Nokia has unveiled the Nokia Asha 501 – the 1st device to run on the new Asha platform, designed to make the experience faster and more responsive and also to helps devs. push their applications and monetize them on the Nokia store.
Standout design, innovative user interface – The Nokia Asha 501, available in 6 colours, makes higher-end design and quality accessible to more people. It comes in just two parts: a durable, removable casing and the scratch-resistant glass display, which features a 3inch, capacitive touchscreen and a single ‘back’ button. It weighs 98 grams. The device offers a simple swipe to access everything on 2 main screens-
Home – a traditional, icon-based view for launching individual apps or accessing a specific feature, like the dialler or phone settings
Fastlane – inspired by how people really use their phone i.e. recently accessed contacts, social ne Read more »
What is 2-factor authentication? As the name already suggests, this is a process that most companies are now adopting to ensure that you use 2 steps to login to your online accounts to reduce fraud/illegal activity on or using your account.
Who already offers 2-Step authentication? Google has had it since 2011. So has Facebook. Dropbox, the online file-sharing and cloud-store for files, has had it since 2012. Apple’s iCloud started the 2-Step verification in March 2013 and now Microsoft is also on board to offer good account protection to its users.
This allows you to set up a password on an account as well as the need to key in a code sent to your mobile phone to access an account. These settings are now available on Microsoft services like Outlook, SkyDrive and Office Web Apps and offer an excellent layer of security that wo Read more »
A series of updates of popular BlackBerry® apps will be released over the coming days to make it even easier for users to stay connected with their BBM contacts. Research In Motion (RIM)on the 12th of April announced that Facebook for BlackBerry, Twitter for BlackBerry, BlackBerry Travel™, BlackBerry App World™ and BBM Music will now include BB Messenger connectivity. This would make it easier for users to stay in touch with their contacts, share experiences and content, and discover new things from their BBM contact list.
“Since we provided developers the means to build BBM connectivity into their apps, we have seen more than 800 hundred new BBM-connected apps come to market, which has been followed by a huge uptake by users – about one of every five apps being downloaded on BlackBerry App World is a BBM-connected app,” said Alec Saunders, VP of Developer Relations at RIM. “Today we’re excited to announce that RIM has also integrated BBM connectivity into a number of our own popular apps and the BBM-connected revolution continues to grow.” Read more »
Here is a list of things you should do on Twitter of you are really pressed for time.
1. Put up some awesome tweets
Find a list of awesome tweets that you may have hoarded somewhere within your day and post them to Twitter. This will hopefully get a retweet or two and build on your Klout and Kred.ly credibility while building great content from you.
2. Reply to tweets
Use about 10 minutes to engage other users on twitter and reply to pressing matters on the same. This is the best way to create a good rapport and ensure that your followers are not going to refer to you as a snob. You could also use this opportunity to follow up on some business referrals that may have been sent your way on the Social networks.
3. Follow some social influencers
Look for people who continuously churn out interesting tweets and more-so tweets in a related field and follow them. If your area of interest is cooking, go on ahead and look for Chef Gordon Ramsey and other guys who are great in the kitchen. If your aim is to follow issues on the stocks exchange and more importantly Kenya’s stock exchange, follow @SokoAnalyst, @coldtusker, @genghiscapital and @henrygithaiga. Their tweets will definitely interest you.
4. Unfollow irrelevant twats
Let’s face it. Some of us are the kind of people who go around collecting followers like trinkets or sea shells by the sea shore. Do yourself a favour, look for that one person who clogs up your timeline with irrelevant and in-bad-taste material and unfollow them. Call it what you want but the best description is not having to forego reading a tweet that could have improved your life by reading this useless tweet. Come on, grow a pair. And press that unfollow button.
Most people have been bullied at one point in their lives. It is common practice especially in lower age schools where the line between right and wrong is quite thin and impressions are everything. By impressions, the words crowd and Klout automatically follow.
For many, leaving such institutions is great relief as one is tempted to believe it is an end to the mental (and sometimes physical torture that is bullying).
Enter eBullying or Cyber Bullying:
Fact: The internet provides the perfect place for the existence of a cyber bully because of anonymity and expansive resources in easily-rallied participants.
You have heard of them before and know them; those guys that will wait for you to produce online content in form of a tweet, a Facebook update, an instagram image, a blogpost or even a twitpic and victimize you endlessly for it being ‘not up to their standard.’
They go an extra mile to make you feel like you’re going to take it down and/or delete it forcing a subsequent perverse form of satisfaction from your attempt to defend your content.
Well, here are a few things you should probably know about your cyber bully.
- Cyber bullies thrive on reaction to provocation and conflict – The minute you start to curse out a cyber bully, you are fuelling their urge and interest to pound you even more. They get a kick out of having you react and throw tantrums. Trust that there are very idle people out there that pick out your rant as a weakness and you will never hear the end of it.
- Cyber bullies are generally weak – The Bully behavior is normally deep-rooted and will probably arise from poor upbringing, a much-less-than-perfect childhood, daddy issues and a lot of other issues not related to you. It is not your fault he doesn’t like your poetry; it is because he probably can’t think of any two words that rhyme.
- Cyber bullies thrive on attention – Look for any evidence of a cyber bully that continued to tarnish a brand when he is completely ignored by others. You won’t find even one. Simply because if no-one is watching (or listening), then they’re no longer interested. Read more »
The web has taken over how we communicate in so many ways.
You no longer have to remember a birthday as Facebook warns you whenever a loved-one’s birthday is near. Twitter tells you when someone decides to think out loud and post (read tweet) something on their page. LinkedIn keeps you in tandem with your professional crowd and FourSquare lets you know where your friends are via check-in when they share their location.
We are in the 21st Century of the Generation X, humans seem to be moving more and more towards online meet-ups and away from actual physical ones.
Influence is everything. At least to those people who know what it is worth, it is everything.
What you eat, drink, watch, listen to, talk about, wear and even drive is constantly being observed by people and more importantly those who you influence. Facebook calls them friends; Twitter calls them followers while Helloo calls them Listeners (puke!). Read more »
There has been a lot of discussion in the public domain about a new device called the Poken. It is a small device that is set to replace the need for business cards say in the next year or so by consolidating a user’s contacts in its small microchip and enabling on to transmit information on themselves in a fun and cool way.
1. Poken User meets other Poken User
2. User “’high four’s” his or her Poken with that of the other user. This is essentially holding them against each other (such that the coils inside the token are more or less aligned).
3. The two Pokens flash green to signal that a bond was made. If red light appears, please try again as this means that the devices have not yet connected.
4. On a computer at home or anywhere, the User plugs in his or her token into the USB port. Read more »
In a bid to combat what happened with Facebook inventor Mark Zuckerberg’s facebook page, the guys at Facebook have been hard at work to bring us full https support while browsing their website.
Now whenever you are on their website, they are assuring you of security. Full https support essentially means that even when you access the social site from anywhere even on an unsecured and insecure website such as the free WiFi most people normally go on from their computers and mobile devices, no one can access your data.
What would you do if guy you trusted with all your money had his money stolen?
Would you even believe that? Many wouldn’t! I know I wouldn’t. But then think about it … are the systems really fool and tamperproof?? In a world where people thrive more on information sharing and cloud computing, this could be a scary thought.
Tuesday 25th January and the guy we entrust with all our information has his account hacked. Yes, Mark Zuckerberg had his page hacked. A real shocker for the man who was recently named Person of The Year by Time magazine.
The hacker got hold of his credentials and posted the update below; Read more »
Your Life Companion- Galaxy S4
Indigo, Microsoft, GoK – Mawingu Project
Mozilla Community Stuff:
- Get Picked By Alicia Keys: BlackBerry STEM Scholarship Programme
- We Need More App Technology To Adopt Green Living.
- Come Listen To Microsoft President Jean-Phillipe Courtois Today at the iHub
- The Dadaab No One Tells You About
- Akirachix Mobile Garage 2013: Application Pitches
- Tumblr now Belongs To Yahoo
- 6 Million Galaxy S4 Units Shipped So Far: 42000 A Day in First 4 Days
- SMEs Becoming More CyberEspionage Vulnerable, Symantec
- What Next For Bharti Airtel After Warid Telkom Acquisition?
- New Nokia Asha 501 has Free Data Hook Ups from Facebook
- juuchini on The Dadaab No One Tells You About
- nngash on The Dadaab No One Tells You About
- juuchini on The Dadaab No One Tells You About
- Mo on The Dadaab No One Tells You About
- David Okwii on South Korean KOICA to Build 5.6 Million USD ICT Centre in Kigali, Rwanda
- David Okwii on Microsoft Retiring Windows XP; End Of Support Coming on 8-4-2014
- Twitter 102 | Qube - Digital Agency on Twitter 101.
- Tech Links Around Africa, March 2013 | WhiteAfrican on Intel, iHub partner to Support Mobile App Development in Africa thru Tech Hubs
- Kevin on The Intel – Safaricom YOLO! Smartphone – a Quick Review
- Omelette on About JuuChini