SlideShare una empresa de Scribd logo
1 de 20
 

     RCCG LP25 GIICT
          WINNERS
     THUMBS ON – ACCESS ALL YOUR
    ACCOUNTS SAME WAY, SAFEST WAY

                             TECHNOVATION CHALLENGE



                                          Digital inclusion for this
                                          generation and the next
The RCCG LP25 Technovation
Technology in 21st Century Skills

  • We are a team of young teenage girls from under the
    Teens Church arm one of the Provincial Headquarters
    of the Redeemed Christian Church of God in Lagos
    and we are excellence-oriented people running with a
    globally-impactful vision. Our team name is RCCG
    LP25 GIICT WINNERS and the names of our team
    members are as follows:-
                                      Digital inclusion for this
                                      generation and the next
Importance of Technology
           in Schools
   As technology is bound to rule our present and
    future, it is good to obtain a know how of the
    technological reforms at the earliest. Children learn
    faster and can adapt to changes relatively easily. If
    they are trained during their school years, they have
    high chances of becoming experts in technology. An
    early beginning is always beneficial in the long run.
    When we know that technology is bound to be a part
    of their future, it is best to introduce them to it during
    school life. Instead of seeing them, struggle with
    learning later in life, it is advisable to give them a
    basic idea of the technological reforms
                                             Digital inclusion for this
                                             generation and the next
PRESENTED BY
Uramu  Maryann, 17
Ekechukwu Rachel, 17
Akingba Gladys, 14
Edozie Oluchi, 14
Ogunleye Oluwatosin, 18
                    Digital inclusion for this
                    generation and the next
Introducing the Thumb Access
                 Technology

 The Thumb Access is a software technology
 that aims at improving phone security and
 contributing to global crime control. If you
 are looking for that software that eases
 mental stress while ensuring information
 protection, then Thumb Access is what you
 need.

                               Digital inclusion for this
                               generation and the next
Introducing the Thumb Access
               Technology

 Thumb  Access links you to all your accounts
 whether on SNS, Chat Messengers, E-mail or
 with your Bank through one medium – your
 thumbprint. Like is widely known, only the
 human thumbprint is unique to every
 individual as no two persons have the same
 finger-print features. This makes Thumb
 Access far safer than passwords which are
 prone to hacking, formatting or can even be
                                 Digital inclusion for this
 forgotten.                      generation and the next
Introducing the Thumb Access
                 Technology

 Thumb     Access works in a way that
    specifically eliminates any fears of intrusion
    to one’s protected information. All that
    protection comes without cramming or
    writing passwords; it simply demands
    registering your thumbprint with every
    account you own. Now you can be sure that
    your next mail, tweet, chat message or even
    bank transaction is just a thumbprint away.
                                    Digital inclusion for this
                                   generation and the next
Technology Environments




                    Digital inclusion for this
                    generation and the next
THUMBS ON – ACCESS ALL YOUR
ACCOUNTS SAME WAY, SAFEST WAY




         Fig a
                                                  Fig b




                 Fig e                            Fig d
 Fig c

                         Digital inclusion for this
                         generation and the next
How does it work?


 The software comes pre-loaded on mobile
 phones that operate touch-capabilities, i.e.
 touchscreens, as part of the System Software.
 Once purchased and ready to use, the user is
 required to register his or her thumbprint
 (preferably the right thumb) as part of the
 start-up procedures.


                                Digital inclusion for this
                                generation and the next
How does it work?


 The user also is required to register his or her
 SNS, Chat Messenger, E-mail as well as Bank
 accounts with the thumbprint as an access
 code. Once this stage is completed, regular
 settings will follow. As a result, the thumbprint
 will also serve as the phone code covering the
 various codes that can be used on mobile
 phones.
                                   Digital inclusion for this
                                   generation and the next
How does it work?


 Sowhen you need to unlock your phone, view
 your mails, access your SNS or chat, your
 thumbprint will be requested for as your pre-
 registered access code. No password
 required! Now you can open as many
 accounts you want on the variety of sites as
 you won’t need to rack your brain over a
 forgotten password.
                                Digital inclusion for this
                                generation and the next
How does it work?


Also, the thumbprint is saved
 on a central database along with
 your phone details for retrieval
 and phone security purposes.


                       Digital inclusion for this
                       generation and the next
Can I change settings on
  my Thumb Access?

 Sure enough, the application is
 absolutely user-friendly permitting
 controlled changes in settings for
 customer satisfaction. Any change in
 settings will demand the pre-registered
 thumbprint so as to prevent intrusion.
 With this and more, you have it all the
 more secure.                 Digital inclusion for this
                                        generation and the next
How does the App improve
         security?

 Asa user, your accounts are safe
 against unwanted intrusions while your
 phone accessibility is controlled. You
 also get to track and find the location of
 your phone if lost or stolen thus going a
 long way in helping Police
 Investigations.
                              Digital inclusion for this
                              generation and the next
How does the App improve
          security?

 Since your phone will demand access code
 every two hours and for every attempt at
 unlocking (Preset), any unauthorized use
 through theft leaves the suspect without any
 means of using or changing any settings. This
 technology will also curb phone theft as
 stealing an access-protected phone will be
 unappealing. Since the application will be
 operating under system software, it will not be
                                  Digital inclusion for this
 liable to formatting.           generation and the next
How does the App improve
          security?

 Sincethe phone will only be sold at
 designated retail centers, road-side sale of
 stolen phones will be considered illegal and
 termed as a criminal act. Robbery suspect will
 also be tracked using the stolen phone and it
 can be found even after being discarded.
 Change of SIM cards will be irrelevant to
 decoding or unlocking the phone.
                                 Digital inclusion for this
                                 generation and the next
How does the App improve
             security?

   Country security can be greatly improved through
    linking it with the appropriate database thus giving
    possible monitoring of migrations. The user can
    also set the thumbprint as a permission code for
    switching of the phone. In order to preserve
    necessary information, time changes will
    immediately occur with a change in time zones. All
    users need to do is to notify the phone/software
    manufacturers on the theft of their phones,
    information on the phone location will be
                                          Digital inclusion for this
    immediately sent to the user.         generation and the next
Can I use/find the software
        on any phone?

Thumb   Access is only available on
 touch-enabled phones and will be
 available for Symbian OS, Windows
 OS, Web OS, Android OS, i-OS,
 Blackberry OS and other
 collaborating touch-enabled phone
 categories.
                          Digital inclusion for this
                          generation and the next
THANK YOU SEE YOU ALL AT
        THE TOP

    Thank You for Listening!




                      IT TAKES A GOOD PROCESS
                        TO BRING OUT A GOOD
                             PRODUCT

Más contenido relacionado

La actualidad más candente

Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
Mobile changes everything, no one is safe
Mobile changes everything, no one is safeMobile changes everything, no one is safe
Mobile changes everything, no one is safeJorge Sebastiao
 
IRJET- A Review on Iot Based Sign Language Conversion
IRJET-  	  A Review on Iot Based Sign Language ConversionIRJET-  	  A Review on Iot Based Sign Language Conversion
IRJET- A Review on Iot Based Sign Language ConversionIRJET Journal
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacementTELKOMNIKA JOURNAL
 
Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Mattia Brunetti
 
State of the Market
State of the MarketState of the Market
State of the MarketNFC Forum
 
Smart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry piSmart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry piAabid Ansar
 
Are you Smart Phone savvy?
Are you Smart Phone savvy?Are you Smart Phone savvy?
Are you Smart Phone savvy?Simon Lock
 
(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013STO STRATEGY
 
UNESCO | Touch and Mobile technologies for the Classroom session 3
UNESCO | Touch and Mobile technologies for the Classroom session 3UNESCO | Touch and Mobile technologies for the Classroom session 3
UNESCO | Touch and Mobile technologies for the Classroom session 3Giorgio Ungania
 
The User Experience of Near Field Communication
The User Experience of Near Field CommunicationThe User Experience of Near Field Communication
The User Experience of Near Field CommunicationMemi Beltrame
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Contactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile LoyaltyContactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile LoyaltyMerchant360, Inc.
 

La actualidad más candente (19)

NFC
NFCNFC
NFC
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
Mobile changes everything, no one is safe
Mobile changes everything, no one is safeMobile changes everything, no one is safe
Mobile changes everything, no one is safe
 
IRJET- A Review on Iot Based Sign Language Conversion
IRJET-  	  A Review on Iot Based Sign Language ConversionIRJET-  	  A Review on Iot Based Sign Language Conversion
IRJET- A Review on Iot Based Sign Language Conversion
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement
 
Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!
 
State of the Market
State of the MarketState of the Market
State of the Market
 
Smart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry piSmart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry pi
 
Are you Smart Phone savvy?
Are you Smart Phone savvy?Are you Smart Phone savvy?
Are you Smart Phone savvy?
 
(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013
 
NFC wallet
NFC walletNFC wallet
NFC wallet
 
UNESCO | Touch and Mobile technologies for the Classroom session 3
UNESCO | Touch and Mobile technologies for the Classroom session 3UNESCO | Touch and Mobile technologies for the Classroom session 3
UNESCO | Touch and Mobile technologies for the Classroom session 3
 
The User Experience of Near Field Communication
The User Experience of Near Field CommunicationThe User Experience of Near Field Communication
The User Experience of Near Field Communication
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Smart phone
Smart phoneSmart phone
Smart phone
 
Contactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile LoyaltyContactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile Loyalty
 

Destacado

Member and Family Engagement: Digital Workforce Group
Member and Family Engagement: Digital Workforce GroupMember and Family Engagement: Digital Workforce Group
Member and Family Engagement: Digital Workforce GroupTed Eytan, MD, MS, MPH
 
College management system
College management systemCollege management system
College management systemAditya Kiran
 
Vehicle accident report slideshare
Vehicle accident report slideshareVehicle accident report slideshare
Vehicle accident report slidesharecatou9
 
Railway gate cct project report-Diploma Project
Railway gate cct project report-Diploma ProjectRailway gate cct project report-Diploma Project
Railway gate cct project report-Diploma ProjectSubhash Kumar Yadav
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 
Project Management
Project ManagementProject Management
Project ManagementRami Issa
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
Academic management system PPT
Academic management system PPTAcademic management system PPT
Academic management system PPTNagaraj Kandoor
 
Remote accident report system for highways using rf
Remote accident report system for highways using rfRemote accident report system for highways using rf
Remote accident report system for highways using rfPRADEEP Cheekatla
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Online Bus Reservation System
Online Bus Reservation SystemOnline Bus Reservation System
Online Bus Reservation SystemSiva Rushi
 
railway reservation software documentaion
railway reservation software documentaionrailway reservation software documentaion
railway reservation software documentaionJoveria Beg
 
Online examination system
Online examination systemOnline examination system
Online examination systemRahul Khanwani
 
Online examination documentation
Online examination documentationOnline examination documentation
Online examination documentationWakimul Alam
 

Destacado (20)

Member and Family Engagement: Digital Workforce Group
Member and Family Engagement: Digital Workforce GroupMember and Family Engagement: Digital Workforce Group
Member and Family Engagement: Digital Workforce Group
 
Online examination software eduexam
Online examination software eduexamOnline examination software eduexam
Online examination software eduexam
 
College management system
College management systemCollege management system
College management system
 
Vehicle accident report slideshare
Vehicle accident report slideshareVehicle accident report slideshare
Vehicle accident report slideshare
 
Railway gate cct project report-Diploma Project
Railway gate cct project report-Diploma ProjectRailway gate cct project report-Diploma Project
Railway gate cct project report-Diploma Project
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Project Management
Project ManagementProject Management
Project Management
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Academic management system PPT
Academic management system PPTAcademic management system PPT
Academic management system PPT
 
Automated Bus Ticket Booking System
Automated Bus Ticket Booking System Automated Bus Ticket Booking System
Automated Bus Ticket Booking System
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Academic management
Academic managementAcademic management
Academic management
 
Remote accident report system for highways using rf
Remote accident report system for highways using rfRemote accident report system for highways using rf
Remote accident report system for highways using rf
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Online Bus Reservation System
Online Bus Reservation SystemOnline Bus Reservation System
Online Bus Reservation System
 
railway reservation software documentaion
railway reservation software documentaionrailway reservation software documentaion
railway reservation software documentaion
 
ONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEMONLINE BUS BOOKING SYSTEM
ONLINE BUS BOOKING SYSTEM
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
Online examination documentation
Online examination documentationOnline examination documentation
Online examination documentation
 

Similar a THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY

How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfOZONESOFT Solutions
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
7 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 20227 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 2022Cerebrum Infotech
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market TrendsForgeRock
 
2018 01 smart city symposium - db
2018 01 smart city symposium - db2018 01 smart city symposium - db
2018 01 smart city symposium - dbDavid Bressler
 
How to Launch a Secured Digital Wallet.pdf
How to Launch a Secured Digital Wallet.pdfHow to Launch a Secured Digital Wallet.pdf
How to Launch a Secured Digital Wallet.pdfMarie Weaver
 
E business-ppt
E business-pptE business-ppt
E business-pptnetsmartzz
 
DSMS - Community
DSMS - CommunityDSMS - Community
DSMS - CommunityJAN HICKEY
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Parental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhoneParental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhoneNischint
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetTechugo
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
How RelyPass Simplifies Password Management
How RelyPass Simplifies Password ManagementHow RelyPass Simplifies Password Management
How RelyPass Simplifies Password ManagementRelyPass
 
Top Cybersecurity Challenges Faced By Fintech Applications! .pdf
Top Cybersecurity Challenges Faced By Fintech Applications! .pdfTop Cybersecurity Challenges Faced By Fintech Applications! .pdf
Top Cybersecurity Challenges Faced By Fintech Applications! .pdfTechugo Inc
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOPDevConFu
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Allan Isfan
 

Similar a THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY (20)

How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
7 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 20227 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 2022
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
 
2018 01 smart city symposium - db
2018 01 smart city symposium - db2018 01 smart city symposium - db
2018 01 smart city symposium - db
 
How to Launch a Secured Digital Wallet.pdf
How to Launch a Secured Digital Wallet.pdfHow to Launch a Secured Digital Wallet.pdf
How to Launch a Secured Digital Wallet.pdf
 
E business-ppt
E business-pptE business-ppt
E business-ppt
 
DSMS - Community
DSMS - CommunityDSMS - Community
DSMS - Community
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Going Mobile
Going MobileGoing Mobile
Going Mobile
 
Parental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhoneParental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhone
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
How RelyPass Simplifies Password Management
How RelyPass Simplifies Password ManagementHow RelyPass Simplifies Password Management
How RelyPass Simplifies Password Management
 
Top Cybersecurity Challenges Faced By Fintech Applications! .pdf
Top Cybersecurity Challenges Faced By Fintech Applications! .pdfTop Cybersecurity Challenges Faced By Fintech Applications! .pdf
Top Cybersecurity Challenges Faced By Fintech Applications! .pdf
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015
 

Último

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Último (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY

  • 1.   RCCG LP25 GIICT WINNERS THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY TECHNOVATION CHALLENGE Digital inclusion for this generation and the next The RCCG LP25 Technovation
  • 2. Technology in 21st Century Skills • We are a team of young teenage girls from under the Teens Church arm one of the Provincial Headquarters of the Redeemed Christian Church of God in Lagos and we are excellence-oriented people running with a globally-impactful vision. Our team name is RCCG LP25 GIICT WINNERS and the names of our team members are as follows:- Digital inclusion for this generation and the next
  • 3. Importance of Technology in Schools  As technology is bound to rule our present and future, it is good to obtain a know how of the technological reforms at the earliest. Children learn faster and can adapt to changes relatively easily. If they are trained during their school years, they have high chances of becoming experts in technology. An early beginning is always beneficial in the long run. When we know that technology is bound to be a part of their future, it is best to introduce them to it during school life. Instead of seeing them, struggle with learning later in life, it is advisable to give them a basic idea of the technological reforms Digital inclusion for this generation and the next
  • 4. PRESENTED BY Uramu Maryann, 17 Ekechukwu Rachel, 17 Akingba Gladys, 14 Edozie Oluchi, 14 Ogunleye Oluwatosin, 18 Digital inclusion for this generation and the next
  • 5. Introducing the Thumb Access Technology  The Thumb Access is a software technology that aims at improving phone security and contributing to global crime control. If you are looking for that software that eases mental stress while ensuring information protection, then Thumb Access is what you need. Digital inclusion for this generation and the next
  • 6. Introducing the Thumb Access Technology  Thumb Access links you to all your accounts whether on SNS, Chat Messengers, E-mail or with your Bank through one medium – your thumbprint. Like is widely known, only the human thumbprint is unique to every individual as no two persons have the same finger-print features. This makes Thumb Access far safer than passwords which are prone to hacking, formatting or can even be Digital inclusion for this forgotten. generation and the next
  • 7. Introducing the Thumb Access Technology  Thumb Access works in a way that specifically eliminates any fears of intrusion to one’s protected information. All that protection comes without cramming or writing passwords; it simply demands registering your thumbprint with every account you own. Now you can be sure that your next mail, tweet, chat message or even bank transaction is just a thumbprint away. Digital inclusion for this  generation and the next
  • 8. Technology Environments Digital inclusion for this generation and the next
  • 9. THUMBS ON – ACCESS ALL YOUR ACCOUNTS SAME WAY, SAFEST WAY Fig a Fig b Fig e Fig d Fig c Digital inclusion for this generation and the next
  • 10. How does it work?  The software comes pre-loaded on mobile phones that operate touch-capabilities, i.e. touchscreens, as part of the System Software. Once purchased and ready to use, the user is required to register his or her thumbprint (preferably the right thumb) as part of the start-up procedures. Digital inclusion for this generation and the next
  • 11. How does it work?  The user also is required to register his or her SNS, Chat Messenger, E-mail as well as Bank accounts with the thumbprint as an access code. Once this stage is completed, regular settings will follow. As a result, the thumbprint will also serve as the phone code covering the various codes that can be used on mobile phones. Digital inclusion for this generation and the next
  • 12. How does it work?  Sowhen you need to unlock your phone, view your mails, access your SNS or chat, your thumbprint will be requested for as your pre- registered access code. No password required! Now you can open as many accounts you want on the variety of sites as you won’t need to rack your brain over a forgotten password. Digital inclusion for this generation and the next
  • 13. How does it work? Also, the thumbprint is saved on a central database along with your phone details for retrieval and phone security purposes. Digital inclusion for this generation and the next
  • 14. Can I change settings on my Thumb Access?  Sure enough, the application is absolutely user-friendly permitting controlled changes in settings for customer satisfaction. Any change in settings will demand the pre-registered thumbprint so as to prevent intrusion. With this and more, you have it all the more secure. Digital inclusion for this generation and the next
  • 15. How does the App improve security?  Asa user, your accounts are safe against unwanted intrusions while your phone accessibility is controlled. You also get to track and find the location of your phone if lost or stolen thus going a long way in helping Police Investigations. Digital inclusion for this generation and the next
  • 16. How does the App improve security?  Since your phone will demand access code every two hours and for every attempt at unlocking (Preset), any unauthorized use through theft leaves the suspect without any means of using or changing any settings. This technology will also curb phone theft as stealing an access-protected phone will be unappealing. Since the application will be operating under system software, it will not be Digital inclusion for this liable to formatting. generation and the next
  • 17. How does the App improve security?  Sincethe phone will only be sold at designated retail centers, road-side sale of stolen phones will be considered illegal and termed as a criminal act. Robbery suspect will also be tracked using the stolen phone and it can be found even after being discarded. Change of SIM cards will be irrelevant to decoding or unlocking the phone. Digital inclusion for this generation and the next
  • 18. How does the App improve security?  Country security can be greatly improved through linking it with the appropriate database thus giving possible monitoring of migrations. The user can also set the thumbprint as a permission code for switching of the phone. In order to preserve necessary information, time changes will immediately occur with a change in time zones. All users need to do is to notify the phone/software manufacturers on the theft of their phones, information on the phone location will be Digital inclusion for this immediately sent to the user. generation and the next
  • 19. Can I use/find the software on any phone? Thumb Access is only available on touch-enabled phones and will be available for Symbian OS, Windows OS, Web OS, Android OS, i-OS, Blackberry OS and other collaborating touch-enabled phone categories. Digital inclusion for this generation and the next
  • 20. THANK YOU SEE YOU ALL AT THE TOP Thank You for Listening! IT TAKES A GOOD PROCESS TO BRING OUT A GOOD PRODUCT

Notas del editor

  1. What are 21 st century skills? True technology and media literacy Effective communication Critical thinking Problem solving And…collaboration The best learning environment to acquire these skills is an “eLearning” environment Access to ICT (Information and Communication Technology) has emerged as a key strategy to take education to a new level – by creating effective eLearning environments
  2. [This is a section head slide – allows field person to establish rapport before “diving in.”] 1. Global economic climate is getting more competitive. 2. Demand for skilled workforce is increasing. 3. New technology tools play an increasing role in learning.
  3. [This is a section head slide – allows field person to establish rapport before “diving in.”] 1. Global economic climate is getting more competitive. 2. Demand for skilled workforce is increasing. 3. New technology tools play an increasing role in learning.
  4. [This is a section head slide – allows field person to establish rapport before “diving in.”] 1. Global economic climate is getting more competitive. 2. Demand for skilled workforce is increasing. 3. New technology tools play an increasing role in learning.
  5. Whether you’re introducing or expanding ICT in your schools, successful implementation takes several key components working together: Strong technology Connectivity Professional development Improved learning methods and Digital curriculum All of these contribute to an eLearning environment where 21st century skills flourish and students thrive. Technology: PCs, servers, PDA/handhelds, cell phones, iPods*. Also: Wired communications and computing networks; wireless communications and computing networks. Connectivity: Wired or wireless. Wi-Fi and WiMAX are optimum. Professional development: Many flavors available. Intel’s Teach to the Future program offers professional development for teachers in 35 countries today. Improved learning methods: Student-centric learning, project-based learning, group collaboration, goal of developing higher-order thinking skills. Digital curriculum: Includes digital content, but is not the same thing as digital content. A digital curriculum is a teaching/learning approach that assumes that technology and connectivity are involved, and that takes advantage of those. So lesson plans are different, resources are different, AND the content is digital (from the Net, multimedia, CD-ROM, etc. – electronic-based, not paper-based).