Posts

SPEAKER SACKS SEFWI WIAWSO MP

Image
  The speaker of parliament Alban Sumana Kingsford Bagbin    today sacked the MP for SEFWI WIAWSO for passing a rude remark during his submission. The speaker of Parliament ordered the Marshals of the Parliament House to see the MP ,Kweku  Afriyie , who is a member of the New Patriotic Party and the member of Parliament for Sefwi Wiawso constituency in the Western North Region out of Parliament.

2 BILLION OLD CEDIS FOR YOU!

In this modern era where entrepreneurship is the order of the day, individuals with the zeal and commitment have the ambition to turn their brilliant ideas into terrific businesses. Various centres or hubs have taken it upon themselves to help shape, nurture and shapen these ideas into actionable realities.  INNOHUB is one of the hubs at the Accra digital centre built for entrepreneurs and businesses. Having the desire to support entrepreneurs is their main objective. They have launched another opportunity which vungton Multimedia thinks entrepreneurs can capitalise on.  200,000 cedis for you! Join our info sessions on July 18 and 19 at 11 am to learn how your idea or business can win grants to scale.  Register: bit.ly/GTIC-Info Vungton Multimedia's four main objectives are: Safety, Entrepreneurship, Entertainment and News. Entrepreneurship being part of our objectives , any opportunity that we can lay our hands on will be brought to you.  Keep up with the effort and don't give

THE IMPORTANCE OF DISASTER MAPPING

Image
Disaster mapping is a crucial tool in disaster management, providing valuable insights into potential risks and helping communities prepare for and respond to natural disasters. By visualizing and analyzing data related to various factors such as terrain, infrastructure, and population density, disaster mapping allows decision-makers, emergency responders, and local authorities to make informed decisions and take proactive measures to mitigate the impact of disasters. Section 1: Understanding the Need for Disaster Mapping Disaster mapping is essential for understanding the potential risks associated with natural disasters. By analyzing historical data, satellite imagery, and other sources of information, disaster mappers can identify areas that are prone to specific types of disasters, such as floods, landslides, or hurricanes. This information is invaluable for local authorities, as it enables them to develop targeted disaster preparedness and response plans, allocate resources effect

CHEF SMITH APOLOGISES FOR THE FAKE COOKATHON CERTIFICATE

Image
 Chef Smith in a recent video was seen apologising to Ghanaians for faking his COOKATHON certificate. According to a video from nanaboroo.gh, he was very remorseful so he knelt down to apologise to Ghanaians. Chef Smith who was supported by Amadia, Nana Boroo's sister, during his COOKATHON for 822 hours and over, early part of this month was seen in a video announcing that Guiness world record has recognised his COOKATHON and awarded him a certificate. He added that, upon various deductions, he was acknowledged by Guinness world records for cooking 802 hours. Later revelation was made by a Ghanaian who queried Guinness world record and they confirmed it wasn't true but rather Alan Fisher is still holding the COOKATHON for 119 hours longest cooking. Find the video below 

AFRICAN CLIMATE LEADERSHIP FELLOWSHIP APPLICATION

The African Climate Leadership Fellowship, an initiative of GreenLead, is a transformative fellowship targeted at connecting young people on the continent of Africa to address climate problems in their communities through education, internships to gain practical skills, and community projects. Fellows develop an understanding of climate science and core areas affected by climate change, practical skills to inspire action, leadership, organization, and communication skills, inspiring climate solutions to local problems while learning from a network of peers and mentors. The program is designed to empower the next generation of climate champions from across the African continent. This transformative initiative aims to equip emerging leaders with the knowledge, skills, and networks to drive positive change in their communities and tackle the urgent challenges posed by climate change. Visit  https://greenleadaclf.org to register in order to be a part of the cohort.  NB: You will spend less

DISASTER RISK REDUCTION : A COMPREHENSIVE APPROACH TO MITIGATING CATASTROPHIC EVENTS

Introduction Disasters, whether they are natural or human-induced, have the potential to cause significant damage to communities and individuals. From hurricanes to wildfires, and from earthquakes to floods, the impact of these events can be devastating. However, with the right strategies in place, it is possible to reduce the risk of disasters and their impact on our lives. This blog post will explore the key components of a comprehensive disaster risk reduction strategy, and provide insights into how we can work together to build more resilient communities. Main Body Understanding the causes of disasters Disasters can be caused by a variety of factors, both natural and human-induced. Natural disasters, such as hurricanes, earthquakes, and floods, are often caused by environmental factors, such as weather patterns, geological events, or human activities, such as deforestation or urbanization. Human-induced disasters, on the other hand, are caused by human actions, such as pollution, c

HOW TO PROTECT YOUR PHONE & SOCIAL MEDIA ACCOUNTS FROM HACKERS

Image
  What is Hacking  A commonly used hacking definition is the act of compromising digital devices and networks through unauthorized access to an account or computer system. Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals.  But what is hacking in a cyber security context?  Hacking in cyber security refers to the misuse of devices like computers, smartphones, tablets, and networks to cause damage to or corrupt systems, gather information on users, steal data and documents, or disrupt data-related activity. Now, let's have a look at how we can protect our Phones, E mails and social media accounts from hackers in toto.  Introduction: In today's digital age, our phones and social media accounts contain a vast amount of personal information, from bank details to family photos. It's crucial to keep these devices and accounts secure to prevent unauthorized access and potential identity theft. In this b