ECOWAS Cybersecurity Hackathon 2024

 


The highly anticipated Cybersecurity Hackathon for 2024 has been announced by the Economic Community of West African States (ECOWAS). This ground-breaking program aims to promote innovation and strengthen cybersecurity capabilities throughout the region.

ECOWAS Cybersecurity Hackathon 2024

This Capture the Flag (CTF) competition provides a unique opportunity for cybersecurity enthusiasts, ranging from novices to experts, to showcase their skills and bolster the region's digital security endeavors. It is organized by ECOWAS in collaboration with the Nigerian Federal Ministry of Communications, Innovation and Digital Economy and the National Information Technology Development Agency (NITDA).

Overview of the ECOWAS Cybersecurity Hackathon

The goal of the ECOWAS Cybersecurity Hackathon is to foster learning, networking, and technology improvement in West Africa rather than merely serving as a competition. The purpose of the event is to establish a thriving ecosystem of cybersecurity experts that can tackle the intricate problems with digital security that the area faces.

Participants in a Capture the Flag (CTF) competition will take on a series of cybersecurity challenges aimed at evaluating their technical proficiency, collaborative thinking, and problem-solving skills. These difficulties could consist of:

·       Cryptography puzzles

·       Network security simulations

·       Web application vulnerability assessments

·       Forensic analysis tasks

·       Reverse engineering challenges

Objectives

·       Talent Development: Nurture and identify emerging cybersecurity talent within ECOWAS member states.

·       Skill Enhancement: Provide participants with hands-on experience in tackling real-world cybersecurity challenges.

·       Regional Collaboration: Foster cooperation and knowledge sharing among cybersecurity professionals across West Africa.

·       Innovation Promotion: Encourage creative problem-solving approaches to cybersecurity issues.

·       Workforce Development: Contribute to the growth of a skilled cyber workforce in the region.

Participation:

Teams from all ECOWAS member states are welcome to participate in the hackathon, which encourages a varied spectrum of participants to provide their special insights and abilities to the competition.
Regardless of your level of experience, this event provides an opportunity to demonstrate your skills, gain knowledge from colleagues, and have a positive impact on the cybersecurity scene in the area.

Benefits for Participants

·       Skill Development: Gain hands-on experience with cutting-edge cybersecurity tools and techniques.

·       Networking Opportunities: Connect with like-minded professionals and potential employers from across the region.

·       Recognition: Showcase your talents on a regional stage and gain recognition for your cybersecurity skills.

·       Career Advancement: Enhance your resume and open doors to new career opportunities in the rapidly growing field of cybersecurity.

·       Contribution to Regional Security: Play a role in strengthening West Africa’s digital infrastructure and security posture.

How to Apply

Through the NITDA learning management system or the official ECOWAS website, interested individuals or teams can apply. The following steps are included in the application process:

·       First you go to the application portal at https://testlms.nitda.gov.ng/#

·       Then you just need to login or Create an account

·       Now complete the registration form with all required information

·       Then you will form or join a team (if applicable)

·       Finally just submit any additional required documentation

Application Deadline: August 5, 2024

How to Upload a Video to Google Drive

 


With the robust cloud storage service Google Drive, you can store and retrieve data from any location. The capacity to post and share videos is a significant feature it provides. Uploading movies to Google Drive is a practical way to store and share films for work or personal use.

Why Upload to Google Drive?

There are actually different reasons for one to upload your videos to Google Drive.

You won't have to worry about losing files in the event that your computer crashes because it offers safe and secure cloud storage.
Sharing and accessing your films on any device is made simple with Google Drive.

What are the Steps to Upload Videos to Google Drive

Uploading videos to Google Drive from your Android device is very simple. You just need to read and follow these simple steps below.

Step 1: Open the Google Drive App

To access the Google Drive app, tap its icon. It is available for free download from the Google Play Store if it isn't already installed.

Step 2: Tap the “+” Button

There is a blue "+" button in the bottom right of the screen. Feel free to press it to view the uploading options.

Step 3: Select “Upload”

Then you should Choose “Upload” from the menu that pops up.

Step 4: Pick Your Videos

You may now browse your Android storage and choose which video files to submit. You can choose more than one video at once by tapping on them.

Step 4: Tap Upload

When you're ready, click "Upload" and observe the progress bar as your video or videos are uploaded to the safe cloud servers of Google Drive.
NOTE: Depending on the size of the file and the speed of the internet, uploading may take some time. However, Google Drive will notify you when it's finished.

Tips to take When Uploading Your Videos

Here are some precautions to take when you are uploading your videos to Google Drive:

·       Organize Videos into Folders

·       Rename Videos with Descriptive Titles

·       Adjust Video Permissions

·       Eliminate Duplicates

·       Convert to Google Drive Player Format

·       Set Upload Preferences

These pointers can help you turn your Google Drive into a well-organized, searchable vault to save all of your priceless video memories.

Importance of Uploading Videos to Google Drive

The ability to upload films to Google Drive is one of its many noteworthy features, which makes it a useful tool for both personal and business use. Here are a few crucial ones:

1. Secure Backup and Storage:

The safe online storage that Google Drive offers for your videos is one of its main advantages. You won't ever have to worry about losing priceless video memories in the event of a hard drive failure, phone theft or loss, or computer breakdown if your files are securely backed up online. Your movies are safe thanks to Google's top-notch data centers and security measures.

2. Easy Access from Anywhere:

You can access your video files from any internet-connected device, such as a laptop, tablet, phone, etc., once they have been uploaded to Google Drive. Whether you're working on, watching, or sharing videos at home, the workplace, or on the move, this makes it really handy.

3. Simple Sharing and Collaboration:

Sharing films privately with particular individuals or even publicly via a shareable link is made simple by Google Drive. This makes it simple to collaborate on video projects with friends, family, clients, or coworkers.

4. Space Management:

You can help your devices have more valuable storage space by uploading videos to Google Drive. Offloading videos to the cloud can enhance device speed and free up space for other essential data because videos can take up a lot of storage.

5. Integration with Other Google Services:

It's simple to add movies to your papers, spreadsheets, and presentations using Google Drive's seamless integration with other Google services like Google Docs, Sheets, and Slides. Workflows are streamlined and productivity is increased by this integration.

6. Backup and Recovery:

You can be sure that you have a secure cloud copy of your videos when you use Google Drive as a backup solution. You can quickly retrieve your films from Google Drive in the event that you misplace your original files as a result of a device malfunction or other problems.

Conclusion

You don't need to keep running the risk of losing these priceless memories on your smartphone now that you are familiar with the simple procedure of uploading videos to Google Drive. It's time to accept cloud video storage's flexibility, security, and ease. You can access your movie library from any device, anywhere, with just a few taps thanks to Google Drive.
Thus, why do you delay? With the power of Google Drive video storage and sharing, it's time to stop risking your video memories and start using them to your advantage. You can enjoy the convenience of anytime access and the piece of mind that comes with knowing your movies are secure!

Ransomware Attacks on the Rise: The Growing Threat to Businesses and Individuals



Introduction

In recent years, the digital landscape has become a battleground for a sinister form of cybercrime: ransomware attacks. These malicious incidents have surged, leaving organizations and individuals scrambling to protect their digital assets from extortionists. Ransomware attacks are not just on the rise; they have evolved into a formidable threat that demands our immediate attention and a multifaceted approach to cybersecurity.


The Ransomware Epidemic

Ransomware is a type of malware that encrypts a victim's data, rendering it inaccessible until a ransom is paid to the attacker, usually in cryptocurrency. The appeal of ransomware for cybercriminals lies in its potential for massive financial gains with relatively low risk. Recent years have seen a proliferation of ransomware strains, each more sophisticated and destructive than the last.


The Toll on Businesses

Businesses of all sizes have fallen victim to ransomware attacks. These attacks can cripple operations, disrupt supply chains, and lead to significant financial losses. In some cases, the reputational damage can be even more devastating than the monetary impact.

One of the most high-profile ransomware attacks in recent memory was the Colonial Pipeline incident in 2021, which led to fuel shortages and highlighted the real-world consequences of a successful cyberattack. Similarly, healthcare organizations have been targeted during the COVID-19 pandemic, putting patient lives at risk.


The Role of Evolving Tactics

Ransomware attacks have evolved beyond indiscriminate phishing emails. Cybercriminals now employ advanced tactics, such as spear-phishing campaigns that specifically target individuals within an organization, or they exploit unpatched vulnerabilities in software. These tactics increase the likelihood of a successful attack.


The Rise of Double Extortion

A concerning trend in ransomware attacks is the adoption of double extortion. In addition to encrypting data, attackers exfiltrate sensitive information before locking victims out of their systems. They threaten to release this data publicly if the ransom is not paid, which adds an extra layer of pressure on victims to comply.


The Costly Ransom Dilemma

Paying the ransom is a dilemma faced by many victims. While it may provide a quick solution to regain access to data, it also fuels the criminal ecosystem and offers no guarantee that the attacker will honor their end of the bargain. Furthermore, paying ransoms emboldens cybercriminals to target more victims.


Preventing Ransomware Attacks

The most effective way to deal with ransomware is to prevent it in the first place. Here are some proactive measures organizations and individuals can take:


1. **Regular Backups**: Maintain up-to-date backups of critical data offline or in a secure, isolated environment.

2. **Patch and Update**: Keep software and systems current with security patches and updates.

3. **Employee Training**: Train employees to recognize phishing attempts and practice safe online behavior.

4. **Endpoint Security**: Implement robust endpoint security solutions to detect and block malware.

5. **Network Segmentation**: Segment networks to limit lateral movement by attackers.

6. **Incident Response Plan**: Develop a comprehensive incident response plan to minimize damage in the event of an attack.


Conclusion

Ransomware attacks on the rise pose a clear and present danger to businesses and individuals alike. To combat this growing threat, we must adopt a proactive cybersecurity stance that combines technology, education, and vigilance. By implementing strong security measures, raising awareness, and fostering a culture of cyber resilience, we can stand strong against ransomware and protect our digital assets from falling into the hands of extortionists. The battle against ransomware is ongoing, and it's one that we cannot afford to lose.

Navigating the Digital Frontier: Emerging Issues in Cybersecurity



Introduction

In today's interconnected world, cybersecurity has become a paramount concern for individuals, businesses, and governments alike. As technology continues to evolve at a rapid pace, so too do the threats that lurk in the digital realm. From innovative hacking techniques to the challenges posed by emerging technologies, there are numerous emerging issues in cybersecurity that demand our attention and proactive solutions. In this article, we delve into some of the most pressing concerns that define the cybersecurity landscape of the modern era.


1. **Ransomware Attacks on the Rise**

Ransomware attacks have surged in recent years, wreaking havoc on businesses, healthcare institutions, and even critical infrastructure. Cybercriminals have grown more sophisticated in their tactics, using social engineering, phishing emails, and encryption techniques to lock victims out of their data until a ransom is paid. The fallout from such attacks can be financially devastating and compromise sensitive information.


To combat this threat, organizations must prioritize robust backup systems, employee training in recognizing phishing attempts, and invest in cutting-edge cybersecurity software capable of identifying and neutralizing ransomware threats.


2. **Supply Chain Vulnerabilities**

In an increasingly interconnected global marketplace, supply chain vulnerabilities have emerged as a significant cybersecurity challenge. Cybercriminals target the weakest link in the supply chain to gain access to sensitive data, intellectual property, or even to insert malware into products or services. The SolarWinds breach in 2020 is a striking example of the far-reaching consequences of a supply chain attack.

To mitigate this risk, organizations must scrutinize their suppliers' cybersecurity practices and establish stringent vetting processes. Regular audits and continuous monitoring can help detect and address vulnerabilities before they lead to a breach.


3. **IoT Security Concerns**

The proliferation of Internet of Things (IoT) devices has introduced a host of new cybersecurity challenges. These devices, ranging from smart thermostats to industrial sensors, often lack robust security features, making them susceptible to exploitation. Once compromised, IoT devices can be used as entry points into larger networks, potentially compromising critical infrastructure or sensitive data.

Addressing IoT security requires manufacturers to prioritize security features, and consumers and businesses to adopt best practices, such as changing default passwords and segmenting IoT devices from critical networks.


4. **Quantum Computing Threats**

While quantum computing promises revolutionary advances in fields such as cryptography and data analysis, it also poses a significant threat to current encryption methods. Quantum computers could potentially break widely used encryption algorithms, rendering much of today's cybersecurity measures obsolete.


The response to this emerging issue lies in developing and adopting post-quantum encryption standards that can withstand quantum computing attacks. Governments, businesses, and researchers are actively working on quantum-resistant encryption methods to secure our digital future.


5. **Cybersecurity Workforce Shortage**

The demand for skilled cybersecurity professionals has skyrocketed in tandem with the increase in cyber threats. However, there is a significant shortage of qualified personnel to fill these roles. This shortage leaves organizations vulnerable as they struggle to find and retain talented individuals who can defend against evolving threats.

To address this challenge, investments must be made in cybersecurity education and training programs, and organizations should actively cultivate a cybersecurity-conscious culture to ensure all employees play a part in safeguarding digital assets.


Conclusion

As the digital landscape continues to evolve, so too will the emerging issues in cybersecurity. Addressing these challenges demands a proactive approach that encompasses technology, education, and collaboration. By staying vigilant, investing in cybersecurity measures, and fostering a culture of digital responsibility, we can navigate the digital frontier with confidence and protect the integrity of our data, systems, and digital way of life. The time to act is now, as the future of our digital world depends on our ability to adapt and secure it.

Breaking Barriers: Healthcare Career College Offers Massage Therapy Program For Visually Impaired Students

 

Introduction

In the realm of healthcare education, inclusivity and diversity are pivotal components of a progressive society. It is not just about training the best professionals; it's also about creating opportunities for all individuals, regardless of their physical abilities. In a remarkable stride towards inclusivity, Healthcare Career College (HCC) has introduced a groundbreaking initiative: a Massage Therapy Program tailored specifically for visually impaired students. This program embodies the essence of equal opportunity and aims to empower visually impaired individuals to pursue a fulfilling career in healthcare.

Empowering Through Education

The field of massage therapy has long been regarded as a healing art form that promotes physical and emotional well-being. It offers a unique combination of science and artistry, making it a particularly attractive career option for those with an inclination towards hands-on healthcare practices. However, until now, visually impaired individuals faced significant barriers when aspiring to become licensed massage therapists.


HCC's innovative program acknowledges the potential of visually impaired students and seeks to provide them with an equal chance to excel in the field. The college has invested in accessible learning resources, state-of-the-art equipment, and a supportive environment to ensure that students with visual impairments can receive the same high-quality education as their sighted peers.


A Focus on Adaptability

One of the key elements of this program is its emphasis on adaptability. HCC recognizes that each visually impaired student may have unique needs, and the curriculum is designed to be flexible and accommodating. From tactile learning materials to accessible digital resources, the college is committed to fostering an inclusive learning environment.


Additionally, the program places a strong emphasis on the development of communication and interpersonal skills. Massage therapy is not solely about technique; it also involves building trust and rapport with clients. Visually impaired students are encouraged to refine their verbal communication skills, which are fundamental to providing exceptional client care.


Guidance from Experienced Professionals

To ensure the success of the Massage Therapy Program for visually impaired students, HCC has enlisted a team of experienced professionals who are passionate about inclusive education. These educators bring a wealth of knowledge and expertise to the program, ensuring that students receive the best possible instruction and mentorship.


Furthermore, the college collaborates with local massage therapy practitioners and healthcare facilities to provide real-world experience opportunities for students. This not only enhances their skills but also fosters connections within the industry, which can be invaluable when seeking employment.


Championing Equal Opportunities

The introduction of the Massage Therapy Program for visually impaired students at Healthcare Career College is a testament to the college's commitment to providing equal opportunities for all. By breaking down barriers and focusing on inclusivity, HCC is not only transforming the lives of its students but also contributing to the diversification of the healthcare workforce.


In Conclusion

Healthcare Career College's Massage Therapy Program for visually impaired students is a shining example of how education institutions can lead the charge towards a more inclusive and diverse healthcare industry. By providing the necessary resources, support, and guidance, HCC is opening doors that were once closed for visually impaired individuals. This program represents a giant leap towards a future where healthcare professionals reflect the rich tapestry of society, ensuring that everyone has access to quality healthcare services.


As other institutions take note of HCC's pioneering initiative, it is our hope that this program will inspire similar efforts across the healthcare education landscape, creating a world where opportunities abound for all aspiring healthcare professionals, regardless of their abilities.

Why I Left My Relationship: A Journey of Self-Discovery


 Introduction


Breaking up with a partner is one of the most challenging decisions one can make in life. It's a decision that often comes after much contemplation, soul-searching, and emotional turmoil. While some relationships end due to clear-cut issues like betrayal or abuse, others may conclude for more complex reasons. In this article, we explore the personal journey of why someone might choose to leave a relationship, shedding light on the importance of self-discovery and personal growth.


Unfulfilled Expectations

One common reason for leaving a relationship is unfulfilled expectations. Over time, we develop certain expectations about what our relationships should be like. When these expectations consistently go unmet, it can lead to feelings of disappointment and frustration. These unmet expectations can encompass various aspects, such as emotional support, communication, or shared values.


Personal Growth

As individuals, we are constantly evolving. Our interests, goals, and values may change over time. In some cases, a relationship may no longer align with our personal growth and aspirations. Leaving a relationship can be a difficult but necessary step to allow both partners to continue their journeys of self-discovery and self-fulfillment.


Communication Breakdown

Effective communication is the foundation of a healthy relationship. When communication breaks down, it can lead to misunderstandings, conflict, and emotional distance. Some individuals may choose to leave a relationship when they feel that their attempts to communicate and resolve issues are consistently unsuccessful.


Emotional Well-being

One's emotional well-being is paramount. In some cases, staying in a relationship can have detrimental effects on mental health. Issues like chronic conflict, emotional neglect, or even gaslighting can take a severe toll on an individual's emotional and psychological health. Leaving such a relationship can be an act of self-preservation.


Misalignment of Values

Over time, couples may discover that they have fundamental differences in values, beliefs, or life goals. These disparities can create tension and conflict within the relationship. In cases where compromise is impossible or undesirable, parting ways can allow both individuals to pursue paths that are more aligned with their values.

Reclaiming Independence

Some individuals may enter relationships at a point in their lives when they are still discovering their independence and identity. Leaving a relationship can be a way to reclaim a sense of self, explore personal interests, and establish independence.

Conclusion

Deciding to leave a relationship is never easy. It often involves a rollercoaster of emotions, self-reflection, and difficult conversations. However, it can also be an act of self-love and a commitment to personal growth and well-being. While leaving a relationship is undoubtedly a significant step, it is not synonymous with failure. It can be the catalyst for positive change, allowing individuals to embark on journeys of self-discovery, heal, and ultimately find healthier and more fulfilling relationships in the future. Remember, the decision to leave is a deeply personal one, and each individual's journey is unique.

How to secure your Website from Hackers

 


If you have a website, then it is likely that you are ever-vigilant to protect it from hackers and cyber threats. After all, your website is an asset, and if it gets hacked, you will not only lose the data stored on it but also tarnish your company's reputation. Fortunately, there are steps you can take to keep your website safe and secure. In this blog post, we will explore some of the best tips for securing your website from hackers. From password management strategies to security best practices for software development teams, we'll discuss everything you need to know to ensure the safety of your website.

Ethical

There are a number of ethical considerations to take into account when securing your website from hackers. One of the most important is to ensure that you do not inadvertently allow hackers access to your site. This means taking care to use strong passwords and keeping them confidential, as well as ensuring that your server is properly configured and secured.

Another ethical consideration is to avoid inadvertently harming other websites or systems in the course of securing your own. For example, if you were to implement a security measure that blocks all traffic from a certain IP address, you could unintentionally block legitimate traffic as well as malicious traffic. Therefore, it is important to consider the potential impacts of your security measures before implementing them.

Finally, you should also be aware of the legal implications of website security. In some jurisdictions, certain types of security measures may be considered illegal. For example, in some countries it may be illegal to use encryption on your website. As such, it is important to consult with a lawyer before implementing any website security measures.

Hacking

Hackers are always looking for new ways to exploit vulnerabilities in websites. They can deface your site, steal sensitive information, or even take over your entire server. It’s important to take steps to secure your website from these threats.

Here are some tips for securing your website from hackers:

1. Keep your software up to date

One of the most important things you can do to secure your website is to keep your software up to date. This includes your operating system, web server software, database software, and any other software you use on your server. Outdated software is often full of security holes that hackers can exploit.

2. Use strong passwords

Another important step in securing your website is to use strong passwords. Hackers often use automated tools to guess common passwords, so it’s important to choose passwords that are hard to guess. A good password should be at least 8 characters long and include a mix of uppercase and lowercase letters, numbers, and symbols.

3. Limit access to your admin area

If possible, you should limit access to your website’s admin area to only trusted users. This will help prevent hackers from gaining access to sensitive information or making changes to your site without permission. You can do this by setting up a password protection system or using an IP address whitelist.

4. Use a web application firewall

A web application firewall (WAF)

Cyber security

As the world becomes increasingly digitized, cyber security is more important than ever. Here are some tips to help you secure your website from hackers:

1. Use a strong password and never reuse passwords.

2. Enable two-factor authentication whenever possible.

3. Keep your software and plugins up to date.

4. Use a security plugin or service like Sucuri to monitor and protect your site.

5. Regularly back up your website files and database.

By following these tips, you can help keep your website safe from hackers and other cybersecurity threats.

Some Dangers From Pandemic Fatigue

 After, close to two years, it should surprise no one, many are, at the least, tired of this horrendous pandemic, or even, far - more, fatigued, and sick - and- tired of it, and the impact on our lives! However, this should not, and cannot justify, the utter - disregard of some, in terms of respecting the greater good, and abiding by basic, common sense, public health, protective measures! How did this become another, political issue, with so many, apparently putting their personal/ political interests and agenda, first? How many more must get infected, hospitalized, put others, at - risk, and/ or die? Many seniors have lost their battle, as have the immune - compromised, and we still do not know all the potential longer - term ramifications and impacts! Why does this nation, despite its efforts and spending, have, among, the lowest vaccination rates, in the world, among first - tier, developed nations? Everyone is tired of this, and would like, a return to normal, but, the efforts of a minority, harms our overall efforts, and the potential to optimize our efforts! With that in mind,this article will attempt to briefly examine and review this, and why, we must do better.



1) Conspiracy theories: For some reasons, some prefer to believe unfounded, opinions, and accept them, instead of facts. It began with denials, transformed to accusations, and created harmful resistance. Is there anyone, who has not witnessed or experienced the loss of someone close? While, everyone is entitled to an opinion of their own, they are not, to their own set of facts. It is one thing if your actions only harmed you, but quite - another, when it puts others,at - risk!

2) Politics: Why has this become political, like so many, apparently, common sense, issues, have? There is a huge difference between a viable solution,and well - considered, plan, as opposed to blaming and complaining, denials, and stubbornness!

3) Data and science matter: Mike Bloomberg likes to say, "In God We Trust. All others, bring data,." History shows, it takes a science - based, plan, endorsed and supported by public health, medical, and scientific personnel and experts, to create a meaningful, fact - based, efforts.

4) Mandate resistance: Although we have seen public health mandates, in the past, it seems we are experiencing the most polarized nation, in recent memory! Just because one doesn't agree, does not mean, he knows more than the experts!

THE METAVERSE: What Is It, and Why Should You Care?

The Metaverse. Some are calling it the following advancement of the Internet, others say it's now existed for a really long time. Somehow, it's the focal point of the absolute most powerful media organizations on the planet, and you ought to investigate it, as well.



I've generally been intrigued with the Metaverse, some time before I even realized there was a name attached to the thought. Going as far as possible back to when I was a youngster. Like most other young men, I was longing for being a hero, a knight, a swashbuckler, and on the most unconventional days, a few combination of those and a lot more activity y originals moved into one as I adventured through different universes worked in the aggregate dream of my companions and I.

As time went on, I consigned those domain stepping thoughts to the part at the rear of my psyche named "whimsical garbage," right close to light-sabers and world harmony feeling that videogames and books would be the nearest of intermediary for investigating different universes that I'd have in the course of my life.

That course of reasoning was changed in a moment one Saturday evening on a visit to a companion's home. I had popped in unannounced to observe a large number of my companions lumped into a group, quavering with brazen stunningness. At the point when they had sufficient sense about them all things considered to see the fresh introduction, I was guided to the focal point of the group, and tied into a massive headset, the Oculus Rift, playing a game called Robo Recall - a straightforward undertaking where you take shots at deviant robots rampaging through a cutting edge city.

Completely wrapped, with a degree of inundation I had never drawn closer, even with the most exciting of media I'd at any point consumed, I was merrily tearing through these crowds of robots.

I wasn't pointing a crosshair at these robots and clicking like had generally been the situation previously. All things considered, I was peering down the sights of the strange, modern weapons by moving my hand to eye level, squeezing my genuine fingers together to get a slug, and throwing my wrist forward to toss things.


It was only a brief time before the considerations of the cumbersome headgear and outsider regulators were totally gone, and I was totally inside this game. Unfortunately, the game came not without risk I whipped to one side to shoot one of those rampaging robots and felt a sharp break toward the rear of my hand, and pulling the headset off, I understood I had clubbed one of my young men with the Rift's regulator.

As he got himself from the floor I put myself into opportunity for being a threat to essentially everyone, and as I sat out of the way looking as others took their own turns it was completely cheerful to shoot robots I. This thing I was seeing - - I realized it was monumentous. Not on the grounds that this innovation all alone was progressive and sort of astonishing to see, but since it was a small gradual step between this present reality and a fantastical and genuinely limitless one, interesting to some inactive expectation profound inside me. Something that appeared to be so inconceivably far away, was arising into the real world, and having the unbelievable graciousness not exclusively to occur during my lifetime, yet before my actual eyes.

"A disclaimer"

Before we dig into the immense and complex issue of attempting to divine the fate of innovation - an errand wherein a lot more qualified before me have bombed hopelessly - or become lifted up in their unrivaled facticity, I might want to incorporate something much the same as a disclaimer.

Takes on the web, cell phones, TV, and essentially every other advancement of innovation at the hour of their origination and reception tend to slant outwards to those two limits. We feature and utilize the absolute most unfortunate deniers utilizing the clearness of knowing the past to make those speakers of olden times into a joke, or feature individuals who were forward thinking while at the same time overlooking the average sentiments that make up the contemporary idea.

While I sing the commendations of the astounding innovative headways, I likewise desire to admonish that there are horrible perils astir. The more we become derailed in the presence wonderland, the more the bosses of that space will can impact our lives, thoughts, and discernment… an open door we realize they will seize whenever given.


I accept that the Metaverse is a certainty, save for a fiasco of framework or a fundamental change in human way of behaving. Similar to the request for our general public, what used to be a capricious thought will be inhaled into reality pushing ahead, regardless of whether it appears as harmful and abominably defiled.


From My perspective, humankind moves toward the Metaverse, stepping a restricted and frightening way. Holding up toward the end, a definitive award for going where we have never tried, nor been able to go previously, an Eden where mankind's innovative marking will permit us to genuinely rise above a significant number of the limits of our essential actual reality and to a great extent take out the strategic obstacles of room and distance from a horde of exercises.


The peril lies on one or the other side of that way, pulling at us with a voracious gravity towards dark entanglements of corporate control. Where a considerable lot of mankind's base opportunities are a deception. The noblemen of those ruined realms having full oversight over what might exist inside this new reality that we take on.

As we investigate the possibility of the Metaverse here today, I beg you to consider that the innovation that will before long be available to us doesn't have the intrinsic nature of being a preeminent decent, nor an extreme, fixing evil. Something will be assembled and directed by the activities and goals of many individuals, and has the capacity to wind up in both of these last objections, thus numerous in the middle.

Where did "Metaverse" come from?

The prefix "Meta-" implies past, and "- stanza" alludes to the Universe. Consolidate them to get the fairly fitting term "Metaverse," signifying "past the Universe." All things considered, Metaverse feels a suitably lavish word for the thoughts it addresses.

This totally new popular expression we're tossing around isn't very new. It started in the 1992 Sci-fi novel, Snow Crash. I feel it is important that this is the very spot that is remembered to have promoted the expression "symbol" while alluding to a computerized portrayal of somebody, so with that award you can perceive Snow Crash affected the tech a long time past when it was composed.



North Korea to focus on economy in 2022 #Kim Jong-un

 



North Korea's leader Kim Jong-un has said the faltering economy will be the national priority this year as the country faces a "great life-and-death struggle".

He was speaking at the end of a key ruling party meeting, which coincides with him being in power for 10 years

A self-imposed coronavirus blockade has left North Korea struggling with food shortages.

There was no direct mention of the US or South Korea in his speech.

Mr Kim said increasing development and improving people's living standards was the main task.

He acknowledged the "harsh situation" in 2021 and and set "an important task for making radical progress in solving the food, clothing and housing problem for the people", the official Korean Central News Agency (KCNA) reported.

He said battling the pandemic was one of the main goals for the coming year: "Emergency epidemic prevention work should be made a top priority in the state work," he is quoted as saying by KCNA.

But he also said Pyongyang would continue to strengthen its defence capabilities because of an increasingly unstable military environment on the Korean peninsula.

He was speaking on Friday at the end of the 4th Plenary Meeting of the 8th Central Committee of the Workers' Party of Korea (WPK), which began on Monday.

There were reports earlier this year that people in the country were going hungry, giving rise to concerns as winter approached about a full-blown food crisis.

The border has been closed since January 2020 to prevent the spread of Covid-19 from China.

Following a year in which leader Kim Jong-un repeatedly stressed North Korea's dire economic condition and food shortages, these challenges were once again in the spotlight at the ruling Workers' Party's year-end plenum.

Kim's warning of a "great life-or-death struggle" in 2022 echoes last April's rhetoric urging officials to prepare for another "Arduous March", referencing North Korea's greatest economic crisis and famine in the 1990s.

While such comparisons overexaggerate the situation, North Korea's economic woes have indeed been exacerbated by Covid-19-related border closures, international sanctions and natural disasters.

These have all contributed to what Kim described in June as a "tense" food situation, and international agencies also warn of growing food insecurity and starvation.

Kim's emphasis on implementation of the national economic plan, rural development and advancing "scientific farming" now serves to remind citizens that their leader is prioritising their needs, while setting expectations for another year of economic struggles.

line


Mr Kim's new year speeches have previously included messages to South Korea and the US, but there were no explicit mentions this time.

"If we consider this report on the plenum as a replacement of Kim Jong-un's annual New Year's speech, it can be said that it's by far the shortest mention of inter-Korean relations and foreign policy ever," Cheong Seong-chang, a senior researcher at Sejong Institute, told NK News.

At the end of last year, North and South Korea, the US, and China agreed in principle to declare a formal end to the Korean War which ended in an armistice.

But talks have yet to begin because of North Korea's demands, South Korea has said.

Opening and Saving a Html file

How Playing Call of Duty Can Improve Your Driving Skills



 "Playing video games can make you a better driver." That statement probably brings to mind games like Gran Turismo or Forza Motorsports. Sure, these games can teach players the mechanics of driving, especially when using steering wheels and pedal controls, but are they the best at improving driving skills?



Ironically, studies have shown that first-person shooters, like Call of Duty, actually provide more benefits for drivers than driving games do.

One of the most apparent and most cited positive effects of playing video games is improved eye-to-hand coordination. It has almost become a cliché in debates over the positive and negative effects of playing video games and is still hotly debated, despite it seeming like common sense.

Gaming has come a long way from the single-joystick, single-button days of the Atari 2600. Now players have to contend with gamepads featuring dual joysticks and 12 or more buttons.

Growing up through the evolution of controllers, some players likely find using modern devices effortless because they have been using these complicated input mechanisms all their lives. Their eye-to-hand coordination is already conditioned. But is that directly related to playing games or just an environmental factor?


According to a 2014 study by the University of Toronto, playing action-intense video games like Call of Duty or Assassin's Creed did not reliably enhance sensorimotor control (eye-to-hand coordination). However, it did improve sensorimotor learning, meaning gamers were better than non-gamers at performing tasks with a "consistent and predictable structure."

The researchers tested this by having the two groups keep a cursor within a white square as it moved around a computer screen. At first, both groups performed equally. As the participants continued to practice, the gamers showed far better and quicker improvement in keeping the cursor in the square than non-gamers.

It might not seem like keeping a cursor within a square on a computer screen translates well into making one a better driver, but it actually does. It's not about the action that is taking place on the screen, but what is going on in the brain. The cognitive functions and visual acuity are what matters. Realizing the square has changed directions and then altering the course of the cursor before it leaves its confines relates directly to situations where a driver must make a split-second decision to avoid an accident.

The 2014 Toronto study is not the only evidence to show that Call of Duty and similar games can improve skills used in driving. Professor of Brain and Cognitive Sciences Daphne Bavelier at the University of Rochester has spent most of her time studying the cognitive effects of gaming and has some interesting insights into how playing action video games affect players.

In a 2012 TEDx Talk (watch below), Dr. Bavelier debunked a long-held myth that playing video games damage a player's eyesight. It might be intuitive to think that excessive time in front of the screen would harm your vision, but Bavelier says this is simply not true. She and her team have measured eyesight in the lab of gamers and non-gamers, and the former consistently had better vision than the latter -- even those who played up to 15 hours per week tested better than 20/20 vision.

Not only do game players have better visual acuity, but they also have a sharper perception of different shades of gray. Dr. Bavelier analogizes this with an example of driving in a fog.


"The other way that gamers are better is actually being able to resolve different levels of gray," Bavelier said. "Imagine you're driving in the fog. That makes the difference between seeing the car in front of you and avoiding the accident or getting into an accident."


Another myth that runs contrary to her findings is that games lead to attention problems and greater distractibility. Scientists have studied attention for decades, and there are plenty of standard tests to measure it in a quantifiable manner.


Bavelier found that people who play Call of Duty have far better attention than non-players. A simple test they used was to show test subjects colored words and ask them to state the ink color of each word as they appear. Some words introduced a cognitive conflict. For example, the word blue appearing in red ink. Results showed that the gamers were far quicker at resolving those conflicts than those that did not play.

Another attention test involves tracking multiple moving targets. The average person can keep tabs on about three or four objects at once. Action video game players have a span of around six to seven. These results are relatively predictable considering what it takes to play action games like Call of Duty, especially in hectic multiplayer matches. It's a good thing too, since we need to keep that many browser tabs open just to have a shot at scoring a new graphics card these days.

Attention is a critical attribute when driving. Just think of all the things you have to pay attention to at the same time when driving -- the cars in front, behind, and beside you; the children playing near the street up ahead; the color of the traffic signal; your speed; the speed of cross traffic when approaching a green light. There are many things you have to maintain focus on when driving. And lab tests show action gamers are very good at this.


Bavelier's research further confirms the practical testing results with brain imaging. There are three areas of the brain that regulate attention. The parietal lobe controls the orientation of attention. The frontal lobe sustains attention. Lastly, the anterior cingulate controls how we allocate concentration and resolve conflict.

"Now, when we do brain imaging, we find that all three of these networks are actually much more efficient in people that play action games," Bavelier said.

However, we again fall back to the argument of whether these results were directly related to playing games or just common environmental factors. Fortunately, Bavelier considered causality, too, which is easy to test in the lab.

Bavelier and her team performed a controlled training study to establish causality. What they did was have participants take cognitive tests at the start. Then subjects would play 10 hours of action games over two weeks in 40-minute sessions. Subjects then took the same cognitive tests, and the results found that not only did they perform better, but the improvements were still present five months after the training.


The training tests show two things. First, they prove the causality between visual and cognitive improvements when playing video games like Call of Duty. The positive effects are not caused by environmental conditions common to gamers. Second, it shows that training your brain on these games has lasting effects.

Indeed, another study out of Shanghai in 2016 showed that playing high-action titles physically rewires the brain, so the benefits are at least semi-permanent. The researchers wanted to know if playing video games improved practical driving skills. They also wanted to find out whether the type of game mattered.

They tested participants using a driving simulator. One group played action games for 5 to 10 hours, and the other played slower-paced games. The study found that the action players performed markedly better in subsequent simulator testing than the non-action players.

"Our research shows that playing easily accessible action video games for as little as 5 hours can be a cost-effective tool to help people improve essential visuomotor-control skills used for driving," said researcher and co-author of the paper Li Li of New York University Shanghai.

Researchers used Mario Kart and Rollercoaster Tycoon for action and non-action training, respectively. The driving simulator was set up to have participants drive a car down a lane while compensating for crosswinds that affected the car's behavior.

7 Signs That You're a Good Developer


There's nothing unusual if you want to become a developer. Perhaps you'd want to create web applications, mobile apps, or even some sort of a game. However, the issue is whether or not you believe yourself to be competent enough. I attempted to explain some of the indicators that suggest that you're really a great developer or not.

Programming is a Profession That Requires Constant Learning

Thus, you can assume knowing several programming languages or having some experience in this field isn't sufficient to call yourself good at it. The only way you're able to understand if are truly talented enough for something is when you spend years working on projects and solving problems - just like any other developer out there does. If the outcome was great then most likely your skills are highly appreciated by others too!

In other words, if you can create a basic project like a calculator or even something more complicated in a Programming Language that you understand well, then you truly understand how it works, and this is critical.

Good Developers Don't Need Anyone's help

Developers that are great don't require any assistance while working. They never get stuck because they know how to work alone and without supervision (well, sometimes even with someone watching over them). They're constantly able to accomplish what they set out to do, as well as produce high-quality results immediately and consistently.

Of course, working with your coworkers to establish the project is preferable, but there may be times when you'll be alone with no one to assist you, therefore you'll need to be able to work independently and have faith that you can accomplish this task on your own.

Programming Isn't The Only Thing That They're Good at!

They usually have a wide range of skills and are interested in various other activities like music, movies, sports, etc. Consequently, they can easily communicate with different types of people which is always an advantage when working on a project with a team.

It also aids them in performing their job more effectively. For instance, you've been given a freelance order to create a completely Working Website for someone's service, such as a generator of images from sentences or an AI with a paid subscription and other features. So to complete the task, you'll need to understand this field well and not just how to make a beautiful navbar or animated scrollbar. I believe you see my point.

You Must Be Familiar With Your Tools

This quote is extremely relevant for this particular subject. Good developers not only possess great coding skills but also know their development environments (such as IDEs) very well and use all the shortcuts available to make their work faster.

Additionally, they understand the principles behind the code they write and why it works instead of just blindly following some tutorials.

Developers are self-taught

I assume you've heard this statement before, but do you actually know what it means? This term implies that the person never attended any special school or classes to learn Programming. Consequently, they just started working on projects and found themselves doing something new every day which developed their programming skills along with time.

Without a doubt having some sort of education in Programming is advantageous because there's lots of stuff to study in order to become great at it (similarly like when studying for an exam). However, if your primary goal is only becoming good enough then most likely developing these skills alone will be sufficient. Just remember about practicing every day!

You're Good If You Can Create Something

When I say creating, I mean Programming a piece of software, not designing it. There is an entire world outside Programming and creating websites or mobile apps which requires creativity as well (such as drawing).

However, we're talking about Programming now so if you can create something complicated without using any tutorials to assist you then this fact confirms that your skills are worth being valued by other people! It's all about challenging yourself because the more difficult task is solved successfully, the better developer you become! So don't be afraid of challenges - embrace them instead!

No Need To Read This Article

If you're already a good developer then there is no reason in reading this article! You know everything that was written here, or at least most of it because I'm sure some points are new to you. So congratulations on becoming awesome at Programming and discovering how important it is to be able to work alone without assistance (except when needed)! Good luck with your tasks, projects, and career progressions!


'RHOC' BRAUNWYN WINDHAM-BURKE PDA WITH NEW MODEL GF ON BEACH ... Keepin' It Casual

 Braunwyn Windham-Burke might be an OC girl, but she sure does look good in Florida ... especially in the arms of this beauty.



The 'Real Housewives' alum was enjoying the rays of Miami Beach this week, splashing in the waves alongside a woman she was more than happy to embrace in public. More than just that ... they were putting on a full-blown PDA clinic.

We've figured out her mystery playmate is Victoria Brito, and sources tell us she and Braunwyn have been dating for a month. They met via mutual friends and they've been talking on IG.

We're told they're keeping it pretty casual for now, although Braunwyn is apparently smitten ... which is obvious in the beach pics. As for VB, she's coming up in the game -- having recently shot a campaign for PUMA.

Of course, we know what you're thinking ... has Victoria met Braunwyn's kids with Sean??? Our sources say not yet, but Braunwyn plans to introduce Victoria to her kids around Christmas when they travel to CA together.

Braunwyn came out as lesbian in December. She and Sean split earlier this year.

How to Make Your Long Distance Boyfriend Want You More

 Relationships can have their fair share of conflicts and issues in any normal situation. Let's face it, even the so called healthy relationships have had their fair share of ups and down. And with long distance relationships, the chances that you may sometime fall out with your significant other cannot be ruled out. Without mincing words, distance can cause a huge gulf between two inseparable love birds. Little wonder the cliché "out of sight is out of mind"



Of course, there are pros and cons attached to long distance relationships. First of all, a long distance relationship can actually help the relationship between you and your man grow stronger each day, as you constantly miss each other and try to do things that would bridge the gap between you.

However, the not-so-appealing part of long distance relationships is found in being out of the sight of your partner. In the most extreme cases, this can result in you slipping from his mind pretty quickly, and we don't want that do we? Of course not! That's why this article is just timely. In this article, you'll get all the relationship advice you need to put some spark to your long distance relationship.

Here are some really helpful relationship advice that will make your long distance boyfriend fall helplessly in love with you even from miles away. Hopefully, you'll get the hang of this and pitch your relationship among some of the best healthy relationships out there.

Primp yourself up before his departure.

Saying farewell to your lover can be heartbreaking to say the least, but you don't need to look unkempt and haggard because he's going miles away from you. To make him feel like staying back instead of leaving, do something about your looks; get a sexy new hairstyle, or go to the beauticians for a facial so your skin glows. Treat yourself to a new wardrobe, some cute new shoes, a sexy dress and a flattering blouse that you look and feel awesome in. Look good for him, even at the airport, as you bid him farewell, let him know exactly who he is leaving behind. Your boyfriend will surely experience a heightened interest in you like never before with your new look and all.

Curb the desire to call him every single day.

Yes, the phone is all that you have that connects you both now and it's normal to feel propelled to always stay in touch with him. However, you'll be overdoing things if you call or text him every single minute! Trust me, boys sometimes want their space. So, instead of wanting you more he'll only get irritated with your constant calls. So, draw back a little bit (it's all for your good). It's okay to let his call go to voice-mail once in awhile or delay replying his text. When you wait for a few hours before calling him you'll get better results. I'm sure he'll be so excited to hear your voice, why? Because he has really missed you!

Let him know you are having fun.

Do you want to show your heartthrob that he is missing out on a lot? Go out shopping with your girlfriends, go clubbing, to the movies, do something adventurous while your boyfriend is away and be sure to take selfies! Share these pictures with him later, giving him a subtle hint that you are having fun on your own and not moping around. That will get him on his toes if he really loves you. Do that often and your man might just take the next available flight back to you because he wants you so badly.

Make use of social platforms that allows him to see your face.

In today's world of modern technology, there's virtually nothing you can't do on the Internet. This is to your advantage, so make full use of all the communication options that enables you talk to your significant other every single day. To this end, social media platforms like Snapchat and Facebook have proven to be very rewarding. All you need to do is fix a date to talk to each other on any of these platforms, and don't forget to primp up yourself so you look gorgeous since he's going to see you!

Don't make use of jealousy.

If you want to have a healthy relationship with your man, even if it's a long distanced one, it isn't advisable to make use of jealousy in order to make your man miss or want you more.

It's safe to let him know you're having a good time while he's away from you, but don't rub anything in his face to make him jealous. This won't make your long distance boyfriend want you, he'll only feel insecure in his relationship with you, and that could be the beginning of the end of your relationship, long distance or otherwise.

I hope this relationship advice have been exciting? Experiment with them and you'll definitely pitch your relationship as one of the healthy relationships your peers will look to emulate.


Alder Lake Architectural Benchmark: Intel 12th-Gen Core

 A few months back we investigated CPU core misconceptions, explaining how overall processor performance is affected not only by how many cores a CPU has, but other factors including cache levels and capacity. This was an interesting and unique look at Intel’s 10th-gen series in an article we titled "How CPU Cores & Cache Impact Gaming Performance." Basically what we did was compare the Core i9-10900K, Core i7-10700K and Core i5-10600K at the same 4.2 GHz frequency, with the same memory, memory timings, ring bus frequency, and so on.



Then compared the three CPUs with only 6 cores / 12 threads enabled to see how much of a difference the L3 cache capacity made when it came to gaming performance. After that, we compared that data to the 10700K and 10900K with 8 cores enabled, and finally the 10900K with all of its 10 cores turned on.

Long story short, it turns out that in almost all games, it's not the core count but the L3 cache capacity that is responsible for the improved performance seen across the higher-end Intel parts. Of course, down the track the extra cores will see those higher-end parts pull even further ahead, but at least on today's games it’s all about the L3 cache.

That investigation later morphed to a quad-core version where we included Core i3 models and a similar take for AMD CPUs, where we looked at 10 years of AMD CPU progress and back to Intel for the same.

To wrap up that content, we thought we should add the new Intel Alder Lake 12th-gen CPUs to the data pool, so here we are, and it's been a more involved process than we first imagined. Whereas all other CPU architectures had one, two, or maybe three different configurations, 12th-gen Core has three per CPU.

For example, the 10th-gen CPUs had a 20MB L3 cache with the Core i9 model, 16MB for i7 and 12MB for the i5 models, Alder Lake’s cache capacity is segmented in a similar fashion, 20MB of L3 for the Core i5, 25MB for i7 and 30 MB for i9. But then on top of that we had to work out what kind of core configuration we should test. Four P-cores, Four E-cores or a mixture of both? The correct answer was of course all three configurations and that’s provided us with a wealth of juicy data to go over.


To be clear, with four P-cores enabled we were using Hyper-Threading, so this is a 4-core/8-thread configuration. Basically SMT was enabled when supported for all test configurations. This means because the E-cores don’t support SMT the four E-core configuration was 4 cores with 4 threads. Then the mixed configuration which featured two P-cores with two E-cores was a 4-core/6-thread configuration.

For testing we’ve used the MSI Z690 Tomahawk Wi-Fi DDR4 as we wanted to use the same DDR4-3200 CL14 low-latency memory that was used to test all the other CPU architectures that support DDR4. In our testing, DDR5-6000 has not shown to be any faster for gaming, but most importantly we wanted to keep the data as apples to apples as possible for this feature. Finally, all configurations were tested using the Radeon RX 6900 XT. Let’s dive into the data.

Benchmarks

Starting with Rainbow Six Siege, there’s quite a bit to go over, so bear with me. First let’s just look at the Core i9-12900K, we see with four P-cores enabled and locked at 4.2 GHz that this configuration was good for 510 fps, just 3% faster than AMD’s Zen 3 architecture.

Then with two P-cores and two E-cores enabled, performance dropped by 15% which is a fairly significant reduction, and then with just four E-cores enabled performance drops by a further 12% which isn’t that much and not nearly the decline I was expecting. Quite shockingly, in this title four E-cores were able to match the performance of the Core i9-11900K, though the 11th-gen architecture does suck in this title, but still I didn’t expect to see any results like this.


Moving onto Battlefield V results, we gain a few interesting insights. First, is that the E-cores suck big time in this title, not only is the average frame rate almost halved when compared to what we see when just using the P-cores, but the 1% low performance is shattered.

We’re looking at a 22% reduction in performance with the 12900K when going from 4 P-cores to 2 P-cores and 2 E-cores. Then we see a further 31% reduction when moving to E-cores exclusively. Worse, that means the P-cores were 87% faster when looking at the average frame rate and 170% faster when looking at the 1% low. So those efficient cores are devastatingly slow in this game, and anything but efficient.
We also see that when the E-cores are enabled, the larger L3 cache capacity of the i7 and i9 models doesn’t result in any extra performance, or at least very little in the way of extra performance. However with just the P-cores the 12700K was 6% faster than the 12600K and then the 12900K was 7% faster than the 12700K.

If we compare that data with the rest of the CPU architectures we’ve tested, there’s a few noteworthy comparisons to be made. When compared to Zen 3, Alder Lake is up to 12% faster, seen when comparing the 12900K with the 5800X. That said, the smaller 20MB cache of the 12600K meant it was 2% slower while the 25MB i7 was just 4% faster. So it’s that larger 30 MB L3 cache that gets the Core i9 firmly over the line.

That said, if we were to force Intel to utilize the E-cores for gaming, we see that the mixed 2 P-cores/2 E-cores configurations fall behind Zen 3. Then if you were to use E-cores exclusively, performance falls off a cliff and now we’re talking nowhere near Skylake levels of gaming performance, think more Sandy Bridge. Moving on to F1 2020, we see that the E-cores are nowhere near as bad as what we saw in Battlefield V. We’re looking at a 65% performance increase with the E-cores when looking at the 12900K and a 43% increase with the 12600K. The 12600K does appear to be choked by its smaller 20 MB L3 cache given the 12700K was 18% faster when comparing P-core performance, while the 12900K was just 4% faster than the 12700K.

Compared to Zen 3, Alder Lake is slower when limited to a 20 MB L3 cache, then up to 10% faster with 25 MB and 12% faster with 30 MB. As for the E-core only configuration, Alder Lake is comparable to Ivy Bridge in F1 2020 and a long way behind Skylake, the 7700K for example was 33% faster than the 12900K’s E-core configuration.


JAMB takes over collection of registration fee from Computer-Based Test centres to end extortion

 JAMB says it has taken over the collection of the N700 registration fee for the Unified Tertiary Matriculation Examination (UTME), from 2022.



It said in its weekly bulletin issued in Abuja on Monday that it would collect the approved N700 registration fee at the point of registration and remit the same to the various approved centres.


"JAMB will as from the 2022 UTME exercise, be collecting the approved N700 registration fee on behalf of the various Computer-Based Test (CBT) centres along with its UTME registration fees.

"The board will then remit whatever is due to each registration centre to its bank account on a weekly basis or any timeframe acceptable to the centre owners.


"This laudable step was borne out of a painstaking review of the entire UTME registration process which has revealed some unethical and unacceptable practises by many CBT centres.

"It is to be noted that these centres were allowed to collect only N700 as registration charges, but some fraudulent centre owners misused that opportunity to engage in conduct unbecoming of respectable establishments.



"They indulge in massive extortion of candidates during the exercise,'' the board stated.

It stated also that it had been compelled to make the UTME registration process cashless to put a stop to extortion.

It added that the new process would not in any way increase the cost of UTME registration.

"It is only the process of payment that has changed; not the cost.

"With the new policy, candidates simply walk into any registration centre and register without paying any fee.

"The fee hitherto payable to the centre would have been paid along with the cost of obtaining the e-PINS,'' it stressed.

Meanwhile, the board said it had taken a decision to establish what it referred to as the "A/Level Task Team'' and the "A/Level Qualification and Verification Databank'' (ALQVD).

It explained the initiatives were to serve as monitoring bodies and repositories respectively, for verified A/Level qualifications.

It said the measure, as well as others underway, were to ensure that the gains recorded in the education sector were not eroded.

"This follows revelations from a recent professional operation undertaken by the ICPC in conjunction with the Federal Ministry of Education.

"These revelations are contained in a recent statement by the ICPC about irregularities in the Joint Universities Preliminary Examinations Board (JUPEB).

"Concerns were expressed by major stakeholders about the faking of the Interim Joint Matriculation Board (IJMB) examination results.

"As such, it has become necessary for the board, as a moderator of the two examinations, to take appropriate action to put a stop to the unacceptable happenings.

"Just recently, one tertiary institution had cause to verify the IJMBE results of more than 146 candidates admitted with IJMB certificates and found only six genuine results,'' JAMB lamented.

It stated also that it had introduced Computer Studies and Physical Health Education, to the existing 23 UTME subjects to make them 25, beginning from the 2022 UTME.

ECOWAS Cybersecurity Hackathon 2024

  The highly anticipated Cybersecurity Hackathon for 2024 has been announced by the Economic Community of West African States (ECOWAS). This...