Huawei hosted the TECH4ALL Education Global Online Summit yesterday. Officials and experts at the summit explored how digital technologies will transform today’s education systems into a more inclusive and innovative paradigm, democratize access to education resources, and build-in systemic resilience to external factors like the pandemic. ![]() “Technology can play a critical and catalytic role in transforming education,” said Stefania Giannini, Assistant Director-General for Education for UNESCO. “We need to use technology to ensure connectivity for all; build free, public digital learning content and platforms; and focus on how technology can enhance innovation and change in teaching methodologies.” Underpinned by connectivity, digital skills, and digital platforms, the transformation of the education sector is gathering momentum. ![]() “Technology truly has the power to transform education for everyone,” said Kevin Zhang, CMO of ICT Infrastructure for Huawei. “We are doing this in three ways: connecting schools, promoting digital skills, and supporting STEAM curriculum.” Strategies that prioritize blended learning are already in play where schools are no longer just physical venues for learning, with educational approaches shifting to prepare today’s students for tomorrow’s world. One UNESCO program that leverages technology and a transformational approach is Technology-enabled Open Schools for All (TeOSS). Supported by Huawei and developed in close collaboration with the MOEs of Ghana, Ethiopia, and Egypt, the three-year project aims to benefit students and teachers in the three African nations and set the foundation for innovative education systems that seamlessly connect school and home learning in online and offline scenarios to maximize inclusion. “It is a project we are very much excited about,” said Mr. John Ntim Fordjour, Deputy Minister of Education of Ghana. “The purpose is to provide reliable connectivity for all schools at the pre-tertiary level. Future educational technology is going to advance the quality of education and even the ways we teach and learn.” In Kenya, connecting schools, boosting digital literacy, and providing teachers and students with digital devices is a key priority. Successful completion of phase one of the DigiSchool project, for example, saw 13 schools connected, with more than 6,000 students benefiting. “The Ministry of ICT, the Ministry of Education, UNESCO, and Huawei formed a collaborative initiative to provide sustainable Internet connectivity. Ensuring no child is left behind – that is the driving force behind this project,” said Martin Kungania, Deputy Director, Education National Coordinator for Kenya’s Digital Literacy Programme. Experts from WeTechCare and the Bandung Institute of Technology described progress with the France DigiTruck and Huawei ICT Academy, respectively. In France, 35% of people are unable to fully utilize digital tools due to a range of challenges. The DigiTruck – a solar-powered mobile classroom converted from a used shipping container – aims to help address this by providing free training in digital skills, targeting unemployed young people and older citizens. Continuing the theme of skills development, discussion on the Huawei ICT Academy centered on the value of developing students’ ICT skills to cultivate the next generation of tech talent – a critical need given the current estimated global shortage of 200 million ICT professionals. Looking to the future and at how education will evolve, speakers from the National University of Singapore, Pimax Technologies, and Huawei explored how ICT infrastructure and nascent technologies such as AI, VR, and the metaverse will revolutionize the teaching and learning space, reshaping subjects like geography and history with a truly immersive experience that will enable students to virtually travel through time and space. Read more about Huawei’s TECH4ALL Tech4Education projects: https://www.huawei.com/en/tech4all/education Via https://www.jbklutse.com/huawei-partners-explore-ict-to-drive-inclusive-innovative-education/
0 Comments
The Cyber Security Poverty Line: If we dont address the least prepared the most prepared will suffer8/16/2022 For the many cybersecurity practitioners living in the shadow of threat actors and adversaries, I can’t even imagine what the battle is like, and for businesses still struggling to establish a baseline cybersecurity solution for their operations, I commend your efforts. We are all living on the edge in anticipation of an attack soon to come, already in place but haven’t been detected yet, or recovering from a terrible attack. Living on the edge means living in fear of the unknown or what is to come. For small and medium businesses with inadequate security controls in place, characterized by budget constraints, inadequate expertise, and lack of capability and influence, obviously need assistance to complement your efforts. Security Poverty line (SPL) is the baseline minimum-security posture that every company should maintain. Security Poverty Line does not only address challenges faced by small and medium businesses that struggle to meet up with baseline security and regulatory requirements but also large or big corporations that underinvest in security. We live in a digital ecosystem where most, if not all, businesses rely on other businesses for survival. No business operates in isolation but rather a constant “food chain” of businesses surviving on the operations and assurance of other third-party businesses. This supply chain creates an environment of dependency and, therefore, a need for all businesses to operate under a baseline security obligation across all domains since an attack on one business has the surest tendency to impact other businesses in the supply or “food” chain. It is, therefore, necessary that cybersecurity organizations, regulators, and communities come together to address challenges facing businesses, especially small to medium businesses, to rise above the security poverty line in order to sufficiently ensure that all businesses attain practical, consolidated, and matured security posture that ensures the security of all. SMBs are in dying need of support and assistance. If we don’t address the least prepared in the world, the most prepared will suffer. Data shows that SMEs are the most attacked and experience the most security incidents; 43% of attacks were targeted at SMEs in 2019 and 46% in 2021 (Verizon). 36% of SMEs consider themselves below the Security poverty line (Duo Security, 2019), and 75% of healthcare providers that fall within the SME bracket are below the SPL. It is even worrying to know that security incidents in 2018 affected 67% of surveyed SMEs (Accenture). SMEs that face critical security incidents collapse in 6 months. Now, the threat landscape has widened, the attack surface has increased, and attacks are even more complex and sophisticated. ![]() Four known reasons underpin the struggles of businesses below the security poverty line; BudgetSecurity in itself is very expensive. There is no finish line for security or shopping list for security. You cannot go to the market and buy all your security needs. Unfortunately, many SMEs are not prioritizing investment in cyber security which exposes them to attacks. For most organizations below the SPL, money is a major constraint. Small businesses are swelled up with regulations and standards equal to that of large organizations. When the budget is tight, security suffers. SMEs need to outsource their security program to Managed Security Service Providers (MSSPs) that can offer them affordable service but at the best quality. Many vendors provide a budget-friendly MSSP for SMEs. These MSSP takes care of the operationalization of your basic security needs, with the expertise, procedures, and right technology to manage them. Buying a security product is costly, and operating or running the product is even costlier than the product, as you will need the right people and environment to manage the product. MSSPs know what your security needs are, the requirement from regulators, compliance, and a better structure to defend and respond to incidents. ExpertiseLarge companies and corporations hire the best talents leaving a budget-constrained SME to struggle with hiring. It is critical that SMEs employ people with the requisite expertise to help in their security. They are usually understaffed or do not have personnel with the right expertise to manage security. Security is too delicate and critical to be handled by practitioners who do not have the best industry license or certifications. There are various MSSP agreements that SMEs can buy into. SMEs can sign training agreements with MSSPs for their small, amateur security teams or even sign a supervisory agreement with MSSPs to assist in managing their SOC. There are Cyber communities and tech bodies that SMEs can also reach out to for assistance at little to no cost. CapabilityBuilding operational capability is a tedious task. Most security teams, particularly SMEs, do not have the capability to handle new threats and attacks that are facing the industry. Cyber defense capability is the ability of an organization to successfully prepare, prevent, detect, and respond to cyber-attack. Obviously, capability deficiencies result from a lack of expertise and budget constraints. The capabilities are very complex and require cyber security practitioners’ technical, strategic, and operational abilities to confront a cyber threat. This notion requires the development of strategic tools for active and passive defense and collaboration with other key players. InfluenceInfluence plays a very paramount role in establishing a defense. Disinformation, technological evolution, and digitization are major influences on the present threat landscape. Ghana’s digitization agenda will significantly influence the country’s threat landscape going forward. The type of technology we deploy, the economic and industrial transformation that takes place, and the verticals within which rapid digitization takes place will determine what kind of threats we will face. The economic downturn and global recession taking place will have an adverse impact on countries. Cyber fraud cases have the tendency to peak due to economic pressures. These threats will come in various dimensions and forms. There will be influences on network, email, cloud, or security service adoption as the threat and vulnerabilities across these platforms and services multiply. A large majority of SMEs and institutions that play critical roles are silent because the industry or communities are receptive to the most vocal and most active entities. Businesses that can sponsor security conferences and training. Sadly, companies with the most expertise take the center stage in decision-making. There’s a large group out there below the SPL that is struggling to deal with these security problems. They’re not really getting the voice that they need, and as a security community, we need to try to focus more on helping them solve those problems. About Writer ![]() Computer/Cyber security, Digital/Memory/Malware forensics, Forensic Investigation and Audit, Networking, and an excellent researcher in the field of Information communication and technology. Contact: 0279489127 Via https://www.jbklutse.com/the-cyber-security-poverty-line/ Cryptocurrency exchangers are very popular among digital money network users. This is because not everywhere can you pay with bitcoin, ether, or other crypto coins; however, you can purchase any product or service with them after exchanging them for fiat (traditional money). In this article, we will talk about the features of working with exchangers. An exchanger is a specialized service that provides services for exchanging funds of various payment systems (including digital currencies in all directions). Each service charges a commission and sets its cryptocurrency exchange rates (based on stock exchanges). Overview of cryptocurrency exchangers and how they operateEach cryptocurrency exchange works according to the following principle – two accounts are involved in the exchange: the contractor and the customer. The client transfers a particular amount in one currency to the contractor’s account, after which the contractor assigns the converted equivalent in another currency to the client’s account. The main tasks of the owners of modern exchangers are high speed, security of exchange operations, and the most simplified use of their services by customers. Thus, most exchangers permit to deposit/withdraw cryptocurrency in only several clicks. Cryptocurrency exchangers and exchanges: main differencesMost often, cryptocurrency exchangers are explicitly used for quick exchange of busd vs usdt or cashing out of digital money. You can enter the market through cryptocurrency exchanges, where you can make a versatile exchange at favorable rates. Unlike exchangers, on the exchange, the user’s funds are credited to a personal account, and it takes much longer to withdraw them. Registration is required to create an account and operate on a cryptocurrency exchange. It is not required to register on the sites of exchangers, and it is enough to show some data about yourself when converting (e-mail, in some cases, you will need a phone number and full name). Registration on the exchanger’s website still gives some advantages – participation in the loyalty program (all exchanges are summed up and bonuses are provided) and the referral system (if any). The order of transactions in the online cryptocurrency exchangerThe exchange procedure itself is similar for all exchangers:
Using the exchanger’s functionality, we transfer funds to the contractor’s account and wait for the receipt of the desired currency to our account – the time of execution of the application is prescribed in the service regulations. For the exchange of Cardano vs Polygon to be successful, you must never lose vigilance. It would be best if you made an exchange only on trusted platforms, for example, Godex. Via https://www.jbklutse.com/cryptocurrency-exchangers-and-exchanges-principle-of-operation-main-differences/ Over the years, cryptocurrencies have gained enormous popularity, making people adopt them as a tool for financial transactions. In fact, cryptocurrencies have delivered several benefits, such as minimal transaction fees, instant accessibility, and high levels of transparency. With all the benefits cryptocurrency has over traditional currency and even other asset classes, it’s hard to argue that there’s no value in transacting with or investing in crypto. The utility provided by many cryptocurrencies is of great benefit to people who value fast and secure transactions. And this is only going to grow more accessible over time with fewer technical hurdles being curbed. Crypto SecurityAs a digital payment system, cryptocurrency doesn’t rely on banks to check and verify transactions. It utilizes a peer-to-peer network that makes it possible for anybody, anywhere, to send and receive payments. This system uses encryption to verify transactions and the aim of this is to provide added security and safety. Just like traditional systems, blockchain networks are not exempted from potential obstacles. However, despite the prevalence of this, there are tools that enable anyone to look up transaction data such as the location, timing, and quantity of cryptocurrency sent from a wallet address. The amount of cryptocurrency saved in a wallet may also be seen by anyone, and this level of transparency helps cut down on any insecurities. Recently, an automated market maker (AMM), Wine Swap, engaged in an exit scam, and the Binance Security team was able to effectively recover an estimated 99.9 percent of the nearly US$345,000 worth of stolen bitcoins. The platform’s busiest and most dedicated community builders, Binance Angels, have been instrumental in raising money for recovery operations. The volunteer organization assisted a user in recovering 98,000 USDC in funds that were unintentionally sent to the incorrect address. Keys to Enhancing Crypto SecurityWhilst the element of transparency in cryptocurrency transactions as well as the blockchain network exist to conquer any potential insecurities, there is still a need to adopt stringent security measures. Advanced security measures, offline money storage, real-time activity monitoring, and data encryption are a few of Binance’s main platform security initiatives. In addition to ensuring that only users have access to their personal information and the safety and integrity of user cash, these initiatives also analyze user activity through Binance’s risk management system in the event of any unexpected activity on the account. While guaranteeing industry-wide compliance with crypto security standards, it’s critical to take user-level security into account, which takes us to the user-first approach. The User-first ApproachA high level of security is maintained on the user’s side thanks to the user-first approach. Maintaining a security measure on the user’s side is as crucial to maintaining crypto compliance on the industry side. This is a vital key to enhancing crypto security. The Binance platform consistently prioritizes user protection through its cutting-edge security measures and stringent data privacy laws because users are the foundation of the Binance ecosystem. This consists of a comprehensive risk management system, real-time monitoring, and cutting-edge data privacy solutions. Safe sign-in, access control, and security notifications are among the user-level security measures to ensure adequate crypto security. In addition to the user-first approach measures, Binance also put the following actions in place to guarantee user-level security: prompt alerts in the event of questionable activity, a stringent sign-in policy, and opt-in security measures. Additionally, Binance includes a cooling-off time feature that stops trading in derivatives, allowing users to refrain from compulsive buying after experiencing losing streaks. This capability is also accessible for margin trading, temporarily suspending activities like borrowing and isolated or cross-margin trading. Along with these capabilities, the platform also contains user-generated material, help articles, an auto-deleverage liquidation indication, and client knowledge tests. The greatest level possible of cybersecurity must be maintained regardless of the rise in crypto vulnerability, and Binance has taken this step to retain its commitment to user safety by adopting a user-first approach. Also, it is important for users to take security measures seriously. Keep your devices safe and conduct personal research on the cryptocurrency you’re transacting with. This is important as it keeps you informed about the cryptocurrency market and improves your future investment decisions. Via https://www.jbklutse.com/how-binance-adopts-a-user-first-approach-for-enhancement-of-crypto-security/ CWG Ghana Clari5 reaffirm commitment to support banks and other institutions to combat fraud8/15/2022 CWG, a leading information technology company, and its key strategic partner, Clari5, a provider of enterprise financial crime risk management solutions, have reaffirmed their commitment to providing solutions that will aid in the fight against fraudulent activities in financial and other institutions. The two institutions are leading the charge in the introduction of new technologies and procedures to help organizations identify fraudulent transactions while preventing employee fraud. Managing Director of CWG Ghana, Harriet Attram Yartey said it has become necessary for banks to maintain a high level of security in order to maintain their market positions, and for that purpose, the partnership with Clari5 has come in handy to help achieve the said objective. “Over the past few years, the fraud and money laundering landscape has grown alarmingly complex, and it is obvious that banks are looking for more effective ways to stop the plague but with Clari5, banks now have the power of a world-class enterprise-wide real-time financial crime management solution that has been changing the way banks fight financial crime,” she said. She further urged banks to invest more in technology to generate more revenue and also keep up with emerging trends and connect with major global financial institutions. “I believe banks and financial institutions could innovate more than what they are currently doing in terms of deploying systems and, we also need to stop seeing technology deployment as cost. This is because technology is implemented to solve problems within the organization and whilst those problems are being solved, it creates opportunities for the various business departments to leverage to drive more revenue into the banks and the financial institutions,” she added. Chief Executive Officer for Clari5, Rivi Varghese said as part of measures taken to curbing the threat, a new customized product modeled after a centralized brain system has been created to help organizations monitor and track down fraudulent activities. “With over 200 million accounts at a single site, Clari5 has the world’s largest implementation of a centralized fraud management. In a bank, the credit card department has its own security solution and so has the internet banking department and so on, essentially all operating in silos. Because a centralized system is lacking, you have this problem for instance of an insider who will log into a high net worth account and check a customer’s balance through the core banking application, send the information to an outside accomplice who will log into the same high net worth account from the internet banking application and siphon funds, without the bank knowing that both seemingly independent actions are linked. We have developed what we call the centralized brain that can help organizations identify these illegal activities,” he said. He explained that Clari5 does not design products and dump it on banks but rather design tailor-made products depending on the focus and aspiration of the bank and its customers. “Every human being has a soul, and banks capture customers’ souls. In fighting banking fraud, some banks take a silo approach or what I call a piecemeal approach. You can prevent some basic frauds using a silo approach but when it comes to complex fraud, you need an integrated approach,” he added. Head of Project Management and Corporate Development at CWG Ghana, Oluwaseun Layade on his part reiterated CWG’s goal of continually contributing to the Information and Communication Technology sector by consistently delivering service excellence using global best practices. “Our business spans multiple markets, including telecommunications, oil and gas, financial services, and manufacturing, among others, and our long-term goal is to remain Africa’s benchmark for ICT excellence,” he said. He stated that the core of CWG’s philosophy is to use a customer-centric approach to create the best experience for its customers. “We are a business solutions provider, not just an IT provider. We look at business problems and use IT to solve them so that these businesses can grow. It is mostly about our customers, not about us. Be it any kind of business, whether it is a bank, insurance company, hotel, manufacturing company, or any other organization; they are there to serve other people, and we are here to assist these organizations in serving their customers, so even as a pan-African company, we are a multidisciplinary organization,” he said. Africa Regional Head for Clari5, Rishin Roy Chowdhury, urged management executives to be mindful of the banking methods they use in carrying out activities, emphasizing that organizations should best observe their customers to find the best method needed to carry out activities, which would also help prevent internal fraudulent crimes. Via https://www.jbklutse.com/cwg-ghana-clari5-reaffirm-commitment-to-support-financial-institutions-combat-fraud/ If you’re like most business owners, you’re always looking for ways to improve your operations and make things run more smoothly. One way to do this is by implementing a spa scheduling system into your business. There are many different software programs or methods you can use to set up a spa scheduling system; it’s essential to find one that works well for both you and your clients! Here are a few tips on how to implement a spa scheduling system into your business: Determine What Type of System You NeedThere are many different types of spa scheduling systems available; you’ll need to decide which one is best for your business. Do you need something simple that allows customers to book appointments online? Or do you need something more complex that can track employee schedules and client information? There are a few factors you’ll need to consider when determining what type of system you need, such as:
Once you’ve determined what type of system you need, you can start shopping around for the perfect option for your business. Choose a System That’s Easy to UseAs we mentioned above, ease of use is an essential factor to consider when choosing a spa scheduling system. You’ll want something simple enough for both you and your employees to use without any headaches. Many systems offer training and support in case anyone has trouble using it; this is definitely something to look for! Some features that make a system easy to use include:
Make Sure the System is ScalableAs your business grows, you’ll need a scheduling system that can grow with you. Make sure the system you choose is scalable so you won’t have to replace it down the line. Some features that make a scalable system include:
Consider Your Budget When Choosing a SystemThere are both free and paid options available when it comes to spa scheduling systems. It’s essential to consider your budget when making your decision. Free options are typically less feature-rich than paid options, but they can be a good option for small businesses on a tight budget. Paid options usually offer more features and are more scalable than free options. Shop Around for the Best OptionNow that you know what to look for in a spa scheduling system, it’s time to start shopping around! There are many different options available, so take your time to find the best one for your business. Be sure to read reviews, compare features, and get a feel for each system before making your final decision. And remember, the best system is the one that works best for you and your business! Train Your EmployeesOnce you have your spa scheduling system set up, it’s essential to train your employees on how to use it. This will ensure that they’re able to make the most of the system and provide excellent customer service. There are a few different ways you can train your employees on how to use your spa scheduling system.
By following these tips, you can ensure that your employees are properly trained on how to use your spa scheduling system. This will help them provide excellent customer service and keep your business running smoothly. Promote Your New SystemBe sure to let your customers know that you now have a spa scheduling system in place! You can promote it through your website, social media, or even local advertising.
By promoting your new spa scheduling system, you can attract new customers and keep existing ones coming back! By following these tips, you can easily implement a spa scheduling system into your business and start reaping the benefits! Your employees will be more efficient, your customers will be happier, and you’ll save time and money in the long run. It’s a win-win for everyone involved! Via https://www.jbklutse.com/how-to-implement-a-spa-scheduling-system-for-your-business/ MTN Group reported a resilient performance in the first half of 2022, balancing an accelerated investment into its networks, reducing the cost to communicate and the delivery of solid financial results. We advanced the delivery of our strategy under challenging conditions, which included macroeconomic and geopolitical volatility, global supply chain disruptions, constrained on-grid power supply in South Africa and greater regulatory requirements across many markets. “Notwithstanding the tough macro conditions, MTN remained focused on investing in our markets to increase broadband coverage and to reduce the cost to communicate,” said President and CEO Ralph Mupita. “We accelerated network investment to R17.1 billion and spent an additional R7 billion on securing 4G and 5G spectrum in the key markets of South Africa and Nigeria.” The investment in networks increased access to broadband services to 85.5% of the population and led to an average 22.5% reduction in data tariffs. Our contribution to society and economies also included cash taxes of R7.3 billion paid to nation states in the period. In driving investment that grows gross capital formation, the contribution we made to jobs and the fiscal resources of nation states was underlined by good financial results in the first six months of 2022. In constant-currency terms, service revenue grew by 14.8% to R92.5 billion; earnings before interest, tax, depreciation and amortisation (EBITDA) increased by 15.1% to R43.9 billion before once-off items; and the EBITDA margin expanded by 0.3 percentage points to 45.3%. This was supported by the focused execution of our expense efficiency programme. “Growth in data revenue was particularly strong, up 35.9%, driven by MTN Nigeria, MTN Ghana, MTN Cameroon and MTN South Africa,” said Mupita, adding that fintech revenue grew by 14.0%, with solid performances from Nigeria, Uganda and Ghana. “The introduction of fintech taxes in some markets slowed revenue growth in Q2, but we remain encouraged by the ecosystem growth as users, agents and merchants continued to grow healthily during the period under review, with transaction volumes growing by 31.5% during the period.” As part of our Ambition 2025, we are building five scale platform businesses on top of a very strong connectivity network. The fintech platform is the most mature of these, and in the first half it had 60.7 million Mobile Money users (up 24% year-on-year), generating six billion transactions worth US$116.3 billion. The total number of MTN subscribers in the period was 281.6 million, up 5.6%. We made progress in our work to separate our fintech and fibre businesses from our GSM business and have started the process of engagement with select potential strategic investors into the Group Fintech structure, the outcome of which should be concluded by the end of the year. Chief Financial Officer Tsholo Molefe said the Group accelerated the deleveraging of the balance sheet in the six months to end-June 2022, boosted by the repatriation of R9.4 billion in cash from operating companies, including R4.5 billion from Nigeria: “We continue to explore opportunities for further liability management and remain focused on reducing the hard currency liabilities on our balance sheet.” Underlying operating free cashflow growth was strong at 24.0%, and return on equity increased to 24.2%, reflecting the consistent delivery of earnings. We accelerated our portfolio transformation, delivering R9.2 billion in asset realisations in the first half and bringing the total realised since March 2020 to R15.8 billion, with proceeds supporting the group leverage and liquidity positions, which strengthened during the period. In line with our pan-Africa focus, we accepted a binding offer for 100% of MTN Afghanistan. Localisations remained important in the period, as we prioritised creating shared value, broadening local participation and deepening capital markets. In Ghana we increased local ownership to 23.7% through share sales to pension funds and strategic investors. Mupita said the headwinds facing customers and the business looked likely to persist in the second half. “The business is well positioned to navigate the prevailing market conditions. In South Africa, we are focused on improving the resilience and availability of the network, given the constrained on-grid power situation. Battery and generators solutions will be deployed to restore network availability to the world-class standards our customers have been used to. This resilience plan will be executed within the capital expenditure envelope of the business. “If we experience the same level of loadshedding in H2 as we did in H1 in South Africa, service revenue will come in slightly under guidance, with margins at the lower end of the range communicated to investors. The structurally higher growth opportunities in our markets continue to support the investment case of a compelling Africa growth story that delivers digital and financial inclusion to Africans,” he concluded. About the MTN Group Launched in 1994, the MTN Group is a leading emerging market operator with a clear vision to lead the delivery of a bold new digital world to our customers. We are inspired by our belief that everyone deserves the benefits of a modern connected life. The MTN Group is listed on the JSE Securities Exchange in South Africa under the share code ‘MTN’. Our strategy is Ambition 2025: Leading digital solutions for Africa’s progress. Via https://www.jbklutse.com/mtn-group-accelerates-investment-into-broadband-coverage-h1-2022/ Zayed Sustainability Prize 2023 demonstrates global reach and impact with over 4500 submissions8/11/2022 Following a successful 4-month submissions phase, the Zayed Sustainability Prize, the UAE’s pioneering global award for recognising excellence in sustainability, has officially closed entries for its 2023 awards cycle. Over 4,500 applications were received across the five Prize categories of Health, Food, Energy, Water and Global High Schools, from a record 152 countries, demonstrating the Prize’s growing global reach and impact. The Zayed Sustainability Prize winners will be announced at the 2023 Zayed Sustainability Prize Awards Ceremony that will be held on January 16, 2023, as part of Abu Dhabi Sustainability Week. The Prize witnessed a 13% increase in submissions compared to last year from small and medium-sized enterprises (SMEs), nonprofit organisations and high schools. Total submissions from SMEs increased across all categories, underscoring a rising trend that SMEs are putting sustainability at the top of their agenda. H.E. Dr. Sultan Ahmed Al Jaber, UAE Minister of Industry and Advanced Technology and Director General of the Prize said: “For the last 14 years the Zayed Sustainability Prize has incentivised practical solutions to global challenges that deliver tangible impact at a community level around the world. Inspired by the commitment to sustainable development and humanitarian legacy of Sheikh Zayed bin Sultan Al Nahyan, the Prize has improved the lives of 370 million people in 151 countries to date. This year, we have seen applications from a record number of countries across every category from health, food, energy, water and global high schools. I’m excited to see what creative solutions this year’s applicants will bring to the table, particularly as the UAE prepares to host COP 28 next year. “ “Given that we want to leverage COP 28 as a platform for inclusivity and practical outcomes, I am confident that the Prize can help to deliver social and economic progress from across the private sector, small business community and an increasingly active and engaged younger generation.” he added. This year’s submissions were more diverse than ever before, revealing climate change’s impact on every country across every continent, and reflecting a growing awareness that urgent climate action is critical to meet global net zero carbon goals by mid-century. More submissions received this year came from developing nations in Sub-Saharan Africa, South Asia, East Asia, Latin America, the Middle East, and North Africa, which is an important indication of the growing participation of developing countries in the fight against climate change. The top submitting countries included Kenya, India, China, Egypt, Brazil and the United States. By receiving submissions from a wide range of geographies, the Prize is better equipped to deliver on its mission of driving impactful, innovative, and inspiring sustainable and humanitarian development around the world. The Food (1,426) and Health (946) categories attracted the greatest number of submissions, followed by Energy (736) and Water (601), while the Global High Schools category received 829 submissions. In the Food category, which received nearly 20% increase in submissions compared to last year, many entries presented solutions aimed at achieving sustainable food production to address rising food insecurity and malnutrition in a world threatened by climate change. In the Health category, several entries address the weaknesses of the healthcare systems exposed by the Covid-19 pandemic, and offer solutions that provide more resilient, inclusive, accessible, and sustainable healthcare services to people most in need. In the Energy category, the Prize received numerous entries focused on improving sustainable energy access in vulnerable communities, supporting United Nations Sustainable Development Goal 7, affordable and clean energy for all, and driving the low-carbon energy transition. Finally, in the Water category, a number of entries offered solutions aimed at addressing the clean water production, climate change, and water resource management challenges faced around the world, and particularly in developing nations. The number of submissions received from high schools grew by 55% compared to last year, which is especially encouraging and a testament to young people’s growing awareness of the challenges and risks presented by the climate crisis and of the opportunity to lead on sustainable development. Entries in the Global High Schools category proposed waste management solutions, clean energy systems, and food systems like hydroponics and aquaponics, reflecting the students’ innovative thinking and careful consideration of projects most suited for their local communities. Following the close of submissions, the Prize now enters the evaluation stage. All entries will now be shortlisted by an independent research and analysis consultancy. A Selection Committee comprised of globally renowned industry experts will then assess the qualified entries and shortlist the candidates. The third and final tier of the evaluation process is the Jury, which will convene in October, to unanimously elect the winners in each category. Since its launch in 2008, the US$3 million Prize has, directly and indirectly, transformed the lives of over 370 million people around the world. Its global impact continues to grow, as it further catalyses humanitarian outreach and sustainable development. Each winner in the Health, Food, Energy, and Water categories receive US$600,000 to expand the scope and scale of their sustainability solution(s), while the Global High Schools category has six winners, representing six world regions, with each winner receiving up to US$100,000. For more information, visit www.ZayedSustainabilityPrize.com Via https://www.jbklutse.com/zayed-sustainability-prize-2023-demonstrates-global-reach-and-impact/ AR can be used in production to make new processes more efficient, enhance worker safety, improve communication, and develop new design ideas faster than ever before. This article will elaborate further about why you should invest in augmented reality in manufacturing, what type of businesses you can target with this technology, and how you can implement AR into your business today. Why You Should Invest in Augmented Reality in ManufacturingAR is one of the next most powerful tools businesses can use to make their operations more efficient. AR can help with many common challenges that manufacturing businesses experience, including better communication between workers, safer work environments, higher quality of products, and lower costs. Manufacturers today have more options than ever before to increase efficiency. With the rise in the popularity of AR, enterprises are discovering the many benefits of this technology. Also, in many cases, AR can be less expensive than virtual reality, which carries great potential, but isn’t suitable for all industrial uses. AR is a technology that uses computer vision to overlay digital information over the real environment. This can be used to create realistic 3D models, GPS tracking, virtual buttons, and much more. AR can help manufacturers make their operations more efficient by improving worker safety, improving communication, streamlining design, and enabling efficient predictive maintenance. ![]() What is Augmented Reality?Augmented reality supplements real life with digital additions. Similar to how a smartphone shows you the information on your screen when you’re looking at it from across the room, AR is when you have that same ability with the bonus of seeing the information in the environment around you. This includes being able to see what someone is doing, like holding a graph or drawing with a stylus, or being able to see exactly where someone is in the office, like a remote worker. Users can take pictures of their surroundings, annotate them, share them with others, and use digital pictures to see what’s underneath, e.g. in working machines. How Does Augmented Reality In Manufacturing Work?AR manufacturers can use computer vision to overlay digital information over the real environment (check Nsflow). AR might be used to show employees how to use a machine, how to install a part, or how to use a new tool. This information can be delivered to workers via AR, so they don’t have to walk to another room to get it. This can be especially helpful if there are a lot of machines or if the machines are in another room. Moreover, using AR reduces the time necessary for staff training, enabling convenient on-the-job training while wearing dedicated equipment. With AR, technicians don’t need to carry paper manuals and flip through them any time an unusual malfunction occurs. Following a digital workflows allows employees to use the appropriate service or maintenance tutorial to solve the issue on the spot or contacting a remote expert with the remote support module. Global Brands Using Augmented Reality In ManufacturingWith the rise in popularity of AR and how it can be used to make business operations more efficient, more and more manufacturing companies are turning to this technology. To present the recognition of AR among the biggest global companies in manufacturing, we present you with a selection of the top brands using augmented reality. Among brands using augmented reality, we can list Boeing, Volvo, BMW, Bosch, General Electric, and many more. These companies are using AR to improve efficiency and increase productivity, making work safer and enhancing communication. Limitations of Augmented Reality In ManufacturingAR is a powerful technology, but like any other technology, there are limitations. For example, AR can be difficult to use if there is no internet connection. This can make it difficult for manufacturers to use AR for safety training, maintenance, and job instructions. However, some AR platforms are preset on devices including hotspots, making users independent of external networks. AR is also limited by the camera on most smartphones and laptops, which means that it can be difficult to see the real world from the virtual world. Luckily, dedicated AR devices nowadays come with built-in high-quality and high-fidelity cameras. Another challenge that manufacturers face with AR is that the 3D models provided in AR can be hard to manipulate. This might be because they are created using a complex CAD model, or it might be due to the user’s lack of AR experience. This issue can be bypassed by creating digital models without CAD models, resulting in digital twins based on delivered data. ConclusionAugmented reality has the potential to transform the way manufacturers create products, while also improving worker safety, enhancing communication, and expanding productivity. With the rise in popularity of AR, businesses are discovering the many benefits of this technology, including less expensive costs and increased efficiency. Manufacturers today have more options than ever before to increase efficiency. Augmented reality is a future-proof technology, and the manufacturing field is one of the best fields for its adoption. Via https://www.jbklutse.com/augmented-reality-in-manufacturing-the-future-has-arrived/ Taking videos is probably better than taking a picture when you want to preserve the memories you’re making. Taking that to the next level, you’d want your videos to look crispy and clean while retaining that heartwarming simplicity. What better app to do that with than the Inshot app that offers slick and easy video editing? What is InShot, you ask? Well, it’s a free video editing app on your mobile that has multiple easy-to-use features that let you crop, merge, and trim your videos. Inshot also allows you to add filters that can help give you the vibe you want for your video, so you can be sure that whenever you use this app, you will end up with an ideal video every time. Check this out to know more about InShot app. InShot’s FeaturesFirst of all, the four basic features that Inshot offers are the cutter, merger, splitter, and trimmer. What they do is pretty self-explanatory. They cut, split, and trim your video into separate little bits for you to merge into better sequences later on. You could even arrange them into collages so different clips can play simultaneously. Secondly, to fancy things up for your video, you can add the visual effects that InShot gives you; you also have your choice of filters. Not to mention how you can overlay some stylized texts, making your video seem more sophisticated. If you want to take it to a cuter and busier route, you can add GIFs and stickers(which they have over 1000). How To Use InShotI’ll go over how to cut, trim, and split your lengthy video into shorter clips, which then gives you the freedom to edit each clip more accurately and precisely. What’s the purpose of doing all of that? Well, you probably just want to get the best little parts and mash them all together. They’re all under the same tab, so it’s going to be easy to go through them speedily. The instructions are all pretty similar; you go to the ‘Trim’ bar or the scissors icon and slide the bar up to where you think the sweet spot for the length of your video is. To split your video, you also adjust the slider until you reach the point where you want to separate your video into two. To successfully trim and split your video, you both finish it off by tapping the checkmark. To merge two or more videos, you need to add the videos of your choice into the playlist and then add a transition effect of your choice. You do this by tapping the big ‘+’ sign on the bottom left. You can take advantage of this by adding several great videos you’ve taken to make the perfect compilation of your amazing memories! What’s a video editor without a little addition of great music? Tap on the music tab to spice up your video with music; you get to show off your great video alongside your great music taste! You can choose music from the InShot app’s library, or you can even add your own. Not only that, but you can also add some sound effects to emphasize some parts of your video! TakeawayThere you have it! The simple ways to edit your videos are with a little pizzazz. Experiment with the format of your video by using separate clips and arranging them into a collage or by having each clip go in the perfect sequence. Remember to save your file, though. You won’t want to lose the masterpiece that you’ve worked so hard to make! Go on, try out InShot now. Visit Download Inshot MOD APK. Via https://www.jbklutse.com/how-to-use-inshot-for-video-editing/ |