top of page

 Technology,Telecommunication Service, Information System Design & Cybersecurity, Inc

Agriculture

Wangoh Dynamics Green Urban Initiative Project

Transforming Sierra Leone Slums Into A Green Environmental Friendly

“Greening The Economy: Sustainable Cities”

​

• To provide quality vocational training and post training support for 500,000 disadvantaged young peoples to help them either gain  employment or establish their own micro-enterprise;

• To provide basic literacy and numeracy and/or recreational activities for at least  200 out of school young people per year;

• To improve the quality of life of 700,000 people in two slum communities through targeted advocacy, community mobilization and capacity building activities led by young people;

• To improve the living conditions and environment of at least  500,000 people per year through slum upgrading pilot and demonstration project; and,

• To build the capacity of selected Civil Society Organizations (CSOs) to scale up support to vulnerable young people and their families in urban slum areas.

​

Internet Service Provider
​
Firstly, internet speeds in Sierra Leone are nothing like in the developed world unless you happen to have access to private VSAT. Prepare yourself for painfully frustrating speeds. The main hope for Sierra Leone’s long suffering internet using public lies in the fibre optic network which is expected to come live in the latter part of 2012, has little effects.

Internet access in Sierra Leone has been sparse, but is on the increase, especially since the introduction of 3G cellular phone services across the country and the arrival of the ACE cable in Freetown in the second half of 2011. Freetown has Internet cafes and other businesses offering Internet access. Problems experienced with access to the Internet include an intermittent electricity supply and a slow connection speed in the country outside Freetown. Outside of Freetown enterprises generally have to rely on VSAT satellite services.

There are no government restrictions on access to the Internet or credible reports that the government monitors e-mail or Internet chat rooms. Individuals and groups engage in the expression of views via the Internet, including by e-mail.

Wangoh Dynamics Technologies will be a Tier 1 & Tier 2 Internet Service Provider for Sierra Leone, West Africa. Our primary service offering consists of Internet access and data transport, offered over our award-winning fiber optic, IP data-only network, along with collocation in any of our single Internet data centers.

Our innovative, facilities-based network spans across Sierra Leone and West Africa. With over 50,000  route miles of intercity fiber and more than 20 metro fiber miles, we will provide service to the 16 Political district of Sierra Leone and other major markets.

 Wangoh Dynamics Technologies was founded on the premise that bandwidth can be treated like a commodity, service and produce mass amounts and position it for sale based on price. Leveraging new technologies, we built our own IP data network independent of the tradition. By doing so, we believed we could reduce the cost of high quality bandwidth down to a level never before offered in the marketplace.

We stand apart from our competitors in many areas, but key differentiation include:

  • Our customer connections are dedicated and non-oversubscribed

  • Our prices are the lowest in the industry

  • Our diversity from traditional carriers enables redundancy for customer data

  • Our simple network structure allows for rapid provisioning

Education
​
ICT Education in Primary & Secondary Schools Learning Systems of Sierra Leone
​
 Wangoh  Dynamics Technologies  decided to undertake an ICT Education project through Wangoh One Laptop Per Child Project  that seek to expand the use of computer technology, especially for both rich and poor students of Primary and Secondary Schools of the 190 chiefdom's and 16 political districts of Sierra Leone. Not only does the One Laptop Per Child project seek to narrow the “Digital Divide”, the project also seek to improve educational opportunities for the under-privileged children overall, by providing resources for these children to be proactive and engaged in their own learning through the use of internet-connecting laptops.
​
​
​
​
​
​
​

 Data Analytics

​

Data analytics is the science of extracting patterns, trends, and actionable information from large sets of data. While often used interchangeably with the term “business intelligence,” it’s useful to distinguish the terms. Think of business intelligence as the ways in which companies use data to improve their management and operations. Data analytics involves improving your ways of making sense of that data before acting on it; further still, you can slice and dice the data to extract insights that allow you to leverage this data to give you and your organization a competitive advantage.

Data and information, generally, are proliferating at a veritably exponential rate, thanks to rapid increases in the Three Digital Accelerators I’ve been tracking since the early 1980s: bandwidth, digital storage, and processing power. The “big data” we have today will be nothing compared to the abundance of data and information available to us in the near future data generated by hundreds of millions of devices, things like wearable tech, smartphones, and anything that’s part of the Internet of Things (IoT).

Improving your capacity to analyze this data works at multiple stages from collection processes to organizing and communication techniques such as modeling and visualization. Yet, whereas data once required a large team of skilled analysts to be made useful, today there are a number of enterprise level tools for running high speed data analytics on massive amounts of data, as well as publically available free tools like Google Analytics that offer every business and entrepreneur the opportunity to incorporate data analytics when making decisions.

​

​​Data Center Technology

Data center is a facility that centralizes an organization’s IT operations and equipment, as well as where it stores, manages, and disseminates its data. Data centers house a network’s most critical systems and are vital to the continuity of daily operations. Consequentially, the security and reliability of data centers and their information is a top priority for organizations.

Although data center designs are unique, they can generally be classified as internet-facing or enterprise (or “internal”) data centers. Internet-facing data centers usually support relatively few applications, are typically browser-based, and have many users, typically unknown. In contrast, enterprise data centers service fewer users, but host more applications that vary from off-the-shelf to custom applications.

Data center architectures and requirements can differ significantly. For example, a data center built for a cloud service provider, satisfies facility, infrastructure, and security requirements that significantly differ from a completely private data center, such as one built for the Pentagon that is dedicated to securing classified data.

Regardless of classification, an effective data center operation is achieved through a balanced investment in the facility and equipment housed. The elements of a data center break down as follows:

Facility – the location and “white space,” or usable space, that is available for IT equipment. Providing round-the-clock access to information makes data centers some of the most energy-consuming facilities in the world. A high emphasis is placed on design to optimize white space and environmental control to keep equipment within manufacturer-specified temperature/humidity range.

Support infrastructure – equipment contributing to securely sustaining the highest level of availability possible. The Uptime Institute defined four tiers data centers can fall under, with availability ranging from 99.671% to 99.995%. Some components for supporting infrastructure include:

  • Uninterruptible Power Sources (UPS) – battery banks, generators and redundant power sources.

  • Environmental Control – computer room air conditioners (CRAC), heating, ventilation, and air conditioning (HVAC) systems, and exhaust systems.

  • Physical Security Systems – bio metrics and video surveillance systems.

IT equipment – actual equipment for IT operations and storage of the organization’s data. This includes servers, storage hardware, cables and racks, as well as a variety of information security elements, such as firewalls.

Operations staff – to monitor operations and maintain IT and infrastructural equipment around the clock.

Data centers have evolved significantly in recent years, adopting technologies such as virtualization to optimize resource utilization and increase IT flexibility. As enterprise IT needs continue to evolve toward on-demand services, many organizations are moving toward cloud-based services and infrastructure. A focus has also been placed on initiatives to reduce the enormous energy consumption of data centers by incorporating more efficient technologies and practices in data center management. Data centers built to these standards have been coined “green data centers.”

​

​

​

​

Information System Security
​

Technology today has move forward in leaps and bounds in the last couple of years. This has created new opportunities for jobs, entertainment, how we go about our daily lives, and even organize the vast wealth of information at our fingertips. With all this information constantly being exchanged any given day, companies and organizations have had to step up their game too. Information systems security is a big part of keeping security systems for this information in check and running smoothly.

When people think of security systems for computer networks, they may think having just a good password is enough. The truth is a lot more goes into these security systems then what people see on the surface.

Throughout time information has always been stolen, bartered, or taken for personal gain or greed. There is an exchange of digital information going on all the time throughout the world. Every time someone swipes a card, logs into their e-mail, or a million other things that can happen, is an exchange of digital information. Just like physical information, this information can be stolen and used for personal gain or greed.

Information systems security is very important to help protect against this type of theft. Companies and organizations are especially vulnerable since they have a wealth of information from their employees. This can include names, addresses, telephone numbers, social security numbers, payrolls, etc. This information is sensitive and needs to be protected. Not to mention many companies and organizations today have an IT and security department to oversee their network systems.

The main focus of this industry is to protect these systems and to prevent the information from being stolen too. People in this industry can be involved with several tasks including raising user awareness, improving existing security systems, and in some cases even investigating security breaches too.

bottom of page