Skip to main content

Public Voting For Second National ICT 2008 Awards Opens

The public voting for the Second National ICT Awards 2008 to be held
on Saturday May 17, 2008 as the world celebrates World
Telecommunications Day and Information Society Day has opened. The
awards is being organized by Ministry of Communications and Ghana's
ICT industry stakeholders.

Members of the general public can vote either by going to
www.ghanaictawards. com or send the full name of their choice to
1419(all mobile networks in Ghana) via SMS until 13th May 2008.
- Hide quoted text -


The categories opened for public voting are as follows:

1. ICT PERSONALITY OF THE YEAR

· NII NARKU QUAYNOR

· ENGR MRS FLORENCE SERIKI

· AKWASI PIANIM OSEI

· DR HARRIET SOMUAH

· SAQIB NAZIR

· SAMUEL QUARSHIE

2. TELECOM COMPANY OF THE YEAR

· TIGO

· MTN

· KASAPA

· ONE TOUCH

3. TOP CAFÉ OF THE YEAR

· SMART INTERNET & MULTIMEDIA

· CYBERCITY INTERNET

4. TOP ICT TRAINNING/INSTITUTI ON

· KNUST COMPUTER SCIENCE DEPARTMENT

· IPMC

· NIIT

· KiNET

· DZODZE CHILDRENS RESOURCE CENTRE

The winners from the second national ICT awards would be entered into
African Achievers Award to be held in South Africa. The awards night
slated for the evening of 17th May 2008 will be a celebration of
excellence in Ghana's ICT sector.

Ends

Comments

Popular posts from this blog

Vincent Chukwuemeka Ike's The Potter's Wheel

Currently reading Chukwuemeka Ike's The Potter's Wheel very interesting paper pack written by a prolific Nigeria writer the story set during the second World War and the only means of modern entertainment was the The Mobile Cinema Van. the book is very rich is proverbs and a lot of wise words The main character is Obuechina Maduabuchi ( mouthful) who happened to be the only boy born to his parents Mama Obu( short form of Obuechina) and Papa Lazarus Maduabuchi among six older sisters. Due to the "value" placed on the male child, he become a totaly spoilt brat, though academically brilliam Obu was growing into a hopelessly spoilt child to reverse this trend, Papa Lazarus decided to send him away as a servant to a schoolmasster with a dragon of a wife Of course, Obu goes and comes back very different published by University Press PLC Ibadan Nigeria 1993 email address is unipress AT skannet.com.gh though first published by Harvill Press 1973 ISBN 9780302832 WORDS FROM TH...

Evidence : Success of Connecting Citizens to Parliament Project by @penplusbytes

"The Committee on Government Assurances was established to play an oversight role of the Executive arm of government in Ghana. We were faced with the challenge of interacting effectively with citizens and getting their valuable feedback on project delivery statuses. You can understand our excitement when we started the Connecting Citizens to Parliament Project in partnership with Penplusbytes to implement an innovative mechanism of connecting citizens to Parliament, using new digital technologies including SMS, an online portal, a Mobile App and WhatsApp. Our work was more efficient as, for the first time ever, we had a dedicated website on which citizens could report on projects within their communities and reach out to us via an integrated media system about other governance issues that they had concerns with. The project also equipped our committee members with technology, information and knowledge management skills. We call on all stakeholders to support us, sustain the succes...

Strategies for better password management : Key to your online security

KWAMI AHIABENU  11 JULY 2016 Passwords are the key to your online life. They are the most popular mechanism to enable authorised access to various online resources for users. At the basic level, this type of security is made up of two parameters; a user name and password. The user name is usually static while best security practices demand that passwords are changed periodically.  The genesis of passwords dates back to ancient times when watchmen would require those wanting to enter an area to supply a password or catchphrase. Only persons with the correct password gained access.  Fast forwarding to our modern days, user names and passwords (a word or a string of characters) are now required to get access to protected computer operating systems, networks, database, Internet access via Wifi, online resources, mobile phones, automated teller machines (ATMs) and cars, among others.  Fundamentally, passwords are used to identify and distinguish between users, determine...