Bridging the digital divide! We aim to inspire young men and women to reach for the skies in ICTs in a safe and healthy environment. P.O. Box 309 Bamenda, Republic of CameroonEmail:corneliustawong@gmail.com

Nouveauté: Cliquez Pour Traduire Mon Blog En Français

Saturday, 15 November 2014

History of Prime Ministers of Cameroon

History of PMs
alt

Philemon Yang


alt

Ephraïm Inoni


alt

Mafany Musonge Peter


alt

Simon Achidi Achu

  • Gouvernement du Opens internal link in current window25/11/1992
  • Gouvernement du 09/04/1992

alt

Sadou Hayatou


alt

Luc Ayang


Bello Bouba Maigari


alt

Paul Biya


alt

Simon Pierre Tsoungui


alt

Salomon Tandeng Muna 


alt

Augustin Ngom Jua 


alt

Charles Assalé

alt

alt

John Ngu Foncha 


alt

Ahmadou Ahidjo

TRADITIONAL HEALER INTERPRETS WHY CHILDREN CRY AT NIGHT


Health children feeding in a typical environment I refer to


The Wimbum do not have a medical system, but are confronted with a wide–ranging complex of illnesses and other misfortunes for which all the various kinds of healers, whether traditional or biomedical should, between them, have a cure. Medicine is seen not as a system but as part of the necessary cultural camouflage that enables one to survive.
Pa Njobe was a traditional healer and expert in children’s health complications. He lived above our Kieku quarter in Bondu quarter all of the Binjong Ward in Tabenken Village, Donga Mantung Division of the North West Region of Cameroon. After my sickness during early childhood days (about the age of 4), I had not fallen ill again for a long time. I was taken to Pa Njobe in Bondu quarter sometimes when I had stomach bite. On arrival in his treatment room, he placed his hand on my navel and a maggot came out. We took home a litre of boiled herbs which I drank for some days and from that time onwards I had  never been sick nor experience the stomach bite again up to age of above thirty. The traditional healer was a specialist in children’s sicknesses and most mothers in the Wimbum area took children who cried at night to him. His compound was large and because women came there from far and nearby villages some of these women took residence in his large compound waiting for treatment depending on their case. Ever since Pa Njobe touched my stomach and a maggot came out it was mysterious to me. This was because I didn’t see this maggot in his hand at the time he was preparing to touch my navel. I have heard stories about Pa Njobe and when it came to my case I was very vigilant observing him. It was believed that children who cry at night had an insect in their navel troubling them and must be removed.
After mine was removed mysteriously at the time, I didn’t believe in it but later on argued that if the stomach bite had come to an end then it was thanks to this practice of Pa Njobe. Of recent on CRTV media one advert says that one pampers equals one dry night and makes children sleep well and peaceful but what if the child cries when there isn't bedwitting? Mothers even though illiterate are scientific too.
Parents in remote and rural areas especially those dogmatic ones foolishly think that when they leave their children with the clergy they are in safe hands. This is not true. Some of these believes have cost some children their lives. Many of such unfortunate children were and are still nowadays being sexually abused by these clergy. If God helps you or rather if you find favour with God you will learn that the greatest wickedness in this world comes from people who disguise to be godly. Earlier mentioned, Jesus was killed by priests who had studied the law of God so well and should have known him.

Friday, 14 November 2014

Global Change Leaders

Deadline: 9 January 2015
Coady Institute’s International Centre for Women’s Leadership is inviting applications for the Global Change Leaders Program. It is a seven-week education program which seeks to enable women from developing countries to reinforce their leadership capacities in order to contribute to innovation and change in their communities.
Global Change Leaders program provides successful candidates with a full scholarship that includes tuition, travel, accommodations, and meals. Participants will also get the benefit of  the guidance and mentorship of accomplished women leaders from around the world.
Eligibility Criteria
This program is targeted to emerging women leaders from developing countries who are working on development issues.  The women should fulfill the following criteria:
  • Possess a minimum of four years of demonstrated leadership experience in a social or economic development endeavor.
  • Have great drive and passion for their work.
  • Are practitioners in civil society organizations including community based organizations and not for profits.
  • Hold a university degree or a combination of post-secondary education and experience.
  • Have strong oral and written English language competencies.
Program Schedule
  • August 24 – October 8, 2015: A seven week on-site intensive course at the Coady International Institute in Antigonish, Nova Scotia where a collaborative relationship is fostered among facilitators and participants to draw out lessons and insights from their rich and diverse experiences.
  • October 12, 2015 – April 30, 2016:  Participants will benefit from one-on-one mentoring from experienced women leaders upon their return home for up to six months to follow on the application of learning into practice.
How to apply?
  1. The candidates have to click on the Apply Now link and register themselves with their email id.
  2. After successful registration the application form has to be submitted online with their registered id.
For more information, please visit: Apply Now.

Job opportunities for young Africans at the World Bank

Through targeted programs and internships, the World Bank benefits from investing in the talent of young African professionals, and has much to gain by investing in more. Below is a list of career opportunities available for young Africans who are interested in working at the World Bank. The jobs are stationed both at the headquarters in Washington, DC and the Africa country offices. All of these opportunities are paid and require fluency in English. However, fluency in at least one other Bank language (French, Spanish, Russian, Arabic, Portuguese, or Chinese) is an advantage. As a young African, I encourage any fellow African youth to consider these job opportunities and pass them along to interested peers: 1) Africa Fellowship Program Description Fellows will spend a minimum of 6 months getting hands-on experience at World Bank headquarters in Washington D.C. to work on economic policy, technical assistance to countries, and lending for eliminating poverty and increasing shared prosperity. Who can apply? Doctoral students of African descent within one or two years of completing a Ph.D. program in the following fields: Economics, Demography, Applied Statistics and Econometrics, Impact Evaluation, Education, Health, Energy, Agriculture, and Infrastructure. Applicants must be 32 years of age or below. Learn more and APPLY here. 2) Internship Program Description This Internship typically seeks candidates in the following fields: Economics, Finance, Human Development (public health, education, nutrition, population), Social Science (anthropology, sociology), Agriculture, Environment, Private Sector Development, as well as other related fields. Who can apply? Candidates must possess an undergraduate degree and already be enrolled in a full-time graduate study program (pursuing a Master's degree or PhD with plans to return to school in a full-time capacity). Learn more and APPLY here. 3) Junior Professionals Associates Program Description This is a two-year, entry-level program designed for those skilled in areas such as Economics, Finance, Human Resources Development (public health, education, nutrition, population), Social Sciences (anthropology, sociology), Agriculture, Environment, Private Sector Development, as well as other related fields. Who can apply? Applicants 28 years of age or below, holding the equivalent of a Bachelor's degree, with some relevant job experience. Learn more and APPLY here. 4) MIGA Professional Program Description Candidates will be assigned to one of MIGA’s department to work in underwriting, financial accounting and reporting, as well as economics and risk management (including environmental and social risk mitigation). Who can apply? Applicants under 35 years of age with an advanced degree and a minimum of 5 years working experience in the relevant field. Learn more and APPLY here. 5) Young Professionals Program Description This is a two-year, entry-level program designed for those skilled in areas such as Economics, Finance, Education, Public Health, Social Sciences, Engineering, Urban Planning, and Natural Resource Management. Who can apply? This program is open to applicants under 32 years of age with an advanced degree and a minimum of 3 years working experience in the relevant field. Learn more and APPLY here. To join the discussion on youth in Africa, follow @WorldBankAfrica on Twitter, and use the hashtag #AfricasYouth.

Breaking News: Former Crtv Director General Gervais Mendo Ze Has Been Arrested

Gervais Mendo Ze
Mendo Ze is at this moment, languishing in the Kondengui Central Prison, Yaounde. The former CRTV Director General was initially taken Wednesday morning November 12, to the Special Criminal Court, where he was heard for several hours. And right now, he has been remanded in custody at the Kondengui Central Prison, pending investigations. Mendo Ze was CRTV Director General from 1988 till 2005. 
This is the latest development of the "Operation Sparrow Hawk"

Thursday, 13 November 2014

MTN-Microsoft Cloud Conference 13th November 2014

MTN-Microsoft Cloud Conference

MTN Cameroon

Ten Commandments of Computer Ethics

International Computer Principles Prescribed In The Cameroon GCE Syllabus For Computer Science/ICT
Lessons For Form One Students
Ten Commandments of Computer Ethics
1. THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE.
2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'S COMPUTER WORK.
3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'S COMPUTER FILES.
4. THOU SHALT NOT USE A COMPUTER TO STEAL.
5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.
6. THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID.
7. THOU SHALT NOT USE OTHER PEOPLE'S COMPUTER RESOURCES WITHOUT  
     AUTHORIZATION OR PROPER COMPENSATION.
8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT.
9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARE DESIGNING.
10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURE CONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANS.
 
COMPUTER ETHICS INSTITUTE
11 Dupont Circle, NW Suite 900
Washington, DC 20036
Tel. (202) 939-3707
Fax (202) 797-7806
The Institute gives full permission to copy and use these commandments, with the request that the source be acknowledged.
Exegesis
Commandment 1
Simply put: Do not use a computer in ways that may harm other people.
Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users' data or files. The commandment states that it is wrong to use a computer to steal someone's personal information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs, which on execution lead to stealing, copying or gaining unauthorized access to other users' data. Being involved in practices like hacking, spamming, phishing or cyber bullying does not conform to computer ethics.
Commandment 2
Simply put: Do not use computer technology to cause interference in other users' work.
Explanation: Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for example, are programs meant to harm useful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the functioning of computers in more ways than one. It may overload computer memory through excessive consumption of computer resources, thus slowing its functioning. It may cause a computer to function wrongly or even stop working. Using malicious software to attack a computer is unethical.
Commandment 3
Simply put: Do not spy on another person's computer data.
Explanation: We know it is wrong to read someone's personal letters. On the same lines, it is wrong to read someone else's email messages or files. Obtaining data from another person's private files is nothing less than breaking into someone's room. Snooping around in another person's files or reading someone else's personal messages is the invasion of his privacy. There are exceptions to this. For example, spying is necessary and cannot be called unethical when it is done against illegitimate use of computers. For example, intelligence agencies working on cybercrime cases need to spy on the internet activity of suspects.
Commandment 4
Simply put: Do not use computer technology to steal information.
Explanation: Stealing sensitive information or leaking confidential information is as good as robbery. It is wrong to acquire personal information of employees from an employee database or patient history from a hospital database or other such information that is meant to be confidential. Similarly, breaking into a bank account to collect information about the account or account holder is wrong. Illegal electronic transfer of funds is a type of fraud. With the use of technology, stealing of information is much easier. Computers can be used to store stolen information.
Commandment 5
Simply put: Do not contribute to the spread of misinformation using computer technology.
Explanation: Spread of information has become viral today, because of the Internet. This also means that false news or rumors can spread speedily through social networking sites or emails. Being involved in the circulation of incorrect information is unethical. Mails and pop-ups are commonly used to spread the wrong information or give false alerts with the only intent of selling products. Mails from untrusted sources advertising certain products or spreading some hard-to-believe information, are not uncommon. Direct or indirect involvement in the circulation of false information is ethically wrong.
Commandment 6
Simply put: Refrain from copying software or buying pirated copies. Pay for software unless it is free.
Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the original work of the individual who created it. It is copyrighted in his name. In case of a developer writing software for the organization he works for, the organization holds the copyright for it. Copyright holds true unless its creators announce it is not. Obtaining illegal copies of copyrighted software is unethical.
Commandment 7
Simply put: Do not use someone else's computer resources unless authorized to.
Explanation: Multi-user systems have user specific passwords. Breaking into some other user's password, thus intruding his private space is unethical. It is not ethical to hack passwords for gaining unauthorized access to a password-protected computer system. Accessing data that you are not authorized to access or gaining access to another user's computer without his permission is not ethical.
Commandment 8
Simply put: It is wrong to claim ownership on a work which is the output of someone else's intellect.
Explanation: Programs developed by a software developer are his/her property. If he is working with an organization, they are the organization's property. Copying them and propagating them in one's own name is unethical. This applies to any creative work, program or design. Establishing ownership on a work which is not yours is ethically wrong.
Commandment 9
Simply put: Before developing a software, think about the social impact it can have.
Explanation: Looking at the social consequences that a program can have, describes a broader perspective of looking at technology. A computer software on release, reaches millions. Software like video games and animations or educational software can have a social impact on their users. When working on animation films or designing video games, for example, it is the programmer's responsibility to understand his target audience/users and the effect it may have on them. For example, a computer game for kids should not have content that can influence them negatively. Similarly, writing malicious software is ethically wrong. A software developer/development firm should consider the influence their code can have on the society at large.
Commandment 10
Simply put: In using computers for communication, be respectful and courteous with the fellow members.
Explanation: The communication etiquette we follow in the real world applies to communication over computers as well. While communicating over the Internet, one should treat others with respect. One should not intrude others' private space, use abusive language, make false statements or pass irresponsible remarks about others. One should be courteous while communicating over the web and should respect others' time and resources. Also, one should be considerate with a novice computer user.

Green Grasshopper Business in Bamenda

Bucket Green grasshoppers sells at 9.000frs

Buyam-Sellam and the  catchers early in the morning doing green grasshopper business

Niba Emmanuel and a Buyam-Sellam 

Buyam-Sellam putting the grasshoppers in her bag to take to Bamenda town

Niba Emmanuel and Buyam - Sellam

Taminang Edwin: Biggest grasshopper industry owner and Buyam-sellam

Pouring grasshoppers out of the drums early in the morning

Software