fbpx

Destiny Young

Destiny Young is a highly credentialed information technology professional with over 14 years of industry experience. An HND/BSc (Hons) in Computer Science graduate. He holds a Master of Technology degree in Information Technology from the prestigious University of South Africa (UNISA). He is a Distinction-grade MBA alumnus of Nexford University, Washington, DC, where he also obtained a First-class MSc degree in Digital Transformation. His professional development direction is in Cybersecurity, Digital Transformation, and Business Intelligence. He is a member of the British Computer Society (BCS), the Chartered Institute of Administration of Nigeria (CIA), the Nigeria Computer Society (NCS), etc.
304 POSTS
4 COMMENTS

National Digital Economy and E-Governance Act 2024: THE DIGITAL TRANSFORMATION ERA

For effective execution of the provisions under this Act, there shall be established in every public institution an ICT Unit with such number of staff as may be required for efficient performance, effective service delivery, and digital transformation of functions in the respective public institution.

National Digital Economy and E-Governance Act 2024

The bill aims to create a legal framework for the digital economy in Nigeria and improve the way the government delivers services to citizens

CrowdStrike: Revolutionizing Cybersecurity

CrowdStrike is a leading cybersecurity company dedicated to protecting organizations from cyber threats

Data Lifecycle Management: EXPLAINED

Data lifecycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its lifecycle: from creation and initial storage to when it becomes obsolete and is deleted.

I am working with FG to develop new identity technology in Nigeria – Bill Gates

According to Gates, the ID technology called MOSIP would ensure that every Nigerian gets digital benefits.

Implementing Effective Collaboration between Academia and IT Industry Players in Nigeria

Establish a framework for intellectual property management and commercialization of research outcomes, ensuring mutual benefits.

How An Attacker Can Hack Your Fingerprint

If the potential victim swipes the screen during a call, the attacker can reconstruct parts of the fingerprint from the sound it makes.

Elon Musk unveils Tesla LunaRoof: AI solar panel to generate electricity from moonlight

One of the major problems with conventional solar power systems is that they are only able to generate solar power at certain times of the day, and only when the sky is as free of clouds as possible.

Optical Fiber: Aston University researchers beam internet speeds at 301,000 Gbps

the team developed “optical amplifiers and optical gain equalizers,” which can tap the E-band and S-bans, alongside the already commercialized C and L-bands

Managing Modern Organizations: Why Business Leaders Must Embrace IT

Leaders who embrace IT’s transformative power can drive sustainable growth, foster innovation, and navigate the complexities of a technology-driven world.

Follow me

Latest articles

Subscribe to our newsletter