Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Tuesday, April 28, 2020

Inexpensive Smart TV - Part 2

Okay I have been bored stiff from the Covid-19 lockdown situation in my country and need something worthwhile to keep busy. The thought of streaming vides came to mind an a new project was borne. This video plug is the second part to my initial video on what to order for the project as seen here. If you haven't ordered your parts yet you can do so on eBay or www.360hub.com.ng

We need to install a barebone operating system called LibreELEC on the Raspberry Pi, Kodi is a sophisticated media centre that will run on this Operating system and facilitate process of running and managing our smart TV. If that sounds technical, don't worry, much of the work has been done by experts and you only need to configure a few things.


The first thing we will do is to burn the LidreELEC Image on the SD Card. Follow the video below and leave comments for help. Next step will be connecting the TV and starting the Raspberry Pi for the first time.

Please share and subscribe to my channel to encourage me keep this vlog open.

Friday, April 24, 2020

Inexpensive Smart TV - Part 1.

Frustrated from the world-wide Covid-19 clamp down I have been unable to sleep having lost track of time. I got tired of watching TV - I hadn't paid for subscription on DSTV for so long, I am sure the might have flagged my account to be delisted. I could have been watching movies on Netflix, or my favorite documentaries from the internet if only I had a smart TV. I wanted to buy one a few years ago, but they were much too expensive for my liking...

So that's when it hit me that I could actually use Raspberry Pi to make my old TV a Smart TV. That sure sound like a good Covid Project.


I posted the above video on my Whats App status page, and my mailbox started overflowing with request on the "How Tos". The reaction was so much that I have decided to make a follow-up video to guide anyone who is interested.



So the list of things to prepare are as follows
  1.  A TV with HDMI or VGA port.
  2.  A short HDMI cable OR A HDMI - VGA adaptor if your TV doesn't have a HDMI port.
  3.  A high quality SD card with at least 16Gig storage space (Nothing else on the SD it will be reformated and all files deleted)
  4.  A laptop or PC with full adminstrative privilages to allow you install on.
  5. Full access to the Internet (Preferably high bandwidth).
  6.  2 Sided Velcro to stick our Pi to the back of the TV
  7.  Raspberry Pi - Preferably RP4, but RPi Zero, Pi 1 - 3 will still work.
I will be waiting patiently for you to order for these parts and we can start the simple 5 steps.

Friday, February 14, 2020

My Smart Sprinkler System Part 2.


Introduction
You might be aware that I have been frustrated about forgetting to switch off appliances before leaving home. I guess its a sign of old age, my forgetfulness is becoming fairly pronounced. but instead of grumbling, as a technological determinist, I decided to create a smart home.

I have been tinkering with microcontrollers for some years, but creating a smart home got me jumping into the deep end of Internet of Things IOT. I have short listed several projects that I will need to create to have a smart home, and you can find them from looking through my blog for IOT and my smart home. here -

As you can see I have a whole lot of projects to keep me busy for a long long time. but not to worry, they are all simple modular systems that latch unto each other to create a smart system. I usually, will share them here with you. you can follow the steps and recreate them for yourself if you have the basic skills of soldiering and following simple instructions. I will also share Gerber files, circuit diagrams and a whole lot of information to help you build these circuit systems on your own.

To Sprinkle Or not to Sprinkle
for today, I will focus on the plants in my compound. I want to be able to automatically water the lawn, plants around the compound at preset times every single day of the year without much manual intervention. Yes one can easily buy a working water sprinkler off the shelve in any hardware store. but there is no fun in that. Plus, we can build a smarter system that takes cognizance of the weather to decided if it should give the plants their usual dose of water, or not water at all if it has rained in the last 24 hours. We could also throw on a Big Bank effect that brings in the watering sequence to a crescendo as part of the Christmas Lighting experience.

Examples of making of the Project Circuit Boards PCB abound on the internet. 1. Transfer a circuit trace from a Laser Printer to a paper and unto a PCB board. and 2. Rule traces manually by hand. 3. etch in an acid bath and 4. Solder on the components. etc.

Feel free to look them up and choose which one to use. For the 1st step - there are basically only two methods open to you, One, to carefully draw it with your hand using a permanent maker like a fine point sharpie, or two, to use a purpose built application to design the circuit and print it out using a Laser printer (not a bubble jet ink based printer). I have written an article on how to make a a PCB using the manual process. If you don't want to use that method, I will explain here how to follow another more precise method.

Laser Heat Transfer Method
If you desire a more professional end product, you can create professional PCB files using purpose built applications - there are a lot of applications that take away the stress of sweaty and shaky hands to deliver crisp looking products. See a list of the top 9 free PCB softwares. I have tried my hands on a couple of these, they all have their pros and cons, but I especially like Fritzing software. Its intuitive features allow you  make professional looking double sided PCB. Below is the image of the PCB I designed for the water Sprinkler. Along with its Gerber files if you wish to print it out and transfer it to the board.

Here are the Gerber files from my Fritzing design, for the sprinkler system.

After the traces have been printed on paper, they are ironed with high heat to melt the Laser Toner onto the board. As you may have noticed, this design was done on two sides - two sided boards are very difficult to make, the main problem is ensuring that the vias (the points where current passes from one side to the other side of the board. If the vias are not precisely placed, the PCB will not work.

Note: To esure that the vias line up, I utilize a light box to ensure that both sides of the mirrored print out match. I tape it on three sides before sliding in the measured fresh PCB. This way, when the PCB is etched and the holes are drilled, each trace matches. If the VIAS don't match point to point, all the vias will fail and your two sided board will fail.

After both sides are held in place, I iron both sides with a pressing iron until I can clearly see all the traces melted onto the board - most websites tell you to do this for about 5 mins, but I iron mine for longer periods than that. At the end you can clearly see that the traces have melted unto the PCB.

After allowing the PCB to cool down, I leave it in a bowl of water to soften the paper. softly rob off paper to reveal a perfect work of art...

Gloves On!!!
Handling or even inhaling chemicals is very dangerous. Please be careful with the following steps.

Choosing the etchant is very important. Boric chloride, off the shelve etchants, etc. are easily obtained in the west, but in the south, its not easy to come by. but not to worry, finding a chemical that corrodes copper is not very difficult. I use Hydrochloric Acid (easily obtained from any swimming pool shed) and Hydrogen Peroxide (From any pharmacy). One part peroxide, and two parts Hydrochloric Acid.



Please note that you should not dispose of the etchant in the drain - it could potentially corrode the pipes and sink. do not also throw it out indiscriminately as it could kill plants and pollute the earth. I use mine to clean concrete of moss. and water it down afterwards.


By now the PCB is looking very good. but we need to mark the points to drill each hole. I use a carbide score to nick the points for my pilot holes. these points are important to ensure the drill doesn't "runaway" and end up in the wrong place. scoring the PCB, only to make a dent, not to make a hole. Remember each via on the topside must match its corresponding via on the bottom. After the scoring, its time to drill the holes.


Monday, March 19, 2018

My Smart Sprinkler System Part 1.


Introduction
You might be aware that I have been frustrated about forgetting to switch off appliances before leaving home. I guess its a sign of old age, my forgetfulness is becoming fairly pronounced. but instead of grumbling, as a technological determinist, I decided to create a smart home.

I have been tinkering with microcontrollers for some years, but creating a smart home got me jumping into the deep end of Internet of Things IOT. I have short listed several projects that I will need to create to have a smart home, and you can find them from looking through my blog for IOT and my smart home. here -

As you can see I have a whole lot of projects to keep me busy for a long long time. but not to worry, they are all simple modular systems that latch unto each other to create a smart system. I usual, I will share them here with you. you can follow the steps and recreate them for yourself if you have the basic skills of soldiering and following simple instructions. I will also share Gerber files, circuit diagrams and a whole lot of information to help you build these systems on your own.

To Sprinkle Or not to Sprinkle
for today, I will focus on the plants in my compound. I want to be able to automatically water the lawn, plants around the compound at preset times every single day of the year without much manual intervention. Yes one can easily buy a working water sprinkler of the shelve in any hardware store. but there is no fun in that. Plus, we can build a smarter system that takes cognizant of the weather to decided if it should give the plants their usual dose of water, or not water at all if it has rained in the last 24 hours.



The making of the Project Circuit Boards PCB
Examples abound on the internet on how to create a PCB.

1. Transfer a circuit trace from a Laser Printer to a paper and unto a PCB board.
2. Rule traces manually by hand.

feel free to look them up and choose which one to use. but there are basically only two methods open to you, One, to carefully draw it with your hand using a permanent maker like a fine point sharpie, or two, to use a purpose built application to design the circuit and print it out using a Laser printer (not a bubble jet ink based printer).

1. Manual Trace
I typically use the manual tracing method only when the design is simple or I don't have access to a Laser Printer and time is of the essence. Though this would typically give a rough amateurish outcome, but as usual, I put a little method to the madness. As expected, this manual process, though fast, creates a not so professional outcome. but there are a whole lot of lessons to learn from this method, so I will show you how to make a PCB using the manual writing method.

1st step is to clean the PCB with steel wool and use 4 pins to sandwich the dotted project board, the two sided board against a piece of paper.




I usually pull out a dotted project PCB as a guide to help me mark the necessary points from studying my circuit on the bread board, I experiment with where each component will fit by placing them on the paper, punching a tiny hole through the doted project board.

 At the end I get a fair idea of where things would end up and I rule the lines on the paper.


I then manually rule the necessary traces with a sharpie (permanent marker). If I make mistakes, I wipe them off with cotton wool dipped in acetone and touchup with a fine tipped sharpie or any permanent marker after it dries.



These markings are actually thin plastic traces protecting the copper upon which they are written. the protection prevents corrosion by the chemicals when dropped in an etching bathe. Spend all the time you need reviewing the traces, make sure there are not shorts and that each pad connects to a matching hole that way when drilled the components will easily fall in place. this is particularly important if they are surface mounted components - I avoid  them cos they are very difficult to solder, but they are cheaper and also small, ideal for compact designs.

If you are able to follw these steps you will have something similar to the image above and ready for the next phase - etching the copper plate in an acid bathe. I will show you just how in another article. until then cheers.


Thursday, March 1, 2018

Internet Of Things IOT

Hello Thinkers, Its been quite a while since I hooked up, but believe me, I have been very busy doing so many many things. I can only sum them up as my deep dive into the rave of the moment - Internet of Things (IoT). We have all had our share of that sad moment after driving hours into town only to realize that you didn't switch off the air conditioner at home. Or perhaps, there was no power when you left, but you know you left several appliances running before the power cut - meaning that you will be running (wasting) energy with no one around to enjoy them. In the 3rd world where these are scares resources, no body wants anything to go to waste. It could be anything;-

you forgot to close the garage door. you forgot to switch the generator to manual to prevent it from kicking in when there is a power cut. You forgot to switch off the TV, Fan, AC, etc. depending on where you are, your problem might be different.

The Problem
My problem was how to create a smart home, that allows me the freedom of switching these things off even after I have left home. Yes! without coming home, or calling in the neighbors. Literally from anywhere I am in the world. My plan is to create a smart home, capable of doing the following;-
  1. Open & Close the gate (electric gate already exist)
  2. Arm Electric fence
  3. Let the Dogs out of their kennel 
  4. Monitor the weather to ascertain steps to take for air-conditioning, watering plants, letting out dogs, switching on lights, notifying the pool maintenance guy,
  5. Switch off / on several equipment's
    1. Generator
    2. Air Conditioners
    3. Fence / Outside Lights
    4. Borehole pump
    5. Swimming pool pump
    6. Swimming pool lights
  6. Monitor the battery level of the inverter
  7. Monitor the temperature of the deep freezer
  8. Water the lawn and the plants at home
  9. Monitor the security alarm
  10. Track motion after hours
  11. etc.
As expected, I had to do some research, and I found several projects I could latch unto - one of the is My Sensors Project. MySensors is an open source hardware and software community focusing on do-it-yourself home automation and Internet of Things IOT. They provide easy to follow build instructions, ready to use code examples and adaptable open source hardware designs. All of this runs on the MySensors software library for secure communication that has been battle-tested with more than 20 of the leading home automation controllers on the market.


MyController?
Controllers as the name suggests are the brain behind an IOT architecture. The controller is the unit like a CPU is to a computer, that does the processing of data fed in by sensors like temperature sensor on a node circuit tucked away somewhere in the compound. The controller uses this data to make rule based decisions (as created by me) to set switches on or off as desired. For example, I could use the rain gage data that shows that it rained today to tell the water sprinkler not to come on as scheduled every 4:00pm. In addition, the controller can tell, the node that controls the fence light to come on as soon as it gets dark, this could be set at a specific time, or just based on day light, the latter being the preferred as it will switch on the lights both in summer or winter when day light is delays or even during a storm when it could get dark even at noon.

My choice of controller was stressful. I was looking for a neat easy to use (and understand) controller with an active community to help when I get stock. I settled on MyController another open source project by JKandasa. The system is based on pure java (back end) and angularJS (front end) it can run it in any platform supporting Java SE 1.8. I liked its look and feel. and as expected JKandasa himself was readily on hand to support newbies like me. but after a difficult start and several huddles I faced with frustration, I went back to the square one to look for an alternative... my research lead me to Domoticz.

Domoticz is a free/open-source Home Automation System that lets you monitor and configure various devices such as lights, switches, temperature, rain, wind, UV and meters (electric, gas, water). It appeared quite powerful and intuitive as it promised. In less than an hour after I downloaded and installed it, it had latched on to the flimsy MySensors Gateway that I had arranged on my breadboard. with that, my journey has begun.

IOT here we come1

Sunday, October 21, 2012

Jack of All Trade - Master of Non!

While several of my friends knew what their calling way back when we were toddlers - I am yet to find out where I belong. I have always thought this was due to the fact that I am multi talented. But my friend Amalaye Oyakes comments about me on Facebook got me thinking...



By the way, Amalaye settled for exploring the celestial bodies ever since we left secondary school. So when I heard he was one of the big boys at NASA's Jet Propulsion Lab in Huston, I wasnt too surprised. But, why am I so confused? Whats my calling? Why haven't I settled down yet and focused on one career path? Am I a Jack of all trade... and master...? This comment made we think about my diverse interest, and how I came to be where I am.

  • My first love is music - I am a prolific entertainer - I once lead a brass band in my secondary school. I even went as far as playing on the same stage with world renowned Dizzy Gilespie (twice at the Port Harcourt Jazz festivals. Femi Anikulapo Kuti, Eddie Okonta, Gerald Opino, etc. I was given a scholarship to study music by the Nigerian Navy, but my father would have nothing of it. The only thing that kept me away from being a musician was education. I play (well I think I still can) all brass music instruments, from the Beagle, Trumpet, Trombone, to the almighty Tuba. I also play the guitar, and most wind instruments like the Clarinet. I have written several songs, but havent mustered the courage to enter a studio... yet.
  • Add caption
  •  I have always been an artist. I recall attempting my first drawing at five after watching my Dad draw a human head - I guess its in the blood, I picked up a pencil and tried to do just what I saw and the rest as the say is history. I exhibited my first art piece at the tender age of 15 at the United Nations sponsored art exhibition in New York.
  •  Being a science student in secondary school, I applied for Electrical Engineering & Architecture when I left secondary school. I got an offer to study Electrical Engineering at the Federal University of Technology Owerri FUTO. But that was not to be, cos my family thought I could do better to study art and be my own boss - I wish I didn't listen. I went on to study Graphic Arts at University of Nigeria. I recall my name was on the notice board when I resumed - my head of department wanted to meet this "Mad man" - I must have been mad to enroll for Fine & Applied Arts with Physics, Mathematics, English & Arts. I got an A in all with Arts been the lowest score. I guess I must have made an impression as Prof. Chike Aniako, Prof. Obiora Udechukwu and Prof. Ola Oloidi would become life time mentors.
  • Computer Graphics was a budding career path by the time I left University. In advert agencies of the time, studio heads had to depend on the skills of their "glorified" secretaries to bring their art creations into the digital world. As you may have imagined, this practice did not produce the finest results. With my love for computers, an inquisitive mind and a wealth of creative ability, I thrived in Ad Agency work. After a stink at three advert agencies - Dawn Functions, New Generation & Media Plus International, I realized that I felt like I was being used, while the products I churned out (calendars, Annual reports, Desk Diaries, Product advert, etc) were sold for millions, I got stipends. So I wrote a private proposal to Banks who were the major clients in the industry and voila, Afri Bank (now Main Street Bank) & NAL Merchant Bank Plc. (now Sterling Bank) took the bait. That's how I went to work as the in house Graphic Artist for NAL Merchant Bank.
  • One little known secret is that Graphic Artist helped make the internet what it is today. After Sir Tim Bernes Lee created the hyper-text protocol in 1993 (the http:// you find before the www web url) that changed the aparnet (as it used to be known) to what we now call the internet, Graphic artist were the first group of professionals to apply their visual creations... I consider myself one of Nigeria pioneers having built my first website in 1994.I also designed NALs website in the early 1990s when very few Nigerians knew what the internet was.
  • As the internet grew in complexity, I grew with it. My simple HTML pages designed with WYSIWYG applications gave way to more mature web programming languages like ASP.net, SharePoint, etc. With several web development and other professional certifications under my belt, I gracefully transited to being called a web developer. Even went on to design the nations Central Bank of Nigeria internet, intranet and extranet websites.
  • As you can imagine, web development is not a core function for banking - so the promotions were not coming as fast, and after 10 years of creating the web communications office and administering an army of content managers, one think stuck out like a sore thumb. "But... you are an artist" was becoming a derogatory statement I couldn't bear anymore. and so even-though I really wanted to study Human Computer Interaction HCI to prepare myself to join the now thriving Nollywood movie industry, I was forced to study Information Systems in Manchester University, United Kingdom.
  • On my return from studies, along with my Project Management PM skills and certification, I jumped into the deep end of project management pool. The PM skills was to see me working on the banks Cashless Nigeria initiative. I had reinvented myself once more.
So while I am sitting here thinking I have derailed a million times already - Amalayes comments clearly shows that my electronics and inventing talents has taken a back seat. If the climate was right, I should be an industrialist and inventor.Its always reassuring to hear your friends describe you in ways you never imagined. I recalled Amalaye near fatal electrocution at my house in the late 1980's when he tried to test my Door Zapper! a device I put in place to detar buglars who had hit my room a few weeks prior to his visit. His recent visit to Nigeria last month may have well Zapped me back to life - I should make plans to attend the exhibition, perhaps, this time, I may have finally settled down cos a rolling stone gathers no moss.



Wednesday, July 4, 2012

How to Cold Cast a plastic Part in Your Kitchen

Part 1 – Making the Wax Mold

Have you every cried over throwing away a functional device or toy just because you lost or broke one small plastic part? 

I recently visited my mechanic to find out what was wrong with my AC, and in the process, they broke one of the plastic slide for the air vent. The knob is  a one off part, not something one can order a replacement part for – there are only two possible ways to find another – 1) Visit the local junk yard and hope to God that you will find a matching part from an accidented vehicle.  2) Make one. Yes make another one in my kitchen.
I know any wise guy would have chosen the easy way out, but trust me, I rather stay indoors and engage myself in a small DIY project than to venture out doors – with planes falling out of the skies, and Boko Haram incessant bombings, I have made the tough choice of making it myself. I took the one weekend out to make a replacement part for the AC vent and the account below is how I went about it.
What do you need for this project?
  • Candles
  • Paper Box
  • Sticky Tape
  • Large syringe
  • Empty tin can
  • Epoxy

            Steps
  • Depending on size of the item to be replaced, find an appropriate box that will hold the mold
  • Make sure the box is big enough to hold the item and still leave enough space on the edge. The space will ensure that the wax does not break off. The rule of thumb is making sure that the item will sit in about 50% of the space.
  • Decide the part of to cast. From experience, it is better to cast in two parts – top and bottom, is a way that allows you to remove both molds without breaking the molds as such. It is often easy to make this choice by looking at the lines on the original piece to be cast – most plastic objects bear the tell tail sign of how they were cast – often in two parts. – we will call that line the “Cast Line”.
  • Cut up the candles and put it in the tin can and set the can on low heat on the cooker.
  • The following process might be very messy, so make sure you are wearing gloves and mask off the working area to prevent greasy stains.

  • After the wax melts… pour the wax into the box and allow it to cool off.  From experience, I noticed that the very first time I poured wax into a box, the wax leaked out (of course, it is liquid). I found it quite handy to tape the entire corners of the box with cello tape (sticky tape) to prevent any leakages. 


  • Wait until it is cool enough to leave your finger prints on. Not too hot, not too cold. After a few experiments you will know when the time is right. 
  • With a steady hand push the part into the molten wax to get the first mold. Don’t be tempted to pull it out or jiggle it. Just let it sit deep, allow the wax to rise above the Cast Line where you would like the second mold to start from.
Post picture of the two replicas sitting in the molten wax
  • Wait for the wax to solidify – To speed things up, I placed the mold in the freezer, and then the fridge, but it always resulted in cracks, as the wax cooled too fast. It is best to allow the mold to cool at room temperature.
  • With the original piece still in place and using a sharp blade, carve out the Cast line – make the surface of the mold flat. Enough angle to ensure that the 1st and second molds will meet on a some worth flat surface. Drill out holes to ensure that there will be no air pockets when both molds meet.

  • Set the first mold aside and prepare the box for 2nd mold – follow steps 1 – 4 above.
  • When the second mold has reached the right temperature, slowly lower mold 1 into the second mold, press hard until wax is dripping out of the drilled holes in mold 1

  • Leave it to harden overnight. Don’t be afraid that they will bind together, Wax is actually has its own oils, as long as two drops are not the same temperature, chances are that they will come apart with a minimal effort.
  • Make sure to wait for the wax in the middle of the mold to set before continuing this procedure
  • Make guide marks across the two sides of the mold – this will help you align the two parts properly. From experience, I put a scratch mark on all sides of the mold. Magic marker lines will eventually rub off so avoid them, unless you have already secured a masking tape.
  • Pry the two parts apart, make sure you are gentle and avoid breaking the mold
  • Slowly bring out the original part from the two molds. If the mold breaks, it is just a temporary setback, just cutup the wax and smelt it down again. From experience, some waxy residue remain on the original part after each attempt. Washing it off or cleaning it off did not work – The best way to get rid of the extra wax was dipping the part in Hot water (you risk melting the part if you dip it into Very hot water).
  • Examine the two molds. You should notice every small detail; even part numbers will show up clearly in a good mold.
  • If you successfully get to this part without any problems, Shout Hurray! – you are half way there.

Monday, April 2, 2012

Government Institutions VS the Cloud

Executive Summary
Cloud computing is the new buzz word on the internet and seen as the key to the future of IT services. Because it is still an emerging trend, its definition is still a bit hazy, however the cloud is simply a virtual data center shared by several organizations. Cloud applications involve multiple customers sharing application, even though they only have access to their own data.

No doubt, there are several business intelligence advantages derivable from operating in the cloud that allows for powerful combination of high-assurance remote serve integrity and cryptographic protocols that are consistent with policies, whether within the enterprise or in the cloud. To the most part, they mostly lend themselves to small and medium scale corporations who want to save money and infrastructure. Yet these advantages do not at this point in the maturity matrix of cloud sourcing, out-weight the inherent dangers of adopting such an emerging trend for public regulatory institutions such as Central Banks.

These inherent dangers underscore the well documented fear of being at the “Bleeding Edge” of technology. Complications experienced by early adopters of emerging trends in IT are well documented. Cloud computing has unique attributes that are fraught with security risks, smart customers should err on the side of caution and reappraise their dream of being on the Cloud.

This paper explains in simple terms, the idea of the Cloud sourcing, the advantages accruable to implementing it, against the backdrop of recent developments and Federal Governments desire to adopt a portal service hosted on the cloud. It also details the pit falls and explains why other public and government institutions have shied away from doing the same.

Cloud computing has unique attributes that require risk assessment in areas such as data integrity, At the forefront of this challenges is that of the security of sensitive data and information stored in countries where we have no legal jurisdiction on how these data is used or managed.

There is no better cautionary statement to set the tone like

“I am nervous to host corporate information on someone else’s server? Yes, even if its Google” – Shukry Tiab. There are several reasons experts’ advice caution in moving to “cloudosphere”. Some identified risks include;
  • Loss of service if your provider has downtime or goes out of business.
  • Regulatory problems when critical data is stored internationally.
  • Security concerns when users lose control of how their data is protected.
  • One-sided service agreements that give clients little redress in the event of a calamity, acquisitions, etc.
  • Lock-in dependency on proprietary cloud applications.
Early on in the evolution of any new technology, there are concern about how it will be used. These concerns are what is termed “Privacy Hump” – they represent a barrier to the acceptance and adoption of a potentially intrusive technology… if the business case for the technology is strong, the hump may fade over time – that time has not come yet for Cloud sourcing and the Government Institutions.

Preamble
In furtherance of its mandate to provide support to the Board of an apex regulator through the monitoring of the decisions of the Board and assurance of the highest level of oversight for internal and public complaints and managing, (from creation to archival), all their documents. The Department that manages the Board recently launched a portal service for the Board.

This portal designed by messers Digital Board Book Limited is accessible via the internet to all members and accords them the ease of collaborating with other members regardless of where they are in the world.

While these may be laudable objectives, we are of the opinion the regulator may have inadvertently by coerced into approving the deployment of sensitive Board decisions to the Cloud. The paper tries to draw the attention of the regulator to the huge risk associated with the cloud and government sensitive information. More especially as the President of the federation has recently directed that a similar portal be developed for the Federal Executive Council (FEC) for the Government.

Introduction
What is the Cloud?
Ostensibly, most people think the cloud is the same as the internet. The name cloud is inspired by the cloud symbol often used to represent the internet in diagrams and workflow, but that is where the similarity ends… it is more complicated than that.

The definition of the cloud is still hazy, but the Guardian defined it as “a means of putting more of your materials out ‘there’ and the less on you PC or Server” while the US National Institute of Standards and Technology defined it as “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction”.

These services are broadly divided into three categories;
  • Infrastructure-As-a-Service (IaaS),
  • Platform-as-a-Service (PaaS), and
  • Software-as-a-Service (SaaS)
Early on in the life of any technology, there are concern about how these technologies will be used. These concerns are what is termed “Privacy Hump” – they represent a barrier to the acceptance and adoption of a potentially intrusive technology… if the business case for the technology is strong, the hump may fade over time – that time has not come yet for Cloud sourcing and the Government Institutions.

Who is the Cloud meant for?
It is perhaps too easy to start using a cloud service – that’s exactly how it is designed to be. It is easier to setup a Yahoo, Gmail, or American Online account than installing and running an exchange server. However, while the later is more expensive to maintain, it can be easily controlled to protect sensitive data for an enterprise. – Cloud sourcing easily lends itself to small, medium companies who do not wish to incur, waste or underutilize resources, be it monetary or otherwise.

Presently cloud computing is been embraced by private businesses as a means of saving cost on computer hardware. Cost saving has been identified as the single most important factor for cloud computing services. Most public institutions are slow in embracing the technology as there has to be a strong case of cost savings aligned to security of sensitive data.

What is preventing its early adoption?
Security of sensitive data remains the major concern for public institutions the world over. One myth that cloud computing is sold on is that though it is a shared service, it can be implementation independent. But in reality, due to the “Openness of the Internet” and its inscribed transparency, industry regulatory compliance is another kettle of fish. The following section summarizes the challenges of adopting Cloud sourcing.

Current Concerns
The question is, can multi-tenant services ever be as secure as your own server? Concerns are beginning to grow about just how safe an environment the cloud is for holding sensitive data and information. Analysts warn that the cloud is becoming particularly attractive to cyber crooks. Reformed hacker, Michael Calce agrees that trouble looms ahead if companies fail to apply the right security measures.

Standards & Regulations
There are No Regulations and Standards when using or implementing cloud computing due to lack of long-term experience. This exposes other unique challenges such as follows:-

Privileged User Access.
Sensitive data that is processed outside the enterprise brings with it an inherent risk that it may fall into the “wrong Hands”. The most prominent issue in cloud services is security of user data as the user has no control over its business data files containing valuable information. This is because a proper security model for cloud computing has not yet been developed.

Contractual Obligations
Managing problems with another companies infrastructure is not practical due to a mis-alignment of interests. I cite Amazons “Non-Assertion” terms of reference. Other contractual gaps are:-

  1. Dependency:
    Cloud services make the user totally dependent on the Cloud Service Provider. The user is denied control on quality and maintenance issues and plays no role in back up and disaster recovery activities. They level of dependency is so high that the user existence is tied to the financial health of the cloud service provider. If the CSP goes under, the user’s business goes with it. This lack of control means that if a user decides to terminate his contract with the service provider, there is no way the user will ensure the provider does not retain his data in his database.
  2. Data/Information Location
    Another security issue is that physical location of hardware and software is unknown making site inspections and audits difficult.
  3. Cost and Flexibility:
    There is presently no customization of product as the whole essence is for many businesses to store data within the same environment. There is also the likelihood of hidden cost such as compliancy regulations, backup, restore, disaster recovery and problem solving costs been introduced by the CSP.
  4. Legislation:
    Users of cloud services don't know where their information is held which raises the question of loyalty by the Cloud Service Provider. The danger this poses can be highlighted by considering the America laws such as the US Patriot Act which empowers government and other agencies to access information including that belonging to companies as long as this information is held by companies operating within the United States. A subpoena or legal action can compel a cloud provider to give up sensitive information/data. This is further exuberated by the widespread use of freedom of information acts in the west.

    It also entails that critical information could be moved across boundaries without the knowledge of the user. Legal implications of data and applications being held by a third party are complex and not clearly understood. Potential risk of giving up sensitive data due to transparency.

    Contractual commitments to obey local privacy requirements across international jurisdiction is a burning issue for providers of sensitive information.
  5. Long-term Viability:
    Moose law suggests the fast pace of technological development, with cloud in its infancy, and there are little known information about the requirements and conditions for implementing and managing service level agreements contracts with CSPs. This hands the advantage to CSPs and exposes the user in case of disagreements in SLA. chances are that CSP will increase, small providers maybe bought over by new ones, leaving clients with few options.
  6. Provider Espionage:
    Espionage may not seem like a threat to a public regulatory institution, But it is however expedient that confidentiality and availability of the data and information be assured at all times.
    Data in the cloud is typically in a shared environment with other customers. Enforcing encryption across such a complex terrain is impractical considering that other customer may want avoid it due to its disruptive nature.

    Auditability of a distributed and dynamic application spread all over the globe is not practical and may not satisfy auditors that data is properly isolated and cannot be viewed by the wrong persons. One popular audit guideline is tha SAS 70 – it defines guidelines for the assess internal controls over processing of sensitive information. Other guidelines like the SOX and HIPAA. US government agencies are mandated to follow these guidelines.

    There have been well publicized accounts of cloud outages, down time of critical applications and services. When compared to traditional forms of investigative support, forensics in the cloud face huge difficulties if even possible. The scale of the cloud and the rate at which data is overwritten is of concern due to the logging and data for multiple customers often co-located and spread across an ever changing set of host and data centers.
Suggestions on The way forward:
The Board Book Portal Project has come a long way, a compelling business need that justifies its creation are well noted, however it is clear that the proper project initialization processes have not been followed leading to the unwitty decision to host on a public cloud. It is therefore expedient that a more detailed look is taken at the portal to ensure that sensitive board decisions are protected. This is even more crucial as the Presidency has muted its desire to adopt the same portal service for the Federal Executive Council of Nigeria.

We therefore recommend as follows: The legal and IT departments of the regulator conduct a due diligent exercises; Read and fully understand the legislation, reasonability and terms of both providers and users in case of loss of sensitive data.

Create Internal/Private Clouds or utilities:
The quest to use the Cloud is on for several public institutions, Most countries opt for a private cloud with more consistent and controlled governance to mitigate the identified risk enumerated above.

The UK government is setting up its own cloud to make savings of up to £3.2bn – a 20% reduction in costs. The UK government is working to build its own secured cloud called GCloud while the US government is working to build its own cloud called GovCloud. Both governments are avoiding the commercial environments primarily because of security concerns. Both governments have also identified savings of over $3b in computer hardware and software purchases over the next few years.

According to the analyst Gartner – the first step before committing to cloud source is to Seek security assessment from a neutral third party to assess the security risks associated with the present CSP. An external IT audit may signal how secure these cloud providers facilities are, and will no doubt suggest how trivial information should be published on the portal.

Proper project initiation processes be followed for all strategic projects such as this. This will ensure that all stakeholders are carried along and properly enrolled, as it has a significant impact on the quality of the project execution.

Government should determine security and privacy requirements, develop standards, gather data, and benchmark costs and performance against risks and trust.

Conclusion:
Cloud computing technologies have not reached maturity. Users are at the mercy of their cloud service providers for the availability and integrity of their data. Presently cloud computing is been used mostly by private firms, while public sector explores creating private Cloudscapes to protect sensitive government information.

In order for government institutions to embrace cloud technology, there is need to determine the business needs and benefits of cloud services and its fit with our policies, processes and legislation.

Thank You.

Monday, August 1, 2011

Mobile Digital Inclusion; a Paradox of Poverty & Technological Determinism

"...the Future Is Already Her! It’s Just Not Very Evenly Distributed!!”
— Richard Heeks
1. Preamble

Mpape Top-up
For all it is worth, one thing that has always baffled me as a young Nigerian, has been the tenacity and ingenuity displayed by my fellow countrymen. As a student in the early 90s, I wondered why all the petty traders sold the same seasonal fruits. Like a “seasonal harvest-sales culture” When it was the orange season, all the women would sell oranges, and when it was the cashew season, all of them would sell same. I couldn’t imagine how not one thought to create a niche market, by going solo to do something different.

Now as before, almost 2 decades on, I wondered why he was sitting there, in front of me. His wares cast to one side like he really didn’t care about them. He held in one hand, his head - aching... and in the other, he rubbed his leg – tired from walking the hot dusty streets of Abuja. One glance at his foot told me all there was to this drama. He had bruised his toes. I took pity on him, he couldn’t have been more than 13 years old, yet out of the dare need to feed, he had taken this “noble” cause to bring a top-up service to my phone. I felt sorry – and enquired how much it would cost to buy up all he had to sell, to enable him return home to nurse his busted toes. N5000 [1] he responded – I paid, he walked. I hoped he would rest, at least for today. But shocked I was, to learn he had limped off only to reappear with yet another batch – to continue in his toil to make ends meet on the sidewalks of Mpape[2].

2. Introduction
Changes in society as a result of increased international trade and cultural exchange, often called globalisation, have always had a significant impact on organisations and their Information Systems (IS). These changes are beginning to reopen research concerns in the area of development. These changes are contingent on the rapid inundation of IT in to less developing world. – leading to Development 2.0.
"...belle first[3]”
— An Africa Urban Cliche
Recent studies of the role of ICT in development exist (D´ıaz A & Urquhart (2009); (Hunt, 2001); Kanungo (2003); Salvador et al (2005). They all show the power of local knowledge and commitment to develop one’s community at play.

These early research have all too often been one sided, like the horse and its bilkers – they have focused on the marginal benefits derivable from ICT4D or Development 2.0, unwittingly neglecting the negatives. This has encouraged more and more research and foreign aid, As William Eastly succinctly put it, “The big problem with foreign aid and other western efforts to transform the Rest is that [the]people paying the bills are rich people who have very little knowledge of poor people.” (Eastly, W. (2006). Without prejudice, this paper seeks to throw more light in this dark area to help researcher gain inside knowledge of the bitter realities that plague the so called “4th World”.

This paper is divided into 4; the first part reflects on literature and outlines development 2.0. The second part seeks to trace the origins and motivation of development 2.0. part three focuses the issue on digital inclusion as practiced in Nigeria, delineating all its flavours in rich detail. Part four critically analysis these initiatives against the global-world economy and the disenfranchised in Africa. Finally part six concludes and makes recommendations.


3. Definitions
We turn to Richard Heeks as an authority in the area of eGovernment and Development in the developing world. He contends that at last “we can celebrate the fact that the foundations and assumptions of international development are changing. The tools for a digital economy are now—and will increasingly be—in the hands of the world’s poor. (Heeks. R. B. 2010). This change has reshaped the world of development by underpinning the importance of technology as a change driver.

“In 1998, less than one out of every 100 inhabitants in developing countries was an Internet user. By 2008, that figure had risen to 22 out of every 100. In 1998, two out of every 100 inhabitants in developing countries was a mobile phone subscriber. By 2008, that figure was 55 out of every 100”. (ITU. 2009)."

...a critical aspect of industrial competitiveness will be the ability to adapt quickly to rapid technological developments and constantly changing market conditions”
— Nikerson

3.1. Development 2.0
“Development 2.0” is defined as the new IT-enabled models that can transform the processes and structures of development. – (Heeks, R. B. 2010)

Development 2.0 deals mainly with the role of ICT in development. Richard Heeks categorises it in the following three loose genres. Breaking away from traditional norms, these include -

a) New Relationships
  • Connecting the excluded – bringing the digitally excluded within the digital fold
  • Dis-intermediating – removing the middle man, constraining eGovernent service to fight corruption.
b) New Roles
  • Digital Production – the connected poor now have access to unique jobs/services which were lacking hitherto.
  • Digital innovation – appropriating IT for other means, creating jobs.
c) New Models
  • Collective Power – crowd sourcing – text-in eParticipation
  • Social Enterprise-

Nowhere is this more evident, than in the area of mobile phones, where the poor, disenfranchised and excluded have evolved new unique ways to appropriate technology. The speed at which ICTs are diffusing has taken many observers by surprise. This is in no small part thanks to the mobile revolution. “With 4 billion mobile subscribers in the world” (United Nations, 2009 p. XI.) Mobile phones have emerged as the most widespread ICT in the developing world. (ibid. p.XIV) “An estimated two-thirds of the population [in Africa] now has access to a mobile phone. “Heeks, R.B. (2009).

African countries are pioneering mobile banking and electronic transactions services, like the m-Pesa service by Safaricom in Tanzania, and Airteks m-Chek and Odopay in India. (United Nations, 2009 p39 - 41). Research in this area abound for further reading (Rangaswamy, N. 2007); (D´ıaz A & Urquhart (2009); (Hunt, 2001); Kanungo (2003); Salvador et al (2005).

Mobile phones can also be a source of small enterprises. As argued by Madon S. Et al (2007) it supports development as they all share something in common, in that they are;-
  • getting symbolic acceptance by the community;
  • stimulating valuable social activity in relevant social groups; generating linkage to viable revenue streams; and
  • enrolling government support.
The concept of Development 2.0, even in Africa alone, is beyond the scope of this single paper. We shall therefore narrow it down to digital inclusion via mobile phones and be country specific by looking through the lens of the poor in Nigeria.

4. Nigerian Innovations
Nigeria is better known as the most populous black nation and for her misappropriation of ICT with SPAM than for ICT4D. But the ingenuity of the poor people shine through in the innovative ways they utilize technology - Especially with the mobile phone. In their bid to make ends meet and as a conduit to socio-economic development, the incidence of “low level of political awareness has resulted in meager resources being devoted to promoting” infrastructure in less developed nations (Brown et al, 200). This has informed the peculiarities observed in every Development 2.0 projects around the world. A few Nigerian Examples are described below.
"...The secret of economic growth lies in institutional innovations that are country specific, and that come out of local knowledge and experimentation.”
— Rodik
4.1. The “Umbrella People”
For lack of a better name, the ‘umbrella people.’ are the new merchants on the streets or at vantage points allover Nigeria, easily accessible to deliver phone services for a token fee. They sell air time top-up cards and also double as telephone centers, where customers can make and something receive calls. This phone posts serve a central role in the small villages as the operators are a hub of information dissemination drawing all comers towards it.


Figure 1: “Umbrella People” Sitting in the shade waiting for the next customer


4.2. Trade & Commerce Sales – GSM Village
The streets of urban Nigeria is awash with mobile vendors. Their typical merchandise range from cheap 1st generation mobile phones, universal chargers (one size fits all), phone pouches, batteries and their phone accessories.


Figure 2: “Mobile” Phone Shop. Source of Photo AP

Perhaps their most sold items are the casings[4] of all makes of phone –Some more elaborate models around the same commercial activity exist for more buoyant entrepreneurs. Like the one in the picture below.

Figure 3: A small phone shop Source of Photo AP


ICT Research & Development specifically adheres to Northern markets constructs – where technology is designed to be disposable. But here in a Southern example, old phones are repacked in a new casing to make them appear brand new – the culture of not throwing things away is determined by poverty.

4.3. Fix Shops
Interestingly, the most technical outcome of the mobile phone phenomenon is the mobile fix shop, where technicians[5] repair, maintain and unblock network-bound phones. More recently, with the Nigerian music industry on the rise, and the abundance of cheap flash memory and sophisticated phones with media capabilities, Fix shops now upload and manage musical playlist for customers that are not so good at operating their phones.

Figure 4: A technician repairing phones from scrape. Source of Photo AP


4.4. Mobile Print Shops
With upwards of 5 mega pixel cameras at the finger tips of many mobile phone owners, the art of Photography is been redefined. People can now take photos or all kinds at a moments notice - from the bizarre to mundane. The problem however is that most poor people do not have access to quality print shops where they can print these photographs - Enter the Mobile Printer.


Figure 5: Photographers mingle with tourist.

Mobile printers[6] can be seen in public leisure parks, tourist area and any social event. By means of a universal flash adapter, Bluetooth or infrared connection, they transfer pictures from a costumer’s phone to their printers for a fee.

4.5. Mobile Chargers
“Only 15 percent of rural households in Sub-Saharan Africa have access to electricity” (Heeks, R.B. 2008 p. 28). With frequent power cuts that last days on end, poor rural mobile phone users rely on mobile phone chargers to power their phones.


Figure 6: A Charging Station Source of Photo Self.


The operators of this service use fossil fuel power generators and charge a fee based on how long the batteries is charged. Notice there are hardly any phones being charged? That is because most rural people have multiple batteries to ensure that they can still be on air while their alternate batteries are under charge.


4.6. Other Innovations
Other unique innovative ways the poor have used mobile technology include
  • Free calls
    Mobile service providers offer promotions and freebies to retain existing customers and entice new ones. One such service targets the young by allowing free calls to numbers on the same network from 11pm – 5am. This has seen the poor react in a unique ways. Though African traditions forbid normal activities at night – night is for sleeping. Most poor choose to converse with loved ones, or transact all business deals late to avoid spending money.
  • ‘Flashing’
    Amongst the poor in Nigeria, it is common place to beep and drop before the call is answered. This is termed “Flashing” and is typically used by a subordinate to initiate a call to a superior – by so doing saving money to the subordinate. It is also spurning a new opportunity for traders, especially the airtime top-up vendors who store the names of their customers and send a voucher by text or render a home call to sell the top-up vouchers when they receive a “Flash” from their customers – the memorandum of understanding being not to answer the call, but promptly react by providing the Top-up voucher.

5. Gainers & Losers
Not surprisingly, there are some technological determinist like Heeks who may celebrate every little progress made, as long as it has a technological bearing, while on the flip side there are critics like Willlam Eastly who don’t quite see the connection of struggling poor people with development.

In Heeks view, one “can start to migrate: from seeing [the poor] as victims to seeing them first as consumers, then producers, then innovators of a digital age. And, as we do so, changing our views on the processes and structures of socioeconomic development: from Development 1.0 to Development 2.0.” Heeks. R. B. (2010)

But much like Eastly, Madon et al (2007) I agree with the argument that “there is a significant gap between the original espoused social development goals... and actual usage patterns. As may be observed in the Nigerian cases presented above, challenges to techno-economic globalization come from peoples search for communal or collective identity. – in this wise, the poor are driven by hunger and deprivation to seek novel ways to make a living. The outcomes of these opportunities challenges the norm concerning the barriers to development, vis-à-vis the poor and the digital world-economy. And as such should not be termed as development.

One other point is the expressions being used. for the advocates, there seems to be a blur between the “information poor” and the “financially poor” – a distinction that William Eastly clearly suggest in his epic book “The White Man’s Burden”. Castells also argues’ in his 3rd Vol. that “the rising occasion of the digital divide that widen the gulf of inequalities, may well make way for the emergence of the “4th world”. What has been the value of these projects? What are the evaluation of the costs and benefits of this forms of inclusion? Who is benefiting from it and in what way? All these concerns underpin the spirit of questioning and reassessment of ICT4D [that] is becoming more and more evident. I will elaborate on the many contradictions within these changes bellow.
"The big problem with foreign aid and other western efforts to transform the ‘Rest’ is that people paying the bills are rich people who have verylittle knowledge of poor people.”
— William Eastly
5.1. “Belle First”
Much like my token of mercy in the Mpape Top-up story at the beginning of this paper, the immediate benefit derived by this menial work is insignificant. Hunger for food, not information, seems to be the driving force behind all this. This argument is echoed by Eastly in his book “The Burden of the White Man” – where he concluded that the aid money spent by the West on the “Rest” was not enough to bring her out of poverty. So in simple terms, these changes are a desperate measure by desperate people trying to make ends meet. – this further punctuates the development concerns.

5.2. Urban Migration
The rural – urban divide is important for development in any setting. For developing nations, the impact of ICT in the form of mobile phones is a two edged sword, as it empowers the farmers to expand markets and reduce cost (FARA. 2009) on one hand, while encouraging more and more unskilled youths to leave the urban farms for an opportunity to engage in the “mobile service” on the other.

In the Nigerian examples mentioned earlier most of the Umbrella People around large towns have migrated from the rural areas to urban centres where they can easily setup shop – afterall, all that is needed is a few Naira[7] in the pocket, a large umbrella and a stool. Unwittingly depriving the nation of useful human resources who could benefit the nation in other regards – and the other sector suffers. Mobile services and this type of practice is yet another nail in the coffin for agriculture in Nigeria – this trend is fast spreading to other countries in the western coast of Africa.

5.3. Free Trade
Though it has been argued that “the neoliberal assumption that enabling market access in the global world economy by free trade, or the enactment of intellectual property rights will lead to development” (Gallagher, K. 2004, p5) it is all dependent on several factors. As Rodrik suggests, “The secret of economic growth lies in institutional innovations that are country specific, and that come out of local knowledge and experimentation”. – Unfortunately, this is not what we see in the Nigerian example. The innovations are of an adaptive type rather than creative type.

Easterly's argument is that if motivations for change is imposed by outsiders ”almost nothing works -- in either the economic or political sphere.” It's no accident, he argues that,

“the great East Asian economic success stories of recent decades -- Japan, China, Taiwan, South Korea, Thailand -- all took place in countries that were never successfully colonized by the West. These nations evolved their own cultures, rules and disciplines and built an indigenous foundation for rapid economic growth. The region's laggard is the one nation that was colonized: the Philippines”. (Easterly W., 2007)

This no doubt is at a macro level of nations and states, but we can still make the inference by looking observing its instabilities from a micro level and see how outside money will affect it. “It is unclear where [these] current instabilities might lead, but it is not unreasonable to argue that a questioning of neoliberal political and economic policies and the rise of certain forms of development management are helpful in understanding future roles for ICTs in development.” (Silva & Westrup 2009)

5.4. Inscription
Globalised world or not, IS and its constructs are grounded in the needs of the northern nations and as such do not have the cultural values of the south inscribed within their processes. This brings to question the needs like the furtherance of the Neo capitalist ideals that exploit the poor and fatten the rich – (corporations and individuals alike). There is no evidence in this area, and these are just an echo of the small cynic in me.

5.5. Capitalism & Multinationals
Another such factors is the role of local, (regional and national) authorities mediating and regulating markets. Manuel Castell’s 3 volume study on The Information Age: “Economy, Society and Culture” suggests that a new “network society is emerging from current process of change that is both capitalist and informational”... it goes ahead to say that firms (large or small) seek “to sell wherever they can throughout the world, either directly or via their linkage with networks that operate in the world market (Vol. 1 p. 27).

If we observe the above Nigerian initiatives with this lens, it clearly shows that the big multinationals are feasting large, at the expense of the poor. Mobile service providers like MTN, Vodacom, Vain, Globacom, and recently Etisalat to mention but a few. It is even more complicated when one considers that these services locks lock their users in, with poor subscribers spending as much as 50% of their earning on maintaining their phone.

We have already seen how ICT R&D adheres to Northern markets constructs – where technology is designed to be replaced (hidden under the guise of improvements, Designers continue to manufacture newer and newer models and target anywhere where they can make money.

5.6. Institutionalization
Let us returning to Madons et al (2007) criteria for technologies that support development outline earlier - 1) they should be getting symbolic acceptance by the community; 2) stimulating valuable social activity in relevant social groups; 3) generating linkage to viable revenue streams; and 4) enrolling government support. From the forgoing, we can say that for our Nigerian initiatives described above, it is a resounding yes to the first two criteria, whereas, the last two are clearly not evident.

Even though social inclusion is a good thing, the support needed to move things forward are not normally in place - institutionalisation of digital Inclusion (Harris et al (2003); Madon et al (2007). While most “projects are started with funding from local or central government, aid agencies or NGOs” Madon et al (2007), the initiatives described here are financed mostly by individuals or thrifts societies at best. Their argument for institutionalizing them by involving Government, NGOs and Multinational may well lead to their extinction and usher in Castell’s so called “4th World” of the super poor.

Figure 7: An MTN Sponsored Kiosk.

Though this projects are largely backed by the service providers for whom the poor aid by distributing the top-up cards, and as a means of cheap publicity the service providers brand, (see image above) there is largely no evidence of enrolling local, regional or national government support. Or any form of NGO support as evident in Telecenters and other ICT initiatives.

Typical model of these projects is a mediation between the mobile service provider and a go-between (mostly connected rich individuals) who buys in airtime in bulk and pays stipends for the poor to hawk or sell at their stands.

6. Conclusion
“As mobile phones have presented a way to bridge the connectivity gap without expanding the networks of fixed lines, they are likely to have a great impact on economic growth than in developed countries, where fixed lines were widely available when mobile phones were introduced.” (United Nations, 2009)

But we don’t need to look far to see who’s gaining and who’s losing – my central argument here has been that though the capitalist and their advocates see signs of development in these peculiar inclusive interactions, the fact remains that it’s the multinationals and their neo capitalist objectives that seem to enjoy it all. A glimpse on any African street from Egypt to the cape will reveal the lure – a bait set to catch the poor, hook, line and sinker (See figure 8 below). Furthermore, this puts to question the overall aim of the veal that the West want to help the Rest. As Eastly has cited in his work “The Burden of the White Man” real development comes from within – every other intervention may have its own motives and interest. He says if ‘change motivation’ is “imposed from the outside, almost nothing works!

Figure 8: A Sidewalk in Abuja Source of Photo Self.

Though these activities give a false sense of an inclusion in the global world society - the activities that Westerners often point to as inclusive are actually driven by poverty. People congregating like the “seasonal harvest sales culture”[8] to sell collectively. People selling top-up cards on the street, patronizing mobile chargers for lack of electricity at home, People standing under umbrellas and wasting away in the name of a few hundred Naira at the end of the day only to waste almost all of it on accessories or staying connected, people buying phone casing just because they want to keep their old phones looking brand new, etc cannot be termed as “Developing”. All these are informed by poverty and not mobile inclusion.

" ... if ‘change motivation’ is “imposed from the outside, almost nothing works! in either the economic or political sphere… It's no accident that the great East Asian economic success stories of recent decades - Japan, China, Taiwan, South Korea, Thailand - all took place in countries that were never successfully colonized by the West. These nations evolved their own cultures, rules and disciplines and built an indigenous foundation for rapid economic growth.
— William Eastly
Critics may consider this article a narrow one, and rightly so - judging from the breadth of Development 2.0, it nonetheless throws more light on the resourcefulness of a largely unregulated budding industry of the so-called disenfranchised and poor. “This constellation of mixed media happens within a strictly commercial and entrepreneurial framework of very small businesses with little interest in promoting ICT for development,” Rangaswamy Nimmi (2007)

With some African nations (Nigeria inclusive) now set to connect to submarine optic fiber optic cables soon, there may still be an opening of the black box of African ingenuity as they explore new options with high bandwidth, video and voice capabilities. It will also be nice to feel what a better infrastructure and environments portends for the poor. If electricity distribution improves, will the Multinational Service providers install and run their own vending machines? and plunge the poor back to poverty? If electricity services improve, will the mobile charger stands disappear altogether? If there is no more easy jobs in the urban centers and Government clamps taxes on the “Umbrella People”, will there be another exodus back to the villages? Can they return to farming after tasting the sweet life of the cities?

This paper, though narrow in its scope has traced development through its ICT4D 1.0 – Development 2.0 by focusing on digital inclusion in a country specific setting. It has been able to illustrate how driven by sheer need to survive, the financially poor are seeking a better life by exploiting mobile technologies. The paper tried to debunk the technological imperative, and pointed more to poverty and the need to stay alive as its main driving force. It is our hope that this may help to promote interest in the negative impacts of digital inclusion in the global world economy. Further research may look into case studies or an ethnographic immersion into these innovative projects, with a view to finding how to connect with NGO and government bodies. And perhaps answer some of the questions posed above. I hope that researchers would find it useful.

7. References
Avgerou, C. (2002) Information Systems and Global Diversity, Oxford University Press, Oxford.

Appadurai, A. (1996) Modernity at Large: Cultural Dimensions of Globalisation, University of Minnesota Press, Minneapolis. IN Geoff Walsham, (2001) “Making a World of Difference: IT in a global context” Wiley

Brown et al () “Is Social Inclusion Always a Good Idea” JoDD Vol 14 Mo. 2 http://www.docstoc.com/docs/20364345/Is-Social-Inclusion-Always-a-Good-Idea/ Assessed 20 April 2010.

Castells, M. (1996, 1997, 1998) Information Age: Economy, Society and Culture. Blackwell, Oxford IN Geoff Walsham, (2001) “Making a World of Difference: IT in a global context” Wiley

Diaz Antonio Eduardo Andrade, Cathy Urquhart (2009) “ICTs as a Tool for Cultural Dominance: Prospects for a Two-Way Street” The Electronic Journal of Information Systems in Developing Countries Vol 37, No 2. http://www.ejisdc.org/ojs2/index.php/ejisdc/article/view/536/275 Assessed 19th April 2010.

Easterly, William. (2006) “The White Mans Burden; Why the wests effort to aid the rest have done so much ill and so little good.” New York, N.Y. ; London : Penguin Press.

FARA (Forum for Agricultural Research in Africa) (2009). Inventory of Innovation Farmer Advisory Services. Http://www.iicd.org/files/innovative-Farmer-Advosory-Systems-Fed09.pdf IN United nations, (2009) “Information Economy Report 2009; Trends and Outlook in Turbulent Times”. United Nations Conference on Trade and Development.

Gallagher, K. (2005). Globalization and the nation-state: Reasserting policy autonomy for development. IN K. Gallagher (Ed.), Putting development first: The importance of policy space in the WTO and international financial institutions (pp. 1–15). London: Zed Books. IN Leiser Silva and Chris Westrup (2009) “Development and the Promise of Technological Change” Wiley InterScience (www.interscience.wiley.com). Information Technology for Development, Vol. 15 (2) 59–65.

Heeks, R.B. (2008) “ICT4D 2.0: The Next Phase of Applying ICT for International Development” Published by the IEEE Computer Society. Vol. 0018-9162

Heeks, R.B. (2009) Beyond Subscriptions: Actual Ownership, Use and Non-Use of Mobiles in Developing Countries. ICT 4D blog, 2009; http://ict4dblog.wordpress.com

Heeks , R. B. (2010) “Development 2.0: The IT-Enabled Transformation of International Development” Viewpoints; Communications of the ACM, April 2010. Vol 53 No. 4.

Hunt, P. (2001) ‘True stories: telecentres in Latin America and the Caribbean’, Electronic Journal of Information Systems in Developing Countries, 4(5), 1-17. IN Madon S., Reinhard, N., Roode, D. and Walsham, G. (2007) “Digital Inclusion Projects In Developing Countries: Processes Of Institutionalisation” Proceedings of the 9th International Conference on Social Implications of Computers in Developing Countries, São Paulo, Brazil, http://www.ifipwg94.org.br/fullpapers/R0040-1.pdf Accessed 1 may 2010.

ITU. ICT Statistics Database, International Telecommunications Union, Geneva, 2009; http://www.itu.int/IT U-D/icteye/Indicators/Indicators.aspx) IN Richard Heeks, (2010) “Development 2.0: The IT-Enabled Transformation of International Development” Viewpoints; Communications of the ACM, April 2010. Vol 53 No. 4.

Kanungo, S. (2003) ‘Information village: bridging the digital divide in rural India’, in The Digital Challenge: Information Technology in the Development Context, S. Krishna and S. Madon (eds), Ashgate Publishing, Aldershot, 103-123. IN Madon S., Reinhard, N., Roode, D. and Walsham, G. (2007) “Digital Inclusion Projects In Developing Countries: Processes Of Institutionalisation” Proceedings of the 9th International Conference on Social Implications of Computers in Developing Countries, São Paulo, Brazil. http://www.ifipwg94.org.br/fullpapers/R0040-1.pdf Accessed 1 may 2010.

Leiser Silva and Chris Westrup (2009) “Development and the Promise of Technological Change” Wiley InterScience (www.interscience.wiley.com). Information Technology for Development, Vol. 15 (2) 59–65.

Madon S., Reinhard, N., Roode, D. and Walsham, G. (2007) “Digital Inclusion Projects In Developing Countries: Processes Of Institutionalisation” Proceedings of the 9th International Conference on Social Implications of Computers in Developing Countries, São Paulo, Brazil, http://www.ifipwg94.org.br/fullpapers/R0040-1.pdf Accessed 1 may 2010.

Nickerson, R. S. (1995). Emerging Needs and Opportunities for Human Factors Research. National Academy Press, Washington, DC.

Rangaswamy Nimmi (2007) “ICT for development and commerce: A case study of internet cafés in India” Proceedings of the 9th International Conference on Social Implications of Computers in Developing Countries, São Paulo, Brazil, May 2007 http://www.ifipwg94.org.br/fullpapers/R0071-1.pdf Assessed 22 April, 2010

Rodrik, D. (2004). How to make the trade regime work for development. Cambridge, MA: Harvard University Press. IN Leiser Silva and Chris Westrup (2009) “Development and the Promise of Technological Change” Wiley InterScience (www.interscience.wiley.com). Information Technology for Development, Vol. 15 (2) 59–65.

Salvador, T., Sherry, J.W. and Urrutia, A.E. (2005) ‘Less cyber, more café; enhancing existing small businesses across the digital divide with ICTs’, Information Technology for Development, 11(1), 77-95.

Sachs, D. Jeffery (2005) “The End of Poverty; Economic Possibilities for Our Time” Penguin Press; 1st edition

Silva and Westrup (2009) “Development and the Promise of Technological Change ”Information Technology for Development DOI: 10.1002/itdj

United nations, (2009) “Information Economy Report 2009; Trends and Outlook in Turbulent Times”. United Nations Conference on Trade and Development.

Walsham, Geoff (2001) “Making a World of Difference: IT in a global context” Wiley

[1] About £50 Sterling

[2] Mpape is a suburb of the Federal Capital Territory Abuja, Nigeria.

[3] Belle is a pidgin English word for Stomach, Tummy or Food. “Belle First” means is another way of saying nothing is worth doing until one fulfills the first obligation to self – feeding.

[4] The outer shell of the phone with its buttons, but without the circuits and internal components.

[5] Mostly with no formal training, they may have acquired their skills by apprenticeship.

[6] They also take pictures if you don’t have a camera

[7] The Naira is the name of the Nigerian legal tender, it exchanged for N2 - £1 in the early 80s but now exchanges for N242 – £1 . source – www.cenbank.org

[8] Like the Mpape Top-up story at the beginning of this paper, I noticed the similarities with collective harvest time sales practiced by farmers with the urban mobile craze practiced by the poor.