05.03.2013 Views

Galaxy Music strip ad 21cmx3cm.pdf 1 Feb/13/13 5:27 PM

Galaxy Music strip ad 21cmx3cm.pdf 1 Feb/13/13 5:27 PM

Galaxy Music strip ad 21cmx3cm.pdf 1 Feb/13/13 5:27 PM

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Galaxy</strong> <strong>Music</strong> <strong>strip</strong> <strong>ad</strong> <strong>21cmx3cm</strong>.<strong>pdf</strong> 1 <strong>Feb</strong>/<strong>13</strong>/<strong>13</strong> 5:<strong>27</strong> <strong>PM</strong>


1<br />

UGANDA/INTERNATIONAL - pctechmag.com<br />

KENYA EDITION - ke.pctechmag.com<br />

GHANA EDITION - gh.pctechmag.com<br />

3 NIGERIA EDITION - ng.pctechmag.com<br />

3<br />

<br />

<br />

2


EDITORIAL<br />

2<br />

SOCIAL INNOVATION? iHub Nairobi, just like many other hubs is not just about work. They also act as focal point for the tech community to<br />

come together, learn and, of course party. SEE FULL IN THIS MONTH’S COVER STORY<br />

4 | Editorial team, and Editor’s Notes<br />

6 | Verbatim<br />

THE WALL 6<br />

7 | Numbers: The Mobile World Congress 20<strong>13</strong><br />

(Infographic)<br />

UPDATE 8<br />

8 | Uganda to introduce law to regulate mobile services<br />

8 | 50% Bonus on Data from Airtel Uganda<br />

9 | MTN introduces Nokia Lumia<br />

9 | Google Glass one step close<br />

10 | Adobe Creative Suit goes free (sort of)<br />

11 | MTN’s cross-border fibre cable commissioned<br />

12 | Kenya: SIM Registration Laws Come Into Effect<br />

12 | MTN, RIM partner on Blackberry 10<br />

<strong>13</strong> | Kenya Begins Construction Of ‘Silicon’ City Konza<br />

Artistic Impression of what is intended to be Africa’s “Silicon Valley”.<br />

WHAT’S NEW 14<br />

14 | BlackBerry’s Z10 Smartphone<br />

14 |Panasonic 4K 20-inch tablet<br />

15 | Google’s Chrome Pixel<br />

15 | New Samsung Refrigerator<br />

COVER STORY 16<br />

17 | Inside East Africa’s largest Innovation Hubs<br />

“Hubs” are all over the place these days. And if you look<br />

closely, it means there’s one universal problem: how to<br />

turn techies into entreprenuers. So this article, part of<br />

which is from a report from a research that used iHub<br />

(Nairobi) as a case study, seeks to tell us how the business<br />

of coding is turning into real business!<br />

FEATURES 24<br />

25 | 10 things the comments section taught me about the<br />

Web<br />

<strong>27</strong> | Market Analysis: Mobile Payments In Emerging Nations<br />

28 | The Dark Side of Computers<br />

FEATURES/BLOGS 32<br />

32 | Ecommerce Is Now A Trillion Dollar Industry: Here’s<br />

How It Happened<br />

33 | Lock up your mailbox<br />

34 | Why life through Google Glass...<br />

REVIEWS 36<br />

36 | Samsung <strong>Galaxy</strong> <strong>Music</strong><br />

38 | Nokia Lumia 920<br />

40 | Orange Money<br />

41 | TOSHIBA Satellite P845t-101<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

3


EDITORIAL<br />

4<br />

CHIEF EDITOR/CEO<br />

ALBERT MUCUNGUZI<br />

albert@pctechgrop.net<br />

+256 792 619812 / 782 619812<br />

DIRECTOR, West Africa<br />

RICHARD BOATENG, PhD<br />

richard@pearlrichards.org<br />

FINANCE MANAGER<br />

WYCLEF RUSHAJU<br />

wyclef@pctechgroup.net<br />

+256 703 473073<br />

EDITOR<br />

JEDDY GENRWOT<br />

jeddy@pctechmagazine.com<br />

WEBSITE ADMINISTRATORS<br />

EPHRAIM BATAMBUZE<br />

ebatambuze@gmail.com<br />

NORMAN MUHWEZI<br />

norman@pctcehmagazine.com<br />

BLOGGERS<br />

SIMON KAHERU<br />

skaheru@smsmedia.info<br />

DOUGLAS B. KASYABA<br />

kasyaba587@gmail.com<br />

PATRICK TUMUSIIME<br />

marpat2000@gmail.com<br />

NIGERIA<br />

Ishola Abdulkabeer<br />

abdulkabeerishola@gmail.com<br />

ADVERTISING ENQUIRIES<br />

<strong>ad</strong>vertising@pctechmagazine.com<br />

+256 792 619812<br />

PUBLISHER<br />

PC Tech Communications Ltd<br />

Plot 14 Martyrs’ Lane, Ntinda (Minister’s Village)<br />

P. O. Box 32180, Kampala, Uganda<br />

www.pctechmag.com<br />

© COPYRIGHT 20<strong>13</strong><br />

PC Tech Magazine is published 11 times a year<br />

by PC Tech Communications Ltd. The name PC<br />

Tech Magazine is a registered tr<strong>ad</strong>emark and is<br />

property of PC Tech Communications Ltd.<br />

Welcome to yet another issue of Your Most Contemporary Technology<br />

Magazine.<br />

It is, of course, my pleasure to introduce our<br />

new editor, Jeddy Genrwot, a young and dynamic<br />

guy that’s worked so hard to see this issue<br />

through.<br />

In the coming months, you’ll be seeing more of<br />

his name through the pages.<br />

In the news this month, mTN commissioned<br />

the cross-border fibre cable at Katuna, Uganda/<br />

Rwanda border, a landmark event that effectively<br />

means Uganda has access to an alternative<br />

internet “route” in the event the default one goes<br />

down.<br />

The same company then introduced Nokia’s flagship Windows 8 Phone,<br />

the Nokia lumia. I got the sense that microsoft may be borrowing a bullet<br />

from Google’s gun and coming down to this (Sub Saharan market) that has<br />

long been dominated by chinese manufacturers.<br />

In the cover story, we look at three Innovation Hubs across east Africa.<br />

These are co-working spaces that primarily target tech-minded young people,<br />

and attempt to help them become better entrepreneurs and - in some cases -<br />

help them get access to investors.<br />

We speak to Richard Zulu from Uganda’s outbox Hub, and also feature<br />

excerpts from a research report conducted in Kenya with iHub as a case<br />

study.<br />

Don’t miss the reviews, and Special Features, including one on “The<br />

Darkside of computers”.<br />

Until next month!<br />

Albert mucunguzi<br />

Subscribe<br />

and save!<br />

6 issues at the price of 5<br />

11 Issues at the price of 10<br />

2 FREE COPIES<br />

Fill in the form and bring / send it to:<br />

PC Tech Communications, Plot 14, Martyrs’ Lane, Ntinda P. O. Box 32180, Kampala, Uganda<br />

I would like to subscribe to PC Tech Magazine for: 6 issues 11 issues<br />

tick your choice<br />

I have enclosed UGX 25,000 (USD 10) UGX 50,000 (USD 25) as payment for my subscription.<br />

( Cash Cheque) tick where appropriate<br />

NAME: _________________________________________________________________<br />

ADDRESS: ______________________________________________________________<br />

TEL: ___________________________________________________________________<br />

EMAIL: _________________________________________________________________<br />

DELIVERY ADDRESS: _______________________________________________________<br />

________________________________________________________________________<br />

________________________________________________________________________<br />

________________________________________________________________________<br />

Please double check your <strong>ad</strong>dress and ensure that it is accurate as PC Tech shall not be held responsible for non delivery due to wrong /<br />

incomplete / inaccurate <strong>ad</strong>dresses.<br />

www.pctechmagazine.com/subscribe<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

+256 792 619 812 / +256 703 473 073<br />

EDITORIAL


THE WALL<br />

6<br />

Think of this as your<br />

Facebook Wall, now called<br />

Timeline. Here, we publish<br />

anything. Yes, ANYTHING.<br />

So what’s there this month<br />

may not necessarily be<br />

there next.<br />

‘<br />

Verbatim<br />

“We want Google to be the third half of your brain.”<br />

“There are a lot of amazing things that Steve’s le<strong>ad</strong>ership achieved —<br />

Windows 8, the Surface computer, Bing, Xbox. Is it enough? No. He<br />

and I are not satisfied that in terms of breakthrough things we are doing<br />

everything possible.”<br />

Former Chief Executive and current chairman of Microsoft BILL gATES comments during a recent interview on NBSC<br />

Sergey Brin Russian-born American computer scientist and entrepreneur is also along side Larry Page, a co founder<br />

of Google<br />

“I don’t care if you’re a billionaire. If you haven’t started a company,<br />

really gambled your resume and your money and maybe even your<br />

marriage to just go crazy and try something on your own, you’re no<br />

pirate and you aren’t in the club”<br />

Michael Arrington, TechCrunch<br />

One of the huge mistakes people make is that they try to force an<br />

interest on themselves. You don’t choose your passions; your passions<br />

choose you.<br />

After learning that Microsoft CEO Steve Ballmer would not be giving the keynote speech at CES in 20<strong>13</strong>, and inste<strong>ad</strong><br />

Co-founder and CEO of Amazon.com, Inc JEFF BEzOS<br />

“Every young person one day will be entitled automatically to change<br />

his or her name on reaching <strong>ad</strong>ulthood in order to disown youthful<br />

hijinks stored on their friends’ social media sites.”<br />

STEVE BALLMER, Microsoft CEO To the Wall Street Journal<br />

“We didn’t miss cellphones, but the way that we went about it didn’t<br />

allow us to get the le<strong>ad</strong>ership. It’s clearly a mistake,”<br />

Former Chief Executive and current chairman of Microsoft BILL gATES comments during a recent interview on NBSC<br />

Thick skin will be a necessity for technology companies in the coming<br />

years of the digital age, because they will find themselves beset by<br />

public concerns over privacy, security and user protections…They’ll<br />

also have to hire more lawyers. Litigation will always outpace genuine<br />

legal reform, as any of the technology giants fighting perpetual legal<br />

battles over intellectual property, patents, privacy and other issues<br />

would attest”<br />

STEVE BALLMER, Microsoft CEO<br />

INFOGRAPHIC: The Mobile World Congress 20<strong>13</strong><br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

Turn to page 23<br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

THE WALL


UPDATE<br />

TOP STORIES THIS MONTH<br />

8<br />

Uganda to introduce new law<br />

to regulate Mobile Services<br />

UCC boss praises Orange Uganda<br />

Uganda’s telecommunications regulator announced<br />

that it will introduce a new law that will see more<br />

regulation of <strong>ad</strong>vertising on short text messaging<br />

services and mobile money business in the East African<br />

country.<br />

The Uganda Communications Commission (UCC)<br />

said that the new law will “restore sanity” and help<br />

“improve the quality of services that mobile telephone<br />

companies have <strong>ad</strong>ded to their platforms.”<br />

The statement from the UCC continued to say that<br />

the new law will help these services from continuing to<br />

be “a safe haven for fraud to fleece the unsuspecting<br />

public.”<br />

According to the UCC Executive Director Godfrey<br />

Mutabazi “the most common problems have been the<br />

loss of mobile money, dropped telephone calls, free<br />

airtime promotions, SMS promotions where the public<br />

is asked to vote through certain codes, unsolicited<br />

messaging services where the public loses money by<br />

replying by text message to certain numbers, as well as<br />

unexplained airtime deductions.”<br />

Mutabazi singled out Orange Telecom as the “only<br />

mobile operator which has tried to stick to prudent<br />

business by protecting its customers.”<br />

He <strong>ad</strong>ded that the “UCC and the Bank of Uganda<br />

are in <strong>ad</strong>vanced stages of coming up with a law on<br />

mobile commerce as well as make amendments to the<br />

1997 Uganda Mobile Communications Act because<br />

it has been found to be lacking in the prosecution of<br />

fraudsters.”<br />

“Although the prices of Internet service have<br />

considerably dropped in the last two years, the quality<br />

has been compromised by unprofessional activities by<br />

the telephone operators,” he continued.<br />

50% Bonus on Data from Airtel Uganda<br />

AIRTEL UGANDA launched 50% bonus data campaign<br />

that which is a way of giving back to our data<br />

customers. This will mean that for every purchase of<br />

a data bundle, one will get a bonus of 50% on that<br />

purchase.<br />

Our aim is to be the most loved brand in the daily<br />

lives of Ugandans and we recognize the importance of<br />

internet in the transformation of Uganda as a country<br />

and in the lives of Ugandans as a people. We are<br />

continuously trying to make our services more relevant<br />

to our customers.<br />

Mr. V.G Somasekhar, the Managing Director, Airtel<br />

Uganda has this to say, “With the 50% bonus our<br />

customers will be able to enjoy a wholesome internet<br />

experience with a reliable and abundant service. We<br />

hope with this offer to get more people to access our<br />

affordable data package and transform their lives by<br />

keeping up with the times.”<br />

Airtel launched 3.75G in august 2012 and so far<br />

has the largest 3G Network and the most affordable<br />

packages.<br />

On 5th <strong>Feb</strong>ruary Airtel also launched a new<br />

partnership with UGO to avail all her customers with<br />

free local content through www.ugo.co.ug<br />

IN BRIEF<br />

Google Glass<br />

one step closer<br />

GOOGLE HAS INVITED software<br />

developers to get their hands on its<br />

Project Glass prototypes, in the hope<br />

that they will start work on new and<br />

innovative apps that take <strong>ad</strong>vantage<br />

of the upcoming augmented reality<br />

he<strong>ad</strong>set.<br />

Based around the same technology<br />

as its Android smartphones and tablets,<br />

Google Glass was first unveiled in<br />

April last year as a prototype wearable<br />

computing device that projects a small,<br />

discrete image into one eye of the<br />

wearer.<br />

Original estimates suggested the<br />

device would cost the same as a mid- to<br />

high-end smartphone – in other words,<br />

roughly $250 to $600. However, that<br />

target was far below what early <strong>ad</strong>opters<br />

are being charged for the privilege,<br />

which is $1,500, something that will<br />

hopefully change when the technology<br />

reaches mainstream consumers.<br />

Project Glass isn’t without its<br />

competitors: sunglasses specialist<br />

Oakley is working on a version of its<br />

own, while Vuzix alre<strong>ad</strong>y sells a range<br />

of Glass-like devices. Even Motorola<br />

is getting in on the act, albeit with a<br />

ruggedised version aimed more at the<br />

military than the consumer. That’s why<br />

Google is hoping it will have generated<br />

developer interest in its Glass Foundry<br />

days in San Francisco and New York,<br />

to create unique new apps specifically<br />

for Project Glass. The invite-only events<br />

will see developers given access to<br />

the hardware and underlying software<br />

interfaces, in order to begin work on<br />

applications that can make the most of<br />

the wearable computer system.<br />

The San Francisco event took place<br />

at the end of January, and the New<br />

York event was held at the beginning of<br />

<strong>Feb</strong>ruary.<br />

MTN introduces<br />

Nokia Lumia<br />

MTN UGANDA ANNOUNCED THE availability<br />

of the Nokia Lumia 920 and Lumia 820<br />

smartphones, <strong>ad</strong>ding its name to the growing<br />

list of operators globally selling these flagship<br />

Windows 8 Phone devices.<br />

“We’re excited to work with Nokia to bring<br />

one of the most innovative smartphone on the<br />

market, – the Nokia Lumia 920. With unrivalled<br />

innovations in imaging technology, wireless<br />

charging and a bright, sensitive display, we<br />

think the Lumia 920 is going to turn a lot of<br />

he<strong>ad</strong>s.” said Ernst Fonternel, MTN Uganda Chief<br />

Marketing Officer”<br />

“We welcome MTN Uganda’s decision to<br />

offer the Nokia Lumia 920 and Lumia 820 to our<br />

valued consumers in Uganda. With a growing<br />

demand for smartphones across East Africa,<br />

we believe this announcement continues the<br />

momentum behind our Lumia range of devices<br />

and the bro<strong>ad</strong>er Windows ecosystem,” said<br />

Bruce Howe, General Manager for Nokia East<br />

Africa.<br />

The Nokia Lumia 920 includes the latest<br />

<strong>ad</strong>vances in Nokia Pure View imaging<br />

innovation. Using <strong>ad</strong>vanced floating lens<br />

technology, the camera in the Nokia Lumia<br />

920 is able to take in five times more light<br />

than competing smartphones without using<br />

flash, making it possible to capture clear, bright<br />

pictures and video indoors and at night. It<br />

also compensates for hand movement while<br />

the photo is being taken through image<br />

stabilization technology.<br />

In <strong>ad</strong>dition to built-in wireless charging, the<br />

Nokia 920 also comes with Nokia City Lens, the<br />

latest <strong>ad</strong>dition to the Nokia location suite and<br />

the start of a new augmented reality experience<br />

that also enhances Nokia Maps. Along with<br />

enhancements to Nokia Drive and Nokia<br />

Transport, the Nokia location suite of services<br />

represents the most comprehensive, integrated<br />

mapping experience of any smartphone.<br />

The Nokia Lumia 820 is a snappy, mid-range<br />

smartphone that delivers high-end performance<br />

in a compact package. While the Nokia Lumia<br />

820 has the same unibody look and feel as the<br />

high end Lumia smartphones, it comes with an<br />

exchangeable shell design. Exchangeable shells<br />

not only make it possible to select from a range<br />

of colors, but also to <strong>ad</strong>d wireless charging.<br />

Beneath the shell is room to insert a micro SD<br />

memory card.<br />

Both phones will be available in pentaband<br />

LTE and HSPA+ variants.<br />

The Lumia 920 is priced at UGX2, 255,000.<br />

The Lumia 820 is priced at UGX1, 615,000. Both<br />

phones come bundled with 300MB and are<br />

now available at all MTN service centers<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech 9<br />

UPDATE


UPDATE<br />

10<br />

<br />

<br />

<br />

<br />

<br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

Curve 9220<br />

Adobe Creative<br />

Suite 2 goes<br />

free (sort of )<br />

ADOBE, THE CREATOR of software such as Photoshop and<br />

InDesign, has m<strong>ad</strong>e its entire Creative Suite 2 (CS2) free to<br />

downlo<strong>ad</strong> – sort of. Having disabled the CS2 activation servers<br />

late last year, the company was inundated with complaints from<br />

users demanding to downlo<strong>ad</strong> and install software they h<strong>ad</strong> alre<strong>ad</strong>y<br />

paid for. In response, Adobe released both the installation<br />

files and accompanying serial numbers for downlo<strong>ad</strong>, letting<br />

anyone who previously bought CS2 re-install it on a new PC.<br />

However, this generosity has also been extended to the<br />

general public; initially, anyone with an Adobe.com account<br />

was able to downlo<strong>ad</strong> the files, but now simply pointing your<br />

browser at www.<strong>ad</strong>obe.com/downlo<strong>ad</strong>s/cs2_downlo<strong>ad</strong>s/index.<br />

html will give you complete access to the Creative Suite files.<br />

Although the software is only intended for those who purchased<br />

it legally in the past, there’s nothing to stop anyone from<br />

downlo<strong>ad</strong>ing the company’s Photoshop, InDesign, Illustrator,<br />

Premiere, Audition or the entire Creative Suite software to their<br />

own PCs.<br />

CS2 originally launched in 2005, and as such isn’t optimised<br />

for the latest processors or graphics cards – if you want hardware<br />

acceleration and some of the software’s more <strong>ad</strong>vanced<br />

features, you’ll need to pay for the latest version.<br />

However, each application represents a major improvement<br />

over the free alternatives: Photoshop CS2 has many more<br />

features than Microsoft Paint, Paint.NET and the GIMP image<br />

editors, while Premiere is far more powerful than Windows<br />

Movie Maker. InDesign and Illustrator are both industry standard<br />

design programs, which don’t have free alternatives.<br />

We were able to install each Creative Suite application on a<br />

Windows 8 computer and can confirm they work perfectly. It<br />

might be something of a legal grey area, but while the files are<br />

still freely available we suggest you give it a try.<br />

MTN’s cross-border fibre cable commissioned<br />

By AlBert Mucunguzi<br />

MTN Uganda this month commissioned its<br />

fibre network at Katuna Border in Kabale,<br />

Uganda.<br />

“The launch of the new fibre system at<br />

Katuna is a major development which we<br />

are confident will have a positive impact on<br />

the future of Uganda’s ICT Ro<strong>ad</strong>map, and<br />

will substantially improve connectivity with<br />

neighboring countries,” said CEO Mazen<br />

Mroue in a press statement.<br />

The event at Katuna border is has been<br />

graced by ICT Minister, Dr. Ruhakana Rugunda,<br />

UCC‘s Executive Director Godfrey Mutabazi, as<br />

well as MTN Chairman Charles Mbiire.<br />

Since its launch in Uganda in 1998, MTN<br />

Uganda has m<strong>ad</strong>e major investments in<br />

Uganda. In 2012 alone, its CAPEX investments<br />

exceeded USD 80 million by December. This<br />

investment was mainly towards the expansion<br />

of network infrastructure, establishment of<br />

ultra-modern Switching and Data Centre, as<br />

well as rollout of fibre infrastructure to boost<br />

the quality of voice and data services<br />

In terms of Network infrastructure, last year<br />

MTN Uganda rolled out an <strong>ad</strong>ditional 600km<br />

of fibre backbone closing the year with over<br />

2,800km of fibre system providing the capacity<br />

for high speed data connectivity and wider<br />

national coverage of 3G mobile data services<br />

that extend internet access to the rural areas<br />

of Uganda.<br />

MTN Uganda has over the last 6 months<br />

completed the installation of another 81 new<br />

Network Coverage Sites and also <strong>ad</strong>ded<br />

another batch of capacity sites to enhance<br />

the quality of network services across<br />

Uganda. MTN has a total of 1,100 sites at the<br />

end of 2012 providing Network Coverage<br />

and communication services to millions of<br />

Ugandans across the country.<br />

In 2009 MTN Uganda launched the first<br />

mobile money service with tremendous<br />

success. MTN Uganda Mobile Money ranks<br />

2nd in the world in terms of absolute number<br />

of active customer accounts <strong>ad</strong>ded during<br />

2012 as per GSMA research completed<br />

recently.<br />

Over the past couple of years MTN has<br />

also installed backhaul systems providing<br />

connectivity to the submarine cables landed<br />

at Mombasa. This has enabled secured and<br />

reliable connectivity with the rest of the world<br />

while providing quality voice and data services<br />

and high level redundancy.<br />

MTN has an extensive list of new<br />

innovations that will be gr<strong>ad</strong>ually announced<br />

during the year. MTN Uganda announced<br />

recently about the plan to deploy Long Term<br />

Evolution (LTE) network in Uganda during<br />

the coming months, which will enable MTN<br />

Customers to access world class internet with<br />

bandwidth speed up to 100Mbps. Today, more<br />

than 7.5 Million Ugandan enjoys country wide<br />

the Yellow revolution providing best network,<br />

fastest growing Mobile Money services, widest<br />

coverage and world class internet.<br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech 11<br />

UPDATE<br />

Uganda Communications Commissions Executive<br />

Director, godfrey Mutabazi, MTN Chairman Charles<br />

Mbiire, Uganda ICT Minister, Dr. Ruhakana Rugunda,<br />

and MTN CEO Mazen Mroue pose for a photograph at<br />

Katuna border last month. [Photo by A. Mucunguzi]


UPDATE<br />

12<br />

Kenya: SIM Registration<br />

Laws Come Into Effect<br />

The SIM card registration<br />

regulations come into effect<br />

today, a month after they were<br />

gazetted on January 11. The<br />

Communications Commission<br />

of Kenya (CCK) has asked<br />

the operators to submit their<br />

statistics on reconnected lines,<br />

new registrations and suspended<br />

lines to monitor compliance with<br />

the regulations.<br />

Under the Miscellaneous<br />

Amendment Act No 12 of 2012,<br />

mobile operators have to keep<br />

an accurate register of the people they provide<br />

access to. Those found not complying face a<br />

fine of up to KSh500,000 (approx US$5,700)<br />

for any breach of the law.<br />

Users of the unregistered SIM cards are not<br />

spared either as, according to the law, anyone<br />

found in contravention faces a fine of up to<br />

KSh300,000 (approx US$3,400) or a three year<br />

jail term.<br />

MTN, RIM partner on Blackberry 10<br />

MTN Nigeria and Research In<br />

Motion (RIM) - now BlackBerry<br />

- makers of the brand new<br />

Blackberry Z10 smartphone,<br />

are planning to introduce the<br />

new Blackberry 10 to the country. If the deal<br />

sails through, MTN will be the first to bring the<br />

latest Blackberry to the Nigerian market.<br />

MTN customers will be among the first users<br />

in the world to experience the new product,<br />

which has been re-designed to give customers<br />

a unique experience.<br />

Speaking on the deal, Chief Marketing<br />

Officer, MTN Nigeria, Larry Annetts, said the<br />

firm is giving them value for their money.<br />

“MTN is offering pre-order opportunities<br />

thus conferring on our customers the privilege<br />

of being one of the first to own the device in<br />

Nigeria. Not only that, those who pre-order<br />

will get the smartphone at a bargain price and<br />

they will be contacted for pickup at locations<br />

ABOUT PC TECH NEWS<br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

of their choice even before the phones<br />

become commercially available at retail stores.<br />

They are not required to make any deposits;<br />

they will simply pay on delivery,” he said.<br />

MTN Nigeria has an alliance with RIM,<br />

dating back to 2007, when MTN Nigeria was<br />

the first telecoms company in Africa to offer<br />

Blackberry on pre-paid.<br />

Analysts say the success of the Blackberry<br />

10 will largely rest on winning back those<br />

customers who fled for the gorgeous hardware<br />

and exceptional user interface of the iPhone or<br />

fancied the range of phones running Android.<br />

The task is tougher here, though at least<br />

BlackBerry has 70,000 apps available on day<br />

one. This is a remarkable achievement and<br />

is many ways is enough to be going on with.<br />

Apple and Android have over 700,000 apps<br />

each, but the number of jewels is much lower.<br />

Some of the stories posted in this section have been extracted from Pc Tech online’s daily news updates. You can visit www.<br />

pctechmag.com for daily tech news stories. If you wish to run your story, please email it to editor@pctechmagazine.com*.<br />

*Not all stories that we receive are published.<br />

Information<br />

and Communication<br />

ministry permanent secretary Dr<br />

Bitange Ndemo said the efforts are meant<br />

to ensure that a repeat of the 2007/08 post<br />

election violence that saw telecommunication<br />

g<strong>ad</strong>gets play a major role is not repeated.<br />

“Mobile operators will bear<br />

the intermediary liability in that<br />

they become an accomplice by<br />

failure to register the SIM-cards.<br />

Any aggrieved person can sue<br />

the telecommunication firms for<br />

any crimes committed using the<br />

unregistered SIM cards. It will be<br />

upon the mobile operators to<br />

reveal the identity of the person,”<br />

said Ndemo in an interview with<br />

Business Daily.<br />

Critics observe the operators<br />

have every reason to avoid<br />

finding themselves pinned against the wall for<br />

crimes perpetrated by their subscribers given<br />

the number of increased kidnappings and hate<br />

speech using mobile phone devices.<br />

As to the level of compliance, Kenyans have<br />

to wait and see whether the CCK will have the<br />

power to implement some of these threats<br />

against major companies largely considered to<br />

be more powerful than the regulator.<br />

Kenya Begins Construction Of ‘Silicon’ City Konza<br />

Kenya’s president has launched a<br />

$14.5bn (£9.1bn) project to build<br />

a new city intended to be an IT<br />

business hub and dubbed “Africa’s<br />

Silicon Savannah”.<br />

It will take 20 years to build Konza<br />

Technology City about 60km (37 miles) from<br />

the capital, Nairobi.<br />

It is hoped that more than 20,000 IT jobs<br />

will be created in Konza by 2015, and more<br />

than 200,000 jobs by 2030.<br />

Despite Kenya’s usually divisive politics, the<br />

project has the backing of all political parties.<br />

Konza is part of the government’s ambitious<br />

Vision 2030 initiative to improve muchneglected<br />

infrastructure over the next 18<br />

years.<br />

Correspondents say the government also<br />

wants to take <strong>ad</strong>vantage of the growing<br />

number of software developers in the East<br />

African nation.<br />

‘TREMENDOUS OPPORTUNITIES’<br />

“It is expected to spur massive tr<strong>ad</strong>e and<br />

investment as well as create thousands of<br />

employment opportunities for young Kenyans<br />

in the ICT [information communications<br />

technology] sector,” President Mwai Kibaki said<br />

at the ceremony to launch the construction,<br />

<strong>ad</strong>ding it would be a “game-changer” for the<br />

country’s development.<br />

He called on domestic and foreign investors<br />

to take <strong>ad</strong>vantage of Konza’s “tremendous<br />

opportunities”.<br />

The 5,000-acre (2,011-hectare) site was a<br />

ranch to the south-east of Nairobi on the way<br />

to the port city of Mombasa.<br />

When the plan was announced after the last<br />

elections property prices in the area soared,<br />

reporters say.<br />

According to the Konza information<br />

website, the city wants to attract business<br />

process outsourcing, software development,<br />

data centres, disaster recovery centres, call<br />

centres and light assembly manufacturing<br />

industries.<br />

A university campus focused on research<br />

and technology as well as hotels, residential<br />

areas, schools and hospitals will also be built.<br />

The government has appointed the Konza<br />

Technopolis Development Authority to oversee<br />

the building of the IT hub, which will be built<br />

in four phases – starting with the technology<br />

centres first.<br />

NaiLab has been contracted by the Kenya<br />

ICT Board (KICTB) to pilot the National<br />

Business Incubation program for companies<br />

with high growth potential. This project is an<br />

initiative of the Kenyan Ministry of Information<br />

and Communications under the World Bank<br />

funded Kenya Transparency & Infrastructure<br />

Project.<br />

NaiLab is a Kenyan Tech Business Incubator<br />

based in Nairobi that was launched two years<br />

ago. It’s goal is to lower the entry barriers for<br />

ICT entrepreneurs who want to start and scale<br />

their businesses in Kenya. Business Incubation<br />

provides entrepreneurs with access to critical<br />

information, education, contacts, capital and<br />

other resources crucial to the growth of the<br />

business.<br />

Ten tech ways to say ‘I love you’<br />

1. TWEET YOUR SWEET CLUES TO WHERE<br />

you should meet with Google Map links and<br />

send her Facebook gifts as a prelude to more<br />

geeky treats. Tech her out to a laser show<br />

and have her select whether she likes the Jelly<br />

Bean, Gingerbre<strong>ad</strong> or Ice Cream Sandwich<br />

as a Valentines gift. As the final move, show<br />

her a YouTube link to your love declaration<br />

and leave her a self-designed game where<br />

the hero rescues the damsel in distress from a<br />

world being overtaken by killer robots.<br />

2. Give your girl a bunch of roses, handm<strong>ad</strong>e<br />

via your 3D printer.<br />

3. For those struggling to find someone to<br />

tell those three special words, check out the<br />

Crazy Blind Date app, powered by developers<br />

OKCupid. Unlike other dating applications, it is<br />

more private and turns dating into a game. All<br />

the user gets prior to the date is a scrambled<br />

picture of their potential love interest.<br />

4. Will you embed with me?<br />

5. The free Valentine app for Windows<br />

Phone does the job for you with a gift section<br />

and 40 pre-designed romantic text messages.<br />

All you need to do is enter the right number.<br />

6. Poke them on Facebook.<br />

8. If there is no one to say ‘I love you’ to<br />

then check out new South African social network<br />

No Strings Attached. A “hookup” website<br />

which went live on January 4, it is free for the<br />

first two months after registration. The site is<br />

based on the premise that people do not want<br />

relationships, but rather a ‘one night-stand’.<br />

9. Rather than tell a person ‘I love you’,<br />

Where is Your Valentine allows people to label<br />

a place their one true love. Developer team<br />

Maptia believe “places are like people - that<br />

their sights, and sounds, and personalities can<br />

fill our lives with joy and wonder, that we can<br />

fall he<strong>ad</strong>s over heels in love with a place just<br />

as deeply as with a person, and that for just<br />

a few special places we form relationships or<br />

memories that last a lifetime”.<br />

10. Nestor Benavidez: Why not use a programming<br />

language to say ‘I love you’?:<br />

a) Java comment<br />

/* I love you */<br />

b) Ruby times loop<br />

1000000.times do<br />

puts “I love you”<br />

end<br />

c) Java while loop (infinite)<br />

while (true)<br />

{<br />

IloveYou++;<br />

}<br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech <strong>13</strong><br />

UPDATE


WHAT’S NEW<br />

gADgETS, TECHNOLOgY<br />

14<br />

BlackBerry’s<br />

Z10 Smartphone<br />

BLACKBERRY Z10 ISN’T JUST<br />

another new smartphone. It’s a<br />

symbol of redemption, the net<br />

result of the efforts of thousands<br />

working to salvage one of the most<br />

famous brands in the history of<br />

mobile technology. For the first<br />

time in years, “the new BlackBerry”<br />

isn’t just some repackaged business<br />

phone; it’s an iconic flagship on<br />

which rests the fate of the company<br />

that now shares its name.<br />

“We h<strong>ad</strong> to make a serious<br />

decision,” BlackBerry CEO Thorsten<br />

Heins said at the coming-out party<br />

for its new smartphones; “<strong>ad</strong>opt<br />

someone else’s platform, or build a<br />

new one from the ground up. We<br />

decided to go it alone.”<br />

It’s almost easier to ask “what<br />

changes weren’t m<strong>ad</strong>e?” This is a<br />

ground-up overhaul for BlackBerry,<br />

and they’re hedging the entire<br />

company on the success of this<br />

new platform. Among some<br />

improvements:<br />

•<br />

The Z10’s hardware is a giant<br />

step forward. It packs a 1.5<br />

GHz dual-core Snapdragon S4<br />

CPU, 4.2-inch HD display, 2 GB<br />

THE PROTOTYPE PANASONIC 4K 20-inch tablet<br />

premiered at CES 20<strong>13</strong> in Las Vegas. But it won’<br />

remain a prototype for much longer. Yup, this megasize,<br />

ultra HD tablet is he<strong>ad</strong>ing to the shelves later in<br />

the year.<br />

Aimed at the pro market, the giganta-tab - which<br />

doesn’t have an official name or price point as yet<br />

- packs in a 3840 x 2560 pixel resolution across its<br />

20-inch LED-backlit surface. But it doesn’t <strong>ad</strong>d on the<br />

pounds. Weighing in at around 2.2kgs, it feels really<br />

light considering its sheer scale.<br />

Tucked in to the trim body is an Intel Core i5<br />

1.8Ghz processor with Nvidia GeForce graphics and<br />

16GB of RAM and a 128GB SSD for storage. We h<strong>ad</strong><br />

a play with the Windows 8 touchscreen and all that<br />

power sure does deliver the heat - literally; the rear of<br />

the tablet felt very warm to the touch when rested on<br />

the one hand.<br />

The touchscreen felt generally responsive and we<br />

even h<strong>ad</strong> a play with an optional stylus that responded<br />

much like a normal pen. Writing, scribbling - it was<br />

easy to <strong>ad</strong>d notes over architectural drawings.<br />

Visually, too, the 4K tablet with its relatively slight<br />

bezel is all about the visuals. Flicking through a gallery<br />

•<br />

•<br />

•<br />

of RAM, a 1,800 mAh battery,<br />

and 4G LTE connectivity (in<br />

most markets). The hardware<br />

itself is well-designed, and<br />

still retains a corporate look<br />

and feel for those legacy<br />

BlackBerry users.<br />

The camera is improved<br />

and offers new features like<br />

TimeShift, which allows you<br />

to take multiple pictures and<br />

choose the best face(s) - all<br />

without modifying the existing<br />

picture.<br />

The on-screen keyboard is<br />

a huge improvement from<br />

the Storm days, with fantastic<br />

prediction software.<br />

BlackBerry 10 exudes a far<br />

more modern feel, though the<br />

exact gestures will take some<br />

time to get used to. The<br />

personalization isn’t quite to<br />

par with other OSes on the<br />

market, and the file system<br />

needs some work.<br />

It’s new! For those fatigued with<br />

Android, iOS, and Windows Phone,<br />

this could be a device to turn<br />

to.<br />

of Lumix camera images the resolution and bright<br />

panel really shows its worth.<br />

How much, exactly, that will be worth we’re yet to<br />

hear. Don’t expect this tablet to be a budget buy by<br />

any means, but we’re impressed with what’s on ground<br />

so far.<br />

Google’s Touchscreen Laptop<br />

The Chrome Pixel<br />

GOOGLE unveiled a groundbreaking<br />

new Chromebook laptop — one with<br />

touchscreen capability,<br />

powerful chipset<br />

and an extremely<br />

high-resolution<br />

display.<br />

The Chromebook<br />

Pixel, available for<br />

order on the Google Play<br />

store and shipping in April,<br />

features a 12.85-inch touchsensitive<br />

Gorilla Glass screen.<br />

The resolution is 4.3 million pixels,<br />

which<br />

works<br />

out to<br />

239<br />

pixels per<br />

inch. (The average Windows<br />

laptop has about half that; technically, it also<br />

beats the Macbook Retina.)<br />

The Pixel will come in two versions, both<br />

boasting an Intel Core i5 processor. The<br />

basic model is Wi-Fi only; a more expensive<br />

model has the ability to connect to Verizon’s<br />

superfast LTE network. Google claims a battery<br />

life of five hours on the device, which has<br />

QuickOffice built into the browser and an<br />

SD card slot for automatic photo uplo<strong>ad</strong>s to<br />

Google+. Those features can also be used<br />

offline<br />

(uplo<strong>ad</strong>s queued for<br />

later, of course).<br />

The price, however, is relatively steep:<br />

$1,299 for the Wi-Fi only version, $1,449 for<br />

the LTE model.<br />

Google was careful to emphasize that the<br />

Pixel isn’t for everyone. “This is for power users<br />

who live in the cloud,” Senior Vice President of<br />

Chrome Sundar Pichai repeatedly told a select<br />

group of journalists at a low-key launch event<br />

in San Francisco.<br />

Having a touchscreen doesn’t mean that<br />

Google plans to integrate its mobile OS,<br />

Android, into the device. But Pichai hoped<br />

web developers would start making their<br />

interfaces touch-sensitive — so that content<br />

on the device would be indistinguishable from<br />

Android.<br />

“Touch is here to stay, and I’m pretty sure<br />

every laptop will have touch in the future,”<br />

Pichai said. “Using a laptop with touch seems<br />

strange at first, but your day-to-day browser<br />

experience starts changing. In our tests,<br />

users started replacing the touchp<strong>ad</strong> pretty<br />

quickly.”<br />

The aluminum-coated Pixel was designed<br />

and built by<br />

Google, with help from<br />

other unnamed PC manufacturers. Plenty of<br />

thought appears to have gone into the design:<br />

For example, there’s an extra laser microphone<br />

under the keyboard, complementing the two<br />

mics next to the camera, allowing the software<br />

to cancel out any noise you might make while<br />

typing on a video conference.<br />

“Our goal was to have the hardware<br />

disappear,” Pichai <strong>ad</strong>ded.<br />

Panasonic 4K 20-inch tablet New Samsung Refrigerator<br />

Has Soda Stream Built In<br />

We’ve seen some pretty snazzy high tech<br />

refrigerators lately, but a fridge that has a<br />

sparkling water dispenser? That takes the<br />

cake.<br />

Samsung has announced that its new 36”<br />

four-door refrigerator has the industry’s firstever<br />

automatic sparkling water dispenser.<br />

It’s powered by SodaStream, so you can get<br />

cold, bubbly water anytime of the day or<br />

night. The filtered sparkling water will come<br />

through the dispenser on the fridge door<br />

that alre<strong>ad</strong>y delivers water and ice.<br />

The sparkling water dispenser uses a<br />

standard SodaStream 60L CO2 cylinder<br />

which is concealed inside the left refrigerator<br />

door. That way it’s easy to get to when you<br />

need to change it.<br />

Kevin Dexter, senior vice president of<br />

home appliances sales and marketing for<br />

Samsung Electronics America, said, “By<br />

joining forces with SodaStream, we are able<br />

to offer our consumers something never<br />

before seen on a refrigerator and bring a<br />

new experience to the kitchen.”<br />

All this fizz comes with a price.<br />

The Samsung Refrigerator with sparkling<br />

water dispenser will be available in the U.S. in<br />

April 20<strong>13</strong> for around $3899.<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

WHAT’S NEW 15


COVER STORY<br />

16<br />

Inside East<br />

Africa’s Biggest<br />

Co-working<br />

Spaces<br />

“Hubs” are all over the place these days. And if you look closely,<br />

it means there’s one universal problem: how to turn techies into<br />

entreprenuers. So this article, part of which is from a report from<br />

a research that used iHub (Nairobi) as a case study, seeks to tell<br />

us how the business of coding is turning into real business!<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

COVER STORY 17


COVER STORY<br />

18<br />

DOWN TO BUSINESS<br />

As fibre optic cables continue to lay the<br />

foundations for a new era of African innovation,<br />

the continent is undergoing a dramatic “techhub<br />

boom”. There are now more than 50 tech<br />

hubs, labs, incubators and accelerators across<br />

Africa, with a new one springing up nearly<br />

every two weeks.<br />

These hubs portray a very different Africa<br />

to the one often seen in the media and attract<br />

creative, young tech gr<strong>ad</strong>uates who come in<br />

search of opportunity. In most cities, these<br />

spaces offer students, programmers, developers,<br />

entrepreneurs, creative, investors and techies a<br />

place to work, network and create for the first<br />

time.<br />

As these spaces become the nerve centres<br />

for the tech community, they also become<br />

critical international touch-points for those<br />

seeking to engage in technology and business in<br />

Africa. They are the new points of exchange for<br />

long-term expatriates and short-term visitors<br />

looking to identify trends, find local talent, and<br />

catch the African wave of innovation.<br />

AS<br />

part of a year-long<br />

study on various ICT<br />

Hubs across Africa,<br />

the iHub Research<br />

conducted a 3-month<br />

study to understand the iHub model, its<br />

members and how the iHub impacts the<br />

individual members. The study builds on<br />

surveys with the 7,011 total members and<br />

interviews with various stakeholders.<br />

This research aimed to understand the<br />

impact of the ICT Hubs to entrepreneurs.<br />

An ICT hub is a space where technologists<br />

congregate to bounce ideas around, network,<br />

work, program and design to bring their ideas<br />

to fruition. The first ICT Hub of the 15 hubs<br />

to be profiled within this study series is iHub,<br />

Nairobi’s innovation Hub for the Technology<br />

Community. The study found that 100% of<br />

the entrepreneurs appreciate the iHub space<br />

as it has been a conducive and innovative<br />

co-working space that drives continuous<br />

networking through the events, community<br />

meetups that le<strong>ad</strong>s to collaboration and<br />

partnerships, sharing skills and knowledge<br />

through teamwork among others. This is likely<br />

because most of these talented entrepreneurs<br />

having gr<strong>ad</strong>uated with no formal job<br />

opportunities, have h<strong>ad</strong> their talents and<br />

skills nurtured and housed under these hubs.<br />

Overall, the entrepreneurs believe that the<br />

iHub can further sustain this co-working spirit<br />

by building more capacity through communal<br />

projects and active virtual member interaction<br />

among others.<br />

ABOUT IHUB<br />

For years, technological innovations were<br />

limited to universities and to a select few<br />

ambitious souls. In the span of two to<br />

three years, however, the innovation scene<br />

in Kenya has greatly expanded thanks to<br />

careful planning and a push for a robust<br />

telecommunications infrastructure and highcapacity<br />

International gateways. At the front<br />

line, pushing for this progress has been the<br />

Kenya ICT Board.<br />

The Kenya ICT Board aims to accelerate the<br />

momentum of the ICT sector in the country.<br />

Dr. Bitange Ndemo, the Permanent<br />

Secretary in the Ministry of Information and<br />

Communications has conceptualized a plan<br />

to see ICT contribute twenty-five percent to<br />

the country’s gross domestic product (GDP) –<br />

which would out<strong>strip</strong> agriculture’s contribution<br />

to GDP in the country (ICT Procurement 2012).<br />

The Kenyan government also plans to set up<br />

a steering committee to oversee the country’s<br />

transition to a “digital nation,” providing<br />

support to entrepreneurs looking to start their<br />

own businesses.<br />

There is huge untapped talent of young and<br />

upcoming tech innovators who are building<br />

great innovations (Vision 2030 Report Kenya).<br />

Hubs such as iHub are being viewed by many<br />

as a means of nurturing talent and providing<br />

youth employment for gr<strong>ad</strong>uates. It is<br />

therefore important to understand what makes<br />

these Hubs/Labs successful and their impact<br />

to the tech community of entrepreneurs.<br />

This understanding is recommended for the<br />

successful implementation of ICT Hubs.<br />

A recent article written on ‘Silicon Valley<br />

of the World’ by IBM SmartCamp, that<br />

examines the world’s up-and-coming tech<br />

communities – from Germany to Mexico<br />

to Indonesia and more – compare them<br />

on a number of different factors, including<br />

entrepreneurial mindset, access to capital and<br />

general strengths and weaknesses shows that<br />

the global entrepreneurship index is at 2.49:<br />

Kenya is at 2.63, second only to Nigeria at 2.7<br />

in Africa among others like the US at 2.8.<br />

This number clearly depicts the great<br />

potential for Kenya to become a globally<br />

recognized ICT center and more so, an<br />

environment for nurturing entrepreneurs<br />

talent to a higher level. Entrepreneurship<br />

is becoming widely recognized for its<br />

role in economic growth through youth<br />

employment to solve problems that improve<br />

the living standards of the community to<br />

enhance a common goal hence need for<br />

more research to be done on tech hubs to<br />

understand the implementation of the models<br />

and entrepreneurs to ensure a sustainable<br />

SOCIAL SPACE: The hubs are not just about work. They also act as focal<br />

point for the tech community to come together, learn and, of course party.<br />

approach in the making.<br />

As part of a year-long study on various<br />

ICT Hubs across Africa, the iHub Research<br />

conducted a 3-month study to understand the<br />

iHub model, its members and how the iHub<br />

impacts the individual members. This report<br />

is the second phase of the first report in the<br />

series, after the first phase that examined the<br />

ICT Hubs model report of the iHub, which<br />

explains how the iHub and its management<br />

model works. The two reports are<br />

complementary to each other and together<br />

inform the re<strong>ad</strong>er of the various components<br />

of the iHub, how they are managed and<br />

how its management model impacts its<br />

entrepreneurs.<br />

To access the iHub Model report, go to<br />

http://bit.ly/JtonRl.<br />

Currently there are 7,011 total members in the<br />

iHub in all membership tiers. 5,915 (84%) are<br />

male and 1,096 (16%) are female.<br />

The noticeably large gap in male and<br />

female members of the iHub reflects a larger<br />

countrywide and global trend. The gender<br />

gap in technology remains very real across<br />

the world, including in Kenya. Perhaps the gap<br />

exists because women view computer science<br />

as a subject for men, or have not developed<br />

skills in the field because they have not been<br />

exposed to the subject matter or have been<br />

discouraged by family and friends. Despite the<br />

many possible analogies why there are fewer<br />

women in the computer science field, there is<br />

enormous potential for maximizing the growth<br />

of technology through increasing the number<br />

and quality of women in technology with<br />

initiatives such as Akirachix among others that<br />

are springing up from the iHub.<br />

HOW IHUB STARTED<br />

iHub was started as part of the Ushahidi<br />

strategy. Erik Hersman, founder of iHub, and<br />

a group of young developers, volunteers and<br />

journalists who were passionate and energetic<br />

about technology assisted in developing the<br />

Ushahidi platform for the global community.<br />

Due to space limitation, the developers<br />

were forced to meet in co_ee shops and<br />

restaurants that h<strong>ad</strong> limited WiFi connection.<br />

These meeting places h<strong>ad</strong> a couple of<br />

challenges.<br />

It was expensive for the members to work<br />

from there, as they h<strong>ad</strong> to buy something to<br />

either eat or drink as they worked from places<br />

like Java House and Dorman’s.<br />

There were also many distractions that<br />

arose from the restaurants.<br />

It was then that, Erik Hersman, some of<br />

the <strong>ad</strong>visors, and Jessica Colaço, the initial<br />

iHub Manager; gave birth to the iHub—at<br />

the time, just a bare concrete space with a<br />

few chairs, a table, and a router flickering<br />

in the background. The original team sat<br />

and thought of how they would be able to<br />

accommodate thousands of techies in Nairobi<br />

in that space and breathe life into the space<br />

and the community. “We were looking for<br />

techies who were doers and not talkers. The<br />

techies therefore h<strong>ad</strong> to undergo a vetting<br />

process and fit within a certain structure,” says<br />

Jessica Colaco. “We then decided to come up<br />

with a membership structure to accommodate<br />

the physical and virtual techies of Nairobi and<br />

Kenya,” she continues.<br />

Erik started jotting the structure that the<br />

iHub would <strong>ad</strong>opt on a piece of paper. White<br />

members – these are the ‘virtual’, green<br />

members – those who can physically access<br />

the space, red members - physical members<br />

with a semi-permanent desk space, and black<br />

members - the iHub management team that<br />

assists in daily management and operations.<br />

All of these members came together to<br />

make the iHub space a reality. It was only later<br />

that the founding team realized that they h<strong>ad</strong><br />

picked the colors of the Kenyan flag for the<br />

membership structure.<br />

The piece of paper, which h<strong>ad</strong> the details of<br />

the membership structure, was then used to<br />

develop wireframes and mockups to be used<br />

to build the iHub membership system.<br />

These were further refined to a functional<br />

website by a volunteer web team, led by<br />

Joshua Musua, the webmaster for iHub.<br />

Challenges faced by members as they run<br />

their businesses<br />

The entrepreneurs have also faced<br />

challenges either as startups or freelancers<br />

Inside kLab, Kigali<br />

Expectations while joining kLab<br />

When coming to kLab, there is one thing in mind, a space to think and collaborate. My<br />

expectation in the space was to find people that could work within our startup company<br />

Zilencio Creativo’s project and bring it to life. Coming from a technical background with a<br />

passion for branding I needed people with programming skills to team up with so that we<br />

harness our efforts and create an impactful product.<br />

kLab environment and culture<br />

kLab is a serene environment for developers, IT enthusiasts and interested parties of a growing<br />

ICT community in Rwanda fostering intellect and entrepreneurial spirit. “The space gives<br />

one a peace of mind to work, providing a professional space to engage with other tenants and<br />

experienced mentors” says Ara.<br />

kLab brings like-minded innovators together and give them the resources they need<br />

to explore their ideas, learn from each other, and develop innovative solutions. kLab is<br />

a technology space enabling ambitious entrepreneurs come together and develop their<br />

trailblazing ideas into successful businesses.<br />

Opportunities and exposure at kLab<br />

Ara’s startup company, Zilencio Creativo emerged as the 2012 finalist for the Startup World<br />

competition in Kigali. “As we prepare ourselves to travel to Sillicon Valley to compete globally,<br />

we are working hard on our winning crowdfunding project prototype” says Ara. My company<br />

was also selected to be part of local ICT companies that went to showcase their products at this<br />

year’s ITU Telecom World in Dubai, with this our team considers this opportunity and award<br />

possible only by the exposure provided by kLab.<br />

With people you create experiences; kLab is such a space to provide you with both an<br />

experience and a community to engage with. For any technology person out there, for<br />

any person who has an idea that can get into the ICT field, I recommend to join the kLab<br />

community.<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

COVER STORY 19


COVER STORY<br />

20<br />

DOWN TO BUSINESS<br />

as they run their businesses. Some of the<br />

key challenges that the researchers identified<br />

include but not limited to:<br />

1. Funding<br />

Many of the entrepreneurs either have<br />

no access to enough capital to grow their<br />

business in terms of scaling up their products<br />

and their team capacity, hence many of<br />

them do not end up focusing on their core<br />

business, but are required to have free-lance<br />

side projects in order to generate revenue<br />

to sustain the business. Without appropriate<br />

financing, the inevitable result is a significant<br />

slowdown in the business development<br />

process, which may ultimately jeopardize<br />

chances of success.<br />

2. Sustained Growth<br />

With today’s increased market competition<br />

and change of technologies, requires that<br />

the entrepreneurs need to constantly revise<br />

their innovation strategy by continuously<br />

developing and organizing capabilities<br />

within companies and translating them into<br />

competitive <strong>ad</strong>vantages and profits. The<br />

challenge faced by most of these startups is<br />

the ability to continuously innovate to cultivate<br />

the right environment where their innovations<br />

can be repeated and satisfy the needs of the<br />

existing customers.<br />

3. The right mentors<br />

Only a few of the entrepreneurs are lucky<br />

enough to have the support of mentors. Many<br />

of these entrepreneurs are still searching for<br />

the right mentors who can create time to<br />

continuously <strong>ad</strong>vise them and guide them<br />

through as they run their business. Mentors<br />

come in di_erent shape, size and forms, with<br />

their experience and diverse skills they can be<br />

able to strategically provide support that is<br />

necessary to the entrepreneurs in each stage<br />

of their business. Finding a good mentor and<br />

building a strong relationship takes time. It<br />

takes a strong time investment on both sides<br />

in order to make it a meaningful and valuable<br />

relationship.<br />

4. Pricing their products<br />

Q&A: Outbox Hub’s Richard Zulu<br />

TELL US ABOUT OUTBOx<br />

Outbox is a technology incubation, collaboration<br />

space, and innovation hub for techies – as well<br />

as other people in the technology space to meet<br />

and create ideas that they can later on turn<br />

into sustainable businesses that utilize a mobile<br />

phone and the internet.<br />

Those are the three aspects of Outbox. So,<br />

first of all, we focus on fostering technology<br />

entrepreneurship – which we do through the<br />

incubation of utmost 5 startups in our incubation<br />

program. We take these through business and<br />

technology training, thereby helping them<br />

become sustainable businesses.<br />

As far as Collaboration is concerned, we<br />

create a space where like-minded people can<br />

come together can co-create. You see, when<br />

businesses thrive, there’s also a possibility of<br />

inter-marketing, because of the various skills<br />

that these individuals have. All that boosts<br />

entrepreneurship. That’s done through the space,<br />

and also the kind of events that we hold.<br />

Our main focus is entrepreneurship, but not<br />

everybody is born to be an entrepreneur. Which<br />

brings me to our third aspect, Capacity Building.<br />

We engage with different groups in various<br />

events through which we equip them with skills<br />

we believe can empower them to perform better<br />

in their various fields. We hosted over 20 events<br />

last year alone.<br />

We’ve been able to work and take in three<br />

companies – startups – and last year one of<br />

them was able to obtain funding to help them<br />

set up.<br />

HOW SIGNIFICANT IS THE<br />

FUNDING?<br />

It’s very significant. Quite a lot.<br />

WHICH COMpANY IS THAT?<br />

Unfortunately, I can’t disclose.<br />

HOW DOeS OUTBOx BeNeFIT?<br />

At the end of the day, we want to have<br />

impact. Our current focus is to create<br />

sustainable businesses that drive relevance on<br />

the mobile and web. Having such milestones will<br />

encourage other people to embrace the kind of<br />

initiatives that we are trying to push out here – it<br />

le<strong>ad</strong>s us more to our final objective.<br />

HOW DO YOU SUSTAIN YOUR ACTIVITIeS?<br />

Outbox’s sustainability model is built around quite<br />

a number of things. First of all, Outbox provides<br />

the co-working space – a space that comes at a<br />

price. entrepreneurs pay to have access to the<br />

internet, access to our partner network – Google,<br />

Samsung, e.t.c - and access to our business<br />

support services.<br />

We also host a number of events – people rent<br />

the premises to host various events.<br />

Outbox is run as a business.<br />

BUT YOU HAVe pARTNeRS WHO ARe<br />

GIVING YOU SeeD FUNDING; HOW DO THeY<br />

BeNeFIT FROM YOUR ACTIVITIeS?<br />

Most of the partners we work with align with<br />

the objective of creating sustainable businesses,<br />

and that’s how we look out for our partners.<br />

Working with such an initiative helps them push<br />

their objectives as we achieve ours. Having all of<br />

us working together in the ecosystem will later<br />

on help us realize our goals.<br />

YOU’Ve HeARD OF THe LAW OF<br />

DIFFUSION OF INNOVATION? HOW DOeS<br />

THIS FIT INTO YOUR BUSINeSS pLAN?<br />

One thing we have realized is that it’s still a<br />

challenge for most of the people to understand<br />

what we do. When you talk of words like<br />

Innovation, collaboration – some people don’t<br />

quite understand what we do.<br />

Most of the people we have in this space are<br />

early <strong>ad</strong>opters – people who go out of their way<br />

to learn what it is that’s going on here.<br />

The kind of marketing we do is mainly<br />

through out-reach activities – universities and the<br />

like. Our approach to outreach is very targeted,<br />

and we have intentionally kept it that way.<br />

It is clear that 77% of the<br />

entrepreneurs we interviewed have clients<br />

for their business, but the question is are<br />

they proposing the right prices to them?<br />

How do they ensure they price their products<br />

sustainably and not ‘free’ model that will le<strong>ad</strong><br />

their companies to bankruptcy? On the other<br />

hand, if the entrepreneurs are working on<br />

social products, do they have enough support<br />

from funders to scale their products? Most of<br />

the entrepreneurs do not consider coming<br />

up with a pricing strategy for their products,<br />

basing their pricing on tiers depending on<br />

their target users.<br />

5. Competition<br />

The entrepreneurs competing against larger<br />

organizations in the market such as Google,<br />

and Safaricom, among others, sometimes<br />

find that their ideas end up being ‘stolen’<br />

and implemented by these corporates. This<br />

le<strong>ad</strong>s to the entrepreneurs having a negative<br />

mindset and lack of confidence in their ideas.<br />

They end up having excuses, fears that<br />

paralyze them from achieving their dream.<br />

6. Unverified Assumptions<br />

The nexus of tech startup failures are false<br />

assumptions, wild guesses, conjecture and<br />

generalized self-deception. Extrapolating<br />

anomalies are in the same category as false<br />

assumptions. Most of the entrepreneurs do<br />

not consider doing market research before or<br />

as they develop their projects to understand<br />

their market and if their product is viable.<br />

They focus on the technical aspect and forget<br />

the most important thing that clients want to<br />

know —how does this technology, product or<br />

service <strong>ad</strong>d value to me? How does it solve<br />

my problem?<br />

WHITE MEMBERS<br />

Richard zulu,<br />

Program Director<br />

- Outbox Uganda<br />

As earlier mentioned, the iHub has a<br />

population of 7,011 members. As it is<br />

impossible to have all of these members<br />

physically accessing the space, 96% of the<br />

entire iHub membership populations are<br />

white members (6,738 in number). The white<br />

members are basically an online community<br />

that attends occasionally or regularly the iHub<br />

events held in the physical space. These white<br />

members are constrained by various factors<br />

that do not allow them the option of being a<br />

red or green member as depicted in the figure<br />

below:<br />

RECOMMENDATIONS<br />

The key objectives of the research was to<br />

investigate what factors make up the ICT Hubs<br />

model and how the model itself impacts to<br />

the entrepreneurs in the space, that make<br />

them to actively continue to use the space. In<br />

the coming months, the study will also focus<br />

on other initiatives in the eco-system such<br />

as innovations at high level of education and<br />

upcoming local tech companies’ in order to<br />

measure the innovation in the country, which<br />

will then be replicated to other hubs, and<br />

initiatives around Africa.<br />

In the long run the research will aim to do<br />

a comparative study to identify what unique<br />

factors came out of the different hubs that<br />

make them successful creating an impaction<br />

on the economy’s development that is<br />

<strong>ad</strong>option of new technologies and innovations<br />

of employment le<strong>ad</strong>ing to improvement in the<br />

living standards.<br />

RECOMMENDATIONS FOR IHUB<br />

AND OTHER ICT HUBS:<br />

When asked what changes members<br />

would like to see at the iHub this year<br />

(2012), members shared the following<br />

recommendations:<br />

Events to Build Pitching and Presentation<br />

Skills<br />

30% (n=6) of the interviewed members<br />

suggested that the iHub management should<br />

train people on pitching their products.<br />

The researchers believe that eff¬ecting<br />

platforms such as 5-minute presentations<br />

with the overall community, and community<br />

consulting projects will greatly accelerate<br />

the development of members’ skills through<br />

sharing knowledge, above all building<br />

members’ confidence to become better in<br />

presentation skills.<br />

Creating Opportunities For Funding<br />

the iHub management to start marketing startups<br />

that have a good product to potential<br />

investors and clients, also creating formal<br />

networks for seed funding opportunities.<br />

Finding relevant funding for startups has been<br />

a key challenge at their early stages (Capital<br />

Markets Authority of Kenya 2012), although<br />

some innovators and entrepreneurs have<br />

found avenues to get the funding they need<br />

through participating in pitching competitions<br />

such as IPO48, Pivot East, and Mobile Garage,<br />

among others.<br />

Hence there is a need for ICT Hubs to<br />

help start-ups look for necessary funding<br />

from a wide array of sources, such as using<br />

venture capitalist from their networks but also<br />

<strong>ad</strong>vocating for more local investors to start<br />

investing in making the country an IT hub. On<br />

the other hand, the entrepreneurs have to be<br />

serious about their businesses and execute to<br />

enhance minimal risks and an incentive for the<br />

investors to see the startup succeed; the better<br />

the startup does, the greater the Venture<br />

Capitalists’ return on investment.<br />

Diversity of Events<br />

This study revealed that there are some<br />

members who frequent the space often feel<br />

the iHub events are repetitive. Nevertheless,<br />

these responses are not reflective of all of the<br />

7,011-iHub members. The research suggests<br />

that iHub management not to eliminate the<br />

events that are currently taking place, but<br />

rather, have more diversified events, especially<br />

focused on business aspects of building a<br />

start-up. In <strong>ad</strong>dition, exploring other avenues<br />

of marketing the events may also help to bring<br />

new audience groups to the iHub events.<br />

Membership Turnover<br />

Having a 6-month assessment for green<br />

members to reapply for membership allows<br />

other members a chance to apply and<br />

enjoy the benefits of the iHub space. White<br />

members who are virtual should be given<br />

alternative options depending on their<br />

schedule, even if it means allowing them<br />

to visit the space and work for some hours<br />

to physically interact with the community.<br />

Nevertheless, the researchers believe having<br />

online forums and initiatives such as the online<br />

write board will be a remedy for physical<br />

engagement with the community.<br />

RECOMMENDATIONS FOR<br />

ENTREPRENEURS:<br />

Create a detailed financial model<br />

Members suggested that it would be good for<br />

Want to contribute to PC Tech Magazine?<br />

Contact us with a brief bio, and a link to your previous pieces<br />

editor@pctechmagazine.com<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

COVER STORY 21


SPECIAL<br />

22<br />

Bootstrapping–self-funding from one’s own savings such as<br />

pocket money, friends & relatives—is the most preferred option<br />

for funding a start-up because one does not end up spending a<br />

lot of time going hat-in-hand to investors and does not relinquish<br />

any control of their company. Entrepreneurs should ensure they<br />

have carefully planned their businesses in <strong>ad</strong>vance by creating a<br />

detailed financial model that projects their revenues accurately,<br />

estimating the company’s financial circumstances over the next<br />

2-3 years.<br />

ICT Hubs should also set up formal mechanisms to link<br />

entrepreneurs to potential capital opportunities through venture<br />

capitalists or funding to promote their own innovators.<br />

Create a strategic plan<br />

The challenge of most of the startups is to continuously innovate<br />

and cultivate an environment where innovations can be repeated<br />

and satisfy the needs of customers. This challenge can be<br />

<strong>ad</strong>dressed through a clear strategic plan where the entrepreneurs<br />

can continuously revise to always ensure they align with the<br />

changing needs of their users and changing technologies.<br />

Creating and implementing a clear strategy will not only set the<br />

company on a clearly articulated course to growth but also bring<br />

positive side effects like improving teamwork and boost morale.<br />

Find Appropriate Mentors<br />

No man is an island, and every entrepreneur needs guidance<br />

and a support network. While it is important to have a network<br />

of friends, collaborators, and connections from the community,<br />

it is equally important to have a mentor act as a steward for the<br />

startup. Mentors can assist a start-up think through the business<br />

idea, suggest ways to get funding, or provide the experience and<br />

contacts that a young business needs.<br />

Finding the right mentor is a hard task for entrepreneurs,<br />

something that the management of ICT Hubs can work out<br />

through their networks, compiling a reliable pool of mentors,<br />

which entrepreneurs can tap into for help.<br />

Plan your products accurately<br />

Entrepreneurs need to formulate a pricing strategy as they plan<br />

their business. A pricing strategy will help entrepreneurs to<br />

structure their prices based on their users. Entrepreneurs also<br />

need to seek <strong>ad</strong>vice from experts or mentors to <strong>ad</strong>vise if their<br />

pricing model makes sense. Finally, entrepreneurs must research<br />

the offering of their competitors and compare prices in order to<br />

remain competitive.<br />

Conduct Market Research to Test Your Assumptions<br />

New facts and circumstances can change the validity of any<br />

assumption previously held. S<strong>ad</strong>ly, the management of some<br />

tech start-ups continue to rely upon original assumptions, despite<br />

mounting results and financial evidence to the contrary. Verifying<br />

assumptions enables one to be certain that assumptions are valid<br />

and realistic. Verification can be done through market research.<br />

Running a start-up without market research as a key<br />

component in the business plan is like travelling down a highway<br />

with a blindfold on; Market research for start-ups is essential<br />

as the organization is at a sensitive stage in understanding the<br />

needs of their target market. Understanding one’s target market<br />

can be a benchmark in evaluating the success of a start-up and<br />

also to help start-ups validate their assumptions. Market research<br />

will guide entrepreneurs in making strategic business decisions,<br />

uncovering unmet customer needs, and in many cases, help to<br />

discover new ideas for products or services.<br />

Infographic continued from Page 7<br />

Next Issue: March 15, 20<strong>13</strong><br />

Want to contribute? Got a story?<br />

Send email to:<br />

editor@pctechmagazine.com<br />

De<strong>ad</strong>line: Friday March 10, 20<strong>13</strong><br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

SPECIAL 23


FEATURES<br />

24<br />

REPORTS, ANALYSIS<br />

10 things the comments section...<br />

...taught me<br />

about the Web<br />

AS WE<br />

HIT THE<br />

ROAD FOR<br />

ANOTHER<br />

YEAR,<br />

the pace<br />

of business<br />

may slow<br />

momentarily,<br />

making it a good<br />

time to take stock<br />

of your startup’s IT<br />

assets, spending and<br />

future plans. Inevitably, someone –<br />

maybe the chief financial officer, maybe an<br />

investor – will want to know how much the company<br />

spent on technology over the past year. In <strong>ad</strong>dition,<br />

there are tasks to complete now, in order to start fresh<br />

in the new year.<br />

Of all the challenges faced by those who put content<br />

online, the comments facility must be the most vexing<br />

one. (There’s even a Twitter account, @AvoidComments,<br />

which reminds followers not to re<strong>ad</strong> the comments,<br />

ever. Sample tweet: Whenever you see a smiling child,<br />

remember: she’s never re<strong>ad</strong> a comment in her life, and<br />

she’s doing just fine.)<br />

Many websites have experimented with reining in<br />

the b<strong>ad</strong> behaviour that predominates in a facility that<br />

offers a toxic combination of visibility and anonymity.<br />

Imposing standards all too often means sacrificing<br />

interaction, however. Recently, TechCrunch announced<br />

that it’s bringing its comments facility back; channelling<br />

comments via Facebook resulted in a precipitous dropoff<br />

in engagement, so now it’s trying LiveFyre.<br />

I usually don’t re<strong>ad</strong> the comments on one of the<br />

platforms I blog on, and haven’t for years. This is s<strong>ad</strong>,<br />

because I’ve always thought of blogging, unlike the<br />

opinion pieces or features I write, as a fundamentally<br />

social act. You write in the expectation that others<br />

will have a view on what you’ve written, and the text<br />

is created in the space between your post and the<br />

reactions to it.<br />

If I stopped re<strong>ad</strong>ing the comments, it’s because they<br />

became a strain on my sanity. To survive them, writers<br />

need<br />

to have<br />

thick skin, or<br />

be a masochist, or<br />

both, and I know of bloggers<br />

who stopped writing because they<br />

couldn’t handle the vitriol. Actually, I don’t<br />

know of anyone who can spend any time re<strong>ad</strong>ing the<br />

comments on some websites without wanting to stab<br />

themselves in the eye with a hot fork. But trolling and<br />

abusive comments are par for the course, so much<br />

so that serious research has been conducted into why<br />

people behave so b<strong>ad</strong>ly online.<br />

Researchers have found that that people online<br />

have lower levels of self control. (Oh yes, and spending<br />

too much time on Facebook makes you fat – the more<br />

people spent online, the more likely they were to<br />

engage in binge eating).<br />

In my years of blogging, I’ve learned a thing or two<br />

from the comments facility.<br />

1. There’s a kind of Kevin Bacon game going on<br />

In the Kevin Bacon game so popular in the 1990s, the<br />

challenge was to link any actor to Kevin Bacon. In the<br />

comments facility, the challenge is to see how long it will<br />

take for the comments on any post to devolve into a<br />

slanging match between – for want of a better term —<br />

liberals and conservatives.<br />

Take this report (http://www.independent.co.uk/<br />

news/world/americas/bound-beaten-and-robbedbackpackers-attacked-by-whipbrandishing-peruvianvillagers-in-savage-two-day-ordeal-8480069.html)<br />

from a UK news website on a group of American tourists<br />

attacked in Peru.<br />

The first comment takes a swipe at liberals and it<br />

goes downhill from there, becoming nothing more than<br />

an opportunity for Republicans to fling insults against<br />

Democrats, and vice versa. In South Africa, for<br />

example, all comments facilities ever somehow<br />

end up hosting rants against the ANC and/<br />

or apartheid and/or white privilege, whether<br />

or not the original post h<strong>ad</strong> anything to do<br />

with it. The situation is similar in countries with<br />

similarly torrid pasts.<br />

Which is why….<br />

2. If you want lots of comments, write<br />

about race and/or politics<br />

Around the world, hot button issues range<br />

from gun control to rape. Nothing fires up the<br />

comments facility like discussions about race.<br />

With over 88 000 views and 575 comments,<br />

this post generated far more interaction on<br />

blogging platform Thought Le<strong>ad</strong>er than any<br />

other in the history of the site. The recent FNB<br />

<strong>ad</strong> debacle effectively turned South Africa into<br />

a giant comments facility, with much ranting<br />

about the ANC on various news sites.<br />

Don’t write about race or politics unless you<br />

are very thick skinned or utterly convinced of<br />

the correctness of your views (I’ve learned the<br />

hard way).<br />

3. Abuse is nothing new<br />

The comments facility has just m<strong>ad</strong>e it easier<br />

for people who’d otherwise just rant around<br />

the dinner table, to articulate them in public.<br />

Back in 2004, re<strong>ad</strong>ers were forced to fax<br />

hatemail to the publisher of my satirical pieces<br />

about bitter expats; now all they need to do<br />

is post a comment. Fortunately, the comment<br />

sections on many sites are moderated so<br />

the abusive, <strong>ad</strong> hominem attacks on their<br />

bloggers are mostly filtered out. If I got to<br />

see the comments they didn’t let through, my<br />

insomnia would probably be worse than it<br />

alre<strong>ad</strong>y is.<br />

4. We’re talking a small number of<br />

people<br />

Editor of News24 (a division of emerging<br />

markets media giant Naspers) Jannie<br />

Momberg says about one percent of re<strong>ad</strong>ers<br />

comment, and of those, around 10% are<br />

abusive. “News24 comments” remains<br />

a byword for aggressively stupid, racist<br />

comments, but that’s not really fair because<br />

the same behaviour can be seen in the<br />

comments facilities of other news websites,<br />

too. In fact, the comments on a couple of<br />

recent pieces have been sane and reasonable<br />

for the most part.<br />

5. The same names crop up everywhere<br />

Spend any time re<strong>ad</strong>ing news or comment<br />

and you’ll spot the same familiar names and<br />

pseudonyms, banging the same drum they’ve<br />

been beating for years. Commenting must<br />

virtually be a full time job for some of them,<br />

and they never seem to get bored.<br />

6. Very few people actually re<strong>ad</strong> what<br />

they comment on<br />

This is what really grates me. If I go to the<br />

trouble of putting together an argument, the<br />

least I expect is for the re<strong>ad</strong>er to take in what<br />

I’ve actually written before commenting. S<strong>ad</strong>ly,<br />

the typical re<strong>ad</strong>er strategy seems to be: re<strong>ad</strong><br />

the he<strong>ad</strong>ing, scan through the body of the<br />

text, blurt out the first thing that comes to<br />

mind.<br />

Most popular columnists and bloggers have<br />

regular re<strong>ad</strong>ers who know them well, or think<br />

they know them well, so by the time the latter<br />

click on the link, they’ve alre<strong>ad</strong>y m<strong>ad</strong>e up their<br />

minds (familiarity, alas, breeds contempt — on<br />

both sides). They re<strong>ad</strong> what they think they<br />

see, then argue with their own projections.<br />

Much of the so-called debate in the comments<br />

facility is a form of ideological sh<strong>ad</strong>ow-boxing.<br />

7. Angry, abusive comments beget more<br />

angry, abusive comments<br />

Take any divisive topic – in this case, climate<br />

change. According to this study, the more<br />

abuse in the comments facility, the more<br />

it will inflame others who might otherwise<br />

have been reasonable. Study co-author<br />

Dietram Scheufele, a professor of science<br />

communication at the University of Wisconsin-<br />

M<strong>ad</strong>ison, pointed out that the comments<br />

m<strong>ad</strong>e what used to be a private act now more<br />

like “re<strong>ad</strong>ing the news article in the middle of<br />

the town square, with people screaming in my<br />

ear what I should believe about it.”<br />

8. There will be mansplaining<br />

Mansplaining is the practice of men telling<br />

women what she’s actually thinking because,<br />

poor thing, she’s misinformed. Because<br />

commenters don’t list their gender, it’s<br />

impossible to make a reliable assessment of<br />

whether men comment more than women,<br />

but my impression is that they do. Any female<br />

blogger who writes on a platform where<br />

there are many male re<strong>ad</strong>ers knows all about<br />

mansplaining.<br />

9. The real discussions often happen<br />

elsewhere.<br />

This is something that happened when<br />

TechCrunch shifted to a Facebook-based<br />

comment system. I’ve long held the view that if<br />

people really wanted to debate with bloggers<br />

in a civil manner, they can do it on Twitter or<br />

Facebook. Luckily, I haven’t h<strong>ad</strong> to deal with<br />

much trolling on either platform, and because<br />

there’s more immediacy — the blogger is<br />

there in person, not a disembodied name<br />

attached to words – it’s harder to be abusive.<br />

10. And yes, sometimes the comments<br />

are more interesting than the piece that<br />

inspired them<br />

Sometimes, the comments facility works as it<br />

should, bringing out viewpoints that actually<br />

<strong>ad</strong>d to an understanding of an issue. The<br />

comments on this post on a rather obscure<br />

subject are easier to re<strong>ad</strong> than the piece that<br />

triggered them.<br />

There are no <strong>ad</strong> hominem attacks, and each<br />

commenter seems to be genuinely interested<br />

in teasing apart a complex issue. But this is all<br />

too rare, and probably only happens when<br />

the vast majority of potential commenters are<br />

filtered out by the complexity of an issue.<br />

Recently, I changed my blogging strategy,<br />

writing slightly less contentious material that’s<br />

as much about seeing what responses I get<br />

as it is about putting my opinion out into the<br />

world. A meta post, if you like. As a result, I’ve<br />

started re<strong>ad</strong>ing the comments again — but I’ll<br />

probably stop, because it’s still too depressing:<br />

the same crowd are still saying the same things<br />

they did five years ago. Not that it matters,<br />

really.<br />

The commenters don’t really need me to<br />

participate, because once the post is up, it’s<br />

not mine anymore, but theirs. It takes on a life<br />

of its own, and I am happy to let it go.<br />

Here’s the ultimate irony: if the comments<br />

facility teaches you anything, it’s that if you’re<br />

going to be a writer, and put yourself at the<br />

mercy of others online, you have to learn<br />

to filter out most your re<strong>ad</strong>ers or you’ll stop<br />

writing altogether. As that Twitter account<br />

reminds us: “The next time you’re thinking of<br />

re<strong>ad</strong>ing the comments, do a Google image<br />

search for ‘fluffy puppies’ inste<strong>ad</strong>.”<br />

Have you checked out...<br />

www.directory.pctechmag.com?<br />

— Written by Sarah Britten and first<br />

published by Memeburn.com<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

FEATURES 25


FEATURES<br />

26<br />

USEFUL WEBSITES<br />

Market Analysis:<br />

Mobile Payments In Emerging Nations<br />

Pankaj Kumar is the<br />

chief marketing<br />

officer at F1Soft<br />

International<br />

and specializes<br />

in Strategic<br />

Partnership,<br />

International<br />

marketing,<br />

Global Business<br />

management and<br />

mobile Payments.<br />

He contributes to<br />

Pc Tech’s mobile<br />

Payments section.<br />

Follow Pankaj on<br />

Twitter:<br />

@kumarpankaj1985<br />

BEING A MOBILE PAYMENT PROFESSIONAL, I HAVE always<br />

been curious to identify the elements influencing mobile<br />

commerce business in emerging nations. The growing<br />

ubiquity of mobile phone users proves the potential<br />

of mobile money & extension of services to unbanked<br />

population. Above all, most of the financial institutions,<br />

telcos, vendors are also endorsing mobile payments,<br />

however, the challenges are inevitable. In the recent news,<br />

International Finance Corporation, a member of World<br />

Bank Group is supporting Nepal to develop an efficient<br />

national payment system to regulate all electronic payment<br />

mechanism in the country. This should be a great initiative<br />

to develop the infrastructure in the country in order to<br />

promote mobile money, nevertheless, there are other<br />

segments as well where we should emphasis on.<br />

In spite of last few years of chaos in Nepal, competition<br />

among the financial institutions, money remittances hubs<br />

and telcos has proliferated. There are evidences of financial<br />

institutions actively serving the populations in remote areas<br />

for money remittances while telcos are engaged to expand<br />

the telecommunication spectrum to serve every corner<br />

of nation. Integration of telecommunication system with<br />

financial institutions will be surely urging a revolutionary<br />

changes to the tr<strong>ad</strong>itional banking in remote areas. As of<br />

now, mobile phone users practice sending air time transfer<br />

to another phone, similarly a basic phone can also be<br />

used to manage financial arrangements. As a progression,<br />

very soon we will be using our air time for shopping. The<br />

gigantic volume of remittance has also been the major<br />

factor to induce the technological <strong>ad</strong>vancement in the<br />

region.<br />

In any region across the world, the business model<br />

for mobile money could be Bank driven, Telco driven or<br />

Parternship Led. The regulatory frameworks and AML<br />

compliance need to be well taken care of before jumping<br />

into this space, which eventually strectes a barrier to any<br />

privately held company to start mobile money remittances.<br />

However, if a new entrant follow a partnership led model<br />

with a le<strong>ad</strong>ing bank or telco they can easily spre<strong>ad</strong> to mass<br />

and thereby truncate the market size. Considering two<br />

or three players in the mobile payments space serving a<br />

small region, It becomes mandatory to share merchant<br />

and payout agents. It justifies that even if the consumers<br />

are reluctant to use the mobile money, the threat of new<br />

entrants exist.<br />

Currently the mobile phone is primarily used for voice<br />

or data but taking it to next level in under developed<br />

countries has been a challenge. There are money<br />

remittance hub serving unbanked economies in remote<br />

areas through payout agents thus discouraging the people<br />

to use their mobile phone as a wallet. As long as these big<br />

players are providing substitutes to the services, people will<br />

stick to the tr<strong>ad</strong>itional approach.<br />

Statistics reveals that, Nepal and Bangl<strong>ad</strong>esh come<br />

in the top 5 countries to receive remittances, however<br />

a proficient channel of remittance is still absent in the<br />

region. The investment cost to build a seamless receiving<br />

end for this remittance volume also introduces barrier to<br />

the development. The experience has also claimed that<br />

it’s challenging to any one entity to fulfill all of buyer of<br />

remittances services.<br />

We comprehend that all the risk involved in retail<br />

payments will exist in mobile space as well. However,<br />

winning the confidence of customers should be the priority<br />

on top. In spite of several fraud cases exist in credit card<br />

payment, financial institutions succeeded to obtain the<br />

assurance of consumers. In the same way, we can create<br />

a trusting relationship and convince them to encourage<br />

mobile payments in the nation.<br />

As a conclusion, I would say that we have impressions<br />

of live case studies of mobile payments in developed<br />

countries and we completely understand the future<br />

and benefits of mobile payments. However, educating<br />

user about m-commerce, unified receiving channel<br />

for remittance, existing tr<strong>ad</strong>itional way of banking and<br />

securities should be <strong>ad</strong>dressed on priority basis, otherwise<br />

the vision of mobile money will only be fragmentary.<br />

Reviews?<br />

Checkout... and make an informed decision before<br />

you buy next time!<br />

www.reviews.pctechmag.com<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

FEATURES <strong>27</strong>


FEATURES<br />

28<br />

The Dark SiDe of<br />

Computers<br />

Technology may have enriched all our lives, but it has also been used for<br />

nefarious purposes by unscrupulous governments, criminals and terrorists. In<br />

this feature, we try to explain how computers have helped to perpetrate evil<br />

around the world.<br />

During the six dec<strong>ad</strong>es or so that<br />

they’ve been around, computers<br />

have brought dramatic changes to<br />

our understanding of the world and<br />

the ways in which we work and communicate.<br />

The technology has generated our homes,<br />

cars and pockets, driving changes in our<br />

culture, behavior and governance.<br />

Most of this change has been for the good:<br />

we now communicate more easily, can work<br />

more efficiently and are better entertained<br />

than ever before. However, the foundations of<br />

today’s technology were built amid the darker<br />

motives and necessities of the Second World<br />

War and the Cold War that followed, and<br />

the history of computing contains troubling<br />

examples of the pursuit of power and profit at<br />

the expense of people’s lives.<br />

Computers have been used for evil<br />

deeds, and through bugs or negligence have<br />

accidentally committed dre<strong>ad</strong>ful acts, but the<br />

ongoing development of artificial intelligence<br />

and autonomous systems raises an even<br />

more frightening prospect. Could ever more<br />

intelligent computers be used for ever greater<br />

evil, or could they leap above the humanity<br />

that created them and, living up to the darkest<br />

imaginings of science fiction, themselves<br />

become evil?<br />

Could technological evolution reach a<br />

tipping point beyond which humans, when it<br />

comes to survival, are no longer ‘the fittest’?<br />

GOING BALLISTIC<br />

Computer-based technologies such as GPS<br />

and digital X-rays help to protect and save<br />

lives everyday, but modern computers are<br />

built upon <strong>ad</strong>vances undertaken in darker<br />

times. The origins of computing were<br />

innocent enough, with some of the earliest<br />

programmable machines developed by<br />

Joseph Marie Jacquard to automate looms<br />

in the textile industry in the 1800s. The first<br />

theoretical computer, Charles Babbage’s<br />

‘analytical engine’, was originally devised<br />

simply to remove human errors from the<br />

mathematical tables available in the early 19th<br />

century.<br />

The motivations for these inventions may<br />

have been innocent, but the computer as<br />

we understand it today wasn’t fully imagined<br />

until the years le<strong>ad</strong>ing up to World War II,<br />

and it was the war that provided the money,<br />

facilities and impetus for the theories of<br />

computer scientists such as Alan Turing<br />

to be m<strong>ad</strong>e real. It was the need among<br />

the analysts at Bletchley Park for massive<br />

computing power that drove development,<br />

first of the electromechanical ‘Bombe’ and<br />

‘Heath Robinson’ machines and subsequently<br />

of Colossus – the first programmable, digital,<br />

electronic computer.<br />

Being the product of a war effort doesn’t<br />

automatically render a computer ‘evil’,<br />

of course. The Colossus computers were<br />

famously used to mount ‘brute force’ attacks<br />

on the Lorenz cipher used by the German<br />

High Command, work that helped to save<br />

Allied lives and almost certainly shortened<br />

the duration of the war in Europe, even if Axis<br />

soldiers, and inevitably civilians, were killed in<br />

actions taken on the basis of the intelligence.<br />

Things are muddier, though, for other war-era<br />

computers, such as ENIAC.<br />

ENIAC, a huge electronic ‘brain’ weighing<br />

more than <strong>27</strong> tonnes and containing<br />

more than 17,000 thermionic valves, was<br />

commissioned and funded by the United<br />

States Army and developed in secret at<br />

the University of Pennsylvania from 1943.<br />

Operational from 1946 until 1955, ENIAC was<br />

a ballistics computer, designed specifically to<br />

calculate artillery firing tables.<br />

The very reason for its existence was to<br />

improve the accuracy and de<strong>ad</strong>liness of<br />

the army’s firepower, but while still under<br />

development it came to the attention of the<br />

mathematician John von Neumann, then<br />

working in the Manhattan Project on the<br />

development of the hydrogen bomb. The<br />

computer’s first test run was computations for<br />

the bomb. It’s hard to say whether ENIAC was<br />

instrumental, but the lethality of mankind’s<br />

arsenal has certainly been improved thanks to<br />

computers.<br />

DARK HISTORY<br />

While the building of weapons (nuclear<br />

or otherwise) is a divisive debate, often<br />

dependent on who and why they are<br />

deployed, other examples of computer use<br />

seem harder to defend. In the 2001 book IBM<br />

and the Holocaust, US journalist Edwin Black<br />

alleges that IBM and its German subsidiary<br />

Dehomag developed and continued business<br />

relationships with the Nazi regime from Hitler’s<br />

1933 rise to power until the 1945 downfall of<br />

the Third Reich.<br />

In particular, Black looks at the role of<br />

Hollerith punchcard machines, supplied<br />

by Dehomag, in the identification and<br />

cataloguing of Jews in the 1930s, and of IBM<br />

technology in the organisation of railro<strong>ad</strong>s<br />

and registration at concentration camps. His<br />

book alleges that IBM’s subsidiaries leased,<br />

rather than sold, equipment to the Third<br />

Reich, that they maintained and upgr<strong>ad</strong>ed<br />

punchcard machines throughout the war, and<br />

that Dehomag trained Nazi officers including<br />

concentration camp <strong>ad</strong>ministrators.<br />

The full extent of IBM’s involvement with<br />

the Third Reich is disputed, but Dehomag,<br />

which h<strong>ad</strong> come under the control of Nazi<br />

authorities, did provide Hollerith equipment<br />

that was used for census operations vital to<br />

the Third Reich as it pursued various actions<br />

against its own citizens and those of annexed<br />

and inv<strong>ad</strong>ed countries. Although the systems,<br />

designed to log data re<strong>ad</strong> from punchcards,<br />

weren’t strictly computers, they were close<br />

cousins, and there’s no doubt they helped to<br />

make terrible acts possible.<br />

COMPUTER PARTITION<br />

While the crimes of the Nazis might stand<br />

alone in their brutality, history offers other<br />

examples of regimes who used computers<br />

for unsavoury purposes. The South African<br />

government m<strong>ad</strong>e extensive use of computers<br />

under apartheid to keep track of its citizens<br />

and help enforce the division between racial<br />

groups.<br />

An arms embargo was enforced upon<br />

South Africa from 1977, but computers<br />

were still sold for years after. In 1980 a UN<br />

Committee told the Security Council that the<br />

export of computers should be prohibited. In<br />

1985 and 1986 the Security Council and EU<br />

both halted exports of computers for police or<br />

military use.<br />

However, a total embargo wasn’t enforced,<br />

so the ruling h<strong>ad</strong> little effect on government<br />

procurement of computers.<br />

Although it’s hard to link computers directly<br />

to acts of violence against citizens, computers<br />

were certainly used to control their movement<br />

and restrict their human rights. Black citizens<br />

were each given passbooks detailing where<br />

they could go, live and work, and these were<br />

tied into a computerized population register<br />

for easy reference.<br />

A further possible example is Iraq under<br />

S<strong>ad</strong>dam Hussein which, according to an<br />

unsubstantiated December 2000 story on the<br />

conservative World Net Daily website, once<br />

sought to build a supercomputer from 4,000<br />

Sony PlayStation 2 consoles. Quotes attributed<br />

in the article to a ‘military intelligence officer<br />

who declined to be identified’ re<strong>ad</strong> more like<br />

the exaggerations of a PlayStation marketer,<br />

however, focusing on ‘staggering’ graphics<br />

capabilities that were “roughly 15 times more<br />

powerful than the graphics cards found in<br />

most PCs”.<br />

Despite the story’s dubious feel, it is likely<br />

that S<strong>ad</strong>dam’s regime would have been more<br />

dangerous were it not for the embargo on<br />

buying more conventional computing power.<br />

It’s certainly true that today, consumer<br />

PCs with multicore processors and massively<br />

parallel graphics processors can be combined<br />

in distributed computing projects such as<br />

Folding@home to tackle the most complex<br />

of problems. The world’s most powerful<br />

computer, the Cray Titan based in Oak Ridge,<br />

Tennessee, owes its supremacy to a 2012<br />

upgr<strong>ad</strong>e that, among other things, installed<br />

18,688 Nvidia Tesla K20 GPUs.<br />

EVERYDAY EVILS<br />

While supercomputers (of whatever era) are<br />

often used for sh<strong>ad</strong>owy purposes, anyone’s PC<br />

could be co-opted to act maliciously.<br />

There are many examples of malware that<br />

turn computers into a botnet; a group of<br />

distributed computers under the control of a<br />

hacker, activist or sometimes even the agents<br />

of a state. While botnets don’t usually offer<br />

much computing power, a large botnet can<br />

flood a website or online service with data<br />

requests, overwhelming its ability to respond<br />

and temporarily preventing the service’s<br />

legitimate use – a tactic known as a distributed<br />

denial-of-service (DDoS) attack.<br />

While many such attacks are certainly<br />

criminal or malicious, some highly targeted<br />

examples might be considered ‘evil’. In the<br />

South Korean by-elections of April 2011, for<br />

example, DDoS attacks targeted the websites<br />

of the National Election Commission and of<br />

mayoral candidate Park Won-soon, making<br />

it harder for the electorate to look up details<br />

of where and when to vote and, potentially,<br />

influencing the turnout and outcome of the<br />

election. Police later arrested the secretary of<br />

the Grand National Party and four others in<br />

association with the attacks.<br />

In recent times, the comparative ease with<br />

which a DDoS attack can be mounted has<br />

helped it to become a tool with which activists<br />

can attack the institutions with which they<br />

disagree, whether the targets be commercial<br />

or political. One example is the ongoing DDoS,<br />

hacking and other attacks by pro-Israeli and<br />

pro-Palestinian groups that, at the beginning<br />

of 2012, resulted in the downing of the Tel<br />

Aviv stock exchange, First International Bank of<br />

Israel and Israeli national carrier El Al websites,<br />

followed by the retaliatory taking down of the<br />

Saudi and UAE stock exchange websites.<br />

Such attacks are deliberate, but a website<br />

can be overwhelmed by genuine demand, and<br />

a service can be swamped as a result of a bug<br />

in internet hardware such as a router.<br />

Such bugs, or simple mistakes, can<br />

quite often be the root cause of computer<br />

behaviour that, to the casual observer, might<br />

seem malicious. As an example, a simple data<br />

entry mistake could result in a black mark on<br />

a customer’s credit score that subsequently<br />

prevents them obtaining another service for<br />

which they should in fact be eligible.<br />

Such mistakes are routinely m<strong>ad</strong>e, but may<br />

not be so easy to correct. In November 2012,<br />

the financial services company Prudential<br />

was fined £50,000 by the Information<br />

Commissioner’s Office (ICO) in a case where<br />

the records of two customers h<strong>ad</strong> been<br />

mistakenly merged. The mistake, originally<br />

m<strong>ad</strong>e by one of the customer’s financial<br />

<strong>ad</strong>visors, was understandable as the two<br />

customers shared the same forename,<br />

surname and date of birth, but the fine arose<br />

because Prudential failed to investigate<br />

properly when told of the problem.<br />

In every area where modern technology<br />

gathers, stores and shares information about<br />

us there’s the potential for such mistakes,<br />

but there’s also the potential for deliberate<br />

exploitation. In Google’s early years – a<br />

company whose entire reason for being is to<br />

‘organise the world’s information’ – its staff<br />

recognised this threat, <strong>ad</strong>opting the informal<br />

motto ‘Don’t be evil’. It’s still referenced<br />

prominently in the company’s code of conduct,<br />

although critics might question the extent to<br />

which it influences behaviour.<br />

Companies aren’t the only organisations<br />

that gather data, with governments across the<br />

world eager to retain their grasp on citizens’<br />

communications and activities as they use new<br />

tools such as social networks.<br />

In the worst cases, technology delivers new<br />

tools for potential oppression and suppression,<br />

from facial or number-plate recognition and<br />

tracking in CCTV networks, to censorship or<br />

blocking of the web and other services.<br />

WAR MACHINES<br />

There’s a limit to the damage that can be<br />

done through the gathering and analysis of<br />

information or by simple mistakes, but the<br />

same isn’t true of computer systems that<br />

are designed to act on sh<strong>ad</strong>owy information<br />

or to do harm in the first place. Weapons<br />

technology didn’t stop with the development<br />

of the first ballistic computers; modern warfare<br />

relies on a plethora of computerized systems<br />

that help map the battlefield, locate and<br />

identify friendly troops and enemy targets and,<br />

ideally, destroy only the latter.<br />

Some, such as GPS, indubitably have<br />

far-reaching and peaceful applications, while<br />

others such as missile guidance systems may<br />

be more specialised.<br />

We often hear of ‘pinpoint’, ‘surgical’ or<br />

‘targeted’ strikes in the context of military<br />

action, but even the most accurate decisions<br />

and infallible targeting are only as good as the<br />

information on which they’re based.<br />

When the US declared war on Iraq in March<br />

2003, it launched a cruise missile strike against<br />

a supposed le<strong>ad</strong>ership bunker and other<br />

targets in the hope of wiping out S<strong>ad</strong>dam<br />

Hussein and his command, yet the objectives<br />

weren’t met. Iraqi sources claimed that nonmilitary<br />

targets h<strong>ad</strong> been hit and civilians<br />

wounded, while CBS later reported that the<br />

bunker h<strong>ad</strong> never existed.<br />

In the past dec<strong>ad</strong>e or so, the US in<br />

particular has intensified its use of unmanned<br />

aerial vehicles (UAVs), colloquially referred to<br />

as drones, for surveillance and air strikes, both<br />

within theatres of war such as Afghanistan, and<br />

outside such as in Pakistan.<br />

Drones are appealing to security agencies<br />

and the military because they’re cheaper<br />

than an aeroplane, and can be deployed in<br />

dangerous or illegal missions without risking<br />

a pilot’s life, or the difficulties should they be<br />

shot down and held captive. However, by<br />

reducing human involvement in the gathering<br />

of intelligence data and offensive missions that<br />

rely on it, many argue that unmanned vehicles<br />

increase the risk that innocent people will be<br />

killed.<br />

It’s often difficult to verify casualty reports<br />

from regions in which drones are used<br />

offensively, but there are numerous reports of<br />

civilians being caught up in supposedly highly<br />

targeted strikes. Among the 3,000 people<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

FEATURES 29


FEATURES<br />

30<br />

estimated by the Bureau of Investigative<br />

Journalism to have lost their lives since 2004<br />

in drone strikes within Pakistan, it’s reported<br />

that civilian casualties number between<br />

473 and 889. Other estimates are far more<br />

pessimistic. Writing for the Washington-based<br />

Brookings think tank in July 2009, Middle East<br />

security expert Daniel L Byman estimated that<br />

for every militant killed by drone strikes, 10<br />

civilians might also lose their lives.<br />

NAUGHTY BY NATURE?<br />

Whatever the exact figures, it’s debatable<br />

whether weapons of war are inherently evil<br />

while they’re under the control of humans,<br />

who bear the moral and legal responsibility<br />

for their use. However, drone technology has<br />

improved, and the US Air Force believes that<br />

“<strong>ad</strong>vances in artificial intelligence (AI)… will<br />

enable systems to make combat decisions and<br />

act within legal and policy constraints without<br />

necessarily requiring human input”.<br />

In other words, a future generation of<br />

drones might decide for itself who to kill.<br />

There’s clearly great risk in such a situation.<br />

“Military robots are potentially indiscriminate,”<br />

cautions Patrick Lin, a Stanford University<br />

researcher quoted by US news website<br />

the Global Post. “They have a difficult time<br />

identifying people as well as contexts; for<br />

instance, whether a group of people are<br />

at a political rally or wedding celebration.”<br />

Weapons and AI researchers caution that there<br />

is no plan for humans to be totally removed<br />

from the process, but the military currently<br />

doesn’t have enough trained operators<br />

to meet the demand for UAV sorties, so<br />

increased automation would certainly be a<br />

great benefit.<br />

While fully autonomous drones might<br />

be considered evil – especially if in practice<br />

they prove to be less discriminate than<br />

human-piloted weapons – in reality even<br />

these weapons can’t truly be evil without the<br />

intelligence, consciousness and morals of a<br />

human being. In all of the examples we’ve<br />

looked at so far, where evil has been done it’s<br />

come from those who designed or used the<br />

technology rather than the technology itself,<br />

but with computers increasingly able to ‘think’<br />

for themselves, will this always be the case?<br />

Artificial intelligence is still a distance away<br />

from the super-intelligent systems envisaged<br />

by computer scientists and writers, but these<br />

may still be closer than we’d think. Computer<br />

brains may not be able to tackle the reasoning,<br />

thought, <strong>ad</strong>aptability and self-learning of the<br />

human mind, but for some time they’ve been<br />

able to beat humans at highly specific tasks,<br />

such as preventing a car’s wheels locking<br />

during hard braking or playing chess. More<br />

recently the best artificial systems have begun<br />

to outperform humans at more complex<br />

tasks such as facial recognition, and progress<br />

continues.<br />

GHOST IN THE MACHINE<br />

While it’s uncertain whether we’ll ever succeed<br />

in modelling the exact nature of the human<br />

brain, it’s highly likely that we will manage<br />

to create a machine with a similar level of<br />

intelligence and, ultimately, a computer<br />

that’s substantially more intelligent than us.<br />

This event is the basis for the concept of<br />

‘singularity’ in the field of artificial intelligence;<br />

a scenario in which mankind creates an<br />

intelligent machine that’s more capable than<br />

we are of designing subsequent intelligent<br />

machines. These in turn will create computers<br />

that are an order of magnitude more clever,<br />

and so on, le<strong>ad</strong>ing to a sudden and –<br />

potentially – unlimited explosion in the intellect<br />

and utility of computers.<br />

Such a scenario raises some astonishing<br />

possibilities. With unlimited intelligence, future<br />

computers could be used to solve problems<br />

that have so far defeated humans, such as<br />

curing disease, inventing a safe and limitless<br />

power source or theorising a new physical<br />

model for the universe that incorporates<br />

particles, gravity and all the other observed<br />

phenomena. They could even tackle vexing<br />

philosophical problems such as the existence<br />

or otherwise of God, or the meaning of life<br />

itself – a scenario anticipated by Douglas<br />

Adams in The Hitchhiker’s Guide to the <strong>Galaxy</strong>,<br />

where the computer Deep Thought designs<br />

Earth, the computer, to devise the ultimate<br />

question.<br />

A more earthly concern is that, while the<br />

tipping point for an AI singularity doesn’t<br />

require an artificial intelligence similar to<br />

our own, it’s quite probable that something<br />

similar will arise at some point after singularity<br />

is reached. This raises the possibility that<br />

computers could come to ‘think’ or be<br />

conscious in a similar sense to us, and to<br />

understand morality and the concepts of good<br />

or evil for the first time.<br />

Philosophically, the actions of computers<br />

with such an understanding could, finally, truly<br />

be said to be good or evil.<br />

It’s an intriguing concept, disquieting for<br />

some, but even more thorny is the thought<br />

that a machine morality borne of a different<br />

intelligence and consciousness to ours is likely<br />

not only to have different interests, but to have<br />

a different concept of morality.<br />

In other words, a computer with nothing<br />

but good intentions could prove incredibly<br />

evil by our standards, because its interests,<br />

morality and thus its understanding of evil<br />

wouldn’t reflect our own.<br />

ABSOLUTE POWER<br />

Asked if there would ever be a computer<br />

as intelligent as humans, US author and<br />

singularity proponent Vernor Vinge replied:<br />

“Yes. But only briefly.” Even in a scenario<br />

where technology remains benign, there exists<br />

the possibility for mankind to lose control of<br />

it and ultimately face competition for energy<br />

and materials from, for want of a better word,<br />

a species of our own creation.<br />

While such an outcome sounds far-fetched,<br />

it’s realistic enough that it’s now coming to<br />

be considered quite seriously. In November<br />

2012, such concerns led to the formation at<br />

the University of Cambridge of the Centre for<br />

the Study of Existential Risk (CSER), specifically<br />

to consider ‘extinction-level’ risks posed to<br />

humans by their own technology.<br />

Writing jointly on the Australian ac<strong>ad</strong>emic<br />

website The Conversation, CSER founders Jaan<br />

Tallinn and Huw Price likened the prospect of<br />

uncontained singularity to a ticking bomb. On<br />

containing the risk, they wrote: “A good first<br />

step… would be to stop treating intelligent<br />

machines as the stuff of science fiction, and<br />

start thinking of them as a part of the reality<br />

that we or our descendants may actually<br />

confront, sooner or later. Once we put such<br />

a future on the agenda we can begin some<br />

serious research about ways to ensure<br />

outsourcing intelligence to machines would be<br />

safe and beneficial, from our point of view.”<br />

Some ac<strong>ad</strong>emics have suggested that a<br />

potential strategy by which we could achieve<br />

this is to create only human-based AI, which<br />

will share our human values and thus be<br />

likely to share and protect our interests. A key<br />

problem here is that it seems unlikely that<br />

the first super-intelligent AI we create will be<br />

similar to ours, and it’s by no means certain<br />

that we’ll ever duplicate the exact nature of the<br />

human brain.<br />

An alternative argument espoused by Tallinn<br />

and others is to limit artificial intelligences to<br />

narrow domains, such that AI can never reach<br />

the generalised superintelligence that would in<br />

all likelihood be necessary to displace humans.<br />

Certainly, this approach appears more feasible<br />

against the background of our current<br />

progress, which has delivered super-human<br />

ability only in very narrow applications.<br />

TOOLS OF THE TRADE<br />

Computers are probably mankind’s greatest<br />

tools and, like other tools, the purposes for<br />

which we wield them can be good, neutral or<br />

evil. They usually do our bidding, and where<br />

they don’t it’s usually by an accident of our<br />

design. Either way, the moral responsibility<br />

is with us. The future promises increased<br />

intelligence and autonomy, however, and<br />

the prospect that computers may evolve<br />

beyond our control. In such a scenario artificial<br />

intelligence may act according to its own<br />

morality. If we fail to ensure that this is aligned<br />

with ours, we may deliberately or otherwise<br />

unleash the first truly evil computers.<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

FEATURES 31


FEATURES<br />

32<br />

Buying aeroplane tickets, buying<br />

domain names, the odd concert ticket, movie<br />

ticket and books online is pretty much where<br />

most of us feel comfortable when we talk<br />

ecommerce. We generally like to touch and<br />

feel things when we are looking at buying<br />

tangible goods. But while we have been<br />

looking and touching; the rest of the world has<br />

taken to ecommerce like a humpback whale<br />

to krill.<br />

A recently released eMarketer report<br />

estimates that Business 2 Consumer (B2C)<br />

ecommerce sales rose 21.1% in 2012 to a<br />

stunning one trillion US dollars. This all-time<br />

high figure is predicted to increase a further<br />

18.3% to US$1.298-trillion in 20<strong>13</strong>.<br />

These figures are almost incomprehensible<br />

especially when we compare the regions in the<br />

graph below.<br />

Albert Mucunguzi<br />

Albert is the Founder and CeO of pC Tech Magazine. He contributes to pC<br />

Tech Blogs, and runs another popular blog called “Thinking Different” on<br />

http://almuc.me. You can follow him on Twitter at @albertmuc, or get share<br />

your comments about his articles via the email, albert@pctechgroup.net<br />

Ecommerce Is Now A Trillion Dollar<br />

Industry: Here’s How It Happened<br />

The Asia-Pacific market makes the Middle<br />

East and African markets look like they are<br />

standing still, with the former region holding<br />

30.5% of the market and the later eking out a<br />

paltry 1.9% in 2012.<br />

According to ComScore, 90% of Americans<br />

(about 194-million people) visited retail<br />

shopping sites in December of 2012. That<br />

194-million is part of the reason why the MEA<br />

region is lagging behind. America simply has<br />

a large bulk of connected users. MEA’s total<br />

digital buyers amount to 40.9-million people<br />

in 2012.<br />

Low internet connectivity, poor<br />

infrastructure and a lack of education have<br />

been cited as major reasons as to why<br />

ecommerce particularly is an industry that<br />

developing nations struggle with. So what are<br />

the major draw cards that make people shop<br />

online and not offline in the brick and mortar<br />

stores?<br />

1. CONVENIENCE<br />

Where else can you do shopping at midnight<br />

in your birthday suit? Not at your local corner<br />

shop that’s for sure. Online shops are 24/7<br />

and there are no lines, queues, disgruntled<br />

employees or other irate customers to deal<br />

with.<br />

2. BETTER PRICES<br />

Nine times out of 10 it costs shoppers less<br />

to shop online than in the physical store. It<br />

costs the shop keepers less so they pass this<br />

discount on to their online clients.<br />

3. SEND GIFTS<br />

Online shopping makes it super easy to give<br />

and send gifts to loved ones. The retailers<br />

often offer “gift wrapping” as part of their<br />

service as well as (obviously) delivery. This<br />

takes all of the hassle (and excuse) out of gift<br />

giving to those who might be in another town<br />

or country.<br />

4. COMPARISON OF PRICES<br />

Online shops make comparison and research<br />

of products and prices possible.<br />

5. DISCREET PURCHASES<br />

Sometimes it is better to not be seen whilst<br />

shopping for those, erm, special products that<br />

you would rather not have your pastor see<br />

you buy. Online shopping offers anonymity<br />

when you need it most.<br />

Lock up your mailbox<br />

I’D LIKE TO use this month’s column<br />

to highlight an increasingly prevalent<br />

cybercrime that is causing distress,<br />

concern and, in some cases, real<br />

financial damage: email hacking. In<br />

recent weeks, I have spoken with victims<br />

of email hacks. The real-life testimony of<br />

how their lives were turned upsidedown<br />

and the difficulty involved in recovering<br />

their accounts compelled me to explore<br />

this phenomenon further.<br />

The trouble is that we all hang<br />

on to old emails as a way to store<br />

valuable information such as website logons,<br />

verification emails and financial transaction<br />

details that are kept ‘just in case we need<br />

them’. In some circumstances, this information<br />

can hold the key to your online identity.<br />

Storing it in web-based email accounts is an<br />

invitation to any would-be hacker.<br />

GROUP DYNAMIC<br />

So how are these accounts compromised<br />

in the first place? The most common way<br />

is by phishing or key-logging malware. I’ve<br />

discussed these hacking methods in previous<br />

columns, so I don’t intend to go over them<br />

again. However, there’s another method that’s<br />

becoming increasingly common method:<br />

social engineering. Hackers inveigle their<br />

way into accounts by first accumulating<br />

information on a target. This information is<br />

then used to answer security questions in<br />

order to gain access to the account. I was told<br />

of a hacker who h<strong>ad</strong> gained control of his<br />

victim’s Facebook account by way of an initial<br />

email compromise. This allowed him to send<br />

messages to the victim’s friends, claiming that<br />

he h<strong>ad</strong> lost his phone and needed the mobile<br />

number and email <strong>ad</strong>dress of a particular<br />

person in order to contact him.<br />

Having obtained this information, it<br />

was used to change the specified security<br />

phone number on the second victim’s email<br />

account, so allowing a further email account<br />

compromise to be attempted.<br />

Fortunately, when the first victim logged<br />

on to his Facebook account, he noticed the<br />

phantom conversation and phoned the<br />

compromised friend to alert him, and the<br />

game was up.<br />

To be fair, web-based email providers are<br />

aware of the problem and have taken steps<br />

to increase security. It’s worth knowing how<br />

these steps can help you ‘target harden’ your<br />

particular account.<br />

HAVE A WORD<br />

First and foremost, make sure your passwords<br />

are strong enough. How many of your<br />

passwords for different accounts are identical?<br />

Come on, answer truthfully. When faced with<br />

an online registration form, the temptation to<br />

use the same old password is overwhelming.<br />

One compromised database, though, and<br />

you’ve handed out your keys for all the others.<br />

When was the last time you changed your<br />

email password? Ok, confession time: in my<br />

case, it was two years ago. I discovered this<br />

alarming fact when I opened the control<br />

dashboard of one of my email accounts and,<br />

as a result, I immediately changed it. It’s good<br />

practice to change your email passwords<br />

regularly; it’s painful, I know, but do it, and if<br />

you have been compromised and the b<strong>ad</strong><br />

guys have yet to use these details, they will be<br />

useless to them when the time comes.<br />

Think of a password that’s at least eight<br />

characters long with alphanumeric and<br />

special symbols, then copy and paste it into<br />

a password folder (along with the relevant<br />

website details) and secure that folder on<br />

your machine. Don’t name the folder<br />

‘Passwords’, though, will you?<br />

A recent study of passwords used in<br />

a popular database found that a cracker<br />

with a dictionary of only 5,000 words<br />

could brute-force his way into all the<br />

accounts held on that database.<br />

Brute-forcing is a method of guessing<br />

passwords repeatedly until the correct<br />

one is found, and there are programs<br />

out there that can do this automatically.<br />

To help avoid this, some providers have<br />

a form of twofactor authentication, which<br />

allows a phone number to be linked to the<br />

account so texts are sent directly to you in<br />

the event of a password reset attempt. Go<br />

into your email control panel to see if you can<br />

enable this.<br />

Next, tie your Facebook account down<br />

by restricting who can view your page and<br />

who can see your friends. Facebook is fast<br />

becoming the hacker’s tool of choice for<br />

compromising email accounts and data<br />

gathering, so it makes sense to restrict who<br />

can interact with you. Also, don’t assume that<br />

requests for details that appear to come from<br />

friends are what they seem. If in doubt, call<br />

your friend directly to make sure the request<br />

is genuine.<br />

Finally, clear your inbox of all emails that<br />

could be used against you – the password<br />

confirmation emails, the account detail emails,<br />

the ‘confirmation of transaction’ emails. Copy<br />

them into a secure folder and then delete<br />

them from your inbox. It’s the cyber equivalent<br />

of a clear desk policy.<br />

MAIL PROTECTION<br />

If you look around YouTube, you’ll see a<br />

large group of people who think it’s funny<br />

to compromise email accounts: it’s not. It’s a<br />

criminal offence, and the chances of being<br />

caught and prosecuted are increasing. But<br />

we should all do our bit to make things more<br />

difficult for would-be hackers by beefing up<br />

our email security.<br />

You know it makes sense.<br />

Follow your favourite<br />

blogger every week!<br />

http://blogs.pctechmag.com<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

FEATURES 33


FEATURES<br />

34<br />

Why life through<br />

Google Glass...<br />

It’s hard to engineer this kind of creepy<br />

serendipity. Earlier this week, European Union<br />

data watchdogs, fighting to protect our privacy<br />

in an age of big data, put pressure on Google<br />

over the privacy of user information.<br />

Just 48 hours later, Google potentially struck<br />

...should be for our eyes only<br />

a new blow against privacy when it posted a<br />

video preview of its new “Glass” technology --<br />

high-tech spectacles featuring a revolutionary<br />

digital interface that enable its wearers to not<br />

only view the world through Google’s eyes but<br />

also automatically photograph all that they<br />

see.<br />

“How strange is that!” CNN’s Erin Burnett<br />

exclaimed after a contemplating a “world seen<br />

through Google Glasses”.<br />

Strange indeed. But these glasses, a kind<br />

of digital surrogate for our eyes, are strange<br />

in a creepy, Hitchcockian, “Rear Window” sort<br />

of way. Or the same way that Big Brother’s<br />

ubiquitous cameras were strange in George<br />

Orwell’s “Nineteen Eighty Four.” And in the<br />

same way that a future in which “promethean”<br />

data companies like Google rule the world<br />

now appears strange.<br />

The coincidental timing of last week’s EU<br />

and Google announcements may have been<br />

unintentional, but it sure is ominous.<br />

The EU is concerned about the way in<br />

which Google has, since last March, been<br />

pooling the data of its individual users<br />

across its popular services like search, Gmail,<br />

Google+ and YouTube in order to bundle<br />

them up for <strong>ad</strong>vertisers.<br />

Its anxiety over this aggregation of our<br />

personal information is twofold. Firstly, Google<br />

has done little, if anything, to inform users of<br />

this unilateral change. Secondly, Google hasn’t<br />

offered users a way of opting out.<br />

Google insists its privacy policies respect<br />

European laws and simply help enhance user<br />

experiences. But in the eyes of the EU, those<br />

of us using products like YouTube, Gmail or<br />

Google+ are being, to borrow a Microsoft<br />

coined neologism, “Scroogled” by Google’s<br />

new privacy policy.<br />

Last October, EU watchdogs gave Google<br />

four months to revise this policy. But last week,<br />

after nothing appeared to have changed,<br />

Brussels raised its warning a bureaucratic<br />

notch, promising to take action against Google<br />

by the summer.<br />

And yet, in light of Google Glass, the EU’s<br />

concerns seem like a quaint throwback to a<br />

more innocent digital age.<br />

Watchdogs should, of course, be barking<br />

m<strong>ad</strong>ly at Google’s decision to pool our data<br />

for its <strong>ad</strong>vertising clients. Regardless of the<br />

legitimacy of such practices, I’m strongly in<br />

favor of making Google accountable, both<br />

legally and morally, for policies that so patently<br />

disregard the privacy of its users.<br />

google Class covers only part of the eye,<br />

more like an optional vision aid!<br />

But Google Glass opens an entirely new<br />

front in the digital war against privacy. These<br />

spectacles, which have been specifically<br />

designed to record everything we see,<br />

represent a developmental leap in the history<br />

of data that is comparable to moving from the<br />

bicycle to the automobile.<br />

It is the sort of r<strong>ad</strong>ical transformation that<br />

may actually end up completely destroying our<br />

individual privacy in the digital 21st century.<br />

While none of us were looking, Google<br />

-- the most data-hungry of today’s digital<br />

giants -- is reengineering mobile technology.<br />

Thanks to Silicon Valley’s m<strong>ad</strong> rush to develop<br />

wearable computing, it isn’t alone. Apple is<br />

supposedly working on its hotly-anticipated<br />

wristwatch and wearable personal data devices<br />

from companies like Nike and Fitbit are alre<strong>ad</strong>y<br />

beginning to revolutionize the healthcare<br />

industry.<br />

But there’s something particularly troubling<br />

about Google Glass. When we put on these<br />

surveillance devices, we all become spies, or<br />

scrooglers, of everything and everyone around<br />

us. By getting us to wear their all seeing digital<br />

eyeglasses, Google are metamorphosing us<br />

into human versions of those Street View vans<br />

-- now thankfully banned in Germany -- which<br />

crawl, like giant cockroaches, around our cities<br />

documenting our homes.<br />

Neither Orwell nor Hitchcock at their most<br />

terrifyingly dystopian could have dreamt up<br />

Google Glass. According to Google cofounder<br />

Sergey Brin, quoted by tech website<br />

Mashable, “Glass will also have an automatic<br />

picture-taking mode, snapping pics at a preset<br />

intervals (such as every 5 seconds).”<br />

Pics every 5 seconds! Gulp. So where<br />

will all that intimate data go? Erin Burnett’s<br />

strange “world seen through Google Glasses”<br />

is actually, as another le<strong>ad</strong>ing tech site<br />

Techcrunch notes “the world seen through<br />

Google’s omnipresent eye.”<br />

And the terabytes of data sucked up every<br />

five seconds by its omniscient glasses will,<br />

of course, flow to Google. That’s the whole<br />

business model, the very raison d’etre of<br />

Google Glass. Those pics every 5 seconds<br />

will be used to aggregate data and then to<br />

generate billions of dollars of revenue by<br />

selling <strong>ad</strong>vertising around it.<br />

One EU complaint about current Google<br />

practice, you’ll remember, was about the<br />

absence of an opt out button to enable users<br />

to say no to Google’s pooling of their data.<br />

But the problem of saying no, of opting<br />

out, becomes even more problematic with<br />

Google Glass. After all, as these Warby Parker<br />

or Ray-Ban-designed devices become more<br />

fashionable (ie: innocuous), most of us won’t<br />

even know if we are being filmed when gazed<br />

at by a bespectacled stranger.<br />

The EU watchdogs also objected to<br />

Google’s current pooling of our data in a<br />

single personalized record. And Google Glass<br />

could, I fear, become the focal point for all our<br />

data in a world where privacy no longer exists.<br />

“Everything, from Google searches to<br />

notifications to hangouts, seemingly happens<br />

in this one space,” notes Techcrunch about the<br />

spectacles. Google Glass, thus, may become<br />

the pivotal post PC, post iPod and post tablet<br />

device. A pooling of all our most intimate<br />

data, a mirror of ourselves -- the holy grail, of<br />

course, for <strong>ad</strong>vertisers.<br />

I remarked earlier that it’s hard to engineer<br />

this creepy kind of serendipity. But I may<br />

have been wrong. You see, the whole point<br />

of Google Glass is actually to successfully<br />

engineer serendipity. The creepier, the better.<br />

After all, when we wear these devices, those<br />

clever engineers at Google will know where we<br />

are all the time. So what’s to stop them serving<br />

up personalized <strong>ad</strong>vertisements for products<br />

when the gaze of our glasses rest upon those<br />

products?<br />

At the very moment we look at those new<br />

clothes in that store window, a special offer for<br />

the clothes will flash up on the digital interface<br />

of our Google Glass. How serendipitous, eh?<br />

But what to do? Is there an antidote to<br />

Google’s eyewear?<br />

Google Glass is currently in being tested<br />

with plans for a finished product to be<br />

released into the mass market next year. Last<br />

week, Google announced that a few prototype<br />

models of the spectacles would go on sale<br />

for the not exactly bargain price of $1,500.<br />

To qualify, well-heeled Google fanboys need<br />

to go to their Google+ or Twitter accounts<br />

and, in 50 words or less, using the hashtag<br />

#ifih<strong>ad</strong>glass, explain how they would use<br />

Google Glass.<br />

So, if anyone at Google happens to be<br />

re<strong>ad</strong>ing this, here’s my application:<br />

#ifih<strong>ad</strong>glass: I would make data privacy<br />

its default feature. Nobody else sees the<br />

data I see unless I explicitly say so. Not<br />

<strong>ad</strong>vertisers, nor the government, and certainly<br />

not those engineers of the human soul at<br />

the Googleplex. No, Google Glass must be<br />

opaque. For my eyes only.<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

FEATURES 35


REVIEWS<br />

PHONES<br />

Samsung <strong>Galaxy</strong> <strong>Music</strong><br />

BY JOHNSON P.<br />

INTRODUCTION:<br />

Have you ever cursed that your smartphone is not<br />

really suited to be a music player in your pocket,<br />

as you have to unlock the screen to control the<br />

player?<br />

Well, the Samsung <strong>Galaxy</strong> music is here to remedy<br />

the situation with a dedicated play/pause button<br />

plus stereo speakers, and it won’t break the bank<br />

either, as it should be with a phone targeted<br />

squarely at teens.<br />

The specs are ho-hum, but the phone promises<br />

some extras for music aficion<strong>ad</strong>os, so is it likely<br />

to win their hearts and minds the way it is?<br />

Re<strong>ad</strong> on our review to find out..<br />

DESIGN:<br />

As is customary for teen-oriented phones, we<br />

have a design with flashy color, and a lot of<br />

chrome-like rim supplied. In the case of the <strong>Galaxy</strong><br />

<strong>Music</strong>, however, we also have metal grills over<br />

the two speakers on the front - a material Samsung<br />

doesn’t use very often in its phones.<br />

The tiny handset is very easy to hold and operate with<br />

one hand, fitting comfortably in your palm with its<br />

rounded corners and tapered edges. It is on the chubby<br />

side, but nothing too grand and unbearable, while the<br />

weight is kept in check.<br />

The <strong>Galaxy</strong> <strong>Music</strong> scores points for the regular SIM card<br />

slot and the easily accessible microSD one on the left<br />

- a must if you need to hot-swap cards with your vast<br />

music collection. The memory card slot, as well as the<br />

microUSB port at the top are covered with protective<br />

flaps, that are easy to pry open or snap back into place.<br />

Looking around the sides we find a dedicated play/<br />

pause key down right, which works while the phone<br />

is locked for easily managing your music playback on<br />

the go. If you hold it, the phone goes directly into the<br />

music player, even in a locked state, so you can manage<br />

your tunes quicker.<br />

INTERFACE AND FUNCTIONALITY:<br />

The phone runs Android Ice Cream Sandwich, which<br />

is covered with Samsung’s own TouchWiz UI on top.<br />

It offers no surprises, with the typical Samsung set of<br />

widgets, and an abundance of connectivity toggles in<br />

the notification bar.<br />

There is a pretty spare use of transparencies and<br />

transitional animations compared to the large caliber<br />

Galaxies, as the processor is not very powerful to<br />

support<br />

those<br />

freely.<br />

Apart<br />

from<br />

its own<br />

apps and<br />

media Hubs,<br />

Samsung has<br />

only prelo<strong>ad</strong>ed<br />

Quickoffice for<br />

opening MS Office and<br />

PDF files.<br />

As you can easily guess, typing on the smallish display<br />

is not very easy, especially with bigger hands, and the<br />

fact that the keyboard doesn’t turn in landscape mode<br />

isn’t helping either.<br />

PROCESSOR AND MEMORY:<br />

The 850 MHz processor is single-core, but with a<br />

Cortex-A9 architecture, so it has enough power to pull<br />

through your daily tasks and interface navigation, but<br />

often has hiccups while lo<strong>ad</strong>ing apps, or running more<br />

demanding ones.<br />

The <strong>Galaxy</strong> <strong>Music</strong> has 512 MB of RAM, and 4 GB of<br />

internal memory, of which 1.7 GB are user-available, but<br />

it also offers a microSD card slot on the left for storage<br />

expansion with up to 32 GB cards.<br />

INTERNET AND CONNECTIVITY:<br />

The browser on the <strong>Galaxy</strong> <strong>Music</strong> is a basic ICS version,<br />

with no Adobe Flash support, and somewhat choppy<br />

panning and scrolling thanks to the comparatively slow<br />

processor. The low pixel density is a bummer, too, but<br />

you are unlikely to use it on such a tiny screen for hours<br />

36 pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

36<br />

on end anyway.<br />

The handset sports the basic connectivity<br />

options - 7.2 Mbps HSDPA downlo<strong>ad</strong>s, Wi-Fi,<br />

Bluetooth, GPS and FM R<strong>ad</strong>io.<br />

CAMERA:<br />

The 3 MP camera on the back of the phone<br />

doesn’t have a flash, and the interface is pretty<br />

basic, hinting at the limited functionality of<br />

the unit. Still, you get a few shooting modes,<br />

including Panorama, and a few scene presets,<br />

as well as some standard color effects.<br />

Going into the Camera app is pretty quick<br />

directly from the lock screen, and focusing and<br />

taking a shot is very fast, too, with minimal<br />

shutter lag.<br />

MULTIMEDIA:<br />

Despite its <strong>Music</strong> designation, the phone<br />

generAl FeAtureS<br />

In Sales Package Handset, charger, Battery (<strong>13</strong>00 mAh), Data cable,<br />

He<strong>ad</strong>set, user Manual<br />

Form Bar<br />

SIM Dual SiM, gSM + gSM<br />

Touch Screen yes, capacitive<br />

Business Features Pushmail<br />

Call Features conference call, loudspeaker<br />

Handset Color ceramic White<br />

PLATFORM<br />

Operating Freq gSM - 850, 900, 1800, 1900; uMtS - 2100<br />

OS Android v4 (ice cream Sandwich)<br />

User Interface touchWiz uX<br />

Java yes<br />

Processor 850 MHz cortex-A9<br />

DISPLAY<br />

Type lcD<br />

Size 3 inches<br />

Resolution QVgA, 240 x 320 Pixels<br />

Color 262 K<br />

CAMERA<br />

Primary Camera yes, 3 Megapixel<br />

Video Recording yes, 25 fps<br />

zoom Digital zoom - 2x<br />

Other Camera Features<br />

DIMENSIONS<br />

Size 59x110x12.25 mm<br />

Weight 107 g<br />

BATTERY<br />

Type li-ion, <strong>13</strong>00 mAh<br />

Talk Time 15 hrs (2g)<br />

Standby Time 500 hrs (2g)<br />

MEMORY AND STORAgE<br />

Internal 4 gB<br />

Expandable Memory microSD, upto 32 gB<br />

geo-tagging, touch Focus, Full Focus, Auto Focus,<br />

Photo effects, White Balance, cMOS Sensor, Photo<br />

Quality, image editor<br />

doesn’t offer anything extra in the alre<strong>ad</strong>y<br />

pretty rich TouchWiz tunes player. The usual<br />

song categorization options are present, along<br />

with the <strong>Music</strong> Square mood matrix. The<br />

player interface is easy to operate, with sound<br />

effects and equalizers directly accessible while<br />

the song is playing with the tap of a button.<br />

There are two stereo speakers, top and<br />

bottom at the front, and the supplied Sound<br />

Alive and SRS Surround Sound modes do<br />

make the music more intense, yet overall the<br />

speakers are nothing to write home about,<br />

not so much in terms of strength, which is fine,<br />

but in terms of sound quality, which is about<br />

average, re<strong>ad</strong> nothing impressive when it<br />

comes to clarity and fullness.<br />

CONCLUSION:<br />

Depending on the way it is priced, the<br />

FULL SPECIFICATIONS<br />

Memory 512 MB rAM<br />

INTERNET & CONNECTIVITY<br />

Internet Features email<br />

Preinstalled Browser Android<br />

gPRS, EDgE yes<br />

3g yes, 7.2 Mbps HSDPA; 5.76 Mbps HSuPA<br />

Wifi yes, 802.11 b/g/n<br />

USB Connectivity yes, micro uSB, v2<br />

Tethering Wi-fi Hotspot<br />

Navigation Technology<br />

A-gPS, glOnASS, with google Maps<br />

Bluetooth yes, v3, Supported Profiles (HS, A2DP, AVrcP)<br />

Audio Jack 3.5 mm<br />

DLNA yes<br />

MULTIMEDIA<br />

<strong>Music</strong> Player yes, Supports WAV, FlAc, MiDi, MP3, eAAc+<br />

Video Player yes, Supports PVX, 3gP, AAc, VP8, AAc+, MP4,<br />

H.263, H.264, MKV, MPeg4, AAc+V2, AMr, AMrnB<br />

FM yes<br />

Sound Enhancement SrS Surround Sound, SoundAlive Solution<br />

Ringtone MP3, 64 Polyphonic<br />

OTHER FEATURES<br />

SAR Value 0.754 W/Kg<br />

Call Memory yes<br />

SMS Memory yes<br />

Phone Book Memory yes<br />

Sensors Accelerometer, Proximity Sensor, compass<br />

Additional Features Kies Pc Application, Mini SiM, Wi-Fi Direct, Video<br />

Streaming, calendar, clock, Alarm, DrM Supported<br />

(OMA 1.0), Voice input<br />

Important Apps google Mobile Services, Samsung Apps, <strong>Music</strong><br />

Hub, game Hub lite, google talk, google+,<br />

chatOn, Play Store<br />

WARRANTY<br />

1 year manufacturer warranty for Phone and 6 months warranty for in the box<br />

accessories<br />

Price: Approx. ugX 550,000<br />

Samsung <strong>Galaxy</strong> <strong>Music</strong> could turn out one<br />

unpretentious hottie amongst teens, as it has<br />

the prerequisite colored looks, with chromelike<br />

blingery and extra music features thrown<br />

in. The dedicated play/pause/music player<br />

access key on the side is the only thing that<br />

makes it stand out as a music player, though,<br />

since the two stereo speakers are of pretty<br />

average quality.<br />

There are no major gripes with the handset<br />

but the smallish screen and the low pixel<br />

density, as well as the lack of some sensors.<br />

The <strong>Galaxy</strong> <strong>Music</strong> sports a a hot-swappable<br />

microSD slot and a regular SIM card one,<br />

which are a plus now<strong>ad</strong>ays, and it also offers<br />

a pretty good call quality, making it a versatile<br />

affordable device for music aficion<strong>ad</strong>os.<br />

REVIEWS 37


REVIEWS 38<br />

LAPTOPS & DESKTOPS<br />

NOKIA Lumia 920<br />

NOKIA UNVEILED THE LUMIA 920 and Lumia<br />

820 way back in September last year and,<br />

expectedly, it took quite a while for the phones<br />

to find their way on to East Africa. This month,<br />

though, MTN Uganda launched the phone in<br />

Uganda, and here’s our slightly belated review<br />

of the Nokia Lumia 920.<br />

HARDWARE/ DESIGN<br />

The first thing you notice about the Nokia<br />

Lumia 920, no doubt, is the bulk. The device<br />

may not be as large as the <strong>Galaxy</strong> Note II,<br />

but somehow Nokia has managed to make it<br />

heavier than Samsung’s phablet. Once you get<br />

past the weight, however, there’s plenty to like.<br />

The Nokia Lumia 920 is solidly built out<br />

of a polycarbonate unibody shell that goes<br />

all around the device and offers a welcome<br />

change if you’ve been living in the Samsung<br />

world of plastic for too long. The left side<br />

of the phone is completely bare, giving<br />

way to the Micro-SIM slot on the top left.<br />

The 3.5mm he<strong>ad</strong>phone/mic jack is at the<br />

centre of the top edge, <strong>ad</strong>jacent to a noisecancelling<br />

microphone. The right edge has the<br />

volume rocker, power-button and the camera<br />

button, in a typical Windows Phone button<br />

arrangement.<br />

The bottom edge comes with the micro-<br />

USB port flanked on either side by a rather<br />

cute looking speaker grill. Nokia Lumia 920 is<br />

one of the few phones that manages to have<br />

two visible screws without flipping the ugly<br />

switch over. The back has Nokia/ Carl Zeiss<br />

branding alongside the dual-LED flash. The<br />

front has an earpiece grill and a front camera<br />

next to Nokia branding at the top, with three<br />

capacitive touch buttons rounding off a typical<br />

Windows Phone device look.<br />

DISPLAY<br />

Nokia has put in plenty of work on the display<br />

of the Lumia 920 and thrown in a helping of<br />

buzzwords for good measure – PureMotion<br />

HD+, ClearBlack and the likes. So does that<br />

translate into a great viewing experience? By<br />

and large, yes.<br />

Nokia has ditched the AMOLED display<br />

found in the Lumia 900 and gone with a 4.5inch<br />

IPS LCD with 768×1280 resolution in its<br />

latest flagship. We’ve always been fans of truer<br />

colours that the IPS LCD represent and while<br />

colours on AMOLED may look ‘prettier’, even<br />

its biggest proponents have started moving<br />

away from the technology, given the obvious<br />

inaccuracies in colour reproduction.<br />

Overall, the Nokia Lumia 920 offers best in<br />

class viewing experience, indoors as well as<br />

outdoors. Yes, we did give the touchscreen<br />

a spin while wearing gloves and yes, it does<br />

work as <strong>ad</strong>vertised.<br />

CAMERA<br />

Much has been written about the camera in<br />

the Nokia Lumia 920. The camera carries the<br />

PureView moniker, m<strong>ad</strong>e famous by the 41megapixel<br />

Nokia 808. Unfortunately, the Nokia<br />

Lumia 920 does not have the 41-megapixel<br />

sensor or the oversampling technology found<br />

in the 808, so we’re not sure what component<br />

of ‘PureView’ technology has been carried<br />

forward here. Nonetheless, the camera doesn’t<br />

let us down.<br />

There are two things that the Nokia<br />

Lumia 920 camera does better than any<br />

other camera-phone out there. The first is<br />

photography under low-light conditions,<br />

where the Lumia 920′s imaging capabilities<br />

really come to light (excuse the b<strong>ad</strong> pun).<br />

Images clicked in poor light conditions using<br />

the Lumia 920 are much better than those<br />

clicked with the iPhone 5, perhaps the Lumia<br />

920′s closest match in low-light photography.<br />

However, if you really cherish a shot, we<br />

would recommend clicking an extra snap<br />

or two, since the results can be a little bit<br />

unpredictable in terms of which object gains<br />

focus.<br />

The other area where we can safely say<br />

the Lumia 920 is lightyears ahe<strong>ad</strong> of the<br />

competition if image stabilisation. We shot<br />

side-by-side videos taken with the Lumia<br />

920 and competition, and the difference was<br />

like night and day. Nokia has suspended the<br />

entire Lumia 920 optical assembly using tiny<br />

springs that absorb shocks and the results are<br />

stunning. If you are fond of taking videos on<br />

the move, or just have the hands of a drunken<br />

sailor like us, you’ll love the Nokia Lumia 920′s<br />

cameras.<br />

Windows Phone 8 introduced the concept<br />

of camera lenses, which let you see and click<br />

images in a “different light”. Nokia Lumia<br />

920 comes with Bing Vision, Panorama,<br />

Cinemagraph and Smart Shoot lenses to cater<br />

to various shooting moods and requirements.<br />

SOFTWARE/ UI<br />

The Nokia Lumia 920 comes with Windows<br />

Phone 8, Microsoft’s latest mobile-OS<br />

that ships with multiple improvements like<br />

enhanced performance, multi-core processor<br />

support, NFC and more. Lumia 920, of course,<br />

benefits from these and the focus in this review<br />

will be to highlight the non-core software<br />

components of the Lumia 920.<br />

While Windows Phone 8 doesn’t offer<br />

much flexibility to the manufacturer in terms<br />

of customising the OS, Nokia has managed<br />

to include a few apps that may well prove<br />

to be the differentiator compared to the<br />

competition. The Lumia 920 comes with<br />

popular apps like Nokia Drive, Nokia Maps<br />

and Nokia <strong>Music</strong>, as well as other Nokia apps<br />

like Nokia Care and Nokia City Lens. We’re big<br />

fans of the Nokia Drive app – as documented<br />

in the Nokia 808 review and as far as we<br />

are concerned, Nokia continues to set the<br />

benchmark in navigation apps, even ahe<strong>ad</strong> of<br />

Google Maps.<br />

Two other services we like are Nokia Maps,<br />

which is a huge improvement over the stock<br />

Bing Maps and Nokia <strong>Music</strong>, that offers<br />

unlimited music free for a year. We’ve h<strong>ad</strong><br />

mixed results with the City Lens app, though<br />

your mileage may vary. All in all, thanks to a<br />

small but important lineup of exclusive apps,<br />

the Lumia 920 offers a compelling option once<br />

you’ve decided to go ahe<strong>ad</strong> with Windows<br />

Phone 8.<br />

But is Windows Phone 8 itself worth your<br />

time? Sure, if you can look past a rather bare<br />

looking app store and other annoyances like<br />

the app-installation procedure that requires a<br />

few too-many clicks to get back to what we<br />

are doing. Windows Phone could surely do<br />

with an improved notification system as well.<br />

But if you’re a first-time smartphone buyer,<br />

or looking for a change from the monotony<br />

of the Android/ iOS world, Windows Phone 8<br />

Compared to Samsung’s galaxy SIII as well as most other existing high-end smartphones, the<br />

Lumia 920 is definitely bulky - with a larger screen area.<br />

offers a pretty solid alternative.<br />

PERFORMANCE/ BATTERY LIFE<br />

Windows Phone 8 paved the way for multicore<br />

processors to find their way to Microsoft’s<br />

mobile world, with earlier versions limited to<br />

single-core processors. The current generation<br />

of flagships including the Lumia 920 promptly<br />

utilise the enhanced capabilities by shipping<br />

with dual-core chips, and the benefit, is there<br />

to be seen.<br />

The Nokia Lumia 920 suffered from no<br />

noticeable delays during our time spent<br />

with the device and handled pretty much<br />

everything we threw at it without any<br />

problems. Battery life is unlikely to be a<br />

problem even for heavy users, and you can<br />

expect to go by an entire day on a single<br />

recharge.<br />

pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

VERDICT<br />

Nokia Lumia 920′s release can perhaps be<br />

termed unfortunately timed. The current<br />

generation of flagship Android devices from<br />

the likes of Samsung and HTC have been<br />

around for a while and have benefited from<br />

one or more rounds of price-cuts, to the point<br />

that they are available at a considerable price<br />

<strong>ad</strong>vantage compared to the Lumia, even when<br />

their original prices weren’t too dissimilar<br />

compared to the 920′s. In this environment,<br />

it is understandable that customers would be<br />

tempted to pick up more impressively specced<br />

devices at lower prices.<br />

Having said that, both the camera and the<br />

display are as good as money can buy at the<br />

moment and if you’re willing to give Windows<br />

Phone a spin, we definitely recommend<br />

giving the Lumia 920 a second look. At UGX<br />

2,2500,000/= (MTN Uganda) the Lumia 920 is<br />

by far the most expensive Windows 8 phone<br />

on the market.<br />

However, given Lumia 920′s superiority over<br />

the 8X in terms of the camera, display as well<br />

as bundled apps, we give Nokia’s offering a<br />

slight edge.<br />

Re<strong>ad</strong> more reviews at:<br />

http://reviews.pctechmag.com<br />

Are you a good reviewer? We’re hiring!<br />

Email: editor@pctechmagazine.com or simply<br />

tweet @pctechmagazine.<br />

REVIEWS 39


GALLERY<br />

APPS<br />

Review: Orange Money TOSHIBA Satellite P845t-101<br />

By BrigHt OnAPitO<br />

So NoW IT IS oFFIcIAl, oRANGe Uganda<br />

limited has joined the informal banking sector<br />

by introducing their version of mobile money<br />

dubbed orange money. This brings the number<br />

of mobile money operators to 5 after Airtel,<br />

mTN, UTl and Warid launched their platforms<br />

earlier on.<br />

THE 2011/2012 Uganda Communications<br />

Commission half year posts and market<br />

review puts the number of mobile<br />

subscribers at 16.6 million, which is nearly half<br />

the number of Uganda’s population. MTN<br />

alone has about 3.5 million registered mobile<br />

money subscribers and as the de<strong>ad</strong>line for<br />

registering mobile subscribers fast approaches,<br />

the Mobile Network Operators are scrambling<br />

to have all their clients registered.<br />

Mobile money has been such a huge<br />

phenomenon in Uganda. A 2011 Gallup,<br />

Inc report estimates that 43% of all money<br />

transfers carried out was by mobile money.<br />

That is huge! The numbers are surely going<br />

up, more so that a new player has joined the<br />

market. Mobile money as we know it has h<strong>ad</strong><br />

its glitches. As far as scalability and reliability<br />

are concerned, mobile money users have<br />

suffered the pains of incomplete transactions,<br />

network time-outs and blackouts. That<br />

moment when you are stranded in town and<br />

need quick cash only to be told by the mobile<br />

money agent that ‘the network is down’!<br />

Such has been the plight of mobile money<br />

subscribers in Uganda. So the big question is:<br />

Do we need another mobile money operator<br />

in this market? What innovations does Orange<br />

money bring to this alre<strong>ad</strong>y chaotic spectrum?<br />

I took time to register for Orange Money so<br />

as to see what makes it tick or screech and this<br />

is what I found out:<br />

FRONTEND<br />

I don’t see anything new here. Orange Money<br />

uses the tr<strong>ad</strong>itional architecture consisting of<br />

Unstructured Supplementary Service Data<br />

(USSD), Short Message Service (SMS) and<br />

USSD/SMS servers and web services, which<br />

is similar to all the other mobile money<br />

operators. Now while USSD(see the screenshot<br />

below) is compatible with just about any GSM<br />

mobile phone, in this day and age of mobile<br />

Apps, it simply lacks in terms of user interface<br />

and experience. We thought that perhaps it’s<br />

was high time the Telecoms drummed up to<br />

the beat of intuitive native mobile Apps that<br />

offer better user experience and are much<br />

intuitive for smartphone users while keeping<br />

USSD for the feature phones. But alas, it’s the<br />

same old.<br />

REGISTERING<br />

It was so easy for me to register for Orange<br />

money. It actually took me less than 10<br />

minutes. No need for passport photos<br />

because they have those smart phones for<br />

image capture. Once my details were in their<br />

systems my Orange Money account was<br />

activated almost instantly. I thought this was<br />

great!<br />

NETWORk RELIABILITY<br />

Orange Money alre<strong>ad</strong>y has a he<strong>ad</strong> start for<br />

a fact that the Orange network is not overly<br />

congested like its competitors and is still<br />

regarded as the most efficient mobile network<br />

(according to the Uganda Communications<br />

Commission). So far the application currently<br />

runs flawlessly on my Samsung <strong>Galaxy</strong>. Only<br />

time will tell how reliable the service will be<br />

as the number of users increase. I will be<br />

watching closely.<br />

SECURITY FEATURES<br />

Orange Money has what they call the Multiple<br />

Transaction Rule, which protects users<br />

from making the same transaction twice. A<br />

message is sent to the sender asking them to<br />

confirm if they wish to repeat that transaction.<br />

Also, when they send money for the first<br />

time the recipient will be sent an SMS asking<br />

them to confirm the transaction by entering<br />

the sender’s number. Considering that they<br />

(most likely) won’t know the sender’s phone<br />

number, the system automatically sends back<br />

the money and transaction fees after 5 days<br />

if there is no confirmation. This is a smart<br />

innovation they have introduced that the other<br />

operators lack.<br />

COST OF TRANSACTIONS<br />

Comparatively, there is no significant<br />

difference in transaction cost, though overall<br />

Orange Money charges are slightly higher<br />

than the other competitors. Also, the<br />

maximum transaction limit is much lower that<br />

the competition. You can transact a mere<br />

maximum of UGX 2,000,000 while you can do<br />

up to UGX 10,000,000 with UTL. I get a feeling<br />

this is a strategy to keep the network traffic<br />

under check.<br />

UTILITY PAYMENTS<br />

The only things I can buy using Orange Money<br />

are airtime and data bundles. Hopefully they<br />

will integrate other utility service payments in<br />

the short run.<br />

Some features that I think Orange Money<br />

(and all the other network providers) need<br />

to include in their applications among others<br />

include session caching. Sometimes the<br />

network might time out when the transaction<br />

is almost complete and the user has to start<br />

the process again. That can be very frustrating<br />

for the users. How about the user being able<br />

to continue right where they stopped?<br />

The developers ask — do they have an API?<br />

The software engineer that I am is also looking<br />

for ways to integrate third party services to<br />

any application. There is still a major lack of<br />

Application Programming Interfaces (APIs) to<br />

accomplish this. The fancy name aside, an API,<br />

just enables you to do more. If Orange Money<br />

could <strong>ad</strong>dress this need they could experience<br />

a huge demand for their service considering<br />

that software developers will le<strong>ad</strong> the way.<br />

This will be a deal breaker. Mobile technology<br />

is <strong>ad</strong>vancing exponentially and the mobile<br />

operator willing to embrace these changes will<br />

be ahe<strong>ad</strong> of the game. One of these <strong>ad</strong>vances<br />

is Near Fields Communication (NFC) which I<br />

believe is going to revolutionalize how mobile<br />

transactions are carried out in the near future.<br />

CONCLUSION<br />

Other than the promise of a more reliable<br />

and secure mobile money service, Orange<br />

money brings absolutely nothing new to<br />

the mobile money industry and we found<br />

no differentiating killer feature just yet. The<br />

platform is still “closed” and tightly controlled<br />

by the carrier just like all other platforms giving<br />

no chance for third party providers like say<br />

payment aggregators to use or extent the<br />

benefits of the system.<br />

—The author is a contributor for The<br />

TechPost (www.techpost.ug)<br />

TOSHIBA’S SATELLITE P845T-101 takes<br />

everything we loved about the Asus VivoBook<br />

S200 and <strong>ad</strong>ds an extra helping of raw<br />

processing power. Its third-generation Intel<br />

Core i5-3317U processor runs at 1.7GHz, but<br />

its Turbo Boost technology can increase the<br />

clock speed to 2.6GHz when it’s within certain<br />

thermal limits.<br />

This makes it plenty fast enough for<br />

everyday applications, as well as more<br />

demanding programs that benefit from<br />

multiple cores.<br />

The Core i5’s built-in Intel HD Graphics<br />

4000 GPU provides the visuals, but this<br />

laptop performed better than most in our<br />

Dirt Showdown benchmark, scoring 19fps at<br />

720p with graphics options set to High and<br />

4x anti-aliasing enabled. This is a much<br />

better score than we’ve seen on other<br />

laptops with similar integrated chips,<br />

and we only h<strong>ad</strong> to lower the settings<br />

to Medium to achieve a more playable<br />

30fps.<br />

The real highlight of the P845t-101 is its<br />

14in 10-point touchscreen. It’s very responsive<br />

and a joy to use whether you’re browsing the<br />

web, scrolling through the Windows Store<br />

or zooming in and out of Google Maps. The<br />

only slight worry we h<strong>ad</strong> was with how much<br />

it wobbled when we tapped icons or the<br />

onscreen keyboard, but it has just enough<br />

weight to stop it rocking on the table if you jab<br />

the screen particularly hard.<br />

The downside to having a touchscreen is<br />

that you have to deal with fingerprints, but<br />

thanks to its glossy finish they weren’t very<br />

noticeable unless the screen was switched off<br />

or particularly dark. In fact, we h<strong>ad</strong> more issues<br />

with reflections than fingerprints in general<br />

use. One <strong>ad</strong>vantage of a glossy display is<br />

bright, vivid colours, and the screen certainly<br />

m<strong>ad</strong>e our solid-colour test images extremely<br />

vibrant.<br />

The full-size Chiclet-style keyboard is<br />

comfortable to type on. The well-spaced keys<br />

provide plenty of bounce and tactile feedback,<br />

and a white LED backlight illuminates the<br />

keyboard in low light. We didn’t like the way<br />

the keyboard picked up fingerprints, though.<br />

It’s a small complaint, but we could easily see<br />

where we’d been typing, even after a short<br />

period, and the prints weren’t particularly easy<br />

to clean off.<br />

The smooth all-in-one touchp<strong>ad</strong> didn’t<br />

pick up fingerprints and didn’t<br />

get in the way while typing,<br />

even though it’s not quite in<br />

the centre of the wrist rest.<br />

Multi-touch gestures such<br />

as pinching to zoom were<br />

accurate, and we could easily<br />

use it to bring up Windows<br />

8’s Charms Bar and switch<br />

between windows. Clicking<br />

icons and folder links<br />

sometimes sent our cursor<br />

jolting upwards, as the<br />

buttons are incorporated<br />

into the rest of the<br />

touchp<strong>ad</strong>,<br />

but overall<br />

it wasn’t too much<br />

of a nuisance.<br />

If you find yourself away from<br />

the mains, the P845t should just about last<br />

you most of a working day, as it lasted five<br />

hours and 56 minutes in our light-use battery<br />

life test. It also has a wide range of ports,<br />

including three USB3 ports, a multiformat SD<br />

card re<strong>ad</strong>er, a he<strong>ad</strong>phone and microphone<br />

jack, a DVD rewriter, an Ethernet port and<br />

an HDMI and VGA input for connecting an<br />

external display. The range of video outputs<br />

is useful, as you’ll be able to use practically<br />

any external display from an HD TV to an old<br />

projector.<br />

Our only concern is the price. At £650, it’s<br />

in direct competition with the Toshiba Satellite<br />

L855-148, which is both much faster and<br />

more powerful than the P845t. The Satellite<br />

L855-148 doesn’t have a touchscreen, but it’s<br />

a much better buy.<br />

This makes the P845t hard to recommend<br />

outright, but for those who need a<br />

touchscreen, the P845t is perfectly in the<br />

middle ground between the budget price and<br />

power of the Asus VivoBook S200 and the<br />

vastly more expensive Ultrabooks such as the<br />

Dell XPS 12 and Asus Taichi. If you don’t need<br />

a touchscreen laptop, we recommend the<br />

Toshiba Satellite L855-148.<br />

40<br />

40 pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

SUMMARY<br />

PROCESSOR: 1.7GHz Intel Core i5-3317U<br />

RAM: 6GB<br />

STORAGE: 640GB hard disk<br />

GRAPHICS: Intel HD Graphics 4000<br />

OPTICAL: DRIVE DVD+/-RW +/-DL, DVD-<br />

RAM<br />

DISPLAY: 14in widescreen LCD (1,366x768)<br />

OPERATING SYSTEM: Windows 8<br />

DIMENSIONS: 24x349x234mm, 2kg<br />

POWER CONSUMPTION: 1W standby, 12W<br />

idle, 33W active<br />

WARRANTY: One-year RTB<br />

PART CODE: PSPJ5E-00C00JEN<br />

DeSIGN<br />

FeATUReS<br />

peRFORMANCe<br />

Reviewed by Expert Reviews<br />

Professional Web Development?<br />

www.<strong>ad</strong>noteplus.com / info@<strong>ad</strong>noteplus.com<br />

41<br />

GALLERY


GALLERY<br />

42<br />

42 pc tech ISSUE 25 FEBRUARY 20<strong>13</strong><br />

ISSUE 25 FEBRUARY 20<strong>13</strong> pc tech<br />

43<br />

GALLERY


VISION<br />

SPECIFICATION STATUS<br />

First Published FEBRUARY 2010<br />

Issues Published 25<br />

Circulation UGANDA, RWANDA, KENYA, GHANA, NIGERIA, South Africa<br />

Frequency MONTHLY<br />

Pages 52<br />

Price (Local) UGX 5000, KSH. 200, FRW 1200, USD 5, GHS 8<br />

Quality GLOSSY<br />

Milestones September 22, 2010: Launched in Ghana, December 2010: PC Tech won<br />

the Young Achievers Award ICT Category (2011). PC Tech Named in Top<br />

10 most popular websites in Uganda (Alexa.com)<br />

Other Initiatives PC Tech “Educate”, CTBuS (The Ac<strong>ad</strong>emuc Journal of PC Tech), Digital<br />

Learning Africa (Online Resource Platform), PC Tech Directory, PC Tech<br />

Jobs, Africa Internet & Mobile Entrepreneurs’ Conference and AdNote+<br />

VERDICT You decide.<br />

To be the le<strong>ad</strong>ing media organization that<br />

promotes openness and collaboration on<br />

sustainable innovations in Technology, Business<br />

and Society<br />

MISSION<br />

To create and disseminate inprint and online<br />

products on Technology, Business & Society that<br />

have a global perspective but contextually relevant<br />

to Africa<br />

FACT FILE<br />

FEATURED COVERS<br />

www.pctechmagazine.com<br />

Africa’s Most Contemporary Technology Magazine<br />

Plot 14 Martyrs Lane, Ntinda, Kampala. Website: www.<strong>ad</strong>noteplus.com Twitter: @<strong>ad</strong>noteplus Facebook: /<strong>ad</strong>noteplus Phone: (+256) 792 619812/0782924374 Email: info@<strong>ad</strong>noteplus.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!