08
04
2025

PAGES

08
04
2025

spot_img

PAGES

Home Blog Page 6590

Content Manager/Partner – JAMB Android App for Nigeria

3

Fasmicro has developed JAMB Android App for Nigerian students. It has everything you will need – scorer, Q/A, exam simulator, confidence monitor, practice section, adaptive engine, etc. Bu unfortunately, we have been unable to get JAMB Q/A in digital copies and we do not have experience typing them.

 

We are ready to pay N200,000 to anyone that can provide  these documents since the inception of JAMB. Alternatively, you can partner with us and we will share revenue. Our plan is to release the premium version of the JAMB App when the Q/A is ready and we expect people to pay for them. Our revenue projection is excellent and we can share market data if you have contents.

 

Contact Nkeiru at info@fasmicro.com or call any of our offices in Lagos and Owerri.

The Best SMS Reseller Program in Nigeria – SMS Places

1

 

SMSplaces SMS Gateway

Reseller Quote

First Atlantic Semiconductors and Microelectronics Ltd

www.smsplaces.com

 

 

ABOUT SMS PLACES:

SMSPlaces Solutions is a department of Fasmicro Nigeria Ltd. (We acquired this company and rebuilding the site now). We provide bulk sms & sms gateways to our clients who are into Marketing, Advertising and Event organizing looking for SMS as a tool  for informing its customers about its products, events and social gatherings. This you can say as opportunity to connect directly to us instead of middle channel.

 

FEATURES:

With a speed of more than 30sms per seconds, we provide different Interfaces given below to send these sms with 24X7 Technical support.

  1. Desktop Application which you can send sms directly.
  2. DLL which you can integrate in your software to send sms.
  3. URL Link which can integrate into your website to send sms.
  4. Price : Nigeria @ N1.75k /sms – to any network
  5. Database.

We are having the platform to send bulk SMS and many other services at a very reasonable rate. We  can  provide  you  a SMPP  Account  as well  as Http  account for  this  Report. We can also provide you test account to test our service with about 10 SMS volume.

 

SETUP COSTING:

For any reseller wishing to setup an account with us, about 1000 SMS units will be deducted from your account at setup. We do not offer automated web client setup at the time, this means you will be charged a development fee of N 30,000.00 only after which you will subscribe to your desired SMS volume with a minimum SMS volume of 10,000.00 units only.

 

 

SMS PRICING INFORMATION:

For subsequent SMS Purchase from our company, below is a table showing the price range for various volumes.

SMS VOLUME UNIT PRICE RESELLER PRICE
100 – 4,999 N1.75K
5,000 – 9,999 N1.65K
10,000 – 49,999 N1.55K N1.45K
50,000 – 99,999 N1.45K N1.35K
100,000 – 499,999 N1.35K N1.25K
500,000 – 999,999 N1.25K N1.15K
1 Million and Above N1.15K N1.05K

 

COMPARE OUR PRICING:

Our company believes we are offering you the best pricing available. You can check on the companies below to compare the prices we are giving you to what they are offering

 

CUSTOM SMS PRICING INFORMATION:

Our company can give you further price slashes depending on the your request, to seek details on further price slashes, please email sms@fasmicro.com with your SMS proposal.

 

The Maltina Hits 2 million Visitors in Two Weeks Through Happy Moments Promotions

2

Maltina pay-off line of ‘sharing happiness’ and ‘Happy Moments promo have brought  the number of hits to the website to about two million within two weeks of unveiling.

 

Mrs. Ngozi Nkwoji, Senior brand manager, Maltina,, made this disclosure in Lagos, and said that the modus of participation in the promo is quite simple.

 

“All a consumer need to do is to take a snap shot of themselves, family members and friends while they are sharing happy moments. The photos can range from graduation, birthday party, beach outing etc. They are to upload such photos on the Maltina site, give a brief description and submit. A confirmation mail will then be sent to acknowledge receipt,” she said.

 

The best ‘Happy Moments’ will be selected and the owners would spend time with Nigerian celebrities.

Low-Cost Cell Phone-Based Applications for Priority Global Health Conditions – Gates Foundation List

0

 

Maybe, we can partner with you and submit for the phase 11 which is ongoing.

 

Grand Challenges Explorations Grants

Grand Challenges Explorations fosters creative projects that show great promise to improve the health of people in the developing world. Grants target an expanding set of global health topics, and there are two award rounds per year. Projects with demonstrated success in their initial phase of research have the opportunity to receive Phase II funding of up to $1 million.

On April 28, 2011, the Gates Foundation announced that 88 new global health projects received Grand Challenges Explorations grants.

 

All the recipients in the Create Low-Cost Cell Phone-Based Applications for Priority Global Health Conditions

 

 

A Non-invasive Cell Phone Imaging Probe for Diagnosing Malaria

Alberto Bilenca of Ben-Gurion University of the Negev in Israel will develop a cell phone imaging system that can non-invasively detect malaria parasites in the blood. The system uses a polarized red laser pointer to illuminate tissue such as a finger tip, and a zoom lens and polarizing filter on existing cell phone cameras, to create images that depict hemozoin crystals in blood following malaria parasite infection, as well as micro-obstructions in the circulatory system that result from the infection.

 

Adapting Cell Phone Technology for the Diagnosis of Malaria

Mike Barrett, Jon Cooper and Lisa Ranford-Cartwright of the University of Glasgow in the United Kingdom will test the ability of a key component in mobile phones to separate out red blood cells infected with malaria parasites in a blood sample.  If successful, such devices could be mass produced for rapid and accurate malaria diagnosis.

 

Cell Phone-Based Near-Infrared Camera for High-Risk Neonates
Qianqian Fang of the Massachusetts General Hospital in the U.S. proposes to develop a portable, low-cost mobile-phone-based near-infrared camera for monitoring brain injury in neonates. If successful, it could help identify and monitor high-risk newborns in resource-limited regions. Digitizing

 

Paper-Based Data Via Mobile Image Technologies
Allen Wilcox of Village Reach in the U.S., working with the University of Washington’s Computer Science & Engineering Department, will refine and field test a mobile scanning application to transform paper data into a scalable digital system.  The solution would lower time and cost for data capture, improve data quality from the point of care, and provide access to the same information for all levels in the healthcare delivery system.

 

Dirt-Power for Cell Phone Charging in Rural Africa
Erez Lieberman-Aiden and his team at Harvard University in the U.S. propose to develop a low-cost microbial fuel cell (MFC) to power cell phones in Africa. Certain naturally occurring soil microbes produce free electrons during the course of their ordinary metabolic processes, and MFCs will recharge themselves using power derived from these soil microbes. These fuel cells do not require any sophisticated materials to build, and can be easily assembled using locally available materials.

 

Early Child Health Intervention Using Breathing Sound

Insu Song and Joachim Diederich of the James Cook University in Singapore propose a cell phone-based system for collecting and analyzing time location-tagged children’s crying and breathing sounds to detect respiratory infections. This system provides treatment information for parents and generates public health data regarding the spread of infectious diseases.

 

 

eMosquitoNet: Electronic Mosquito Net Application
Josiane Nzouonta and Renita Machado of Cayoll LLC in the U.S. will develop and test a cell phone application, eMosquitoNet, which plays music that includes sound waves at resonant frequencies of female Aedes aegypti mosquitoes, which transmit yellow fever and dengue fever. These sound waves cause uncontrollable vibrations and failure of the mosquito’s navigation system, preventing them from feeding and spreading disease. Malaria Screening With a Cell Phone and Magnetic Levitation
Ionita Ghiran of Beth Israel Deaconess Medical Center in the U.S. and collaborator Pierre Striehl of the Harvard School of Dental Medicine propose to develop a cell phone compatible diagnostic screening device based solely on the principles of magnetic levitation, allowing detection of malaria-infected red blood cells. If successful, mass production of the device should be possible due to its construction from basic components.

 

 

Palm Vein Biometric Identification Prototype
Yaroslav Ryabov and Denis Broydo of BC Portal, Inc. in the U.S. propose to develop cell phones as biometric identification devices which use the phone camera to take and analyze near-infrared images of hand palms. The unique vein patterns found in the palm can be used by health workers in remote areas to identify individuals and maintain health records for these underserved populations.
SpectraPhone Automated Reagentless Diagnostic System
Kenneth Puzey of QuantaSpec in the U.S. will develop the Spectraphone(TM) to provide automated, rapid, reagent-less diagnosis of malaria and other infectious diseases using an infrared spectrometer embedded in a cell phone.

Time For National Cyber Security and Warfare Command in Nigeria

1

Nigeria will be fifty years old in few months. Since the time of our independence, the world has been redesigned as a result of technological advancements. We have fought wars, both at home and abroad and our soldiers have made sacrifices. Nigeria remains a republic despite constant agitations for segregations from most of the entities that make up Nigeria.

 

We are used to the crises of machetes and bullets. Unfortunately, the future threats to the peace and prosperity of Nigeria will not come from either. There is a new war evolving in the world. It is not fought on the land, sea, air or even in the physical space. It is war of the fifth domain: the cyberspace. Yes, warfare perpetrated through clusters of computer networks which have linked the world in mutually dependent interrelationships of people, firms and nations.

 

Cyberwar is not a war of choice. It will come to you even if you do not want it. Just as computer virus attacks our computers, this warfare is waged at national level with consequences that can shut down a military control, financial systems, health informatics, and telecommunication networks. It is something that the nation cannot afford to waste time to develop a coherent strategy for.

 

Though we have failed to use technology or strong regulation to solve the embarrassment caused by the Nigerian web fraudsters, in this particular case, failure is not an option.

 

The world has nuclear non- proliferation treaty, but none exists for cyberwar despite the potential economic dangers the latter poses to world commerce. Accordingly, many nations have started to deploy strategic commands to protect, defend and necessarily retaliate when their systems are attacked through cyber-means. The United States Pentagon has the Cyber Command inside the National Security Agency, the British has a similar unit inside the GCHQ. China, Iran, Russia, Israel, and many other nations have developed cyber-army to protect their economies.

 

What is basically the threat of cyberwar? It has been proven that people could remotely rewire networks logically and trigger avalanche of problems that can bring a nation’s economy to standstill. They plant logic bombs which on ‘explosion’ brings enormous damages to companies and private citizens. They could penetrate our oil installations, bank servers, electric grids, air-traffic controls, GSM networks, and military commands. We suddenly find out that nothing works in the land and all networks are broken.

 

This is perhaps the most drawbacks of computer networks- the ability to wage war through bits and bytes instead of the old fashioned way of firing bullets where the identities of the invaders are known. In cyberwar, the attackers could mask themselves and may even use your rigged networks to attack you. It is also important to understand that the world ‘computer’ has since evolved. There are pills, watches, shoes, bags, cellphones that are indeed computers. And most systems are on networks with IPs assigned to them.

 

Recently, our Information Minister, Prof Dora Akunyili, in a speech in Amsterdam explained Nigeria’s readiness on ICT through expansion of our fiber-optic networks and satellites. What are the efforts the government is putting in place to secure these networks from cyberwar? It is about the weakest link and nations like US, UK and Canada could be worried that Africa will become the easiest spot to launch attacks because our systems are not protected well enough.

 

In the old warfare, people were trained to become spies or soldiers with enormous risks. But now, all they have to do is use a computer to launch their strikes to vulnerable nations. If we deny the severity of these threats, we will have ourselves to blame. It used to be copies of military notes; now, the digital spies could download an entire library of military strategy.

 

Arguably, many will argue that Nigeria does not have many digital assets to be overly cautious. I disagree; the threat is not just on digital assets, but all aspects of the economy. Foreign contractors can rig our networks and understand what other nations are bidding on national contracts, especially military ones. They can access our military roadmap and infiltrate to stay ahead of our strategies.

 

Let us take a scenario where Nigeria military goes into a meeting to discuss contracts with China. A Chinese engineer hands over an infected file to our generals; through that file they can keep tap of all the future developments on that project. Even a common sharing of the same network during that meeting can expose our military to unprecedented danger. If they rig into that network by us giving them access, they can penetrate and have all the information they need about that project.

 

Take another scenario. You import those microchips from China and they have them designed to gather intelligence for them. This is why it is very important that Nigeria develops its capability because the future wars will be fought differently. We need to become aware of these risks and develop mitigation strategies.

 

Recently, the Chinese built the world’s second fastest supercomputer, primary to avoid the use of IBM machines for military research. They remain suspicious that using a machine from another country is a violation of national security code. When will Nigeria understand that our continuous lack of progress on emerging technology will digitally enslaved us for decades? How can our government understand that our lack of efforts on nanotechnology, biotechnology and microelectronics could potential destroy the foundation of our young democracy?

 

The cyberwar is real and it is already taking place in the world. The first Web War 1 was fought in Estonia where series of orchestrated attacks on Estonian digital infrastructure forced the government to decouple the nation from Internet. In other words, both government and business websites were brought down. That was followed in Georgia during its brief hostility with Russia. Again, its websites were brought down and even the President website had to be moved to a secure server in the United States.

 

This brings the major question. How will Nigeria function if another country launches a web war on our nation? One will hope that our military has already developed a strategy since I guess most of these activities are classified. But if we do not have a plan, this is the time to develop a cyber security and warfare roadmap that will ensure that our national prosperity is secured.

 

It is important to understand that this is not an ICT problem. This is a serious engineering problem that goes beyond the digital bits to the transistors that power the microchips upon which the ICT depends. Nothing is safe; a light bulb in the Presidency can be a listening device, and that Flash USB key our soldiers use on their laptops while connected to our military networks could be the source of intrusion. Linking those power systems to the web for remote monitoring by German vendors could open them to cyber-threats.

 

People, it is a new world and we must understand these challenges and convene meetings of stakeholders to develop plans immediately. It could be a workshop where we bring our brightest minds on engineering and security and connect them to work with our military. Iran has boasted of having the world’s second-largest cyber-army while China is determined of “winning informationised wars by the mid-21st century”. And Nigeria must prepare and push African Union to develop a Cyber Control Command for Africa or better still develop its own.

author/ndubuisi ekekwe