Monday, May 18, 2009

1.0 INTRODUCTION

Looking a couple of years back, one tends to wonder how the world and Nigeria in particular, ever got by without the convenience information technology affords the average man. Gone were the times when hi-tech methods of carrying out basic endeavor were seen as the preserve of the rich class. From the Automated Teller Machine to the GSM mobile phone and the internet, the current day metropolitan dweller find a far more easier and convenient lifestyle in business, leisure, relationships and networking.

Though, as would any new phenomenon, this development has come with its own associated setbacks and negative implications. Information and communication technology has developed over time and some of the very basic problems (for example, data loss, medium congestion, portability, memory capacity, adaptability etc.) have been equalized by better processes and technologies in the search for the delivery of seamless performance.

One problem, however, continues to rear its ugly head in unbelievable dimensions, almost at a better rate compared to technological advancement so much so that advancing technology seem to be moving at a pace behind it. Security and privacy remains an issue with the world’s new found lifestyle. While the issue of privacy has been mitigated by certain legislations and best practices, security threats have become more ravenous. This has made it necessary for developments in the art of securing information and communication technology to move one step further to pre-empt a major setback in what has become a lifestyle to a majority of the twenty-first century generation.

VISION AND MISSION STATEMENT

VISION:
To be a household name in hi-tech lifestyle solutions

MISSION:
“We hope to deploy the best of business ideals in our passionate drive at delivering the state of the art technology solutions that make life more qualitative.”

BUSINESS OBJECTIVES:

1.) To identify areas of technical lag in the use and application of information technology;

2.) To employ ethical, practical and lawful means in sourcing information and communication technology solutions that are designed to suit the needs of the peculiarity of the Nigerian socio-cultural environment;

3.) Acquiring and developing knowledge prowess in addressing some of the basic challenge that plague the use of information and communication technology

4) Sourcing for franchise from local and international organizations that offer applications that best tackle the problems associated with information and communication technology use;

5) Providing sundry support using a warm and effective customer service channel and

6) Promoting security awareness and consciousness, using the vehicle of our products and services .

7.) To leverage on the peculiarity of the Nigerian environment to achieve profitability while simultaneously empowering honest and diligent individuals who seek to make a living.

OUR PRODUCT

INTRODUCTION
Information and communication technology gadgets have gone personal in our age and the need to protect mobile phones, laptops and similar gadgets cannot be over-emphasized, not necessarily as a result of the cost of initially acquiring them, but the volume of personal and/or official information content of such devices. This software solution has been designed to accomplish the twin goal of protecting the personal and real values of such equipments.

The solution is of different variants. But essentially their operating modes are similar. The solution is basically installed into the equipment or gadgets and when the eventuality of a theft takes place, the software activates automatically.