Polytech Consulting & Development PLC

Polytech Consulting & Development PLC Polytech Consulting and Development (PCODE) is a technology company established at the source of Blue Nile in Bahir Dar city, Ethiopia.
(1)

With best of our experience with PHP, JSF, Joomla, Drupal, .NET, ASP, JAVA, C #, Adobe Photoshop, 3Dmax, Adobeflush, and many of video editing softwares, we are developing software, websites and database system. Just contact us in
Addiss Ababa - 09738130
Bahir Dar - 0920774197
Harar/Dire Dawa- 0927605169

Happy Monday!
21/03/2016

Happy Monday!

13/03/2016

   Bio-metric identification and   device known as  -secure.It works by identifying the vein   in the palms of our hands...
13/03/2016



Bio-metric identification and device known as -secure.

It works by identifying the vein in the palms of our hands.

Similar to our , vein patterns are unique to each individual. The purported advantages of this technology is that it is less expensive, easier to manage, and is more than traditional methods of identification.

    S7 and Galaxy S7 Edge -- the new   to beatThe Samsung Galaxy S7 and S7 Edge are beautifully well-executed  , worthy ...
13/03/2016

S7 and Galaxy S7 Edge -- the new to beat

The Samsung Galaxy S7 and S7 Edge are beautifully well-executed , worthy flagships from one of the world's largest manufacturers. The changes from last year's S6 lines are incremental, but the fixes and upgrades are in all the right places. Those small improvements make for two vastly phones, which start at $650 (for the S7) and $750 (for the S7 Edge), depending on the carrier.

Infographic-   -of-
11/03/2016

Infographic- -of-

10 tips to make your phone more secureስልክህ በይበልጥ የተጠበቀ እንዲሆን ለማድረግ 10 ጠቃሚ ምክሮችYour smartphone is more precious than your...
03/03/2016

10 tips to make your phone more secure
ስልክህ በይበልጥ የተጠበቀ እንዲሆን ለማድረግ 10 ጠቃሚ ምክሮች
Your smartphone is more precious than your wallet, your keys and in some cases, your actual computer when it comes to sensitive information - but we all have that nagging guilt that we don't do enough to protect our devices beyond perhaps having a four digit pass code.
Thankfully we are here to help with some top-level tips to help make your phone more secure, protecting those all important messages and images that you don't want falling into the wrong hands.
With around 314 mobiles stolen a day on the streets of London, the risk of things getting out is extremely high.
Of course if you're looking to keep your phone safe from international spies, or snooping networks, you can always check out the BlackPhone... but if you're just the average smartphone user who wants to be a little safer, follow some of our tips below.

1. Update your software
Whether you are running iOS, Android or Windows Phone we will always advise you to grab the latest version of the OS available. This can be a little difficult with Android updates often taking a little while to go through manufacturer and network testing but is well worth it.
Part of the reason we suggest grabbing the latest OS is because it comes with all the added bonuses whether it's the Control Center of iOS7 or the clear bars on Android KitKat, but also because a lot of security loopholes will have been closed.
These updates don't just pop up in major iterations either; Apple is currentlypushing out iOS 7.0.6 in order to close a problem associated with using Apple devices on an unsecured network.
Most manufacturers allow you to set your phone to check for updates automatically, so always make sure this box is ticked.
2. Use a secure lock screen
It seems almost nonsensical in this day and age to not have a basic password on your lock screen, even if it is a basic one. One of the first things we'd suggest is to navigate into your device's security settings and enable a pass lock.
There are obvious benefits to having even a basic lock, but whilst face lock of Android might seem fun it isn't the most secure system out there, with many Google devices rating the effectiveness of each security system so you can make an informed choice.
Looks fun, but isn't secure
Pattern unlocks and pins are some of the most secure but if you can handle the hassle we'd always suggest a full alphanumeric password. Also ensure that any boxes that say "make passwords visible" are also unticked.
If you want to take it one step further then we'd also recommend changing your pass code regularly in case someone spots what you've typed in over your shoulder.
3. Install antivirus software
One of the biggest threats that could see data leaked is the less-than-humble virus. The problem isn't as widespread as on desktop computers, and if you don't download dodgy software chances are that within a 2 year contract you won't come across anything malicious, but there is still a credible threat out there.
The problem appears to be less hazardous for iPhones thanks to Apple's strict controlling of the App store. The open source nature of Android makes it a lot more vulnerable, as malicious apps can be sideloaded onto the device without being checked by Google. In both cases this is something that can be countered through the use of mobile Antivirus software.
The likes of McAfee, AVG and Lookout grace both the iOS App Store and the Google Play store for added security, but obviously be careful of any apps that seem a little suspicious.
If you're really worried check out the manufacturer's website as most will come with a link to their mobile app.
4. Disable apps from untrusted sources and don't root or jailbreak
Whilst it can often be a nice idea to download and install apps that aren't found on the App Store or Google Play Store, these apps tend to be the ones that are less secure. Google, Apple and Microsoft, as well as the likes of BlackBerry, keep tabs on the apps that are on their app portals.
This means apps that contain malicious code are likely to have been removed before you install them.
Rooting your Android phone or jailbreaking your iPhone can also prove really dangerous, especially if you don't know what you're doing. This is because it breaks down your OS and provides you access to the basic code within and if you can get access, malicious code has a much easier route to making changes too.
If you're more familiar with the world of rooting and jailbreaking then you'll have taken measures to ensure the security of your device - so make sure you're certain you know what you want when altering your handset.
5. Use lock code apps and vaults
One thing that can be particularly important for protecting vital messages and pictures is to add a second layer of security. If you've got a pass code that somehow manages to get into the wrong hands then all your data could potentially be at risk.
Locked and vaulted
With another app you can then add another layer of security by protecting apps with a second code. Vault apps also allow you to be safe by storing all the files that you want to secure within a dedicated area of your device or on an SD card, as well as being able to wipe the data after unsuccessful log in attempts.
Samsung's new Galaxy S5 features a fingerprint scanner to hide certain parts of your phone too - it might not be the easiest thing to use, but at least you can be doubly secure that nobody can get into the places you want hidden.
6. Use kid/guest modes
Kid modes, and to a lesser extent guest modes, are also vitally important. The last thing you want is for your child (or your friend) to be messing around on your phone and to stumble across private data, or to later find that they have inadvertently called your boss whilst you're sat discussing a job interview.
These are now prevalent on most Android and Windows devices, as well as being downloadable via the App Store on iOS, but make sure you know how to get out of them when your child has finished - so many people must have spent minutes locked in a crocodile game because they forgot the PIN code.
7. Keep Location settings enabled
This is something that is less about protecting your device from being stolen or having your data stolen and is much more about getting your handset back should you lose it.
On iOS there is the 'Find my iPhone' app which is exceptionally easy to install and use, and a similar technique is available via Android.
Using Android to find your device
This doesn't require an app, just navigate to Google Play via a web browser, click the settings wheel and hit Android Device Manager. From here you can locate, ring, lock and erase your device if needed.
For Windows Phone go via WindowsPhone.com and log in with your details to spot its location on a map and make it ring, display a message or erase the whole device. If you're still rocking a BlackBerry, you can use the BlackBerry Protect tool to achieve a similar thing. This needs to be preset on the BlackBerry device, however.
8. Use wearable tech
One of the key features that can be found within the likes of the Sony SmartWatch 2 or the Galaxy Gear 2 is the ability to know when you've left your phone behind. As the Bluetooth connection is broken when out of range, the watch buzzes to let you know.
It is also possible to make your phone ring if still in range. This is useful beyond being able to locate your phone when you've dropped it down the back of the sofa; if you know the phone is in reach and but not on your pocket then you can make it ring and track it down.
9. Set up a SIM lock
On top of securing your phone, make sure that you've locked your SIM if this is important to you.
A SIM lock (sometimes called a SIM PIN or SIM Security) is especially important if you're tied into an uncapped contract, less so if you're on PAYG. This is because it requires you to input a PIN before you make a call or send a message, vital if you want to ensure that thieves can't run up massive bills. It's not the most efficient way to use your phone, but if you're in a place that worries you, head into your security settings to enable it.
10. Keep sensitive files off your phone
Even better than encrypting your SD card is to make sure the files are never on your phone in the first place.

Job Opening Polytech Consulting and Development (PCODE IT Solution) PLC is hiring  Graphic Designer  Mobile App Software...
19/02/2016

Job Opening
Polytech Consulting and Development (PCODE IT Solution) PLC is hiring
Graphic Designer
Mobile App
Software Developers
Based in Addis Ababa, Bahir Dar and Gondar.
Call 0911 56 56 92 or0935 98 28 18to set up your interview.

Date Posted:Thursday, February 17, 2016

13/02/2016
21/01/2016
የዩኒቨርሲቲ መግቢያ ውጤት ይፋ ሆነ
31/07/2014

የዩኒቨርሲቲ መግቢያ ውጤት ይፋ ሆነ

የዩኒቨርሲቲ መግቢያ ውጤት ይፋ ሆነ

ባህር ዳር ፡ሀምሌ 24/2006 ዓ/ም(አብመድ) በ2006 የትምህርት ዘመን የዩኒቨርሲቲ መግቢያ የብቃት መመዘኛ ፈተና የወሰዱ ተማሪዎች ወደ ዩኒቨርሲቲ መግቢያ ውጤት ሐምሌ 24 ቀን 2006 ዓ.ም ይፋ ሆኗል።
በዚህም መሰረት በመደበኛ እና በማታ በተፈጥሮ ሣይንስ የትምህርት መስክ ፈተና ወስደው 315 እና ከዚያ በላይ ያመጡ ተማሪዎች ወደ ዩኒቨርሲቲ ይገባሉ።
በማህበራዊ የትምህርት መስክ በመደበኛ እና በማታ ፈተና የወሰዱ ደግሞ 280 እና ከዚያ በላይ የዩኒቨርሲቲ መግቢያ ውጤት ሆኗል።
በግልም ሆነ በመንግስት ከፍተኛ የትምህርት ተቋማት በማታም ሆነ በቀን እንዲሁም በርቀት ትምህርታቸውን መከታተል ለሚፈልጉ ተማሪዎች 250 እና ከዚያ በላይ ውጤት ማምጣት ይኖርባቸዋል።
በ2007 የትምህርት ዘመን 1 መቶ 15 ሺህ 6 መቶ 80 ተማሪዎች ወደከፍተኛ ትምህርት ተቋም መግባት የሚያስችለውን ውጤት አምጥተዋል።
ዝርዝር መረጃው እንደደረሰን የምናደርሳችሁ ይሆናል፡፡

ምንጭ፡-ኢርቴድ

APPLY or share with those that might be interested. We are looking for a few interns for this summer.
01/07/2014

APPLY or share with those that might be interested. We are looking for a few interns for this summer.

22/06/2014
22/06/2014

Seven common Android problems and how to fix them

1. Battery drain
Numerous users have reported problems with the battery life of their devices. One of the easiest ways to prolong your smartphone's battery is to change your locations and brightness settings.
Enter the settings menu, click on Location, and select battery saving mode. As for brightness, you should avoid using auto-brightness and instead turn your screen down somewhere below halfway, or to a level that is acceptable for your eyes.

2. Frozen and slow user interface
Phones typically begin to slow down as their internal storage fills up. Try deleting unused apps and photos, or moving them to the cloud or a microSD card. In addition, you should close open apps that you are no longer using, delete app cache, and limit the use of live wallpapers.
An app's cached data can be deleted be going to Settings, clicking on Apps, selecting a certain app, and choosing the "Clear cache" option. Programs such as App Cache Cleaner and Clean Master, both of which are available for free from the Google Play store, can also be used to automate the process of clearing cache.

3. Connectivity issues
If you have are having a problem connecting to Bluetooth, Wi-Fi, or your cellular network, enable Airplane mode for 30 seconds, toggle it off, and try connecting again. Sometimes simply toggling the specific connection can also solve the problem.
Still having issues? Try repairing or setting up your Bluetooth device or Wi-Fi network again.

4. Stalled text messages
Ensure you are connected to the Internet either through Wi-Fi or cellular, click on the unsent message, and click the "resend" option.
If the problem continues, try restarting your device or even installing a third-party messaging app.

5. Syncing error
There are numerous steps you can take to address problems with syncing. First, ensure that you are connected to the Internet, and that the service you are trying to sync with, such as Google or Dropbox, isn't down. Double check that your password is correct and try syncing again.
Still having problems? Remove the account from your device and add it again.

6. App crashes
Apps can crash for all sorts of reasons. Is there an update available for either the app or your phone? If so, install it.If not, force close the app by swiping it away in the multitask menu (pictured above) and then reopen it.

7. Unresponsive screen
You may want to throw your phone against the wall when it begins to malfunction, but there isn't a need to panic. Most problems are fixed with a simple restart. Although if you physically damaged your phone or dropped it in water, you may have bigger problems on your hands.
Press the power button and let the phone turn off, but wait a minute or two before powering it back on.

Source: www.cnet.com

አዲስ Dyre የተባለ የኮምፒውተር የማጭበርበሪያ ቫይረስ የባንክ አካውንትን እየሰረቀ እንደሆነ ተጠቆመ
18/06/2014

አዲስ Dyre የተባለ የኮምፒውተር የማጭበርበሪያ ቫይረስ የባንክ አካውንትን እየሰረቀ እንደሆነ ተጠቆመ

አዲስ Dyre የተባለ የኮምፒውተር የማጭበርበሪያ ቫይረስ የባንክ አካውንትን እየሰረቀ እንደሆነ ተጠቆመ
በቅርቡ የተገኘው ዳየር (Dyre) የተሰኘው ቫይረስ የባንክ አካውንቶችን የሚሰርቅ አዲስ የቫይረስ አይነት ነው:: ቫይረሱ የኮምፒውተር ኔትዎርክ ፍሰትን በመቆጣጠርና በማሻሻል ብሎም ወደራሱ በመምራት የተጠቀሙበትን የሎግኢን ዳታ በመስረቅ ይጠቀማል ::የዳይር ትኩረት በተለይም በድርጅቶች ዙሪያ እንደሆነና ጥቃቱን ለመከላከልም ድርጅቶች ቅድም ዝግጅት ማድረግ እንዳለባችው ተጠቁሞዋል::

ለበለጠ መረጃ :-

http://www.scmagazine.com/tricky-new-malware-strain-dyre-skirts-detection-and-steals-banking-credentials/article/356268/

13/06/2014

In 2013 phishing sites imitating social network websites were to blame for more than 35% of cases when the Anti-phishing heuristic component was triggered.

Last day on the 7th ICT Exhibition and Bathar
12/06/2014

Last day on the 7th ICT Exhibition and Bathar

11/06/2014

You think you know how to Google? You don't know how to Google. Even the most seasoned Googler might not know every tip and trick available with just a few extra keystrokes in the search bar. Consider this your instructions manual for the world's ...

Erik Hersman from Kenya shares some interesting thoughts on the tech community in Addis
11/06/2014

Erik Hersman from Kenya shares some interesting thoughts on the tech community in Addis

Having recently visited Addis Ababa, I thought I might write down some of my impressions. The last time I was here was over 20 years ago, as I would fly

A step closer in the right direction to help the IT infrastructure in Ethiopia, "Southwest Technologies, partners to lau...
10/06/2014

A step closer in the right direction to help the IT infrastructure in Ethiopia, "Southwest Technologies, partners to launch data center in Ethiopia"

Southwest Technologies and its partners announced they are set to launch a data center in Ethiopia to make Ethiopia a hub for IT in Central Africa on...

PCODE is at the 7th ICT Exhibition for Ethiopian Renaissance,  Ababa Exhibition Center
06/06/2014

PCODE is at the 7th ICT Exhibition for Ethiopian Renaissance, Ababa Exhibition Center

The 7th ICT Exhibition and Bather Day 1
05/06/2014

The 7th ICT Exhibition and Bather Day 1

Address

Kebele 03/ict Bic Bulding
Bahir Dar

Alerts

Be the first to know and let us send you an email when Polytech Consulting & Development PLC posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Polytech Consulting & Development PLC:

Share