Connect with us

InfoTech

First Term: Experts Score Buhari Administration High On ICT

Published

on

Experts Score Buhari Administration High On ICT
Share
By Funmilola Gboteku and Florence Onuegbu

The Information and Communications Technology (ICT) Sector in Nigeria has witnessed tremendous growth during the first four years of President Muhammadu Buhari’s administration.

Information Technology (IT) experts attribute the growth to the various friendly ICT policies put in place by the Federal Government.

Gbenga Adebayo, Chairman, Association of Licensed Telecommunications Operators of Nigeria (ALTON) in his candid assessment, says the Federal Government has done quite well in the last four years.

“I think it will be fair to say a score of 80 per cent, owing to the progress the administration has made in the past years, ‘’ he notes.

Adebayo says the industry has made a lot of progress in terms of broadband penetration; hence, achieving the broadband target and even surpassing it.

“We have more Foreign Direct Investments (FDIs) coming into the ICT sector and because of the relatively stable policy of government, the industry has been able to support a number of other sub-sectors of the economy.

“So, on the average, we are able to say that the Buhari’s administration has done quite well in the last four years,’’ he says.

Adebayo says unfortunately it appears that the progress of ICT in the country is being taken for granted.

He laments that telecommunication no longer has a mention by the government as one of the priority sectors.

According to him, it should not be, because ICT is a major driver of the economy.

“We are the infrastructure of infrastructure and we think that wherever issue of development is being discussed, ICT should be in the forefront.

“Other sectors that the government is making efforts to develop are all dependent on ICT in one way or the other.

“So it would appear that we are no longer in the first line of interest of government; which should not be.

“As you know, we are in technology industry and technology is changing by the day; hence, the need for new investments, for new hardware and software.

“So we think that as part of our development as a nation, ICT should continue to be one of the issues of development that we should consider,’’ Adebayo explains.

He says there is no enough protection of the industry by government, as there are issues of base stations’ closure and seizure.

Adebayo says the industry is quite vulnerable and such vulnerability has exposed the issues of multiple taxation and multiple regulation.

According to him, taxes and levies have increased to 39 across all tiers of government in the country.

“I think that government should consider harmonisation of the taxes and levies. Telecom is on the exclusive list of the Federal Government.

“It is the responsibility of the Federal Government to protect the sector, even from issues of interference, multiple taxation and regulation.

“So in my view, the major problem that we face is the issue of site closure and multiple taxation.

“We have issue of foreign exchange and government solved the problem. So the issue of multiple taxation is something the Federal Government must look into.

“I think the time has come that government should take up ownership and protection of infrastructure. We continue to require investments both foreign and local investments; and people will not invest if the industry is unstable,’’ he says.

Ikechukwu Nnamani, the Chief Executive Officer, Medallion Communications says the Buhari’s administration has done well in the arrangement reached by the National Executive Council in respect of Right of Way (RoW) fee.

Nnamani says a number of states have been able to lower their RoW rates, which has enabled deployment of more fibre infrastructure.

Muhammed Rudman, the President of Nigeria Internet Registration Association (NIRA) wants the Federal Government to prioritise significant investments in ICT infrastructure in the next four years.

Rudman notes that although through government’s contributions to the ICT, the  industry has been able to deepen broadband penetration by 33 per cent but more effort needs to be made in ensuring that the rural areas also benefit from it.

He explains that the government already has laid-down policies regarding the ICT industry.

“The best time to implement the policies, which include the deepening of broadband penetration and building infrastructure is now.

“My advice is actually to have an ICT roadmap, that would ensure both the government and private sector identify all the stumbling blocks in the industry and address them.

“The players in the ICT industry should actually have an agenda that they will push to the government every year, so that the sector can grow,’’ he suggests.

Rudman points out that it will go a long way if the president can also resolve the issue of RoW and multiple taxation which are some of the major challenges faced in the industry, most especially by telecom companies.

He notes that those challenges were some of the things slowing down the telecommunications industry, while urging the government to address the issues.

The NIRA boss adds that the government needs to continue investing heavily in the sector, because it has played a big role in terms of revenue generation and also creating employment for citizens.

Also speaking, Chief Deolu Ogunbanjo, the President of the National Association of Telecommunications Subscribers (NATCOMS) says a lot has been achieved in terms of broadband penetration during the President’s four-year tenure.

“In 2014 to 2018, broadband was between 18 to 20 per cent.

“However, according to Nigerian Communications Commission (NCC), we now have 33 per cent broadband peneration, which shows that a lot has been achieved in last four years of the Buhari’s administration.

“To sustain the growth, the government should set another benchmark for 2019 to 2023 where we should be looking at a minimum of 70 per cent or more broadband penetration.

“The government through some of its agencies like NCC is ensuring that Infrastructure Companies (InfraCos) develop both the rural and sub-urban areas.

“NCC is supporting infracos by giving them some money to develop their structures and services,’’ Ogunbanjo notes.

He also suggests that government needs to have refined policies that will gear the industry toward achieving 75 per cent penetration by 2025.

Ogunbanjo urges the Federal Government to invest more in the sector because the ICT industry is the future of Nigeria, aside from oil and agriculture.

Most ICT industry experts are of the opinion that President Buhari’s administration has done quite well in the ICT sector of the economy and can do better in the second term.

The expert, however, note that the industry is a work in progress.

They point out that it is imperative to tackle the challenges of multiple taxation and multiple regulation, if further growth must be achieved in the ICT industry.

InfoTech

Cloud Security and its Role in Healthcare Cybersecurity

Published

on

Share

By Engineer Olusola Omotunde

The advent of cloud technology can be traced back to the 1960s according to https://www.cloudzero.com/blog/history-of-the-cloud/.

Cloud technology has evolved from a myth to a revolution in the global space.

In fact, it forms one of the best ways to secure data and save organizational funds.

A drift from the era of physical data centers has become the norm.

Cloud platforms like Amazon and Azure have taken over the scene even in developing climes.
How much space does an organization need for its operations and what is the cost effect?

Another pertinent point would be, the security of organizational data.

In this paper, we will provide a synopsis of cloud security and its role in healthcare cybersecurity.

The healthcare industry is one of the most critical aspects of any nation. How safe are patient’s data? What are the mitigating factors? How regularly does the IT team carry out an assessment of the security in place? In all of these, cloud security comes into play.

Cloud security is critical in healthcare cybersecurity because it provides the tools, processes, and policies required to protect sensitive patient data and assure regulatory compliance in an increasingly digital environment. Healthcare organizations that use cloud services for electronic health records (EHRs), telemedicine, patient portals, and other services face specific cybersecurity challenges, such as protecting huge amounts of personally identifiable information (PII) and protected health information (PHI).

Below are some aspects where cloud security contributes or plays pivotal roles in healthcare cybersecurity:

1. Data Protection

• Data Backup and Recovery: Cloud solutions provide backup and disaster recovery capabilities, which assist healthcare organizations in protecting data from loss due to cyberattacks or system failures.

• Encryption: Cloud providers provide sophisticated encryption options for data at rest and in transit. This is critical for healthcare providers to safeguard sensitive patient information from unauthorized access.

2. Prevention and Detection of Threat

• Real-time Monitoring and Alerts: Cloud security solutions can provide 24-hour monitoring and notifications if suspicious behaviour is discovered. This quick response capability is crucial for healthcare organizations to avoid or mitigate the effects of cyber events.

• Advanced Threat Protection: Cloud providers provide services that include threat detection features like intrusion detection, malware scanning, and vulnerability assessments. These services assist healthcare organizations in identifying and addressing hazards before they cause harm.

• Automated Patch Management: Cloud providers frequently handle patch management for their infrastructure, ensuring that systems are up to date against the most recent vulnerabilities, which can dramatically minimize the risk of attack.

  3.  Flexibility and Scalability

• Scalable Security: As healthcare organizations expand, cloud security can scale with them, allowing for the installation of additional security measures without requiring major infrastructure upgrades.

• Adaptable Infrastructure: Healthcare organizations can quickly respond to emerging threats with cloud-based solutions that include updated security tools and services. This adaptability is critical in a dynamic threat context.

4. Cost Efficiency

• Pay-as-you-go Model: Many cloud services use a pay-as-you-go model, which allows healthcare providers to only pay for the security services they use. This can help organizations manage costs while still providing high-quality security tools.

• Reduced IT Costs: Cloud providers manage and maintain the infrastructure, eliminating the need for healthcare companies to invest heavily in on-premises security hardware and personnel.

5. Regulatory Compliance

• HIPAA and GDPR Compliance: Cloud providers that service healthcare organizations frequently offer solutions designed to comply with industry-specific standards such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States and the General Data Protection Regulation (GDPR) in Europe.

• Audit Support: Many cloud services provide logging and monitoring capabilities to assist healthcare organizations in tracking and auditing data access and usage, which is critical for regulatory compliance.

Key Considerations for Healthcare Providers across the globe

When healthcare providers deploy cloud solutions, they must address a number of security concerns to safeguard sensitive patient data, ensure regulatory compliance, and manage possible risks. It is also important that they scrutinize the security certificates held by cloud providers, ensure that they clarify ownership rights to their data with their cloud providers, training staff on the security best practices which include training on data handling, phishing awareness and secure access protocol.

There is no one-size fits all rule other than being careful!

Engineer Olusola Omotunde is an IT expert and writes from Lagos, Nigeria


Continue Reading

InfoTech

The World Today, Data Ethics and Privacy

Published

on

Share

By Emmanuel Oye-Adeniran

Data is becoming a vital resource in the digital age, propelling innovation and decision-making in many sectors of the economy such as Construction, Healthcare, Agriculture and Finance. However, data ethics and privacy worries have increased along with data gathering, storage, and analysis growth.

Discussions concerning the ethical use of data and the defence of individual rights in a society that is becoming more interconnected revolve around these issues.
This article looks at the importance of data privacy and ethics as it affects today’s world.

Many years ago, before the advent of digitalization, it was of no consequence to share an individual’s information with or without consent which made it quite interesting as there were no laws safeguarding individual’s data, in fact, people did not bother much.

However, in the new era of digitalization, a person’s data must be treated as private.

They have entrusted you with their bank details, contact addresses, etc and they must be kept private.

Cybercrime has become so prevalent globally that many have argued it has come to stay. Well, this might not be untrue considering how long it has become an issue on the front burner.

A synopsis of data privacy between the 16 and 19th centuries reveals that privacy was mostly a problem with physical areas and communications. The necessity of maintaining communication secrecy was brought to light by the development of the postal system in the seventeenth century (Ref: Mark ElliotAnna M. MandalariMiranda MourbyKieron O’Hara).

In today’s age of online shopping, social media interactions and AI technology, it has become evident that various platforms usually collect people’s data for various purposes, ranging from marketing intelligence to improved user experience.

A look at some of the elements which are related to Data privacy and ethics in today’s world:

(i)Transparency and Accountability:

Stakeholders are holding digital businesses more and more responsible for their ethical behaviour and data policies. Gaining the trust of users requires being open and honest about the goals, techniques, and possible risks associated with data collecting. Businesses should make their policies on the gathering, handling, and distribution of personal data easily understandable.

User permission and data control procedures should also be simple to understand and intuitive. Accountability techniques, such recurring audits and impartial supervision, can guarantee that businesses follow legal and ethical criteria.

(ii) Bias and Fairness:

The computer is obviously not intelligent without human input, and so it must be fed with the right unbiased information. If the Algorithm is discriminatory towards a social class for instance, then this nullifies the essence of Data ethics.

Algorithmic bias poses a significant ethical challenge in technology use. Machine learning algorithms, while powerful, can perpetuate and amplify biases present in training data. This can result in discriminatory outcomes, reinforcing existing social inequalities.

Ethical technology use requires ongoing efforts to identify and mitigate bias in algorithms. Companies must prioritize fairness and equity in designing and implementing AI systems, ensuring that technology serves diverse populations without perpetuating discrimination. 

(iii)Consent and its role:

The use of ambiguous policies often makes it almost impossible for users to make very safe and informed choices about the implications of sharing their data and so it is imperative that policies be made simpler for users to understand. This would by a long shot, provide a proper decision-making process.

(iv)Empowering users:

Enabling consumers to take control of their data is essential to using technology ethically. It is critical to give people easily available tools for controlling privacy settings, comprehending data usage, and making defensible judgments about disclosing personal information. Initiatives aimed at raising user knowledge and education can support people in advocating for their right to privacy and navigating the digital world. By enabling people to take charge of their digital identities, businesses can cultivate a climate that values data security and online privacy. People must be given more rights to their data.

Conclusion

In today’s ever-evolving world of digitalization, it is imperative that stakeholders especially corporations adhere to the rules of data ethics and privacy.

Every clime must ensure that their users are protected by establishing laws and reviewing such existing laws to protect their users. Some of the data protection and ethics laws like the Pan-African initiatives of 2014, the Nigeria Data Protection Regulation (NDPR) issued in 2019 and the European GDPR which came into effect on the 25th of May, 2018 are some of the efforts by various governments across the globe to stem the abuse of peoples’ rights to their Data. The laws are quite clear and focus on some salient points such as, Increased accountability & transparency, Empowerment of individuals, Standardization across the EU and Encouragement of best practices. These laws must be adhered to.

Big world corporations must put the customer’s rights at the front burner.

Continue Reading

InfoTech

Network Engineering in the AI world

Published

on

Share

By Engineer Seun Omotoso

Introduction

AI developments are driving a change in network engineering. Historically, network engineers were responsible for building, deploying, and managing physical and virtual network infrastructures to ensure flawless connectivity and data flow.

However, incorporating AI into network engineering is transforming how networks are maintained, optimized, and secured.
This article examines the importance of network engineering in the AI field, focusing on significant advancements, applications, and future prospects.

The Intersection of AI and Network Engineering

Enhanced Network Security

(i) Threat Detection and Response: AI-powered security systems can recognize and respond to threats in real-time.

Machine learning models analyze network traffic patterns to detect anomalies that may indicate a cyberattack, such as DDoS attacks, phishing, or malware.
(ii) Adaptive Security Policies: AI can generate and update security policies in response to developing threats. This adaptive strategy ensures that the network is constantly safeguarded against the most recent security threats.
(iii) Incident Response Automation: AI systems can automate incident response tasks such as isolating affected network segments, blocking malicious traffic, and initiating recovery protocols.

AI-Driven Network Management

(i) Automation: Artificial intelligence enables the automation of common network management tasks such as configuration, monitoring, and troubleshooting. AI-powered systems can detect problems, apply solutions, and optimize network performance without requiring human intervention.
(ii) Predictive Maintenance: Machine learning algorithms can analyze previous network data to identify possible failures and performance degradation, allowing for proactive maintenance and reduced downtime.
(iii) Self-Optimizing Networks: Artificial intelligence (AI) can dynamically alter network parameters to optimize traffic flow, bandwidth utilization, and resource allocation in real-time.

Network Analytics and Insights

Performance Monitoring: By examining enormous volumes of data, AI technologies offer profound insights into network performance. These understandings aid in the detection of bottlenecks, the comprehension of user behaviour, and the enhancement of network efficiency in general.
AI can predict patterns in network consumption and assist with capacity planning, which ensures that network resources are scaled in accordance with demand.

User Experience Optimisation: Artificial intelligence (AI) can recommend ways to improve user experience, like cutting down on latency and raising service quality, by examining user interactions and network performance

Key Technologies for AI-Driven Network Engineering
Machine and Deep Learning

Machine learning algorithms are at the heart of AI-powered network management, allowing systems to learn from past data and make sound judgements.
Deep learning, which can handle complicated and high-dimensional data, is utilized in increasingly advanced applications such as picture and voice recognition in network security.

Natural Language Processing (NLP)

Natural Language Processing (NLP) enables network engineers to engage with AI systems through natural language commands. This makes network management more understandable and accessible.
Internet of Things (IoT) Integration
AI assists in managing the enormous number of IoT devices connected to current networks. It provides seamless connectivity, efficient data routing, and security for IoT ecosystems.

Some key challenges

Skill set development- Network engineers especially in developing climes, must learn new machine learning and artificial intelligence techniques. It takes ongoing education and training to stay up to date with technical developments.

Scalability-Scalable AI solutions are necessary to manage the expanding scale and complexity of contemporary networks. Effective algorithms and substantial processing power are needed for this.

Inter-operability- AI integration with the current network architecture can be difficult. For operations to run smoothly, new AI-driven technologies and legacy systems must be compatible.

Data privacy and security- It is crucial to protect the security and privacy of data used by AI systems. To stop breaches and misuse, network engineers need to put strong data protection mechanisms in place.

In summary
The field is changing as a result of AI’s incorporation into network engineering, which offers previously unheard-of levels of automation, security, and efficiency. AI’s place in network engineering will only rise as the complexity of networks and the need for seamless connectivity increase. In order to keep ahead in this quickly changing sector, network engineers must embrace these improvements, updating their skills on a regular basis and embracing new technology. Artificial Intelligence-powered intelligent, adaptive, and resilient networks are the wave of the future for network engineering.

Engr. Seun Omotoso is the Managing Director of  Techwise Consulting and he writes from Ibadan, Nigeria.

Continue Reading

Read Our ePaper

Top Stories

Interviews47 minutes ago

Only Experienced and Authorised Body can Train the public in Auctioneering Sector-Kiliya

ShareRecently the president ,Nigeria Association of Auctioneers, Alhaji Aliyu Kiliya, spoke to our Correspondent Raphael Atuu, on the need to...

Health4 hours ago

Niger Vaccinates 444,658 Girls Against HPV

Share Niger state Ministry of Primary Healthcare has vaccinated no fewer than 444,658 girls against the Human Papilloma Virus (HPV)...

Economy4 hours ago

Recapitalisation: Banks Raise N1.7trn Via e-offering

Share The Securities and Exchange Commission (SEC) says N1.682 trillion has been raised by banks through e-offering in the recapitalisation...

POLITICS4 hours ago

Alleged Anti-party Activities: Accord Expels Ex-presidential Candidate, Imumolen, 7 State Chairmen 

Share Accord party has expelled its presidential candidate in the 2023 general elections, Prof. Christopher Imumolen, and seven state chairmen...

NEWS4 hours ago

Bill to Rename Benue Varsity Passes First Reading

Share A bill to rename the Benue State University (BSU) Makurdi to Moses Orshio Adasu University has passed first reading...

NEWS4 hours ago

Tinubu Approves Leadership Changes for Oye-Ekiti, Lokoja Varsities

SharePresident Bola Tinubu has approved the swap of Pro-Chancellors and Chairmen of the Governing Councils of Federal University Oye-Ekiti and...

National Youth Service Corps (NYSC) National Youth Service Corps (NYSC)
NEWS4 hours ago

NYSC Gets new State Coordinator in Delta

ShareMr John Kwaghe has assumed duty as the new Coordinator of the National Youth Service Corps (NYSC) in Delta. This...

NEWS4 hours ago

Nigeria Governors’ Forum Meets over Constitution Amendment, Stamp Duty

ShareThe Nigeria Governors’ Forum (NGF) is currently holding a meeting in Abuja to discuss the ongoing Constitution amendment and stamp...

NEWS5 hours ago

U.S. Vetoes Gaza Ceasefire Resolution at Security Council

ShareThe United States on Wednesday vetoed a UN Security Council draft resolution that demanded an immediate and unconditional ceasefire in...

Health5 hours ago

Kaduna Assembly Moves to Review Caregivers Laws, Address Abuse

Share The Kaduna State House of Assembly, says it is set to review laws on caregivers to address the issues...

Copyright © 2021 Daily Asset Limited | Powered by ObajeSoft Inc