the BMW i series. It is for this reason that Intel has formulated a strategy in the country, and worldwide that sees it driving demand for computers and related devices.

To grow the market to a more educated workforce, Intel has developed a strategy that has seen the fi rm heavily investing in education programs worldwide. The program includes developing math and science content for schools. The reason for choosing math and science is that the two subjects are the same all over the world. The content is freely available to all countries worldwide and is in use in more than 60 countries. Skool.com hosts the content that Intel has developed and is available in 8 languages.

In Kenya, Intel signed a memorandum of understanding (MoU) with the Kenya Institute of Education (KIE) in April 2011. The MoU will see the coming of this content to Kenya and KIE, working closely with Intel to align the curriculum to Kenya’s local curriculum. The partnership involves tasks such as voiceovers and local animations. The agreement also involves capacity building such as content hosting. The content includes both primary and secondary school curriculum. The implementation is left to KIE.

Intel has also signed another MoU with the Ministry of Education (MoE) that seeks to build capacity of Kenyan teachers in the use of computers as a teaching aid. The initial stage sees teachers becoming computer literate in an effort to enable them to use computers. They then learn how to prepare lessons on computers and eventually how to teach using one. The program has trained 4000 teachers since its launch last August and hopes to train many more with the coming on board of the Teachers Service Commission.

Intel is also in talks with Google in an effort to streamline its programs with Google’s recently launched gfunze. gfunze seeks to help secondary school teachers use ICT tools in teaching. “They are good programs that complement each

other and we both agree that they should be aligned,” says Bajaber.

Challenges in the secondary school program include shortage of funding given that Intel has been funding it alone. This is expected to change as the MoE is coming in with funds to help in faster roll out of the programme. Balancing between quality and access to computers given that many teachers do not own computers is also a major setback. “It is important that the Teacher Laptop program (currently been ran by Safaricom and Microsoft) will result in making more computers to teachers.

The urban rural divide has contributed to the lack of access of computers for teachers, as well as lack of internet access across many parts of the country. This is expected

to improve through the Communications Commission of Kenya (CCK) Universal Service Fund that funds the building of telecommunications infrastructure in rural areas. Bajaber says that Intel will be working with CCK to increase rural connectivity. He also credits the Kenya ICT Board for its role in the digital village initiative and has been working closely with them to improve connectivity of the 70% of Kenyans living in rural areas.

Intel invested USD 4 billion worldwide in 2010 towards the education program. The company hopes to achieve a 1 to 1 ratio of computers to kids in schools. “The idea is no to create computer literate kids, but give them tools for life,” says Bajaber. “The job market requires people with computer literacy skills, it is important that we teach them 21st century skills,” says Bajaber.

Building an ICT literate society

Omar Bajaber, Country Manager, Intel Kenya

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

16

• In our COVER STORY

Get more on: www.cio.co.ke

JULYAll this in your

edition of

• Information Security

• IT Governance Frameworks

• Feature

DON’T

MIS

S

co.

InMobi, an independent mobile advertising network, released its latest Africa regional insights that provide a snapshot of mobile advertising trends on the continent

between December 2010 and March 2011. Data from the report shows that InMobi now serves over 3.6 billion impressions a month in Africa and that these mobile ad impressions have grown consistently by 3% during the period. Kenya specifi c data includes: • 16% growth in mobile impressions in the period• 21% growth in smartphone impressions in the Kenya mobile market• Nokia OS holds 54.1% impression share, followed by Symbian at 8.3% and Android at 1.3%• 237,904,357 monthly mobile advertising impressions in Kenya on InMobi network The data also indicates that while 8 out of 10 mobile adverts in Africa are delivered on either a Nokia or Samsung device, when it comes to smart phones platforms in Africa, RIM reigns supreme; although RIM/iPhone OS/Android collectively only represent 4.1% of the total Africa ecosystem. In fact, in just 2 months, RIM has grown 2,5% share points while Nokia, which owns the majority market share (in total

number of handsets, rather than just smartphones), has remained static.

“RIM Blackberry’s growth during the period is proof that the lowering cost of data plans and devices will lead to smart phone adoption in Africa,” comments Isis Nyong’o, Vice President and Managing Director InMobi Africa. “It will be critical to track both RIM and Android market penetration as a key to growth in mobile advertising ecosystem”.

The report also showed that South Africa, Nigeria and Egypt represent the largest mobile markets in Africa. South Africa maintains position as the largest of thesewith in excess of 850 million impressions a month.

James Lamberti, VP of global research and marketing at InMobi says, “Africans continue to increase their mobile media consumption with both advanced phone and smartphone uptake growing at a consistent pace in the last quarter. However, advanced phones still dominate with 81% market share, so smartphones have yet to gain signifi cant traction.”

The full report is available to download at www.inmobi.com/research.

Mobile Ad impressions grow by 16%

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

18

Inte

rnat

iona

l Tre

nds

A security fl aw in nearly all Android phones can leak contact, calendar and photo data to nearby hackers, researchers said. But

is this a serious threat to Android security, or just an overblown bit of fear-mongering?

Let’s walk through what we know to fi nd out:

What’s the issue?

Several Google Android apps use a method called ClientLogin to authorize the transfer of sensitive data to web-based services. ClientLogin uses authorization tokens to pass the user’s login and password through a secure https connection to a web service, such as Google Calendar or your synced contacts.

The problem, according to researchers at Ulm University’s Institute of Media Formatics, occurs once the token is validated and returned. It can then be used for up to two weeks in requests through insecure http connections, making it vulnerable to theft from a hacker over a Wi-Fi network.

What are the dangers?

A hacker could use the stolen token to gain access to calendars, contacts or Picasa images. The intruder could then steal or modify information within these services. Think corporate espionage or personal stalking.

Who’s affected?

The issue applies to all Android versions prior to 2.3.4 for contacts and calendars, and including 2.3.4 for Picasa Web albums. Researchers say it applies to 99.7 percent of Android phones, which isn’t accurate because the data they use only counts users who have recently accessed the Android Market. Still, it’s safe to say that the vast majority of Android phones are affected.

What’s the likelihood of being attacked?

There’s the rub. The attack requires the user and the hacker to be on the same Wi-Fi network. The researchers

describe the possibility of evil twin networks, which spoof popular Wi-Fi access points like those at Starbucks, but the more likely threat comes from ordinary insecure Wi-Fi. Even then, we’re talking about a hacker who’s sitting in close proximity with the sole intent of stealing data. Like the Firesheep mass-hacking tool that caused a stir last year, this issue is scary to think about, but getting hit with an attack is not very likely for average users.

What can users do?

The best thing to do is to stick with secure Wi-Fi networks. In Android settings, you can also turn off automatic synchronization when connecting to open Wi-FI. Updating to Android 2.3.4 would solve most of the problems - although Picasa information is still vulnerable -- but that’s entirely in the hands of wireless carriers and phone makers.

Should Google do something?

The researchers have several for Google, including a requirement that all apps and sync services switch to https, as Google Calendar and Contacts have done in Android 2.3.4. They also recommend that Google switch to a more secure authorization service such as OAuth, limit the lifetime of authentication tokens, reject ClientLogin requests for http connections and create a way to limit automatic Wi-Fi connections to protected networks.

Android data leaks discovered

Hackers have found a way to access Android phone calendar, contact, and picasa data via your phone. Should you worry?

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

19

By Anuradha Shukla

Global technology mergers and acquisitions (M&A) deals grew during the fi rst quarter (Q1) of 2011, according to Ernst & Young’s quarterly report,

Global Technology M&A Update, January - March 2011.

Ernst & Young specialises in assurance, tax, transaction and advisory services. The fi rm reported a growth both in the number of M&A deals and in total value when compared to the same period last year.

During the fi rst quarter of 2011, companies transacted a larger number of smaller, strategically focused deals and thus continued a trend that began in 2010.

Non-technology companies purchased 15 per cent of the quarter’s total value in disclosed-value deals, and according to Ernst & Young, this demonstrated that information technology is blurring into other industries at a rapid pace.

“These trends speak to the rapid pace of change driven by the cloud, social networking and smart mobility, and the ways in which technology is becoming an increasing part of everyday life - not just something we do while at work,” said Joe Steger, global technology transaction advisory services leader at Ernst & Young. “On the business side, the trends refl ect that information is becoming a larger component of the value of all products and services.”

Multiple small, strategic deals

Companies are continuously making multiple small acquisitions and leveraging them together to address strategic business initiatives.

Steger noted that this pattern enables buyers to maintain their competitiveness and also capitalise on current and evolving trends.

“However, given the rapid pace and competitive nature of these deals, it still demands rigorous deal valuation, structuring, due diligence and integration.”

The report shows cloud computing and SaaS were the drivers for many deals, and in Q1 2011, there were multiple deals in which mobile device manufacturers purchased content and services providers, which ensured their entry into traditionally non-technology industries. Also, video deals were apparent in every sector in Q1, and a quest for growth was evident in the level of cross-border deals in the same period. Ernst & Young also notes a strong outlook for 2011 M&A.

“These truly exciting technology innovations, the growing cash stockpiles that technology companies are increasingly challenged to put to good use and the strong start to the

year represented by these fi rst quarter M&A results suggest a big year for technology M&A in 2011. Realistically, however, we must temper those pluses with concern over increasing divergence between buyers and sellers over valuation, geopolitical unrest, global debt issues and other unforeseeable possibilities,” Steger concluded.

Findings from Ernst & Young’s quarterly report.

Global increase in tech mergers

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

20

By Grant Gross

Wading into e-commerce waters can be scary for small businesses because of cybersecurity threats, but they can take steps to protect

themselves, a group of security experts said Monday.

Small businesses using the Internet should develop cybersecurity and disaster recovery plans, train employees regularly on security threats, and regularly change computer passwords, said the experts gathered at a U.S. Federal Communications Commission forum on small-business cybersecurity.

Small businesses need to train employees on “proper hygiene” while using computers, said Michael Chertoff, chairman of consulting fi rm the Chertoff Group and former secretary of the U.S. Department of Homeland Security. Business owners should regularly remind workers not to connect USB thumb drives of unknown origin, not to use weak passwords and not to leave their passwords where others can see them, he said.

Some criminals have purposefully dropped infected USB sticks in the parking lots of organizations they want to target, hoping employees will pick them up and connect them to their network, he said. “You don’t pick up and eat everything that you fi nd on the street,” Chertoff said. “You shouldn’t pick up every USB stick and stick it into your laptop.”

Small businesses should also back up their data and make employees aware of the latest methods cybercriminals are using, he added.

It’s easy to fall victim to online attacks, added Maurice Jones, CEO and CFO of Parkinson Construction, a Washington, D.C., fi rm that lost about US$18,000 in a

November 2009 phishing scam. Now, the company encourages employees to raise questions about suspicious e-mail messages and other issues, he said.

A cyber-attack recovery plan is also important, said Cheri McGuire, vice president of global government affairs and

cybersecurity policy at Symantec. In a Symantec study released in January, half of all small and medium-sized businesses didn’t have disaster recovery plans and 41 didn’t know they should have a recovery plan.

Forty percent of the survey respondents said data protection was not a priority for them, McGuire added. “That’s kind of a shocking statistic when you think about it,” she said. “Data ... is what your business runs on.”

Computer downtime costs small and medium-size businesses an average of $12,500 a day, the Symantec study said.

Without a plan in place, small businesses will see increased costs and more distractions because of cyber-attacks, said Julius Genachowski, the FCC’s chairman. “Having a cybersecurity plan is a competitive advantage, and not having one is a competitive disadvantage,” he said.

The FCC have released a list of 10 cybersecurity tips for small businesses. Among the tips: Regularly download and install software patches, use a fi rewall and limit employee access to data.

Many times small businesses don’t see themselves as targets for cybercrime when they are, Chertoff said. “This really touches everybody,” he said.

Still, no one expects small businesses to have perfect cybersecurity, he added. “It’s important to recognize that what we’re talking about here is managing cyber-risk, not eliminating cyber-risk,” he said. “There will never be a program that eliminates all possibilities of a cyberthreat.”

Small businesses should train employees about threats and develop disaster recovery plans

Steps to improve cybersecurity

Pictorial

Meshack Kamau, Storage Presales, EA, HP, giving a presentation

on overview of Enterprise Storage

Delegates at the CIO Executive BreakfastVincent Wang’ombe, Chief Marketing Offi cer, KDN, speaking about

building secure data centres

Alex deGraaf, Senior Sales Engineering EMEA, McAfee Inc. presents

on securing your data storage

Jackie Gaithuma, Business Development Manager, AccessKenya,

giving a presentation on managed services for data centres.

Arlene Nazareth, Territory Account Manager EA, APC, presenting

on going green with data centres

20th May 2011, Crowne Plaza Hotel, Nairobi

Storage and Data Centres

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

22

Tren

d A

naly

sis

The commercial value of unlicensed software installed on personal computers in Eastern and Southern Africa (ESA), which excludes South

Africa, reached USD 109 million in 2010 as 83 percent of software deployed on PCs during the year was pirated. This stands at almost double the global piracy rate for PC software, which is 42 percent – having risen by 3.6 points on the previous fi ve year average. These are among the fi ndings of the Business Software Alliance (BSA) 2010 Global Software Piracy Study, which evaluates the state of software piracy around the world.

During the past 5 years since 2006, Botswana’s piracy rate has dropped by 2 percent; Kenya’s by just 1 percent; while Zimbabwe’s rose by one percent in 2008 but returned to the 2006 rate of 91 percent in 2010. Zambia’s piracy rate has remained unchanged year over year. Meanwhile, Zimbabwe’s piracy rate of 91 percent is the second highest in the world.

This is the eighth study of global software piracy to be conducted by BSA in partnership with IDC, the IT industry’s leading market research and forecasting fi rm, using a methodology that incorporates 182 discrete data inputs for 116 countries and regions around the world. This year’s study also includes a new dimension: a public-opinion survey of PC users on key social attitudes and behaviors related to software piracy, conducted by Ipsos Public Affairs.

Globally, the opinion survey found strong support for intellectual property rights.

The survey also found widespread recognition that licensed software is better than pirated software, because it is understood to be more secure and more reliable. The problem is many PC users lack a clear understanding of whether common ways of acquiring software, such as buying a single program license for multiple computers or downloading a program from a peer-to-peer network, are likely to be legal or illegal.

“Clearly, there is a strong appreciation for the value delivered by legal software,” said Lawrence Kinyanjui, Anti-Piracy Manager for Microsoft East and Southern Africa. “The results reinforce the need to educate users that software downloaded from P2P networks is often illegal, and installing software purchased for one computer on multiple home or offi ce PCs is piracy.”

Additional fi ndings from the study include:

• Globally, the value of software theft grew to a record $59 billion — nearly double that when the study began in 2003. Half of the 116 geographies studied in 2010 had piracy rates of 62 percent or higher.

• Emerging economies have become a driving force behind PC software piracy. Piracy rates in the developing world are 2.5 times higher than those in the developed world, and the commercial value of pirated software ($31.9 billion) accounts for more than half of the world total. • The most cited advantages of licensed software globally are access to technical assistance (88 percent) and protection from hackers and malware (81 percent).

• Among the common ways people in engage in piracy is to buy a single copy of software and install it on multiple computers.

• Strong majorities of PC users around the world believe intellectual property rights and protections produce tangible economic benefi ts: 59 percent globally say IP rights benefi t local economies, while 61 percent globally say IP rights create jobs.

Africa software theft hits $109m

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

23

As IT organizations look to deliver on-demand services, virtualization requirements continue to advance — and companies are realizing that server

virtualization is only a partial solution. Without the ability to package complete application environments that can be deployed on demand, IT staff must manually customize solutions in order to deliver services.

Perhaps the most important technology trend in recent years, virtualization is moving beyond isolated projects in the datacenter and fundamentally changing the nature of IT organizations from technology hosts to service providers for the business. Indeed, virtualization is no longer a goal unto itself — it is now a means for enabling services-based IT. By deploying application aware virtualization solutions, organizations can speed the delivery of IT services.

Server virtualization

Server virtualization technologies help organizations create administrative and resource boundaries between applications. This approach provides improved application performance and security, and also can be a vehicle for rapid application provisioning by delivering pre-installed, pre-confi gured virtual machine images of enterprise software.

Desktop virtualization

Desktop systems are critical to maximizing user productivity. Yet assigning one desktop system per user can place administrators in the diffi cult position of managing hundreds or even thousands of individual systems. In addition, many engineering and technical organizations need to supply multiple desktop environments per user, further exacerbating the problem. Complicating the situation is the desire for workplace fl exibility. However, giving users the ability to move from place to place with appropriate data security without losing the functionality of traditional fi xed asset environments poses a host of desktop management and security challenges. Desktop Virtualization technologies can help companies increase fl exibility, take better advantage of client device independence, create true mobility for workers, streamline management tasks, and optimize security.

Storage virtualization

As data volumes continue to rise, datacenter managers must cope with expanding storage infrastructure and provide

around-the-clock access to data that is stored on reliable and secure media in order to support demand. A broad range of storage virtualization solutions — for example integrated storage virtualization capabilities in Oracle Solaris 10, virtual tape solutions or Automatic Storage Management can help companies achieve optimal performance, simplify storage provisioning and management, and reduce the risk of data loss and downtime.

Enable private clouds

An important staple in every datacenter, virtualization makes it possible to consolidate systems and services effi ciently. Now virtualization is expanding and combining with intelligent management techniques to foster the distribution and automation of the entire hardware and software stack. The next step—private cloud computing—makes that effi cient technology architecture available to users through a self-service interface that boasts a rich service catalog and fl exible pricing. Indeed, cloud computing is a natural evolution for IT organizations. With a self-service, scale-out, pay-as-you-go premise, cloud computing offers an ideal platform on which applications can expand, contract, and adapt to business and workload requirements more quickly and easily than ever before.

Keeping pace with evolving IT needsBy Mark Anderson, Regional Server Sales Specialist, Oracle South Africa

Mark Anderson, Regional Server Sales Specialist,

Oracle South Africa

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

24

By Jonathan Duncan, director for the Central and North East Africa region at APC by Schneider Electric

The past few years have seen a huge increase in the use of social networking technologies, from Facebook and Twitter to blogs and wikis. In fact,

market research company, Nielsen carried out a study and found that US-based Internet users had spent an average of more than six hours on sites such as Facebook, MySpace and Twitter during May 2010 alone. This increasing trend is set to hit the East Africa.

The Nielsen research also showed that 75 percent of all active US Internet households visited a social networking site at some point during the month of May and that around one-fi fth of American adults publish online or own a blog, and 55 percent have at least one or more social networking profi les.

At the same time, both organisations and government entities worldwide are also increasingly turning to social networking to facilitate communication and collaboration among individuals and groups.

Unfortunately, while there are clear benefi ts to this greater communication, social networks also present a number of challenges. As businesses become increasingly involved in implementing these types of interactive technologies,

they have to completely rethink their approaches to storage. This rapid growth in online demands is fuelling the need for storage, particularly in light of the fact that the data generated is not transactional in nature, but rather fi xed content, as people include photos, videos and audio.

The organisations running these networking sites must ensure that they can offer constant business availability to meet the demands of users – who want access and want it now. It really boils down to availability, be it on a business or a social level, where the applications are hosted and what type of disaster recovery plans are in place.

The key to redefi ning storage strategy is for companies to ensure that their IT infrastructure doesn’t become crippled through the downloading and storage of this type of data and that capacity planning is always kept in mind. An integral part of this is looking at the factors that aid business continuity, from power and cooling to software management, and making certain that measures have been taken to maintain availability from these perspectives. After all, something as simple as a power outage or an overheating data centre could cause downtime and, ultimately, unhappy users.

Social networking affecting storage

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

25

Recently, Ory Okolloh (aka @kenyanpundit) asked a pertinent question on Twitter, that I would paraphrase as: “Tanzanians - what are your thoughts

on why Internet access prices are not dropping and bandwidth speed is still slow, even after undersea fi ber cables landed at Dar es Salaam, as compared with other countries, especially Kenya?”

I happened to see this tweet while meeting with a major Tanzanian ISP and posed the question to them. Their answer is enlightening for everyone in the ICT space. Essentially, it is a failure in regulation and transparency with the national fi ber optic backbone infrastructure.

Tanzania fi ber cable history

Back when SEACOM and EASSy were in the planning stages, the Tanzanian government entered into an agreement with the Chinese government to build a National Information Communication and Technology Broadband Backbone (NICTBB) to transport that bandwidth nationwide. The national network was designed and installed by Huawei and connects most of the major population centers to the landing points at Dar es Salaam. So far so good.

Pricing at SEACOM landing point

Trouble began when the government gave Tanzania Telecommunications Company TTCL, the incumbent national telecommunications operator the monopoly rights to manage the backbone, as evidenced by bandwidth pricing. SEACOM will sell 1 Megabyte per second (Mbs) of bandwidth at $230 USD per month at its landing point in Dar. If an Internet Service Provider wants to use another bandwidth provider, they can get it for as low as $175 for 1 Mbs per month at the SEACOM landing point.

Companies that connect their network infrastructure at the SEACOM landing point have dropped prices and increased bandwidth speeds. Mobile phone companies now offer great plans like Airtel’s 3GB of mobile data for $10 and the Holiday Inn Dar es Salaam has the fastest hotel bandwidth in Africa.

Transmission is the issue

ISPs operating outside of Dar es Salaam still have a transmission problem - how to get bandwidth to the paying customer? TTCL charges a fl at $180,000 per year to transport Internet bandwidth across the country. In

addition, to connect to the backbone requires custom Huawei routers because of the way Huawei built the network. These specialized routers cost $18,000 and take 6 months to manufacture. By comparison, a similar Cisco router for standard network architecture is $8,000 and in stock across Dar.

If ISPs want to buy the bandwidth from TTCL rather than transmitting it on their own, its $700 for 1Mbs per month in Dar and $900 per month in Arusha. If you think TTCL’s $470 per Mbs per month mark up extreme, it gets better. TTCL has a 20-year agreement with SEACOM for bandwidth that averages out to less than $65 Mbs per month.

Regulation is the problem

The excessive markups by TTLC should not come as a surprise to anyone in the African telecom industry. Incumbent telcos have been using their monopoly position for rent seeking for years now. What is surprising is that this is happening in Tanzania. The mobile operator marketplace is open and very competitive - there are several private operators fi ghting for market share. In other industries, government-run companies were privatized and markets liberalized, unleashing a privitization economic boom that the country is still enjoying.

Yet with TTCL, the Tanzanian government has given one company a monopoly power, which that company is using to monopolize the bandwidth transmission market, keeping Tanzanian citizens from enjoying the African bandwidth bonanza. | http://www.ictworks.org/news

by Wayan Vota

TZ Internet prices are yet to drop

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

26

Technology in healthcare has gradually revolutionized how patients are treated in Kenya. A number of telcos, the Kenyan government,

Non-Governmental organizations and application developers have worked on projects based on mobile phones to improve prevention efforts, patients care and treatment, support and health data collection.

Mobile health projects are not only revenue streams for some of these organizations, but also an awareness platform. In 2009, mHealth initiative was explored to fi ght Polio by UNICEF in Zambia by sending mass text messages to parents. Kenya’s Ministry of Public Health and Sanitation, division of Vaccines and Immunization (DVI) use “HealthTrack” a mHealth solution to monitor vaccine stocks at various district stores throughout the country. The system collects and analyzes data, giving estimates of latest vaccine stocks based on previous data stored in databases as well as the latest stocks available in the system.

Through the “HealthTrack” system, DVI gets in touch with the vaccine management staff by sending them SMS text messages conveying new and emerging information about products, safety, storage tips, training opportunities and meeting schedules.

AAR Kenya, a health insurer, has integrated an SMS solution that relays information to patients on validity of their insurance policies.

Safaricom limited and Orange Kenya are telecoms that are active in mHealth. Recently, Safaricom introduced a healthpresence solution that extends beyond mobile technology and combines video, audio and patient medical data to create an environment same to that patients experience when they visit a health specialist. This solution is to be deployed on the “Digital centres” where rural communities will easily have access to them. Patients in rural areas will access specialized health through videoconferencing with specialist doctors from the cities.

“These initiatives bring a universal quality healthcare within reach to those in the remotest villages at an attainable cost, as was demonstrated at the Connected Kenya Summit held in Mombasa,” says Slyvia Mulinge, General Manager, Enterprise, Business Unit, Safaricom

mHealth to impact treatmentby Peter Nalika

Limited. CISCO is working with Safaricom to implement this solution.

Orange Kenya recently partnered with “Text for Change” (TTC), a Dutch NGO that combines the increased growth of mobile telephony with the need for better health projects. TTC uses SMS communication to assess mobile phone users on their health knowledge. The programme is targeted at helping people to access “click diagnosis” services on their mobile phones. They will be able to get immediate response on the nearest clinics, availability of drugs and physicians physical locations.

Private ICT application developers like Circuit Business systems (CBS), have a web based laboratory information system (Labware) solution. Through SMS alert reporting system, the system sends lab test results directly to clinicians’ cellphones. “The solution is free from human error and test contamination, when the samples are fed in the system for tests no human intervention is involved until the results are processed,” says Godfrey O. Owino, CEO CBS.

The Labware solution has been installed in several mainstream hospitals and is being used to send SMS to doctors to inform them whether drugs administered on TB patients are working. Web based reports and analysis have been generated on the same.

Technology is reviving the delivery of health services and health information.

Customers beating a path to your business? We can help.

Use the web to acquire new customersThousands of businesses use the web to differentiate themselves from competition. We have

helped several organizations within East Africa. Talk to us today to create a competitive

advantage for your business.

+254 732 353 355

me d i a

Pamoja Media East Africa Limited#4 Kindaruma Road near St. Nicholas Primary School

P. O. Box 68151-00200, Nairobi, Kenya

www.pamojamedia.com/cio

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

Most business will rarely function when their Internet connection is down. Management at this time cannot question as to why staff is

idle. From this, you would think that businesses are 100% reliant on electronic communication to function, which is not the case.

Businesses still rely on paper documents in this age. Some important processes are yet to be available electronically due to various reasons, mostly legal. For example, tender documents and employee contracts will be handled in hard copy. Firms that have existed for several years may also have a huge collection of physical fi les before their processes were electronically automated. While electronic documents are available at the click of a button, documents stored in physical fi les usually present a bottleneck.

Permanent Secretary in the Ministry of Information and Technology, Bitange Ndemo says that the best way Africans stored their records was in oral form in comparison to the Europeans better way of hard copy. However, technology came and revolutionized document management. “Technology enables for soft storage and multiple access (of information). Information is important, for example court records, and therefore requires procedure to access,” he says. Ndemo also insists that the information has to be in public domain so that the public can have confi dence in the government processes.

28

Feat

ure

Document Management Systems (DMS) enhance effi ciency as they avail needed information quickly while cutting on costs. Ndemo describes document management systems as an easier way of trying to archive information for use or sharing at a much later stage.

Tyrus Kamau, head of innovation at Alliance Technologies says DMS are more or less like a library. Most fi rms face challenges when trying to retrieve a few documents from thousands of documents, maybe for auditing services. At the same time, Tyrus says that some departments such as sales tend to have standardised documents. These are all situations where DMS can quicken the process.

Similarly, when several employees are collaborating on a document, it usually evolves into a to and fro process. A DMS can make the work easier as it provides a platform where all can collaborate on a single document. It is easy to see the original document and changes made along the way, including who made the changes. Several versions of the same document can be retrieved. Tyrus says that use of a DMS saves the fi rm storage as documents are saved in one system. More importantly, they eliminate the paper trail.

The range of documents that a DMS can handle include scanned copies of already fi led documents to digital copies of current fi les that are been worked on. This can be word documents, images, artwork, videos and architectural drawings and blue prints. Some DMS like the open source Afresco that Alliance Technologies deploys have features that can integrate social media interactions such as comments on a company’s Facebook page.

Kenya Medical and Supplies Agency (KEMSA) is amongst the fi rms that Alliance Technologies has deployed a document management system. KEMSA is tasked with supplying drugs and commodities to all public hospitals and medical institutions. With annual transactions amounting to Ksh 15 billion, KEMSA tenders, supplies, distributes and receives fi eld reports on a daily basis. The volume of paper handled in a day is large.

KEMSA’s biggest challenge was that the fi rm was forced to reference paper trails dating back over several months. The fi rm needed a system that would boost effi ciency of their operations. “They also needed a system that could assure

Manage your documentsby Dennis Mbuvi

Document management unlocks revenues, effi ciency

Permanent Secretary, Ministry of Information and

Technology, Bitange Ndemo, in his offi ce discussing

about digitization in the government

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

29

them of recovery in case of a disaster such as the physical paper store burning down,” says Tyrus.

Alliance Technologies then implemented Afresco as part of KEMSA’s enterprise resource planning (ERP) system. Documents including requests for quotations, tenders and approvals are scanned and stored in a database at KEMSA and another at a remote back up location. This had the immediate effect of reducing paperwork and the warehouse now generates no paper trail.

KEMSA’s DMS was implemented as part of its ERP system which was implemented over a four year period. KEMSA is still in the implementation process as the fi rm requires lots of man power to feed documents dating several years back.

Tyrus cautions that one needs to be aware of challenges faced in indexing millions of documents. “It must be done in a standard way that makes retrieval easy. One must be very careful not to automate ineffi ciency,” he says. DMS can be confi gured to work along work fl ows where certain documents are only accessible to certain people. This can be further tuned with roles which determine various levels of access, such as read only, read and write. The Department of Defense implemented a DMS and this made document exchange safer as they no longer relied on email. DMS also provides an audit trail that shows how a document was accessed and changed.

KEMSA has benefi ted in reducing the turnaround time required for document retrieval. By quoting a tender number, associated documents are retrieved instantly. Documents no longer have to be sent via courier from their Nairobi headquarters to its warehouses near the airport and at the coast.

For institutions that are looking to minimize their capital

expenditure investments, the DMS can be installed off Internet Solution’s data centre. The government on the other hand has commenced the digitization of various ministries and agencies and has already completed a few. The process started in key registries such as the state law registry (which is complete) and the company’s registry (almost complete). Other key registries to be covered include judiciary, land and transport. The immigration registry already stores much of its data in digital format.

Digitization of the state law offi ce saw money collected by the offi ce more than double from Ksh 30million to Ksh 80 million. This is attributed to an increase in effi ciency and a decrease in corruption. Other benefi ts include reduced human traffi c in government offices and redeployment of the workforce as digitization reduces the need for man power.

In the next 2 years, it is expected that most key registries will have been digitised. Ndemo says the process will not leave out sub registries in ministries will also undergo digitization at a later stage.

The digitized data is stored in data centres within the ministry. However, the government is building its own data centres and disaster recovery centres.

The individual data centres in the ministry will then be moved to the centralised data centre, making management, especially security management, much easier.

Benefi ts of government digitization in general include making it easy for information to be tracked online and reduce corruption by minimizing citizens’ contact with civil servants.

Application developers are also expected to leverage on digitized registries to develop both mobile and other platform applications. “Kenya has done very well on that, we will see many of them producing e-government related applications,” says Ndemo. The digitization process itself is not expensive, though labour and time costs involved in it make it costly. There have also been challenges like lost physical fi les and lack of enough capacity in terms of management to fully automate and integrate at a faster pace. The PS says that the government is currently building management capacity.

DPH, an Indian fi rm working in partnerships with a few Kenyan fi rms has been contracted to undertake the digitization of the government registries.

Digitization has put the government on the correct path to increase effi ciency and revenues.

Tyrus Kamau, head of innovation, Alliance Technologies and a

colleague (Shirley) from demonstrate how to use the DMS

Innovatingfor the citizenT

he third edition of Connected Kenya summit organized and hosted by the Kenya ICT Board between 18th and 21st of April 2011. Safaricom

Limited was the lead sponsor for the second year running with IBM, Orange, Equity Bank, Seven Technologies, SAP, Accenture, Jamii Telecoms Limited, Huawei and EMC2, CIO East Africa, Homeboyz Entertainment and Deloitte co-sponsoring the event. The three-day conference provided a platform for the Kenya’s ICT industry players to network, share ideas and knowledge. Going by the theme Innovating for the citizen the event drew a wide array of participants from the public, private, business and civil society sectors in Kenya and beyond. Over 400 delegates attended the highest number of participants since the inception of the conference.

This year’s conference had three main objectives: creation of a platform that is relevant for service delivery and execution; creation of an opportunity for participating organisations and sponsors to exhibit and awarding the most innovative companies whose innovations are in line with Kenya’s vision 2030.

The three-day conference provided evidence of the benefi ts as well as the challenges facing ICT-enabled service delivery and citizen-centric solutions development in Kenya. Presentations showcasing the various innovations undertaken by players in both private and public sector show that ICT has come a long way in Kenya in terms of growth and there is a need to keep on improving to make Kenya a Global ICT hub.

Local solutions, global impact

Connected Kenya seeks to bring stakeholders in the ICT sector, mainly technology fi rms to deliberate on trends and have a unifi ed direction towards realizing Kenya’s vision 2030.

The Kenya ICT Board is employing a reversed innovation approach to encourage local solutions to local problems. The interdisciplinary approach involves both the private and public sector to include a sharing and a sourcing of solutions from different sources.

Paul Kukubo, CEO of the Kenya ICT Board says: “In order for Kenya to be competitive we need to bring together an ecosystem

of education, governance, policy and systems.” He adds that Kenya is ranked at position 106 in the global competitive Index, far off form the board’s mission to have Kenya amongst the world’s top countries.

Revolutionary innovations like Safaricom’s mPesa have placed Kenya in the global limelight proving that the internal innovation targeted at solving local problems is what the local ICT industry needs to grow.

Safaricom is the biggest provider of data connectivity in Kenya with 90% of internet consumers in the country accessing internet via Safaricom. This is done through 22,500 Mbps of capacity from Safaricom’s stake in the EASSY cable and a redundant 620 Mbps on Seacom. Collymore adds that the company now provides fi ber connectivity to 500 buildings. Other services from Safaricom include farmer insurance service where farmers insure their farms against drought effects. This is in partnership with other fi rms such as UAP insurance.

“Safaricom has been at the forefront of innovation in Kenya with the aim

Paul Kukubo, CEO, Kenya ICT Board

of bringing down the cost of doing business in Kenya,” says Bob Collymore, Safaricom

CEO. m-PESA is listed as a Safaricom innovation with the biggest impact

in the country with more than 13.5 million customers. “Innovation

must be linked to identifi ed needs,” he adds.

ICT for better service delivery

Realising the need for effi cient service delivery to the citizens, the Ministry of Finance and Treasury are facilitating budgetary priorities for ICT development, tax incentives for an enabling environment and policy reviews for

an enabling environment. Treasury has prioritized ICT oriented programmes in various sectors like the setting up of ICT laboratories and digital libraries for e-learning, electronic voter registration, digitization of court registries, automation of court processes (Telepresence system), Integrated Financial Management Information System (IFMIS) among other programmes.

The treasury is using ICT to monitor and report on the Economic Stimulus Programme (ESP) says Ann Waiguru, Head of Governance at Treasury and Acting Director of Integrated Financial Management Information System. ESP uses an ICT tool and Geographical Information System (GIS) monitoring tools to monitor update and status updates on funds disbursement. Treasury did not have requisite skills to use the system and has partnered with other government agencies and the private sector in this. Google has provided capacity through training of treasury offi cers in the use of these tools while Jomo Kenyatta University of Agriculture and Technology (JKUAT) provide interns to map the information.

“It was very big challenge for treasury to monitor without a tool that would allow them to do so. It meant traversing the country. In addition, the public can comment and give feedback,” she adds. ESP also marks the fi rst government implemented project to have a presence on both Facebook and Twitter.

The eGovernment is looking to implement include open databases on rights performance, land and infrastructure. Other projects to be implemented include information systems audit, eVoting, eJustice, citizen feedback, county indexing, cyber security, smart identity cards, eboarder and evisa system. All this will revolve around three pillars of access to public systems, shared information and effi cient government operations. The judiciary is leading other government agencies and ministries in adoption of ICT. The innovative use of ICT in the judiciary has seen the implementation of the ICT Policy and Strategic Plan 2011- 2013 that lays a fi rm foundation for the achievement of the judiciary’s ICT committee vision. This has been achieved through private-public partnerships with Google, Safaricom and other partners. Through a WorldBank sponsorship programme, court records are now digitized. The digitization process employs 200 young Kenyans in a permanent basis and has digitised 35 million records. In addition, the WorldBank donated laptops that has been given to judges. The court has employed the use of Teleconferencing in the court sittings and judgments. Through a partnership with Safaricom, Judges can now have court sessions between Nairobi and Mombasa law courts without physically being present. This speeds up the process and saves time and money that would have been used travelling.

The National Council for Law Reporting, ICT board, the National Assembly and Government Press are now in a public private partnership with Google. This partnership sees Google digitizing all more than 5000 editions of the Kenya Gazette. The digital archive is fully searchable and is available by searching for the “Kenya Gazette” on Google Books. Google’s mission in digitizing the service is to enrich their Kenya search index.

Innovating for the citizen

Safaricom in partnership with Cisco have offi cially launched a remote m-health initiative at the conference. The m-health program targets citizen in the rural areas and provides them access to quality health care, via Safaricom connectivity.

Bob Collymore, CEO, Safaricom

The program will be rolled out in digital villages and requires minimal equipment to set up. The healthpresence solution combines high-defi nition video, advanced audio, and patient medical data to create an environment similar to what most people experience when they visit their doctor or health specialist.

Taking on m-health as a corporate social responsibility, Orange Kenya’s 10 year participation in the health sub-sector now includes M-pedigree, a solution that identifi es drug authenticity, and Text to Change, an m-health system application in partnership with Text to Change (a Dutch NGO) whereby SMS communication is used to spread health communication and encourage HIV/AIDS testing. Orange Kenya has also conducted a pilot project with the ministry of Medical services and Qualcomm has equipped 10 health

centers in Nairobi with software that manages HIV anti-retroviral drugs stocks and patient follow up. The results

has been a more than 50% rise in report submission rates while reducing time taken and cost of

doing the same.

IBM is looking to introduce its “smarter cities” project in

Kenya aimed to make life in Kenyan cities better by making service delivery easier, more effective and smoother transport around our cities by, for example, usage of cell BTS (base transceiver stations) to track movement of cell phones from one cell to

another. From the tracking, traffi c congestion can be determined by the rate of movement of vehicles between cells. Bill Doak, IBM Public Sector Leader for Middle East and Africa says that the transport system also provides other additional services like online vehicle identifi cation through the registration plates, and also online fi ning of traffi c offenders. This keeps traffi c moving as cars do not have to stop to be charged. Seven Seas Technologies has developed a national innovation forum through which one can share ideas and vote them up. Titled “Community Baraza”, one creates an account through which they submit their ideas or vote for other people’s ideas. Voting can also be done by sending an SMS with the idea number to 0717410705.

Kenya is looking at an ICT system to reduce the cost of doing business and make the process easier. Titled national single window, the platform was deployed by the Kenya Revenue Authority and Kenya Ports Authority at the country’s ports of entry. Before the single window all the stakeholders had to exchange multiple documents between them, with hard copies the same documents been handed in and manually processed by multiple operators.

The results were delays in cargo clearance, high costs, corruption and loss of competitiveness by the country. With the single window system, the trader submits all required information at a single point from where all agencies and stakeholder access them and return their response through. After deployment of the system, port dwell times at Mombasa have decreased from 12.9 days to 6.7 days. This is against a world average of 3 to 6 days and Singapore’s 2.9 days. Singapore ranks 1st in the World Banks ease of doing business, while Kenya ranks 95.

Nurturing innovation and entrepreneurship

Seven Seas Technologies is looking to bridge the gap between the education quality and ICT industry gaps with its Knowledge for Life (K4L) program. The program includes talks to university students to help them understand

the industry offerings, mentoring to the students and free industry relevant training. The K4L programs targets fi nal year university students undertaking business and IT related courses. 400 students from the University of Nairobi, Kenyatta University and Jomo Kenyatta University of Agriculture and Technology have already gone through

A demonstration on how the Safaricom - CISCO m-health service works. From left to right: James

Rege, Head of Parliamentary ICT comittee, a medical offi cer, and a volunteer from the crowd,

being treated remotely from Nairobi

the program with 30 been employed in various ICT industries and 20 others at Seven Seas Technologies.

In the nurturing of ICT enterpreneurs, Safaricom has invested in the Safaricom Academy that will nurture application developers and teach them on how to commercialise their concepts. Collymore also called on corporates to nurture innovation in the Kenyan sector rather than steal their ideas. He says that Safaricom, contrary to widely circulated rumours,

did not steal M-PESA or any idea from anyone. “It’s very easy, but we can’t steal people’s ideas,” he says. The government, through the Ministry of Finance, has a virtual academy dubbed IFMIS Academy to enhance capacity and change management. This is in partnership with the Kenya Institute of Administration. This facility is open to treasury workers for enhancing their ICT skills.

Dr. Kamau Gachigi discussed the Fabrication lab that has been set up at the University of Nairobi. The lab allows those who formulate ideas to come to the lab and transfer the ideas to a design and in to products using the equipment in the lab. The equipment is also capable of producing smart cards and Dr. Gachigi says that the lab is ready to produce such cards for fi rms in the country. The Fablab is open to anyone in the country with ideas. In future, the Fablab will be set up in its own custom location.

Delegates at the Connected Kenya summit 2011

Bitange Ndemo, Permanent Secretary,

Ministry of Information and Technology

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

34

Cove

r S

tory

Earlier on this year, we published an article on how East African companies are inculcating the mobile phone in their business operations. Workplace mobility has become a reality that CIOs have embraced. The availability of low end smartphones, laptops, tablets, iPhones and other computer hardware has led to a proliferation of mobility devices in the workplace, bringing in the next new challenge facing CIOs – the era of ‘bring your own technology to the offi ce’.

to the offi ceBring your own technology

by Louisa Kadzo

I have my blackberry and I want to receive my offi ce emails from wherever I am“

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

35

Global research companies have looked into the area of mobility management, each with interesting fi ndings. One such survey sponsored by Cisco focusing on the threats posed by the growing use of personal devices on corporate networks exposed a disconnect between what workers are doing and what IT leaders believe is happening – IT leaders have no accurate fi gures of how many personal devices are operating in corporate networks, until there is a breach or loss of information due to an unsupported network device.

The blame does not solely lie on the IT leaders, many employees are not aware that they are using personal devices in the work place yet 95 percent of workers bring their own self purchased devices to the work place. Senior management and staff have put pressure on CIOs to open the corporate network to consumer devices for offi ce processes. Words like “I have my Blackberry and I want to be able to receive offi ce email” are only too familiar to IT leaders today.

The process of using these devices for offi ce work has largely been considered as consumerisation of IT. With enterprises continuous reliance on web based applications, cloud computing and the proliferation of mobility devices, this trend is not about to go away any time soon.

Threats versus benefi ts of supporting consumer technology

Consumerization has been credited for increasing productivity, lowering operational costs, enabling fl exibility as well as appealing to enterprise mobility. Enterprises will benefi t from the collaboration and increased productivity while users benefi t from convergence of applications, knowledge and interaction methods.

On the other hand, giving employees unfettered access to valuable company data on whatever device they happen to prefer is a risky proposition. McAfee, a security management company, lists the security concern areas as theft or accidental loss of the devices – meaning that data they contain is more vulnerable. McAfee also states that access to company data on an employee’s laptop, mobile phone, or other personal device can create compliance issues by making it diffi cult or impossible to verify that data is secure at all times. Finally, because consumer devices are not adequately protected against malware, enabling access through these unsecured devices can open a gaping hole in the company’s otherwise secure fi rewall.

Alex de Graaf, Senior Manager Sales and Engineer at McAfee EMEA says: “Employees are the greatest threat to information mismanagement. If you want to physically limit what data employees’ access and move out of your company with, the only solution is to prevent any employee from moving out of your building, lock your building and set it on fi re. This should never be an option a CIO should consider.”

These risks have led many CIOs to ban employee devices in the organisations and locking down company data through various network security measures.

How agile should a business be?

The agility of a business all depends on the corporate goals. Farmers Choice, a manufacturing company that produces, processes and distributes meat products employing over 1000 people, and works with numerous independent distribution outlets in Kenya and outside. To streamline their operations, the company employed Microsoft Business Dynamic, linked with a meat processing module and a mobile invoicing module. Using Safaricom link, daily sales are monitored with an integrated system that runs on Samsung PDAs.

Flora Kinuthia, IT Manager at Farmers Choice says that the market has been pushing for mobility particularly to ease communication between the fi rm and its customers. Senior Managers at the fi rm are given Blackberry and Nokia Smartphones, not for personal use but to ease communication for business use. “Because of the nature of our business, emails need to be responded to immediately,” says Flora.

Since the introduction of mobile phones for senior managers, Flora says that the IT team faced constant challenge of maintenance and troubleshooting of these appliances. “Sometimes over the weekend we have to attend to someone’s phone that has one problem or another,” she says. To curb this, Flora constantly trains the managers on simple troubleshooting and maintenance skills including keeping Bluetooth off when not in use to prevent unauthorized access into the phone, and also

Flora Kinuthia, IT Manager, Farmers Choice

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

36

Cove

r S

tory

making sure the phone has an updated antivirus at all times.

Another challenge is security, major concern being the theft of these devices. “We have lost a number of PDAs that are used by our sales staff. Many of them either forget their phones at their clients’ facility, they drop them as they transport products to the clients, or their phones get snatched,” Flora says. The devices are centrally managed so they are automatically disabled once reported lost to protect company data.

Virus attacks to the phones and computers were a common problem initially. However, Flora implemented an IT policy that has put checks and measures to limit virus attacks. The policy spells out that personal device in the workplace are prohibited. It is a rule that data transfers from the phones to the computers will only be done through synchronization, cable connections are prohibited. It also spells out who is liable to receive a company phone and laptop, and who is not. Flora also installed fi rewalls that protect the networks from virus attacks.

Practices to combat risks of consumerisation

Coming up with a solid plan of integrating consumer devices in enterprises is not an easy process. Many CIOs will choose to say no to allow personal devices in the offi ce. However, the amount of mobile apps available to end users, and the simplicity of integrating these devices to business systems continues to empower end users, making them less reliant on the IT department. Chances of them using their own devices, from simple fl ash disks to mobile phone synchronization and much more are high, the CIO might never come to know about it until there is a compromise in the system.

Some companies have creatively integrated personal devices to the business, creating a win win situation. One such company is Intel California. In 2010, Intel was faced with a situation whereby young techno savvy lots were coming into employment having grown up with different

gargets. These people did not understand why they couldn’t use their faster and better gadgets that they are used to, to increase their productivity in the offi ce. On average, Intel employees use about four different devices and multiple third party operations such as Facebook, Twitter, LinkedIn, Skype and other social networking sites for business and personal activities.

The company then decided to get views from their staff on what gadgets they will prefer to use, and for what purpose. After collecting views and concerns from staff, Intel implemented a new IT policy that allowed the use of specifi ed devices to perform specifi ed processes in the offi ce. Soon after this decision was passed, technical challenges started arising. The IT team had to go back to the drawing board and defi ne new security policies that would allow clients to use personal devices inside Intel.

One of the critical parts of any security policy is to have a solid end user license agreement. Intel came up with an end user license agreement that spelt out the rights and responsibilities of everyone involved in the consumerisation process. This agreement clearly spelt out logistical issues that were of concern. For example, what happens when an employee leaves the company? Do you give your employer the right to review and remove data from any personal device that was used for offi ce work?

Intel passed a rule that any user who wants to use their personal device to receive offi ce mail or link in any way with the system must sign the end user license agreement. The department manager for the employee must also sign the license agreement allowing that particular staff to use that device for the stated purpose. In addition, Intel put in a tiered policy capability whereby only devices that attained certain security standards can receive email attachments; any other phone could only receive the email without any attached documents. Intel also ensured that no device can get into the system, but data can be pushed into the device.

To Intel, consumerisation is productivity, effi ciency and fl exibility. When Intel embraced consumerisation of IT at

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

37

the beginning of 2010, 3000 employees signed up immediately. Towards the end of 2010, 20000 employees had signed up to the policy. This was a success story.

How do you handle personal appliances in the workplace

With the growing integration of the mobile phone for business operation and the increase in mobile workers worldwide, the trend of consumerisation is here is stay. The security environment for company data today is complex because data is no longer contained in the walls of a business, but ends up in the users’ personal devices. What enterprises need most is control of valuable data. Therefore, a company can install a centralised policy that is auditable and scalable. “Putting simple access control to data is one way of maintaining control over information,” says Flora Kinuthia.

McAfee, recommends certain steps for preparing for consumerisation. First is to deploy host and network anti-malware to reduce infections and protect company systems, a fi rewall and network intrusion prevention system (IPS) to control traffi c to and from key assets. Next is to enforce remote encryption and wiping of information and applications for company owned smartphones and other mobile devices. This will protect data in case of theft. McAfee recommends the use of network access control (NAC) to ensure employee-owned devices have proper security tools installed and are otherwise compliant with IT standards prior to accessing the network. NAC can control guest devices and other unmanaged endpoints and ensure they have limited ability to access resources or infect your network.

An alternative is to use virtualized desktops (VDI). With VDI, employees can access company applications and data on personal devices, but the application infrastructure and data remain on corporate servers behind the fi rewall.

CIOs can also implement encryption for information at rest and in motion. If a remote device falls into the wrong hands or a transmission is intercepted, encrypted information is unusable. Note that while this strategy is practical for company-owned laptops and employee-owned smartphones, it’s diffi cult to enforce data encryption on employee-owned PCs and Macs.

McAfee proposes a relatively new development called “PC on a stick,” in which thumb drives (USB drives) or memory cards store a customized interface or launch pad, user-selected applications, and data. Users can carry this computer-on-a-stick to any public or shared machine, plug it in, and begin working with familiar tools and personalized settings. When the drive or card is removed, there is no trace of the user’s work left on the PC.

Another alternative suggested is to deploy integrated endpoint security with a centralized management console to ease the effort required by security administrators and enable them to easily manage all endpoints in the system. An integrated, centralized strategy is more effi cient, more effective, and ultimately less expensive than deploying a series of point solutions.

McAfee is confident that if CIOs follow these recommendations and deploy a comprehensive endpoint security solution, it not only becomes possible to support the consumerisation of IT with adequate and effective security, but that doing so yields some nice benefi ts for the company. The greater mobility of the workforce and the ability of employees to work from home can also lighten other expenses, such as offi ce costs.

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

Tech

nolo

gy

38

If your awesome new smartphone is to have any hope of lasting longer than a day on one charge, it’s going to need more power than a typical lithium ion battery

can deliver.

Today, though, we’re wedded to our chargers, and glare hawkishly at people who hog airport and coffee-shop outlets for too long. Switching over to superfast 4G networks, as many smartphones will in the coming year, is only going to exacerbate this problem; and reports already indicate that 4G devices tend to have pitiful battery life. In fact, the power requirements of the technology being built into mobile devices is growing at twice the pace of battery-capacity increases, according to one Verizon executive.

But catching up with mobile power requirements won’t be quick or easy for the battery industry, and continuing diffi culty may discourage public adoption of new 4G devices. Unfortunately, the problem isn’t a simple matter of mobile battery R&D falling behind. It extends to the chemical nature of batteries, the way research and development is funded in the global market for mobile tech, and the many different demands users place on our phones and tablets.

Constrained by chemistry

Battery technology and smartphone technology are at two very different stages in their lifespans. “Unlike smartphones, battery technology has been evolving for over a century, and is much further down the development curve, meaning that improvements in battery technology, while steady, no longer happen at the breakneck speed of younger technology like smartphones,” says Keith Nowak of phone and tablet maker HTC.

But aside from tiny incremental improvements in solid-electrolyte effi ciency, lithium ion polymer batteries for handheld tech products haven’t changed drastically in more than 15 years. Almost all of the batteries that power today’s smartphones and tablets run on some variant of the lithium ion polymer battery--a cell in which the anode and the cathode are packaged with a solid, gel-like electrolyte (the substance that makes the battery conduct electricity). This solid-electrolyte design was developed commercially in 1996 as manufacturers sought a sturdier battery for mobile tech products. Previously, cell phones had run on lithium ion batteries with liquid electrolytes, which were bulky and relatively unstable.

Today, battery researchers continue to increase the capacity of lithium ion polymer batteries. Since a battery’s power comes from its transfer of electric-charge-bearing electrons between the anode and the cathode, battery researchers focus primarily on optimizing the multitude of mini-

transfers. “A lot of chemical reactions can take on a life of their own, and battery scientists try to control that,” said Irving Echavarria of Gold Peak Industries, a company that manufactures all types of consumer batteries, including lithium ion variations. Echavarria estimates that 80 percent of the processes in a battery can be accurately harnessed. And the smaller the battery’s window of errant chemical reactions, the more effi ciently the battery will provide power. Battery makers continue to achieve capacity gains by pushing closer to that 80 percent effi ciency limit.

But the incremental advances in effi ciency aren’t keeping pace with the increasing energy demands of smartphones and other mobile devices. Frustrated by the chemical and physical limits of batteries, developers who want to get longer run times out of smartphone batteries must either add active material to the battery by making the

Lithium ion batteries are nearing the limits of their possible power capacity.

Why smartphone batteries suckBy Megan Geuss

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

39

inactive parts of the battery smaller (a technique that has already reached limits of its own) or move from lithium ion polymer to a different, as yet not fully researched material.

New ideas coming, slowly

Small signs of innovation are visible on the battery-life horizon. The unanswered questions are how quickly they’ll emerge, and whether the technology involved will be scalable to serve the entire mobile world.

Lithium ion research continues in the R&D labs of many consumer-battery makers. And university labs across the country have churned out paper after paper on the possibilities of graphene, a single-atom-thick sheet of graphite that has the potential to store and transmit energy (though any use of graphene for consumer batteries is still a long way off).

It’s not just the battery, though

Designing a mobile device is no longer just about perfecting its computing power, design, and user interface; it’s about doing all those things with far less power. At some point, consumers’ desire for faster data plans and monster multitasking capabilities will be overtaken by the simple need for a device that can remain in operation for at least one full workday.

Smartphone screens are getting larger and supporting higher resolutions, both of which suck power like crazy. Lowering your screen’s brightness might help eke a few extra minutes out of your battery, but Apple, HTC, Motorola, and other major phone manufacturers are unlikely to move to smaller or duller screens anytime soon. Nevertheless, some (including Samsung and LG Electronics) are focusing on making new types of displays that are no dimmer but use less power.

Another major power drain relates to increasingly complex apps, which impose ever-steeper processing requirements. Most smartphones contain Bluetooth, Wi-Fi, and GPS radios inside, and in many instances these components operate simultaneously. The GPS radio, in particular, is a notorious battery killer: You can see the battery bar getting shorter as you run your navigation app. Newer phones add a 4G radio chipset, which requires a lot more processing power to decode far greater amounts of data encoded in the LTE wireless spectrum. On top of all that, new 4G phones have two different chip sets, to connect with a 4G spectrum and

with the carrier’s older 3G network. As a result, you can count on your battery to deliver only about a day of juice to your phone, if you’re lucky.

One consequence of runaway power consumption is that the makers of mobile processors are feeling a lot of pressure to produce more-effi cient chips for phones.

It’s the apps

Smartphone apps are the fi nal culprit in our rogues’ gallery of smartphone battery killers (with the physical limits of batteries ranking as the fi rst culprit). An app’s power usage is one of the things Apple examines when deciding

whether to approve an app for sale at the App Store. “[Apple] wouldn’t let you intentionally ruin battery life, like if you were running a game that didn’t require GPS, they would reject the app if it was pinging a GPS signal every 10 seconds,” says Cameron Vanga, a developer with iPhone app maker 9magnets.

Though the Android app market might harbor a larger number of potential power-sucking apps, more-established developers usually make an effort not to use more battery life than they need to get the app to function properly, for fear of receiving low ratings or having users delete the app. “Beyond maybe GPS applications, most users are good at correlating which apps are going to kill battery,” Vanga notes.

Most smartphone users are okay with taking their phones out for the day and then plugging them in to a charger each night, but battery makers are going to have to step up soon to deal with the voracious appetites of the miniature computers that everyone is relying on more and more every day. If innovation in battery technology doesn’t pick it up a little, the breakneck speed at which mobile tech innovation has been racing along could come crashing to a halt against a usability wall.

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

40

Sec

urit

y

Over the last two decades, the primary contribution of information technologies in fi rms has been about effi ciency and enablement:

to improve processes, make people more productive, reduce time to market, or enable things that couldn’t be done previously. The focus has been on costs and payoffs. This decade is witnessing a new challenge: data. There is suddenly too much of it, and while fi rms rush to mine it, they do so without adequate regard for the risks in keeping and using it.

Hardly a week goes by without yet another international scandal involving data. It made International headlines when news got out that Apple has been gathering consumer movement and use data on its devices, while Sony was hacked, with sensitive data on hundreds of millions of individuals stolen. Despite reassurances from these companies, it is hard to be certain whether and when this data will be misused. More importantly, the

reputations of these companies have been badly damaged. Many more incidents go unreported (like the scandals within your organisations).

Are these incidents any different in terms of potential impacts on franchises from product recalls due to defects in industrial products? Not really. And perhaps some companies are beginning to realize this.

Indeed, one major positive development from the Sony fallout has been the creation by the company of a “Chief Information Security Offi cer (CISO)”. This is a laudable step that others should follow. But it doesn’t go far enough in acknowledging the real problem.

Sony and many other fi rms view the security and use of data as a technical problem. But in fact, the governance of data is a management problem. The lapses we are seeing are not technical ones, but failures in management. Where

Guard your company’s reputationBy Vasant Dhar and Arun Sundararajan

Don’t gamble your company’s reputation on data governance

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

41

data is the lifeblood of commercial activity, its management in many industries must reside in the C-suite, not in the trenches.

Lapses in data governance in data-dependent industries are no different than product defects in the physical world. The reason is simple. Increasingly, it is information itself that is the product, with technology being the critical conduit for its exchange. Many industries that touch our lives on an everyday basis involve information products. If one considers the fi rms that we deal with every day, such as Google, Facebook, banks, media, and telecommunication companies, their products are information-based. Even when there is a physical product, digital interaction with consumers transforms part of the consumer experience into one that is information-based. Information products have different properties than traditional physical products and are subject to different economics and risks. Furthermore, the growing volume of data created as a by-product of this digital interaction brings with it signifi cant benefi ts as well as risks.

CEOs who are insulated from technology have largely failed to grasp the implications of this shift in the role of information technology from enabler to product and still expect their technologists to deal with all aspects of data. This is a mistake. They must partner actively with their CIOs in assessing the importance of data to their product or service and the franchise to avoid the reputational risks from the lack of effective data governance.

Isn’t it time CEOs were held accountable for technology?

When an automobile has a defect, it involves the CEO. If a brake or gas pedal is defective or a tire substandard, the CEO steps in immediately to manage the fallout and address its customers directly. The same must be true for data breaches and misuse. The Sony data breach was an important milestone in that its chief apologized, albeit somewhat late, for a defect in its information-based product. While Sony appointed a dedicated CISO to deal with data security, it didn’t go far enough in acknowledging that this is a management problem, not a technical one.

We believe that fi rms need to give the same level of importance to their fi rm’s data governance policies as they do to their company’s products, fi nancial reporting practices, or brand equity management. Viewing data privacy

management through the lens of network management or potential liability is too narrow. This isn’t a legal, technological or compliance issue. Rather, it’s an executive matter, one made more critical by the continual increase of data and the corresponding increase of risk in cyberspace.

As devices become more powerful, providing more and richer electronic touch points to human activity, the scope of available electronic information explodes, and the associated risks to handling these data also grow exponentially. Companies actively collect and mine this data and even sell it without considering the risks.

These developments strengthen the case for the CIO being a full-fl edged member of the C-suite and embracing the new role of managing their fi rm’s data with a more holistic and strategic approach. CIOs should partner with their CEOs in putting in place a coherent and transparent policy that defi nes the frequent and deliberate choices about what data to acquire, keep, use and share. A fi rst question that such a policy might answer is: Do we keep too much data? Our research suggests that the answer to this question is generally “yes.”

The less data you keep, the less you need to worry about keeping it secure. Next, it is essential to have a clear idea about the use of the data you keep, and specifi cally, to assess whether this use is congruent with the customers’ intent when they provided it to your fi rm.

It took a global fi nancial crisis to get the public to pay attention to systemic fi nancial risk. There is equivalent and growing systemic risk in cyberspace. We hope it does not take a massive data breach at an Apple, Google or Facebook to make data governance a top executive priority. Because once that data is out there, it’s out there for good, and there’s no taking it back.

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

42

Opi

nion

James Wire Lunghabo | CIO Uganda Bureau

The 12 of May 2011 marked the swearing in of the president Yoweri Kaguta Museveni of

Uganda who will lead the country till 2016. In his inauguration speech, the president reassured Ugandans and the world at large of the country’s intention to become a middle income country by 2016.

“In a period of almost 90 years, between 1894 when the British colonized Uganda and 1986 when the national resistant movement took over Government, we had only 28,000 telephone lines. We now have over 14 million telephone lines. You cannot build a modern economy without modern infrastructure. By this, we mean: electricity, roads, the railway, piped water, telephones, ICT network, media, as well as social infrastructure,” he said.

These comments have signifi cantly re-assured the ICT community in Uganda since it had been perceived that the Government was merely giving lip service to the sector.

Lately, a number of ICT projects and businesses have found their way into Uganda with leading brands like Ericsson, Alcatel/Lucent , Huawei, TATA Communications among others set locally. The benefi ts of the undersea fi bre cables landing on the East African coast are beginning to trickle down to the end users with connectivity prices going down signifi cantly. The competition in the Mobile Telephony arena is so intense that it is now possible to call across all networks for Ushs 90/= per minute down from Ushs 300/= a year ago.

The government of Uganda designed a Job Stimulus Program (JSP) aimed at creating job opportunities for the youth (who form a large percentage of the population) mainly through the use of ICT. In line with this, the National Information Technology Association (NITA-U)

contracted the Faculty of Computing and Information Technology at Makerere University to train an initial group of 500 graduates in Business Process Outsourcing skills. This group graduated on the 26 of April 2011.

In the past two years, a number of bills have been passed to align the ICT sector with international best practises. So far, the Computer Misuse Bill, Electronic Transactions Bill, Electronic Signatures Bill and Regulation of Interception of Communications Bill have all been passed by the 8th parliament.

An IPv6 task force was set up by the Ministry of ICT to lead the migration of the country from IPv4 to IPv6. Though having started late, the realisation of its importance is what is much appreciated by the stakeholders.

In a March 2011, the Minister of ICT, Hon. Aggrey Awori issued a press statement on the digital migration situation in the country. He stated: “I would, therefore, like to assure the general public that the government of the republic of Uganda through the Ministry of Information and Communications Technology will ensure a smooth and successful transition from analogue to digital television broadcasting by 17 June 2015. In preparation of this international Analogue Switch Off (ASO) date, I urge all stakeholders to join efforts to make the migration process a success.”

The Ministry has made progress towards the move to digital broadcasting. A digital migration task force has been set up, a digital migration policy has been put in place, private companies are being licensed to provide digital terrestrial broadcasting services, and a regional broadcasting technical task force has been set up.

ICT industry watchers are eager to tap into the new opportunities that are presenting themselves in Uganda. With 5 years to go, the sky can only be the limit. As the case always is, it takes one thing to plan and another to effect the plans.

ICT takes center stage in govt plans

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

43

Ruth Kang’ong’oi | CIO Rwanda Bureau

If you use the Internet then you probably use Internet-based communications to contact

family, friends, co-workers, business partners or customers. With the high cost of living, people want to save money on phone calls by sending instant messages or by using VoIP instead of making a phone call. Instant messaging has become very popular because of its real-time

nature whereby you don’t have to wait for the receiver to check his or her email in order to send a reply.

Four years ago, Patricia Nyirahabimana was just a simple businesswoman with a stall in Kimironko market, one of the suburbs in Kigali. Her business specialized in supplying vegetable and fruit to regular shoppers in Kigali. Fast forward to 2011, her stall supplies the same commodities to different supermarkets, all without necessarily leaving the comfort of her home. Patricia thanks this is to a blackberry that her nephew gave her for her 40th birthday.

“It took me about three months to fully master the use of this phone. But now I am a pro at sending SMS’s and emailing. I owe all my blessings to this mobile phone but most especially, Facebook,” Nyirahabimana says amidst laughter.

She is one of the hundreds, or probably thousands that are reaping big from the benefi ts of social media. Social media is advancing rapidly and has already changed the way many companies and individuals do business in Rwanda. With new computers and mobile devices offering a higher level of communication, businesses are improving their marketing and networking skills, staying in touch with the competition and their own customers, and making improvements in the way they conduct research and marketing intelligence.

With help from her teenage son, Nyirahabimina developed a Facebook page, fully decorated with fresh fruits and vegetables, her business contacts and list of clients.

“When my son suggested Facebook, I did not understand how it would be connected to my business at fi rst. I however did not discourage him and today, I am glad that his efforts have helped change our lives,” she says.

Upon launching the Facebook page, phone calls trickled in slowly. Her fi rst order came from a friend of her friend who wanted a large consignment of fruits for his anniversary party. The rest as they say is history.

Besides Facebook, many businesses in Kigali are harnessing the power of social networking tools like LinkedIn and Twitter which helps them share the latest company news and reach out to their clients directly. Because these tools are interactive, businesses can use the instant feedback they receive as a way of speeding up research, helping them to develop and grow their business faster.

Andrew Mugisha, a man who advises young entrepreneurs on using social media to market their businesses says that the advantages of using social media in business are vast and can move limping business to a leap in a short time.

“Social media helps you build new relationships and networks. It helps you strengthen existing relationships, create brand awareness, inform customers about new products and services, get feedback from clients to improve your business and customer relations, increase customer loyalty, know your customer base better and target them more effectively among so many other advantages,” he says.

With agriculture being the principal foreign exchange earner in Rwanda, the Ministry of Agriculture introduced an e-soko project. Through SMS, farmers, consumers and traders get up-to-date market price information for commodities using mobile phones.

e-soko which is already being used by approximately more than 7,100 farmers was created to address the problems of lack of information on current prices of agricultural products as well as minimizing the exorbitant price hikes by brokers or middlemen who take advantage of ignorant farmers.

Real time comm. & marketing

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

44

Opi

nion

HARD TALK | Bobby Yawe

I recently wrote on my facebook wall that I had purchased a book on how to use the site and other

social media sites. There were a number of responses, most of which where condescending and some plainly derogatory.

The attitude that if I can move the mouse around the screen then it means

I am competent in using the site needs to come to an end, and soon. RTFM is critical if we are to benefi t from ICT through increased productivity.

It is unfortunate that I am preaching to the proverbial choir as if you have read this far in the magazine and also into the article that you fully appreciate RTFM but none the less read on as exercise to keep doing.

I reminisce of the good old days when I was a newbie in the ICT fi eld trying to understand DOS and its ilk of operating systems. Reading a manual was mandatory as there was no graphical user interfaces, all you had when you turned on the computer was a green fl ashing cursor.

Having come from doing physics in high school and carrying around a book we fondly called Abbot, I was not one to shy away from large volumes. The DOS manual compared to the Abbot was equivalent to the Beano weekly.

When you bought a computer or application software, the manuals weighed a ton. The same information plus more is today provided as a PDF or online help, does the reduced weight mean that it is no longer necessary to read?

Users have access to wizards, videos, hyperlinks, discussion forums, webinars, audio notes and many other substitutes for RTFM yet we know less of the features and functionality of today’s applications than we did of those chunky old character applications.

Getting back to the facebook for dummies book that I am reading, it has become very clear to me that 99% of

those who use social media and computers have as little understanding of the features beyond login and posting.

This is a situation identical to that with users of the VCR (for the uninitiated that stands for video cassette recorder) who never got to know how to set the clock. Many have since moved onto to VCD, DVD and now Blu Ray without understanding more than how to insert the media.

RTFM transcends ICT to our daily life. A clear refl ection was how, as a nation of educated people, we handled the issue of a new constitution where many of us opted to look, listen and comment on the document based on what we heard from others. As “learned” citizens, such an action is a slap in the face of those who took us to school.

Due to the death of RTFM, productivity has in many cases dropped due to the installation (not implementation) of computer systems in organisations and in our life in general.

Organisations have spent millions and will continue to do so in installing systems that will actually make them less productive all because they listened to the pitch from vendors and their ICT staff about what the system could achieve, and made decisions based on the information provided.

In a previous article, I mentioned the issue of a local bank who have replaced their fi nancial system twice in less than 5 years and there still has been no noticeable change in its operations. The staff take more steps to carry out an operation with the new systems than with the previous ones.

With many such organisations, a major cause is the reduction in the time staffs spend in training on use of the system because it was “said” to have a friendly and intuitive graphical user interface. Due to the so called ease of use interface, the organisation sees no reason to provide comprehensive documentation to the staff on the usage of the application.

Just like with the VCR and those smart phones we carry around and have never read the manuals, staff at all levels of organisations, even those who know better, are using the look and learn kindergarten and apprenticeship method to use applications. The result is that we have to deal with PEBKAC, PICNIC, PIBCAK and ID-10T error whose solution is RTFM.

Is RTFM dead?

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

45

SECOND OPINION | Sam Mwangi

In Kenya and East Africa, there is a critical shortage of resources and opportunities for people

with physical or mental disabilities. One major challenge that people with disability face is low literacy levels and consequently, access of modern technology is limited.

Various organizations are providing basic training on fundamentals of computer literacy that will positively impact on the lives of people living with disabilities. One such organisation is Deaf Aid, a Norwegian development organization that has partnered with Cisco Systems to establish a Cisco Networking Academy which has a lab to train deaf students with ICT skills.

The academy had to develop sign languages useful in the identifi cation of gadgets like hard disks, and the Internet. 15 students have since graduated from the Academy program, 11 of them have found internships while four have started full-time jobs.

Andrew Wasike, a former student at the academy, is a technician with Computer Planet. Computer Planet is a computer maintenance and networking services company located along Mombasa Road, Nairobi. Wasike is responsible for software installation, networking and repair of computers and printers. This is a rare opportunity for a deaf student.

Another organisation that has devoted its time and resources to the plight of the disabled is inABLE, a US based organisation operating in Nairobi. To improve future opportunities for the visually impaired children, inABLE has brought computers, the Internet and assistive technology to the children of Thika School for the blind. The organization believes that computer literacy will not only allow students to bridge the academic gap with their sighted peers, but also arm them with valuable skills, allowing them to enter a job market place that has dismissed them for too long.

The cell phone is a device that many visually impaired people fi nd diffi cult to operate. A phone has got a screen,

keys, and switches for power and volume. One key is often indistinguishable from another by touch, the screens are small and the switches are often in inconvenient locations. Incorporating a keyboard for sending text further complicates the device. Most phones do not have audio output of the keys pressed or information displayed on the screen.

Over the years, several companies have attempted to create accessible phone designs for the visually impaired. Audiovox was one of the fi rst companies to develop a voice-recognition system for the cell phone. Its voice guidance system gave users the ability to speak a phone number to dial, and listen to incoming caller ID. Verizon soon followed with its own software, the voice genesis Vemail that allows email to be read aloud on some phones. Samsung entered the fi eld with the concept of a Braille keyboard phone. The touch messenger would enable visually impaired users to carry on a mobile conversation in Braille. The device has two Braille pads. Messages can be typed on the top keypad and read on the lower.

Some cell phones advancements can have previously unforeseen benefi ts for visually impaired users. Kurzweil Technologies, the inventor of various text-reading devices, has developed a device based on the Nokia N82 smart phone. This new phone literally reads to you. Take a picture of a printed page or an object, guided by a voice-recognition system. Press a button, and presto—printed material is read using a synthesized voice.

So, how would the deaf use smartphones? For most smartmobile phones, they must send text messages. But that can be limiting because it doesn’t convey emotions, voice infl ections or body language. Engineers at the University of Washington have developed a system that helps the deaf and hearing-challenged users communicate using video chat. For most people, video chat on cellphones is a fun application. But for deaf users, video chat could make a huge difference to their quality of life.With video chat, they can use Sign Language, just as they do in face-to-face conversations. The software, mobile ASL, can potentially run on any device. The software is specially designed to allow video chat through cellphones, without taking up a lot of bandwidth.

Technology access for the disabled

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

46

Bus

ines

s Ti

ps

Old smartphones never die--they just get stuck in a drawer after being replaced by something newer and cooler. Ah, well, that’s what happens

in these fast-tech times, right? Out with the outdated, in with the latest and greatest.

That’s true for MP3 players and digital cameras, maybe. But smartphones? They’re another story. A smartphone sitting in a drawer is a waste of pocket power. In fact, whether you have an old BlackBerry Pearl, a Palm Centro, a T-Mobile G1, or even a fi rst-gen iPhone, you have plenty of ways to put an aged handset to good use. After all,

you paid good money for that once-sexy communicator, so why not get some extra bang for your buck?

Below I’ve rounded up seven fun and practical ways to resurrect an old smartphone (as well as an eighth option). Not every suggestion listed here will work with every phone, but I guarantee that you’ll get at least a little more mileage from your moldy mobile.

Keep an emergency phone handy: A deactivated smartphone (or, for that matter, any cell phone) still should be capable of making one kind of emergency phone call. So why not stick your old phone in, say, your glove compartment or offi ce desk for use in case of emergency? After all, you never know when you might lose or break your primary phone. Just make sure to have some kind of power supply available, whether it’s an AC adapter, a car charger, or an external backup battery.

Use it as a Wi-Fi phone: Just because you’re no longer paying a carrier for your old phone doesn’t mean you can’t use it to make phone calls. If the handset has Wi-Fi capabilities, you can bypass the carrier and use a Voice-over-IP service such as Fring, Skype, or Truphone. Bottom line: If you have access to Wi-Fi, your phone can be a phone again.

It’s still a perfectly good MP3 player: Even Stone Age smartphones like the Palm Treo can pull double duty as an MP3 player. Why bother if you already have, say, an iPod? Simple--since it doesn’t matter if your old phone takes a beating, it’s the perfect MP3 companion for mountain biking, rock climbing, jogging, and other rigorous activities that might prove too perilous for your “good” player. Not going bungee jumping anytime soon? Hand your old phone to your six-year-old--after stocking it with favorite Disney songs, of course.

Who needs a Nintendo DS? So the IT department doesn’t want you to load chess on the company iPhone. That doesn’t mean you can’t still have fun on the run. You can fi nd games aplenty for all smartphones, including older models with resolution-challenged screens and poky processors. Even if you cancel your cellular service, your old phone can still access its respective app store via Wi-Fi. Solitaire, chess, sudoku, Bejeweled--you’ll fi nd all the classics and more.

8 uses for an old smartphoneBy Rick Broida

Your fi rst-generation smartphone may be old, outdated, and out of contract, but it can still serve a purpose (or eight).

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIP www. .co.ke

47

And, sure, maybe you’ve moved on to bigger and better diversions on your current phone, but the old model might make the perfect game-me-down for the kids.

You’ve always wanted an e-reader: Why spend money on a Kindle when your smartphone offers the same basic functionality? All you need is an e-reader app; Amazon itself offers apps for Android, BlackBerry, iOS, and Windows Phone 7. If you want e-books for your Palm or Windows Mobile device, try eReader or Mobipocket. Sure, a phone’s screen is smaller than a Kindle’s, but it’s also backlit--a nice perk when you’re trying to read in bed. This way, you won’t need to worry about running down your phone battery while perusing the classics.

It can’t hurt to have more portable storage: While I’m on the subject of saving money, why buy a fl ash drive when your smartphone offers the same basic functionality? Most phone models have at least a couple gigabytes’ worth of on-board storage, and most provide removable-drive-like

capabilities when plugged into a USB port. (iPhone users will need a third-party utility such as iPhone Explorer to tap the on-board memory.) Use your phone as a mobile data-storage unit for transporting large fi les, backing up important documents, and the like.

Remember the Pocket PC? A mighty powerful processor lurks inside that old phone, so why not take advantage of it--even if it’s just for basic, everyday tasks? Put the handset to work as a fi nancial or mortgage calculator, an alarm clock or world clock, a to-do list manager, or a digital notepad. Heck, if you have Internet access via Wi-Fi, you can use the phone for quick-and-dirty Google searches and other Web activities. Check sites such as Handango for oodles of software that can run on older phones.

Not liking any of these options? Recycle or sell your old smartphone. After all, it’s a shame to hold on to a neat gadget that a less-cutting-edge someone else could put to good use.

June 2011 | Vol 3 | Issue 3

BUSINESS TECHNOLOGY LEADERSHIPwww. .co.ke

48

Last

Wor

d

Dennis Mbuvi

Dennis Mbuvi

[email protected]

Deja vu!

It has happened before; in fact I have done it before. I am talking about a characteristic trait of the ICT industry – giving your consumer a bad experience.

At one time, when I was a college student, I happened to be lucky enough to get a few jobs. The jobs were as simple as making brochure websites for a few clients. The timeline was long enough to fi nish

the job, but come the due date, the only thing I had to show was a list of requirements. It took several more calls and meetings after that for the job to be done. At some point, my clients may have felt that passing the proverbial eye through the eye of a needle was a simpler task than engaging me as a client. It did not help that some of those clients came back to me after going through a similar harrowing experience with a different consultant.

This bizarre habit did not stop there. The clients themselves had bizarre lists of requirements, often we argued whether they were really necessary or had any impact. There was one client who loved banners so much that he may have as well used a giant billboard instead of a website. The client was not satisfi ed until he saw a range of colours fl ashing everywhere and moving in opposite directions. In addition, many clients wanted to fi ll their website with information that they needed rather than what was important for their publics.

Typical of websites a few years back, visitors were treated to missions, visions and speeches of various people in the organization. As you scrolled through the last pixel of the home page, there was barely any information of

what the organization is all about. Remember how University websites used to look like? The sites were full of glorious speeches of the chancellors and vice chancellors. Students had to go beyond the website to fi nd basic details such as the academic calendar, university maps for new students and contacts of the security department after a party gone wrong.

Fast forward a few years later. This time round, we are seeing all fi rms from the small start-up that works off the iHub to a large corporate with a high rise building as its headquarters, taking their customers through the same process. Say a customer accesses a company website today and would like to purchase a product online. What follows next is a chaos cocktail.

There is the telecommunication service provider who people say that one is almost required to kiss the feet of the CEO before successfully subscribing to an E1 line. There is the mobile money online payments integrator whose product requires a visit to a certain doctor in Loliondo Tanzania before you can successfully integrate their product into your systems – calls and emails sink into a black-hole never to be replied. Then there is that Internet Service Provider (ISP) who promises you a galaxy of megabits and entertainment once you subscribe for an installation. On paying for installation, the ISP suddenly discovers that their signal coverage is nonexistent in your area. A coffee farmer will plant a new crop, harvest, sell and get paid for it before the said ISP processes your refund.

I can go on and on to show you how hard it has become for clients to purchase any ICT product successfully online. We seem to take pride in complicating our business processes and providing zero after sales support.

Does it take rocket science to provide a service and satisfactorily support the same?

The great mis-experience