Askwala Home




Upcoming day, World Day of Social Justice, 20 February. 2020 Theme: "Closing the Inequalities Gap to Achieve Social Justice!"

                                      

Inform       Today is Tuesday, February 18, 2020 and day 049 of the year.

Jan 27, 2020 at 09:51 AM

Road to Arteficial Intelligence (AI)

Informer : Space

Ethiopia has set a plan to establish an artificial intelligence (AI) research and development center. Council of Ministers has announced that it is a time towards Artificial intelligence.  

Info source: askwala


Jan 26, 2020 at 01:26 PM

የ ዊንዶ 7 የሳይበር ደህንነት ድጋፍ መቋረጥ

Informer : Askwala

የማይክሮ ሶፍት ኩባንያ ምርት የሆነዉ «ዊንዶ 7» የተባለዉ የኮምፒዩተር ፕሮግራም ከኩባንያዉ ይደረግለት የነበረዉ የሳይበር ደህንነት ድጋፍ ከጎርጎሮሳዉያኑ ጥር 15ቀን 2020 ጀምሮ ተቋርጧል። በመሆኑም ከዚህ በኋላ «ዊንዶ 7»ን መጠቀም የተጠቃሚዎችን መረጃ ለጥቃት ያጋልጣል ሲል ኩባንያዉ አስጠንቅቋል። 

Info source: ዶይቼ ቬለ


Jan 23, 2020 at 10:06 AM

World’s Most Admired Companies

Informer : Askwala

world\'s most admired companies according to Fortune, Apple claims the top spot for 13 straight years in fortune\'s annual ranking of world\'s most admired companies. To view the lists click the below link... 

Info source: Fortune


Dec 20, 2019 at 09:09 AM

ሳታላይታች በተሳካ ሁኔታ መጥቃለች

Informer : Ministry Of Innovation And Technology

ኢትዮጵያ ETRSS-1 የተሰኘችውን የመጀመሪያዋን የመሬት ምልከታ ሳተላይት በተሳካ ሁኔታ አምጥቃለች።
እንኳን ደስ አለን! 

Info source: Ministry of Innovation and Technology


Dec 06, 2019 at 05:06 PM

Ethiopian Remote sensing Satellite

Informer : Space

ታህሳስ 10 ሀገራችን ኢትዮጵያ ከቻይናዉ CAST(China Academy of Space Technology) ጋር በመሆን ወደ ጠፈር የምትልካት 70ኪ.ግ. ሳተላይት ETRSS-1 (Ethiopian Remote sensing Satellite) ትሰኛለች፣ ሆኖም Remote sensing Satellite (መሬት ምልከታ ሳተላይት) ምንድነዉ?፣እንዴት ይሰራል?፣ለምን ዓይነት ግልጋሎት ይዉላል?
• Remote sensing (መሬት ምልከታ) ማለት፡- አንድን ቁስ ሳይነኩ ወይም አካላዊ ግንኙነት ሳይኖር ስለዛ ቁስ ከርቀት (ብርሀን ወይም ሙቀት በመጠቀም) መረጃዎች መሰብሰብ ሲሆን በቅርብ የምትመጥቀዉ የኢትዮጵያ የመሬት ምልከታ ሳተላይትም ከመሬት 700ኪ.ሜ. ርቀት ላይ በመሆን ስለ ኢትዮጵያ፣ ምስራቅና ምዕራብ አፍሪካ አካባቢ መረጃዎች ዕንጦጦ ኦብዘርቫተሪ ወደሚገኘዉ መረጃ መቀበያ ጣቢያ ትልካለች፡፡ የመሬት ምልከታ መሳሪያዎች በሁለት ይከፈላሉ ACTIVE and PASSIVE ተብለዉ፤ Active የምንላቸዉ የራሳቸዉን ሞገድ መረጃ ወደሚሰበሰብበት ቁስ በመልቀቅ ሲሰበስቡ(ለምሳሌ ወደ መሬት) Passive የምልላቸዉ ደግሞ ተፈጥሮአዊ በሆነ መንገድ ከቁስ አካላት የሚመጣን መረጃ መበቀበል መረጃን ይሰበስባሉ፡፡
• ከመሬት ምልከታ ሳተላይት ምን ዓይነት ከባቢያዊ መረጃዎች ይሰበሰባሉ? ከላይ እንደገለጽነዉ የመሬት ምልከታ መሳሪያዎች ሙቀትን ወይም ብርሀንን በመጠቀም ስለመሬት ሁኔታ (አቀማመጥ፣ቀለም፣ቅርጽ፣መጠን) ፣ስለ ዕጸዋትና እንስሳት(የብርቅየ እንስሳት እንቅስቃሴ)፣ ስለ አየር ንብረት ሁኔታ፣ ስለዉሃ አካላትና መሰል ጉዳዮች መረጃዎችን ያቀብላሉ፡፡
• መረጃዎቹ ለምን ዓይነት ግልጋሎት ይዉላሉ? ከመሬት ምልከታ ሳተላይት የሚገኘዉ መረጃ ለተለያዩ አይነት ጥናቶችና ትንበያዎች ግልጋሎት ላይ የሚዉል ሲሆን ከነዚህም በጥቂቱ፡ ለአየር ንብረት ትንበያ፣ ለግብርና(የአፈር ለምነት፣ የዝናብ ሁኔታ፣ ዘመናዊ ግብርና መከወን(Precision farming))፣ ለከተማ ዕቅድና ቅየሳ (የከተሞች መስፋፋት፣ ህገወጥ ቤቶች ግንባታ ቁጥጥር)፣ ለዉሃ ኣካላት ቁጥጥር(የዉሃ ኣካላት መድረቅ ወይም መስፋፋት)፣ ለካርታ ስራ፣ የተፈጥሮ ሀብት ቁጥጥር (ፓርኮችና በዉስጡ ስላሉ እንስሳትና እጸዋት)፣ ለግንባታ ስራዎች(የግድብ ስራዎች ዉሃ መጠን)፣ የተፈጥሮ አደጋዎች ትንበያ(ድርቅ፣ጎርፍ፣ መሬት መንቀጥቀጥ፣እሳት አደጋና መሰል ጉዳዮች)፣ ለትራንስፖርት ቁጥጥርና ዘመናዊነት፣ ለማዕድናት ፍለጋና ጥናት እነዚህንና ያልዘረዘርናቸዉ ግልጋሎት ያለዉ ሲሆን በቀጣይ በተቋማችን የcommunication satellite ባለቤት ለመሆን ሰፊ እንቅስቃሴ እየተደረገ ነዉ፡፡ 

Info source: Ethiopian Space Science and Technology Institute by Ermyas Aklilu


Nov 29, 2019 at 02:05 PM

የሳተላይት መረጃ መቀበያ አንቴና ግንባታ ተጠናቀቀ

Informer : Askwala

የሳተላይት መረጃ መቀበያ አንቴና ግንባታ ተጠናቀቀ
በእንጦጦ ኦብዘረቫቶሪና ምርምር ማዕከል የሳተላይት መረጃ መቀበያ አንቴና ግንባታ ተጠናቀቀ፡፡

የሳተላይት መቆጣጠሪያ እና መረጃ መቀበያ ጣቢያዎች ሳተላይቶች በአግባቡ ተልዕኳቸውን እንዲፈጽሙ ሳተላይቶቹን የሚቆጣጠሩ እና የተፈለገውን መረጃ ለመቀበል የሚያገለግሉ ሲሆን ያለ ሳተላይት መቆጣጠሪያ እና መረጃ መቀበያ ጣቢያዎች ግንባታ የሳተላይቶች መምጠቅ ብቻውን ጥቅም የለውም። ኢትዮጵያ የሳተላይት መረጃ ፍላጎቷን በከፍተኛ ወጪ የምታገኝ ሲሆን ፤ ይህንን በከፍተኛ የዉጭ ምንዛሬ ለግዢ የሚወጣ የሃገር ሃብት ለማዳን እና አልፎ ተርፎም በሃገር ዉስጥና በአጎራባች ሃገራት ለሚገኙ ተጠቃሚዎች የመረጃ አገልግሎቱን በመሸጥ ገቢ ማስገኘት የሚያስችል ምቹ ሁኔታን ለመፍጠር የእንጦጦን የሳተላይት መቆጣጠሪያ እና መረጃ መቀበያ ጣቢያ ፕሮጀክት አንዱ ነው፡፡
ቴሌኮሙኒኬሽን ፣ የመሬትና የህዋ ምልከታ ፣ የከተማ ልማት ፣ ዓለማቀፍ የተፈጥሮ ሃብትን መቆጣጠር፣ አደጋን መከላከል ፣ የካርታ ሥራ ፣ ግብርና ፣ የደን ልማት ፣ ሜትሮሎጂ እና ጂፒኤስ ከብዙዎቹ የሳተላይት ቴክኖሎጂ ትግበራዎች ጥቂቶቹ ናቸው። 

Info source: Ethiopian Space Science and Technology Institute


Nov 26, 2019 at 10:32 AM

Mark the date, Dec 17, 2019, the first Ethiopian satellite to be launched into space.

Informer : Beza Tesfaye

Ethiopia is set to launch the very first micro-satellite into space on 17 December 2019 at exactly 6:01am in the morning. The command post of the Ethiopian Remote Sensing Satellite (ETRSS – 1) command station is located at the Entoto Observatory to be managed by Ethiopian experts.

The launching of ETRSS-1 is aimed at providing sustainable solutions for the tangible challenges Ethiopia is faced with. ETRSS-1 will enable agricultural transformation and modernization by supporting prediction of yield and natural disasters such as floods and drought. ETRSS-1 will also support water resource management, green energy development, land governance and administration, forest resource monitoring and management, infrastructure development and monitoring, national safety and security management.

Realized through the generous financial and technical support of the Government of China, up to 20 Ethiopian engineers are also engaged in this project.

Mark December 17th as Ethiopians take Ethiopia to the future! 

Info source: Beza Tesfaye, Ethiopian Space Science Society


Nov 22, 2019 at 08:42 AM

የመጀመሪያዋ የኢትዮጵያ ሳተላይት

Informer : Space

ኢትዮጵያ ለመጀመሪያ ጊዜ ወደ ህዋ የምታመጥቀዉን የመሬት ምልከታ ማይክሮ ሳተላይት ETRSS-1 በተመለከተ አርብ 12-03-12ዓ.ም ጋዜጣዊ መግለጫ ሊሰጥ ነው፡፡

የኢኖቬሽንና ቴክኖሎጂ ሚኒስቴር እና የኢትዮጵያ ስፔስ ሳይንስና ቴክኖሎጂ ኢንስቲትዩት በጋራ በመሆን በኢትዮጵያ የቀን አቆጣጠር ታህሳስ 7 2012ዓ.ም የምትመጥቀዉን የመጀመሪያዋን የመሬት ምልከታ ማይክሮ ሳተላይት በተመለከተ አርብ 12-03-12ዓ.ም ከእረፋዱ 4 ሰዓት በእንጦጦ ኦብዘርቫቶሪና ምርምር ማዕከል ጋዜጣዊ መግለጫ የሚሰጥ ሲሆን ፤ በስፔስ ሳይንስ ዘርፍ ኢትዮጵያ የደረሰችበት ደረጃም ለጋዜጠኞች የሚገለፅ ይሆናል፡፡ 

Info source: Ethiopian Space Science Society


Nov 20, 2019 at 06:09 PM

ጋሻ የተባለ ጸረ ቫይረስ በኢንፎርሜሽን መረብ ደህንነት ኤጀንሲ መበልፀጉ ተነገረ

Informer : Space

የኢንፎርሜሽን መረብ ደህንነት ኤጀንሲ (ኢመደኤ) በኔትወርክ እና በኮምፒውተሮቻችን ውስጥ ባሉ መተግበሪያዎች የሚመጡ ጥቃቶችን ለመቆጣጠር የሚያስችል “ጋሻ” የተባለ አንቲ-ቫይረስ ማበልፀጉ ተነገረ፡፡

የኢመደኤ የሳይበር ዴቨሎፕመንት ዳይሬክቶሬት የኢንፎርሜሽን ደህንነት ባለሙያ አቶ ናምሩድ ከሰተብርሃን ከኤጀንሲው የሳይበርኛ የቴሌቪዥን ፕሮግራም ጋር በነበራቸው ቆይታ ጋሻ አንቲ ቫይረስ በኤጀንሲው መበልፀጉን ተናግረዋል፡፡

አንቲ-ቫይረሱ በሀገራችን ላይ የሚቃጡ የቫይረስ ዓይነቶችን ታሳቢ በማድረግ እና ዓለም ላይ አሉ የተባሉ ዋነኛ የቫይረስ ዓይነቶችን እንዲከላከል ተስቦ የተዘጋጀ መሆኑን ባለሙያው ገልፀዋል፡፡

“ጋሻ” አንድን የቫይረስ ዓይነት ብቻ ሳይሆን የተለያዩ የቫይረስ ዓይነቶችን መከላከል እንዲችል ታሳቢ ተደርጎ መሠራቱ ታውቋል፡፡

መተግበሪያው በሀገር ውስጥ መሠራቱ የራስ አቅምን ከማጎልበት ባለፈ ለደህንነት ማስጠበቂያ ተብለው ከውጭ ሀገር የሚገቡ ምርቶች በራሳቸው የደህንነት ሥጋት የሚሆኑበትን አጋጣሚ የሚያስቀር ነው፡፡

መተግበሪያው አስፈላጊውን የብቃት ፍተሻ ሂደት ካጠናቀቀ በኋላ ለተጠቃሚዎች የሚተላለፍበት አግባብ እንደሚፈጠር አቶ ናምሩድ ተናግረዋል፡፡

ኢመደኤ በአዋጅ ከተሰጡት ሥልጣንና ኃላፊነቶች አንዱ የኢንፎርሜሽን መሠረተ-ልማቶችን እና ሥርዓቶችን ማበልፀግና መዘርጋት ይገኝበታል፡፡ 

Info source: የኢንፎርሜሽን መረብ ደህንነት ኤጀንሲ


Nov 14, 2019 at 05:59 PM

How to keep away a robot from a site (Robots Exclusion Protocol)

Informer : Space

To keep a robot away from a web site, add the robots meta tag to your page. Use the content value noindex, as shown here:

<meta name="robots" content="noindex">

Remember: like all meta tags, you place this in the <head> section of your HTML document.
If you have larger portions of your site that you want to block off, you\'re better off to create a specialized file called robots.txt, and place it in the top-level folder of your site. The robot will check this file before it goes any further. The content inside the robots.txt file sets the rules.
If you want to stop a robot from indexing any part of your site, add this to the robots.txt file:

User-Agent: *
Disallow: /

The User-agent part identifies the type of robot you\'re addressing. (An asterisk represents all robots.) The Disallow part indicates what part of the Web site is off limits. (A single forward slash represent the whole site. 

Info source: Book entitled Creating Web Sites The Missing Manual By Matthew MacDonald


Nov 04, 2019 at 05:14 PM

World chess grand master lost by Deep Blue (a chess playing computer developed by IBM)

Informer : Space

Kasparov v. Deep Blue
In 1997 Russian chess master Garry Kasparov lost a highly publicized series of matches to an IBM computer named Deep Blue. The computer used artificial intelligence to process 200 million chess moves per second in developing its strategy. This was the first time that an international chess grand master had lost a series to a computer, suggesting to some observers that advances in artificial intelligence may be surpassing human capacity in some areas. 

Info source: Microsoft Student With Encarta Premium


Nov 04, 2019 at 03:44 PM

ትኩረት ለሳይበር ደህንነት

Informer : Space

"ትኩረት ለሳይበር ደህንነት" በሚል መሪ ቃል የሚከበረው የብሄራዊ የሳይበር ደህንነት ግንዛቤ ማስጨበጫ ሳምንት በይፋ ተጀመረ

በኢንፎርሜሽን መረብ ደህንነት ኤጀንሲ የተዘጋጀው የመጀመሪያው ብሄራዊ የሳይበር ደህንነት የግንዛቤ ማስጨበጫ ሳምንት በአፍሪካ ኢኮኖሚ ኮሚሽን የስብሰባ አዳራሽ በይፋ ተጀመረ፡፡

የኢንፎርሜሽን መረብ ደህንት ኤጀንሲ ዋና ዳይሬክተር ወ/ሮ ኤፍራህ አሊ በመክፈቻ ስነ-ስርዓቱ ላይ ባስተላለፉት መልዕክት የሳይበር ደህንነት ግንዛቤ ማስጨበጫ ሳምንትን የማክበር ዓላማ በዘርፉ ያለው ንቃተ-ህሊና ዝቅተኛ በመሆኑ የህብረተሰቡንና የተቋማትን ግንዛቤ ለማሳደግ እንደሆነ ገልፀዋል፡፡

በሀገራችን ከዓመት አመት እየደረሰ ያለው የሳይበር ጥቃቶች በየጊዜው እያደጉ መምጣታቸውን የገለጹት ዋና ዳይሬክተሯ ሁሉም የህብረተሰብ ክፍል ከምንግዜውም በበለጠ ለሳይበር ደህንነት ትኩረት ሊሰጥ ይገባል ብለዋል፡፡

ሰላም ሚንስቴር ሚኒስትር ዴኤታ አቶ ዘይኑ ጀማል በበኩላቸው “ትኩረት ለሳይበር ደህንነት” በሚል መሪ ቃል የሚከበረው የሳይበር ደህንነት ሳምንት ወቅቱን የጠበቀ እና የማህበረሰቡን ግንዛቤ ለማሳደግ አጋዥ ነው ብለዋል፡፡

ዓለም በሳይበር ምህዳር አንድ መንደር በሆነችበት በዚህ ዘመን የሳይበር ሃይል ከገንዘብ፣ ከጦር መሳሪያ እና መሰል አቅሞች በላይ የሆነ የዘመናችን ቁልፍ መወዳደሪያ አቅም መሆኑን ሚኒስትር ዴኤታው አቶ ዘይኑ ጀማል ገልፀዋል፡፡

ሚንስትር ዴኤታው የሳይበር ደህንነት ለሃገራችን አዲስ እና በርካታ የሰለጠነ የሰው ሃይል የሚፈልግ እንደመሆኑ መጠን በዘርፉ የተሰማራውን የሰው ሃይል አቅም በመገንባት እና አዲስ የሰው ሃይል በማልማት አስፈላጊውን የቴክኖሎጂ ግብዓት በሟሟላት ሊመጣብን ከሚችል ማናቸውም ጥቃት ራሳችንን መጠበቅ እንችል ዘንድ መንግስት ዘርፉን ለማሳደግ አስፈላጊውን ሁሉ እገዛ እንደሚያደርግ ተቁመዋል፡፡

የህረተሰቡን አስተሳሰብ በመቀየር ረገድ የመሪነት ሚናን የሚጫወቱት የመገናኛ ብዙሃን የሳይበር ደህንነት ጉዳይ የሁሉም ሃላፊነት መሆኑን በመረዳት በፕሮግራሞቻቸው አንድ አካል አድርገው በመቅረጽ ሊሰሩ እንደሚገባ አቶ ዘይኑ ጀማል ገልጸዋል፡፡

የሰላም ሚንስትር ዴኤታው ኢመደኤ ያዘጋጀውን ትኩረት ለሳይበር ደህንነት ሳምንት እንደ መልካም አጋጣሚ በመጠቀም ተቋማት የመስሪያ ቤቱን አመራሮች እና ሰራተኞችን እንዲሁም የዜጎችን የሳይበር ደህንነት ግንዛቤ ለማሳደግ የበኩላችሁን ልትወጡ ይገባል ሲሉ አሳስበዋል፡፡

የሳይበር ደህንነት ግንዛቤ ማስጨበጫ ሳምንት በዓለም ለ16ኛ ጊዜ በኢትዮጵያ ለመጀመሪያ ጊዜ እየተከበረ ይገኛል፡፡ 

Info source: Information Network Security Agency


Oct 23, 2019 at 03:50 PM

New chrome release

Informer : Space

Google is about to release new and updated version 78 chrome browse in the coming days or weeks. The new version contains a lot of security improvement.  

Info source: Chrome team


Oct 18, 2019 at 04:19 PM

የሳይበር ጥቃቶች እና ሙከራዎች በኢትዮጵያ

Informer : Space

በመጀመሪያው ሩብ ዓመት በኢትዮጵያ 113 የሳይበር ጥቃቶች እና ሙከራዎች ተከስተዋል

አዲስ አበባ፤ ጥቅምት 7/2012፡- በኢትዮጵያ በተያዘው የ2012 በጀት ዓመት የመጀመሪያዎቹ ሶስት ወራት 113 በተለያዩ ቁልፍ የሀገሪቱ ተቋማት እና መሰረተ-ልማቶች ላይ ያነጣጠሩ የሳይበር ጥቃቶች እና ሙከራዎች ተከስተዋል፡፡

ከሃምሌ 1/ 2011 ዓ.ም እስከ መስከረም 30/2012 ዓ.ም ባለው ጊዜ በሀገሪቱ ከተሰነዘሩ የሳይበር ጥቃቶች መካከል በቀዳሚነት በአጥፊ ሶፍትዌሮች (ማልዌር) 42 ጥቃቶች ሲሰነዘሩ በድረ-ገፅ ላይ 29፣ በመሠረተ ልማት ቅኝቶች 22፣ ወዳልተፈቀደ ሲይስተም ሰርጎ መግባት 13 እና የሳይበር መሠረተ-ልማቶችን ሥራ ማቋረጥ ደግሞ 7 ጥቃቶች መከሰታቸውን በብሔራዊ አደጋ ዝግጁነት እና ምላሽ መስጫ ዲቪዥኑ (ኢትዮ-ሰርት) ሃላፊው አቶ አብርሃም ገ/ጻዲቅ ገልፀዋል፡፡

በዲቪዥኑ ይፋ በተደረገው መረጃ በሀገሪቱ ለተከሰቱ ሁሉም ዓይነት የሳይበር ጥቃቶች ምላሽ መሰጠቱንና ጥቃቶቹ ከመፍጠራቸው በፊት ገና ቅኝት ላይ እያሉ መቅጨት እና የተከሰቱ የሳይበር ጥቃቶችም ከፍተኛ ጉዳት ከማድረሳቸው በፊት መግታት መቻሉን ገልጿል፡፡

ባለፉት ሶስት ወራት ተመሳሳይ ጥቃቶች በሀገሪቱ እንዳይሰነዘሩ የስርዓተ ኮምፒውተሮችን የጥቃት ተጋላጭነት የመሙላት ስራ ሲያከናውን መቆየቱንና የሳይበር ጥቃት ያስተናገዱ ስርዓቶችን ደግሞ ከጥቃት በፊት ወደነበሩበት ይዞታቸው እንዲመለሱ ማድረጉን አቶ አብርሃም ጨምረው ገልጿል፡፡

ከዚህ ባለፈም የጥቃት ተጋላጭነት ቅድመ ትንተናዎችን በማድረግ የሳይበር ጥቃቶች ከመድረሳቸው በፊት ያሉትን ተጋላጭነቶች መሙላት መቻሉን ሃላፊው ጠቁመዋል፡፡

የኢንፎርሜሽን መረብ ደህንነት ኤጀንሲ በሃገሪቱ የሚሰነዘሩ የሳይበር ጥቃቶች ቅድመ የመከላከል እና ከተከሰቱ በኋላም አፋጣኝ ምላሾችን የሚሰጥ ሲሆን በአሁኑ ሰዓት ኤጀንሲው የሃገሪቱን የኢንፎርሜሽን እና የኢንፎርሜሽን ኮሙዩኒኬሽን መሰረተ-ልማቶችን ከጥቃት ለመከላከል የሚያስችል አቅም በመገንባት ብሄራዊ ጥቅሞችን የማስጠበቅ ተልዕኮውን በአግባቡ እየተወጣ ይገኛል፡፡ 

Info source: Information Network Security Agency


Oct 02, 2019 at 03:37 PM

Tech

Informer : Rediet

ለጠቅላላ እውቀት share በማድረግ ለወዳጆ ያጋሩ
ይሞክሩት ...
.
ኦርጅናልን ሞባይልን ከፎርጅድ ለመለየት ፡-
.
- ይህንን *#06# ቁጥር በመፃፍ IMEI:( International
Mobile Equipment Identity ) 15 ቁጥሮችን እናገኛለን፡፡
- ይህ ቁጥር ከፊት ወደ ሁዋላ በመቁጠር ሰባተኛውና
ስምነተኛውን በማየት የተሰራበትን አገር ማወቅና መለየት
ይቻላል፡፡
ለምሳሌ የኔ IMEI: 356240033532891 ቢሆን የዚህ
ሰባተኛው እና ስምንተኛው ቁጥር 03 ነው፡፡ 00 ቢሆን ኖሮ
በርግጠኝነት የኦርጂናሊቲና ጥራት ማሳያነው፡፡ ለምን ቢባል 00
ኮድ ሚያመለክተው በኦሪጂናል ሞዴሉ አምራች የተሰራ መሆኑን
ነው፡፡
- 01 ወይም 10 ከሆነ የፊንላንድ ምርት ሆኖ ጥሩ ነው፡፡
- 02፣ 20፣03፣04፣30 እና 40 ከሆነ ህንድ ቻይናና ኮሪያ
ናቸውና መጠርጠሩ መልካም ነው፡፡ በተለይ 02 እና 20
በርግጠኝነት ቻይናና ኢሚሬትስ (ዱባይ) ሚገጣጠሙና ፎርጅድ
ሊሆኑ ይችላል፡፡ አንዳንዴም የህንድ ስልክ 02 እና 20 ይሆናሉ፡፡
- 13 ከሆነ ደግሞ የአዘርባጃን ምርት ሲሆን ፎርጅድና የማይረባ
ነው ፡፡
- 05 እና 50 ብራዚል ቬትናምና አሜሪካ ሲሆን ጥሩ ጥራት
አላቸው፡፡
- 06 ወይም 60 ሆንግኮንግ ሜክሲኮ እና ቻይና ናቸው፡፡
- 08 እና 80 ጀርመን ናቸው፡፡ 

2 Comment(s)

Info source: Ethio tech


Jun 05, 2019 at 01:17 PM

Space created on Windows products

Informer : Wegen

Addis Ababa: May 28, 2011 - The US National Security Agency (NSA) has urged Windows users to fill in the created software gadget.

Microsoft has repeatedly cautioned users to fill in the blot after a "blueKeep" gadget is blurring on Microsoft\'s predecessor Windows products.

The security hole created is "Traffic Desktop Protocols", and Windows operating systems are vulnerable to Windows XP, Windows Vista, Windows 7, Windows Server 2003, and Windows Server 2008.

It is recalled that the company was offering a space vacuum after the product was discontinued.

Though Microsoft has just released May 13, the software gadget is being used as a weapon of use that is dangerous and self-propagating.

Following this, the US National Security Agency rescued its own warning that it was concerned about the issue.

For additional info visit https://www.zdnet.com/article/even-the-nsa-is-urging-windows-users-to-patch-bluekeep-cve-2019-0708 

1 Comment(s)

Info source: INSA facebook page and zdnet.com


Jun 05, 2019 at 12:59 PM

በዊንዶው ምርቶች ላይ የተፈጠረው ክፍተት

Informer : Wegen

አዲስ አበባ ግንቦት 28/2011፡-የአሜሪካ የብሄራዊ ደህንነት ኤጀንሲ( NSA) የዊንዶው ተጠቃሚዎች የተፈጠረውን የሶፍትዌር ክፍተት በአስቸኳይ እንዲሞሉ አሳስቧል፡፡

ማይክሮሶፍት በቀድሞ የዊንዶው ምርቶች ላይ ብሉኪፕ "BlueKeep" የተባለ የሶፍትዌር ክፍተት መከሰቱን ተከትሎ ተጠቃሚዎች ክፍተቱን እንዲሞሉ በተደጋጋሚ ማሳሰቡ ይታወቃል፡፡

የተፈጠረው የደህንነት ክፍተት "የሪሞት ዴስክቶፕ ፕሮቶኮሎችን" የሚያጠቃ ሲሆን ለጥቃት ከተጋለጡ የዊንዶው ኦፕሬቲንግ ሲስተሞች፡ Windows XP ፣ Windows Vista ፣ Windows 7 ፣Windows Server 2003፣ እና Windows Server 2008 ናቸው፡፡

ኩባንያው ማሻሻያ ማቅረብ ላቆመባቸው ምርቶች ሳይቀር ክፍተቱ አደገኛ መሆኑን ተከትሎ ክፍተት መሙያ ማቅረቡ ይታወሳል፡፡

ማይክሮሶፍት ግንቦት 14 ማሻሻያ ቢለቅም የሶፍትዌር ክፍተቱ እጅግ አደገኛ እና ራሱን በማሰራጨት በመሳሪያነት እየዋለ መሆኑ ተገልጿል፡፡

ይህን ተከትሎም የአሜሪካው ብሄራዊ ደህንነት ኤጀንሲ ጉዳዩ አሳስቦኛል በሚል የራሱን ማስጠንቀቂ ለቋል፡፡
For additional info visit https://www.zdnet.com/article/even-the-nsa-is-urging-windows-users-to-patch-bluekeep-cve-2019-0708 

Info source: INSA facebook page and zdnet.com


Apr 24, 2019 at 04:46 PM

History, Virus (computer)

Informer : Wegen Fantu

In 1949 Hungarian American mathematician John von Neumann, at the Institute for Advanced Study in Princeton, New Jersey, proposed that it was theoretically possible for a computer program to replicate. This theory was tested in the 1950s at Bell Laboratories when a game called Core Wars was developed, in which players created tiny computer programs that attacked, erased, and tried to propagate on an opponent\'s system.
In 1983 American electrical engineer Fred Cohen, at the time a graduate student, coined the term virus to describe a self-replicating computer program. In 1985 the first Trojan horses appeared, posing as a graphics-enhancing program called EGABTR and as a game called NUKE-LA. A host of increasingly complex viruses followed.
The so-called Brain virus appeared in 1986 and spread worldwide by 1987. In 1988 two new viruses appeared: Stone, the first bootstrap-sector virus, and the Internet worm, which crossed the United States overnight via computer network. The Dark Avenger virus, the first fast infector, appeared in 1989, followed by the first polymorphic virus in 1990.
Computer viruses grew more sophisticated in the 1990s. In 1995 the first macro language virus, WinWord Concept, was created. In 1999 the Melissa macro virus, spread by e-mail, disabled e-mail servers around the world for several hours, and in some cases several days. Regarded by some as the most prolific virus ever, Melissa cost corporations millions of dollars due to computer downtime and lost productivity.
The VBS_LOVELETTER script virus, also known as the Love Bug and the ILOVEYOU virus, unseated Melissa as the world\'s most prevalent and costly virus when it struck in May 2000. By the time the outbreak was finally brought under control, losses were estimated at U.S.$10 billion, and the Love Bug is said to have infected 1 in every 5 PCs worldwide.
The year 2003 was a particularly bad year for computer viruses and worms. First, the Blaster worm infected more than 10 million machines worldwide by exploiting a flaw in Microsoft’s Windows operating system. A machine that lacked the appropriate patch could be infected simply by connecting to the Internet. Then, the SoBig worm infected millions more machines in an attempt to convert systems into networking relays capable of sending massive amounts of junk e-mail known as spam. SoBig spread via e-mail, and before the outbreak was 24 hours old, MessageLabs, a popular e-mail filtering company, captured more than a million SoBig messages and called it the fastest-spreading virus in history. In January 2004, however, the MyDoom virus set a new record, spreading even faster than SoBig, and, by most accounts, causing even more damage. 

Info source: Microsoft ® Encarta


Apr 13, 2019 at 11:26 AM

Facebook spends $22.6 million to keep Mark Zuckerberg safe

Informer : Wegen Fantu

Facebook Inc more than doubled the money it spent on Chief Executive Officer Mark Zuckerberg’s security in 2018 to $22.6 million, a regulatory filing showed on Friday.

Zuckerberg has drawn a base salary of $1 for the past three years, and his “other” compensation was listed at $22.6 million, most of which was for his personal security.

Nearly $20 million went toward security for Zuckerberg and his family, up from about $9 million the year prior. Zuckerberg also received $2.6 million for personal use of private jets, which the company said was part of his overall security program.

Facebook has in the past few years faced public outcry over its role in Russia’s alleged influence on the 2016 U.S. presidential election and has come under fire following revelations that Cambridge Analytica obtained personal data from millions of Facebook profiles without consent.

Chief Operating Officer Sheryl Sandberg took home $23.7 million in 2018 compared to $25.2 million last year.

Separately, Facebook said Netflix Chief Executive Officer Reed Hastings would vacate his seat on the social media company’s board and not be nominated for re-election.

Hastings’ departure comes as the Menlo Park-based company beefs up its push into videos. Hastings has served on Facebook’s board since 2011.

The company also said it would nominate PayPal’s senior vice president of core markets, Peggy Alford, to its board in place of University of North Carolina President Emeritus Erskine Bowles, who will also not be re-nominated.

Facebook shares closed at $179.07 Friday evening. 

Info source: Reuters


Mar 17, 2019 at 04:23 PM

Empowering rural women with communication technology

Informer : Wegen Fantu

In Rome on Thursday, the International Fund for Agricultural Development (IFAD), UN Food and Agriculture Organization (FAO) and World Food Programme (WFP) are leading the talks, which explores how women’s empowerment and greater equality are inseparable from achieving sustainable development.

"At IFAD we have seen how information communications technologies can be powerful catalysts for political and social empowerment of women, and the promotion of gender equality if rightly designed, accessible and usable," said Gilbert F. Houngbo, IFAD President in his opening remarks at the IFAD-hosted event – highlighting how women’s empowerment and greater equality are inseparable from achieving sustainable development.

“At IFAD, we have seen how information communications technologies can be powerful catalysts for political and social empowerment of women, and the promotion of gender equality if rightly designed, accessible and usable,” said Gilbert F. Houngbo, IFAD President, in his opening remarks at the event, which the agency hosted.

Only 41 per cent of women in low- and middle-income countries own mobile phones, compared to 46 per cent for men. Nearly two-thirds of women living in the South Asia and East Asia and Pacific sub-regions do not own a mobile phone.

Rural women often lack access to health care, education, decent work and social protection.
“The global rise of information has deeply affected rural women in poor countries, who often find themselves on the wrong side of the digital divide: because they live in developing countries, in rural areas, and because they are women, leaving them more likely poor and vulnerable to economic and climatic shocks,” explained FAO Director-General José Graziano da Silva.

“If the interests and needs of rural women and girls are addressed, there is significant potential for information and communication technology to foster gender equality and the improvement of rural livelihoods,” he added.

ICTs can go a long way to boosting economic opportunities for rural women. For example, mobile and smartphones, provide access to real-time prices, offering informed choices about where and when to buy and sell.

Studies indicate that when women earn money, they are more likely than men to spend it on their families’ food and children’s education.

“Digital technology can transform lives if we get it into the hands of the people who need it, and that\'s why we’re working hard every day to help increase access for rural women,” underscored WFP Executive Director David Beasley.

“And every time one of those women farmers uses a WFP app to sell her crops, the prosperity of her family and her community improves and we\'re another step closer to gender equity," he elaborated.
International Women’s Day is a time to call for change and celebrate acts of courage and determination by ordinary women who have played an extraordinary role in the history of their countries and communities. 

Info source: united nation


Mar 16, 2019 at 12:27 PM

What is 5G Technology?

Informer : YouNet Technologies

5G networks are the next generation of mobile internet connectivity, offering faster speeds and more reliable connections on smartphones and other devices than ever before.
Combining cutting-edge network technology and the very latest research, 5G should offer connections that are multitudes faster than current connections, with average download speeds of around 1GBps expected to soon be the norm.

The networks will help power a huge rise in Internet of Things technology, providing the infrastructure needed to carry huge amounts of data, allowing for a smarter and more connected world.
With development well underway, 5G networks are expected to launch across the world by 2020, working alongside existing 3G and 4G technology to provide speedier connections that stay online no matter where you are.
So with only a matter of months to go until 5G networks are set to go live, here\'s our run-down of all the latest news and updates.

What will 5G networks mean for me?

Faster download and upload speeds
Smoother streaming of online content
Higher-quality voice and video calls
More reliable mobile connections
Greater number of connected IoT devices
An expansion of advanced technologies - including self-driving cars and smart cities

How fast will 5G be?

It’s still not exactly known how much faster 5G will be than 4G, as much of the technology is still under development.
That being said, the networks should provide a significant upgrade to current download and upload speeds - with the GSMA proposing minimum download speeds of around 1GBps.
Most estimates expect the average speed of 5G networks to reach 10Gb/s, and some even think transfer rates could reach a whopping 800Gb/s.
This would mean that users could download a full-length HD quality film in a matter of seconds, and that downloading and installing software upgrades would be completed much faster than today.

Will I be able to get 5G networks on my phone?

Existing smartphones, tablet or other devices that were released when 4G networks were the standard may not be able to connect to 5G to begin with, or may incur extra costs to do so.
However following the 2020 deadline for the initial rollout, we should soon see devices coming with 5G connection as default.
Don\'t worry though - although 5G should represent a major step up from current 4G and 3G networks, the new technology won’t immediately replace its predecessor - at least, not to begin with.
Instead, 5G should link in with existing networks to ensure users never lose connection, with the older networks acting as back-up in areas not covered by the new 5G coverage.
So-called “4.5G” networks (also known as LTE-A) are set to fill the gap for the time being, offering connections that are faster than current 4G networks, although only certain countries such as South Korea can benefit from them right now.
Once launched however, implementing 5G may be a slower process. Much like the gradual takeover of 4G networks from the previous generation, existing network infrastructure may need to be upgraded or even replaced in order to deal with the new technology, and homes and businesses may also need to get new services installed.
It’s not yet known how 5G networks will take over from existing networks, but again, much like the rollout of 4G, you may not be able to immediately connect to the new networks without upgrading your technology.

What will a 5G network need?

The GSMA has outlined eight criteria for 5G networks, with a connection needing meet a majority of these in order to qualify as 5G:

1-10Gbps connections to end points in the field (i.e. not theoretical maximum)
1 millisecond end-to-end round trip delay (latency)
1000x bandwidth per unit area
10-100x number of connected devices
(Perception of) 99.999 per cent availability
(Perception of) 100 per cent coverage
90 per cent reduction in network energy usage
Up to 10 year battery life for low power, machine-type devices  

1 Comment(s)

Info source: by Mike Moore, techradar.com


Mar 13, 2019 at 01:53 PM

What is Internet of things (IoT)

Informer : Wegen

The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

A thing in the internet of things can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low or any other natural or man-made object that can be assigned an IP address and is able to transfer data over a network.
Increasingly, organizations in a variety of industries are using IoT to operate more efficiently, better understand customers to deliver enhanced customer service, improve decision-making and increase the value of the business.

History of IoT:
Kevin Ashton, co-founder of the Auto-ID Center at MIT, first mentioned the internet of things in a presentation he made to Procter & Gamble (P&G) in 1999. Wanting to bring radio frequency ID (RFID) to the attention of P&G\'s senior management, Ashton called his presentation "Internet of Things" to incorporate the cool new trend of 1999: the internet. MIT professor Neil Gershenfeld\'s book, When Things Start to Think, also appearing in 1999, didn\'t use the exact term but provided a clear vision of where IoT was headed.

IoT has evolved from the convergence of wireless technologies, microelectromechanical systems (MEMS), microservices and the internet. The convergence has helped tear down the silos between operational technology (OT) and information technology (IT), enabling unstructured machine-generated data to be analyzed for insights to drive improvements.

Although Ashton\'s was the first mention of the internet of things, the idea of connected devices has been around since the 1970s, under the monikers embedded internet and pervasive computing.

The first internet appliance, for example, was a Coke machine at Carnegie Mellon University in the early 1980s. Using the web, programmers could check the status of the machine and determine whether there would be a cold drink awaiting them, should they decide to make the trip to the machine.

IoT evolved from machine-to-machine (M2M) communication, i.e., machines connecting to each other via a network without human interaction. M2M refers to connecting a device to the cloud, managing it and collecting data.

Taking M2M to the next level, IoT is a sensor network of billions of smart devices that connect people, systems and other applications to collect and share data. As its foundation, M2M offers the connectivity that enables IoT.

The internet of things is also a natural extension of SCADA (supervisory control and data acquisition), a category of software application program for process control, the gathering of data in real time from remote locations to control equipment and conditions. SCADA systems include hardware and software components. The hardware gathers and feeds data into a computer that has SCADA software installed, where it is then processed and presented it in a timely manner. The evolution of SCADA is such that late-generation SCADA systems developed into first-generation IoT systems.

The concept of the IoT ecosystem, however, didn\'t really come into its own until the middle of 2010 when, in part, the government of China said it would make IoT a strategic priority in its five-year plan.

How IoT works:
An IoT ecosystem consists of web-enabled smart devices that use embedded processors, sensors and communication hardware to collect, send and act on data they acquire from their environments. IoT devices share the sensor data they collect by connecting to an IoT gateway or other edge device where data is either sent to the cloud to be analyzed or analyzed locally. Sometimes, these devices communicate with other related devices and act on the information they get from one another. The devices do most of the work without human intervention, although people can interact with the devices -- for instance, to set them up, give them instructions or access the data.

The connectivity, networking and communication protocols used with these web-enabled devices largely depend on the specific IoT applications deployed.

Benefits of IoT:
The internet of things offers a number of benefits to organizations, enabling them to:

monitor their overall business processes;
improve the customer experience;
save time and money;
enhance employee productivity;
integrate and adapt business models;
make better business decisions; and
generate more revenue.
IoT encourages companies to rethink the ways they approach their businesses, industries and markets and gives them the tools to improve their business strategies. 

Info source: Iot Agenda


Mar 13, 2019 at 11:49 AM

US seeks to allay fears over killer robots

Informer : Wegen Fantu

Humans will always make the final decision on whether armed robots can shoot, the US Department of Defense has said.

The statement comes as plans emerge for gun platforms that can choose their own targets on the battlefield.

The plans seek to upgrade existing aiming systems, using developments in machine intelligence.

The US said rules governing armed robots still stood and humans would retain the power to veto their actions.

Engage targets
The defence department\'s plans seek to upgrade the current Advanced Targeting and Lethality Automated System (Atlas) used on ground combat vehicles to help human gunners aim.

The military is seeking commercial partners to help develop aiming systems to "acquire, identify, and engage targets at least three times faster than the current manual process".

And some commentators feared this would mean systems that could choose their own targets and make an autonomous decision to fire.

The US Army then updated its proposal, to emphasise the key role of humans in the aiming process.

Human involvement
It said it remained committed to the rules governing human-robot interaction, known as directive 3000.09, which require a human finger on every trigger.

The US Army also said it would issue a series of "talking points" around human-robot interaction to be debated on 12 March, when industry is invited to an open day to explore how Atlas can be updated.

The US Army was not putting robots in a position to kill anyone, an official told military news site Defense One.

Prof Michael Horowitz, a political scientist at the University of Pennsylvania and a senior adjunct fellow at the Center for New American Security, told Defense One: "It is critical that any revisions to the Atlas program... clarify the degree of autonomy and the level of human involvement in the use of force." 

Info source: BBC


Mar 13, 2019 at 11:43 AM

UK needs to meet Facebook, Google competition with new rules

Informer : YouNet Technologies

LONDON (Reuters) - Britain needs to overhaul its competition rules to tackle the dominance of tech giants like Facebook, Google and Amazon, and increase consumer choice, a government review said on Wednesday.
A new competition unit with expertise in the sector should be set up, the independent review said, and innovation should be encouraged by giving people control over their own data so they could switch between rival services and platforms easily.

Smaller companies should also have access to the data that social media platforms hold on their users, it recommended.
Big tech has been criticized by politicians in the United States and in Europe in recent years over issues ranging from Facebook losing track of users’ data to how Google ranks the results of searches.

France, Italy, Britain and Spain have also proposed new digital taxes to narrow loopholes that allow large multinational firms to cut tax bills.

Harvard professor Jason Furman, who chaired the British government review, said the digital sector had created substantial benefits but they had come at the cost of the increasing dominance of a few companies.
“My panel is outlining a balanced proposal to give people more control over their data, give small businesses more of a chance to enter and thrive, and create more predictability for the large digital companies,” he said on Wednesday.

“These recommendations will deliver an economic boost driven by UK tech start-ups and innovation that will give consumers greater choice and protection.”

UK finance minister Philip Hammond, who will deliver a half-yearly update on the budget later on Wednesday, said he would set out government measures to ensure digital markets are competitive later this year.

TechUK, which represents more than 900 tech companies that collectively employ 700,000 people, said the report contained some positive suggestions, but it needed further detail on what any proposed code of conduct for big tech might look like.
It also said there had to be a full assessment of the risks and benefits of opening up data sets.

“Bad regulation can be as big a barrier to competition and innovation as monopolistic activities,” TechUK CEO Julian David said.

“The UK must remain a welcoming place for digital business from around the world, and ensure that the UK competition and wider regulatory framework is not in conflict with the other leading digital economies with which we must compete.” 

Info source: Reuters


Mar 12, 2019 at 11:50 AM

New e-payment platform

Informer : YouNet Technologies

Ethiopia launches integrated national e-payment Platform

Addis Ababa march 8/2019: After been providing eight month pilot service “Derash”- Ethiopia’s first of its kind e-payment platform is now officially launched.

Designed and developed by INSA “The platform will be playing a bridging role between Service providers, Banks, payment agents and Consumers, on the due collection of utility bills as well as government’s receivable payments.” – Stated Yonatan Ayalew – director of INSA’s Integrated Platform Division.

Briefing a press conference; Mr. Yonatan asserted that the new national e-payment platform is a pioneer in digitizing the nation’s payment system and expected to ease doing business as well as accelerating economic growth in Ethiopia.

Now consumers can manage their bills on the go, mobile USSD or using core banking at the nearest windows of any of the local banks in Ethiopia.
Likewise, service providers in Ethiopia are now designated to collect their payments with secure data, less time and fair running cost -just using Derash.

Mr. Yonatan has signaled that the platform is open for customization and integration with other similar systems. Hence it encourages innovation and synergy in the Information technology sector.
Currently, Derash is actively working in collaboration with Commercial Bank of Ethiopia, Wegagen, Lion and Oromia cooperative banks and has signed MoU with numerous local banks to commence operation shortly.
During its pilot service program Derash has helped the Ethiopian Customs Authority to collect a total tax of 5 Billion ETB using e-tax system.
To visit the Platform uses the following link. https://www.derash.gov.et/home 

Info source: INSA


Feb 10, 2019 at 04:06 PM

How Information Travels Over the Internet

Informer : YouNet Technologies

All information is transmitted across the Internet in small units of data called packets. Software on the sending computer divides a large document into many packets for transmission; software on the receiving computer regroups incoming packets into the original document. Similar to a postcard, each packet has two parts: a packet header specifying the computer to which the packet should be delivered, and a packet payload containing the data being sent. The header also specifies how the data in the packet should be combined with the data in other packets by recording which piece of a document is contained in the packet.
A series of rules known as computer communication protocols specify how packet headers are formed and how packets are processed. The set of protocols used for the Internet is named TCP/IP after the two most important protocols in the set: the Transmission Control Protocol and the Internet Protocol. TCP/IP protocols enable the Internet to automatically detect and correct transmission problems. For example, if any network or device malfunctions, protocols detect the failure and automatically find an alternative path for packets in order to avoid the malfunction. Protocol software also ensures that data arrives complete and intact. If any packets are missing or damaged, protocol software on the receiving computer requests that the source resend them. Only when the data has arrived correctly does the protocol software make it available to the receiving application program, and therefore to the user.
Hardware devices that connect networks in the Internet are called IP routers because they follow the IP protocol when forwarding packets. A router examines the header in each packet that arrives to determine the packet’s destination. The router either delivers the packet to the destination computer across a local network or forwards the packet to another router that is closer to the final destination. Thus, a packet travels from router to router as it passes through the Internet. In some cases, a router can deliver packets across a local area wireless network, allowing desktop and laptop computers to access the Internet without the use of cables or wires. Today’s business and home wireless local area networks (LANs), which operate according to a family of wireless protocols known as Wi-Fi, are fast enough to deliver Internet feeds as quickly as wired LANs.
Increasingly, cell phone and handheld computer users are also accessing the Internet through wireless cellular telephone networks. Such wide area wireless access is much slower than high-capacity dedicated, or broadband, access, or dial-up access. Also, handheld devices, equipped with much smaller screens and displays, are more difficult to use than full-sized computers. But with wide area wireless, users can access the Internet on the go and in places where access is otherwise impossible. Telephone companies are currently developing so-called 3G—for “third generation”—cellular networks that will provide wide area Internet access at DSL-like speeds.
Source: Microsoft student


 

3 Comment(s)

Info source: microsoft student


ONLINE E-BOOKS

Online E-books, Textbooks and related materials.