Archive for August, 2014

August 30, 2014

The Top 10 Richest Footballers in Europe

With the 2014-15 European football season kicking off, Wealth-X today released a list of the 10 wealthiest players in the European football leagues. The 10 footballers on the list are collectively worth more than US$1 billion, and predominantly represent clubs in Spain, France and the United Kingdom.

With an estimated net worth of US$230 million, Real Madrid star Cristiano Ronaldo is the wealthiest footballer in Europe – and the world. The 29-year-old Portuguese forward for the Spanish club is the world’s most expensive footballer, costing US$132 million when he was transferred from Manchester United to Real Madrid in 2009. Ronaldo’s personal fortune accounts for nearly a quarter of the total net worth of the 10 footballers on the list.

Lionel Messi takes second spot on the list and is the richest non-European footballer playing in the continent. The Argentine forward, who plays for FC Barcelona, is worth an estimated US$180 million.

Other non-Europeans on the Wealth-X list are Didier Drogba and Yaya Toure from Ivory Coast (worth US$90 million and US$70 million respectively) and Samuel Eto’o from Cameroon (worth US$75 million).

Three British footballers playing for clubs in the English Premier League appear on the Wealth-X list. The richest British player is Manchester United forward and captain Wayne Rooney, who ranks fourth on the list with a personal fortune of US$95 million. Frank Lampard, who now wears a Manchester City jersey (and is worth US$60 million) and Liverpool’s Steven Gerrard (with a net worth of US$55) also made the list.

Here’s the top 10 richest players in Europe:
1 Cristiano Ronaldo (Real Madrid) $230 million
2 Lionel Messi (Barcelona) $180 million
3 Zlatan Ibrahimovic (Paris St-Germain)$100 million
4 Wayne Rooney (Manchester United) $95 million
5 Didier Drogba (Chelsea) $90 million
6 Samuel Eto’o (Everton ) $75 million
7 Yaya Toure (Manchester City) $70 million
8 Frank Lampard (Manchester City) $60 million
9 Steven Gerrard (Liverpool) $55 million
10 Fernando Torres (Chelsea) $50 million.

August 30, 2014

Isaiah 30:15

For thus said the Lord GOD, the Holy One of Israel, “In returning and rest you shall be saved; in quietness and in trust shall be your strength.”

August 29, 2014

Seek GOD’s Kingdom

Luke 12:29-31
And do not seek what you are to eat and what you are to drink, nor be worried. For all the nations of the world seek after these things, and your Father knows that you need them. Instead, seek his kingdom, and these things will be added to you.

August 28, 2014

First comes UX, then UI design – in that order: What’s the difference between user experience (UX) and user interface (UI)? UX is the process, UI is the tangible end result.

User experience (UX) — the most important piece of application delivery — is often misunderstood.


That’s the view of Aaron Sanders, who states that UX often gets confused with user interface (UI). Actually, they are two distinct considerations, he notes on a recent post at InfoQ.

Sanders shares the analogy of a bowl of cereal:

“The bowl is a container for the information like a browser or server, and as shown, the spoon is the UI. The UX, on the other hand, is how all of the components come together. The cereal in the bowl, milk poured in, spoon sticking out has everything needed to enjoy a nice bowl of cereal.”

UX is about navigation and strategy. It’s all the business thinking that takes place at the start of the application design process. It’s a “blend of all the things like visual design, interaction design, information architecture, and user research,” says Sanders. The UI is the tangible end result of the process. 

UX encompasses user research, interviews and observations, “working with the team on the flow of user tasks, interactions and how the information will be put together for easiest consumption,” Sanders says. Questions that should be asked during the UX process include: “What are the business, creative, or other internal goals? What does the user want to accomplish and what are their goals?”

The UX design process focuses on putting together a “a visual design and presentation layer in order to build the UI.” At that stage, application designers will focus on the “treatment of graphics and text, interface and page elements, and navigational components.”

August 28, 2014

Internet of Things doesn’t have to mean enterprise security nightmares. Summary: Within IoT, ‘security has to live at the level of the API, to stay fully within the control of devices’ manufacturers and vendors.’

Internet_of_ThingsWhen it comes to the Internet of Things, enterprises are leaving themselves wide open to security problems. Connected products, services and sensors have a lot of potential, but there is risk. Fortunately, this risk can be managed at the API level.

That’s the word from Mark O’Neill, vice president of Innovation at Axway. In a recent post in Service Technology Magazine, he urges IT managers to start paying more attention to security when it comes to the Internet of Things (IoT). “Each smart device and connected app gathers data, and each smart device and connected application risks exposing this data,” O’Neill says. “Companies promising amazing experiences through their IoT-connected products and services must back those promises up with unsurpassed security.”

Consider the implications to a supply chain well-populated with sensors and intelligent devices, he continues. “Businesses leave valuable data open to exposure and risk supply chain disruptions if they do not address security when they use barcodes, RFID and GPS technology to track supply chain status, and when they Internet-enable functions that traditionally only operate behind the firewall.” The time has passed when “manufacturers can hide their APIs and hope that hackers do not locate and manipulate them,” he states.

There are ways to mitigate these risks — API gateways and API portals are proactive measures can help lock down device security, O’Neill says. “Security has to live at the level of the API,” he says. This keeps security “fully within the control of devices’ manufacturers and vendors, which in the world of the IoT is the safest place for security to reside… The APIs can be the point from which companies enforce their privacy and security policies.”

API gateways “enable APIs to receive virtual patches, a form of upstream security that prevents malicious traffic from reaching APIs without disrupting devices’ functionality. Virtual patches work without changing APIs’ source code and they manage risks quickly.”

API portals “let developers see how devices are using their APIs over time,” says O’Neill. Such information enables organizations to produce audit trails, which can be used to “help in investigations of API attacks and to ensure compliance with industry regulations.” Such auditable data trails are a must in industries such as healthcare, he adds. In addition, “businesses increasingly use APIs for B2B collaboration and data exchange, and in these cases audit trails for APIs can function as tracking methods for people accessing information.”

With API gateways and portals in place, “device manufacturers and app developers can rest assured that their platforms can hold customer data securely, encrypting it within devices, and remain open to security patches and updates,” he says. “Also crucial to IoT success, these security fixes can be applied to APIs without interrupting the function of the devices they control.

August 27, 2014

Top 10 African Women in Technology

Judith-Owigar-Kenya (1)

August 26, 2014

Linux celebrates its 25th Happy Anniversary with Linus Torvalds

August 25, 2014

Implementation Of Rwanda Online Platform Officially Takes Off

The Government of Rwanda and Rwanda Online Platform Limited kicked off the beginning of the first phase of implementation of the Rwanda Online platform set to establish an integrated public service platform that will exclusively offer Government to Business (G2B) and Government to Citizen (G2C) services in the country, accessible via internet and mobile devices.

The agreement between the Government of Rwanda and Rwanda Online Platform Limited, signed in April of this year, granted the concession to Rwanda Online Platform to Build and Operate the Platform for twenty-five (25) years, after which it will be transferred back to the Government of Rwanda.

The Public-Private-Partnership (PPP) agreement aims to bridge the gap of access to information, as well as improve public service delivery through the digitalization of services. As part of the agreement, Rwanda Online Platform committed to deliver one hundred pre-selected services using a phased approach over a course of three years effective August 20th, 2014.

The kick-off meeting, attended by leaders from the six institutions within which the one hundred services fall, served the purpose of strengthening the commitment from key stakeholders ahead of implementation. The first phase of implementation is expected to end in April 2015 whereby ten services are expected to go live. Starting this month, Rwanda Online will begin to work with the six institutions in Phase 1 to gather requirements, build prototypes and engage institutions in testing and training activities, leading up to the go-live date in April.

Services to be automated in the first phase include: National ID card application, Application for birth certificate, Registration for theory test, Application for Visa Permits, Application for Criminal Clearance certificate (extrait du casierjudiciaire), Application for building permits, Transfer of land title, Application for ordinary passport, Issuance of trading license and Land registration.

Rosemary Mbabazi, Permanent Secretary, Ministry of Youth and ICT said: “The Rwanda Online platform will be a single service delivery portal for all Government ministries and agencies, providing citizens and businesses with a streamlined and efficient experience with reduced operational costs. Rwanda online is a transformational project that demonstrates government’s continued efforts and commitment to better the lives of the citizens and increase productivity while enhancing service delivery”.

Francis Gatare, Chief Executive Officer of the Rwanda Development Board said: “The Rwanda Online initiative is an excellent demonstration of how the return on investment made on ICT infrastructure continues to transform the lives of our citizens and make the Rwandan business environment even more attractive and competitive. We are looking forward to seeing the first ten services online, as a success story in public service delivery in Africa unfolds here within Rwanda. Even as all services shall be provided at a single point of access, accessible 24 hours/7 days via Internet and mobile devices, as we kick off the project for the next twenty- five years, we acknowledge the importance of a quick-win within the first phase of implementation.”

He added that the fact that Government is in a PPP with a local company should not be taken lightly as it is one of the first. It is a remarkable time for the government, citizens and the private sector as we aspire to become a connected Government whilst inspiring citizens and grooming vibrant businesses.The Government of Rwanda is committed to developing a vibrant IT Eco-system through partnerships with local companies since they are better placed to develop innovative, homegrown solutions that address local challenges.

Irene Ndikumwenayo, Ag. CEO of RwandaOnline said: “The RwandaOnline platform is designed with citizens and businesses’ interests in mind. In the short term, it will provide tangible results such as reducing the amount of time spent waiting in line, streamlining requirements for the application process, and increasing accountability on the Government. In the longer term, it will heighten expectations of government service delivery—making Rwanda a model for the rest of the continent”

August 25, 2014

Google Scans Everyone’s Email for Child Porn, and it just got a man Arrested

That’s because Google actively scans the images that pass through Gmail accounts to see if they match up with known child pornography. Most seem to agree that this is a good thing, but as cyber security consultant John Hawes, of Virus Bulletin, tells the AFP, others may view this practice as a slippery slope. “There will of course be some who see it as yet another sign of how the twin Big Brothers of state agencies and corporate behemoths have nothing better to do than delve into the private lives of all and sundry, looking for dirt,” Hawes says.

Skillern is alleged to have been using Gmail to send images of child sexual abuse, each of which had previously been identified and given a unique digital fingerprint. When those images were sent through Google’s email service, they were identified by its automated systems. From there, Google passed Skillern’s details on to the police via the National Center for Missing and Exploited Children (NCMEC).

August 13, 2014

1 Peter 4:10 As each has received a gift, use it to serve one another, as good stewards of God’s varied grace …