Wireless Device Licensing in Africa

Device licensing is the process of allowing many users in one computer system without any authenticity needed to login in. Licensing wireless device comes with a load of benefits the biggest one being the ability to control your end product. Licensing also gives security to your data and information. It also helps combine technology with your products hence giving you the ability to meet the needs of your customers with ease.

There are various bodies that are given the responsibility of controlling electronic device licensing in Africa. The federal communications have been since 1934 the body that is in charge of telecommunication. The FCC was initially formed to be in charge of regulating government monopolies in radios and televisions (Mbarika 2006). Since then the FCC has been developed to be in charge of device licensing in electronics and also controlling interstate and international communications in various continents in the world. The FCC controls communication in terms of devices like radio, television, satellites, wires, and cables.

Electronic and wireless licensing has been established in Africa and it has been of great advantage to many Africans. Through the collaboration of various countries like China, Africa has greatly developed in terms of telecommunication in more than fifty countries on the continent (Johns B 2011). Modern telecommunication, one of them being the electronic and wireless device licensing has made many countries grow in terms of raising people’s standards of living and also easy access to modern methods of communication. This eventually leads to the growth of the economy and local business.

Africa has some countries that have some good and developed programs that are able to handle the licensing of devices and also approval and certification of products. Such countries include South Africa and Egypt. In Egypt, for example, the fact that it is the leading country in terms of exporting petroleum products and crude oil makes it an attractive market for consumer electronic products. Egypt also has a large number of populations in terms of those who use mobile phones and also those who use the internet. The national telecommunication regulatory authority is the main agency in Egypt that enhances certification, and sets the compliance criteria in various sectors like health, security, wireless and telecommunication (Mbarika 2006). A major advantage of NRTA is that it does not produce certificates that expire after a while unless there are critical components in the products that need change. With this, the modified product is supposed to be submitted to the agency for approval and also evaluation.

South Africa is the sixth most populated country in Africa has been ranked 19th globally in terms of cell phone users and also 52nd globally in terms of individuals who access the internet. South Africa has a body that is in charge of electronic and wireless compliance. The Independent Communications Authority of South Africa regulates communications, broadcasting and also postal services in the country (Johns B 2011). It is also responsible for TTE and also certification of wireless products. ICASA has a local representative whose role is to regulate the marking of products. ICASA has certificates that do not expire and the certificates are only updated in case the product is modified.

In Africa, wireless device licensing has challenges caused by poverty and infrastructure problems. Regulatory and licensing in Africa does not include radio bands. Regulatory bodies in Africa have challenges getting into the market because of range, power service restrictions, and certification requirements. Infrastructure and alternative regulatory bodies can easily promote connectivity (Johns B 2011). The countries that are affected by the political instability change of regime and economic factors are not able to initiate electronic and wireless processing programs.

The electronic and wireless device licensing has been of great impact in Africa in terms of improving the standards of living and growth of technology. However, there are various issues like poor infrastructure, political instability, and power and services restrictions.


Johns, B. (2011). An introduction to the Wireless Power Consortium standard and TI’s compliant solutions. Analog Applications Journal Q, 1, 2011.

Mbarika, V. W., & Mbarika, I. (2006). Africa calling [African wireless connection]. IEEE Spectrum, 43(5),

Skullcandy Push Bluetooth Headphones

Skullcandy made their name by offering their brand of uniquely adorned, high-quality earbuds at a fair price. They have had tremendous success in this arena, and are consistently among the top-selling headphone manufacturers in the United States. The new line of Skullcandy Push headphones is their foray into the wireless headset market.

Bluetooth headphones have existed for over a decade, but widespread adoption of wireless headphones really took off after the release of the Apple Airpods. Smartphone manufacturers, led by Apple, have begun to do away with the standard 3.5mm headset jacks, which was another likely contributing factor in Skullcandy’s release of the new Push.

Skullcandy Push Specifications

True Wireless

Skullcandy’s current wireless offering, the Jib series, is not fully wireless. That model line features a wired connection between the two buds that wraps around the back of one’s head. The Push earbuds are entirely wireless. These headphones pair up with smartphones, laptops, tablets and other Bluetooth-enabled devices. Each bud can be independently charged using the included case, which features LED lights that let you know when the units are charged and ready to use. The included charger acts as a portable battery and does not need to be plugged into a power source to charge the buds.

Fitfin Secure In-Ear Technology

The visual appearance of the earbuds differs considerably from other popular choices in the wireless earbud world. Instead of being as small and discrete as possible, the Skullcandy Push earbuds feature Fitfin secure-ear technology which wraps around the outside of your ear to keep the buds in place. This feature is likely a response to the numerous complaints Airpod users had about their earbuds falling out during runs or other physical activities.

Voice-Assistant Enabled

One of the biggest draws for the Airpods was the built-in ease of using digital assistants like Siri and Cortana with the press of a button. Skullcandy offers this functionality with the Push as well. Users can interact with their voice assistant, take phone calls, and adjust call/headset volume with dedicated buttons on the side of the earbuds. There is a slight lag in the responsivity of these compared to similar models that feature Apple’s W1 and W2 Bluetooth chips.

Battery Life

The Skullcandy Push Headphones themselves store 6 hours of juice while their portable charging case will allow you to get another 6 hours of use out of the headphones.


The Bottom Line.

The Skullcandy Push wireless headphones fill an urgent need in the headphone market for a durable, activity-friendly set of headphones that won’t break the bank. While they may not be “Airpod Killers” they play their role admirably and fit in well with Skullcandy’s commitment to quality products at a reasonable price point.

15 Hacker News Alternatives

Several news sites combined into a single newspaper-like feed
Alexa: 64k

Culmination of HN, Reddit, SlashDot, and other Tech-News Sites
Alexa: 226k

Designer News, Product Hunt and Hacker News Mashup with easy-access to individual feeds
Alexa: 1.5m

HN, Reddit, and Lobste.rs aggregated and merged into a single feed
Alexa: None

Top posts from many news sites, separated into news, videos, cartoons, sports, and watches?
Alexa: None

HN Mirror
Alexa: Unavailable

Front page of HN in a single page loaded with all articles
Alexa: 1.7m

HackerNews with a search function and 16.8 million posts indexed.
Alexa: Unavailable

HN Mirror with Webpage Screenshots
Alexa: 683k

HN Mirror integrated with an on-page reeder
Alexa: Unavailable

“Less annoying hacker news” with an even simpler interface
Alexa: Unavailable

HN, proggit, reddit, toptal, hackaday, slashdot, techmeme, wired as separate feeds on a single page
Alexa: 583k

More mobile-friendly HN
Alexa: 1.7m

More mobile-friendly HN
Alexa: 8m

More mobile-friendly HN
Alexa: 4.2m

HN Short Link – redirects to https://news.ycombinator.com
Alexa: None


467873 [HC gov Alert] Scam Status

Starting in November, 2018, many people started to receive the following message:

[HC gov Alert] Open Enrollment is here. Review your 2019 coverage options before 12/15:

The message included a link to “https://go.hc.gov/2PoUSr5”, a bitly url-shortener custom domain.

The link forwards to the legitimate healthcare.gov website taking you to the login page of the site.

How to make these messages stop? Reply STOP to the text message thread.

Although this is an annoying message to get, it is not a scam and the link is legitimate. As of the launch of this message at 15:00 UTC November, 1st the link is getting approximately 10,000 clicks per hour according to the bitly information page:

DataPipe Wireless [Open WiFi Access Point]

I recently came upon a curious WiFi access point branded “Datapipe Wireless”
Although the network is “Open” it required Phone number verification for internet access (Very odd for a US WiFi Provider).


The sign-on page was hosted by n123.network-auth.com, a private domain with an IP address resolving to a CDN network.

Welcome to Datapipe Wireless: A mobile phone that can receive text messages (SMS) is required to access this network. Enter your mobile phone number and you will receive a login code for access. Standard SMS charges will apply.
Sign-on screen when you connect to the network

Immediately after entering my phone number, I received a text from 201-580-2502 with “Authorization Code: ######”.

After connecting, I was taken to a “Cisco Meraki” confirmation page, indicating the brand of hardware the WiFi point is using.


The WiGLE map of the access point “Datapipe Wireless” indicates it’s only on a single block of San Jose.

/h/8913147.html in Google Analytics Spam

The page “/h/8913147.html” is part of a Google Analytics Spam campaign published by get-seo-help.com
It is likely the uniqueness of the url is utilized to avoid being filted by Google.

I’ve also seen the same html page being used for referrer spam from  free-seo-consultation.com


iPhone: Number not available. Which number would you like to send the message with?

The following message pops up when you are replying to an SMS or MMS conversation on an iPhone from a number that wasn’t the original recipient number of the message.

Number not available. Which number would you like to send the message with?

For example, if you have two active SIM cards in two seperate iPhones and you are sycning them together using “Text Message Forwarding” you will recieve SMS messages for both SIM cards on both phones. This can be very convenient for business phones. You can get all of your messages on both phones! Unfortunately, if you want to reply to the business-related message conversation using your business line, you will have to switch to that line or you can reply with your “Primary” line, but the recipient of the message will likely see it as a reply message from another number.

uudecode flags / help / command example

[email protected]:~$ uudecode --help
uudecode (GNU sharutils) - decode an encoded file
Usage:  uudecode [ - [] | --[{=| }] ]... [...]

   -o, --output-file=str      direct output to file
   -c, --ignore-chmod         ignore fchmod(3P) errors
   -v, --version[=MODE]       output version information and exit
   -h, --help                 display extended usage information and exit
   -!, --more-help            extended usage information passed thru pager
   -R, --save-opts[=FILE]     save the option state to a config file FILE
   -r, --load-opts=FILE       load options from the config file FILE
                                - disabled with '--no-load-opts'
                                - may appear multiple times

Options are specified by doubled hyphens and their name or by a single
hyphen and the flag character.
If no 'file'(s) are provided, then standard input is decoded.

The following option preset mechanisms are supported:
 - reading file $HOME/.sharrc

'uudecode' transforms uuencoded files into their original form.

The encoded file(s) may be specified on the command line, or one may be
read from standard input.  The output file name is specified in the encoded
file, but may be overridden with the '-o' option.  It will have the mode of
the original file, except that setuid and execute bits are not retained.  If
the output file is specified to be '/dev/stdout' or '-', the result will be
written to standard output.  If there are multiple input files and the
second or subsquent file specifies standard output, the decoded data will
be written to the same file as the previous output.  Don't do that.

'uudecode' ignores any leading and trailing lines.  It looks for a line
that starts with "'begin'" and proceeds until the end-of-encoding marker is
found.  The program determines from the header line of the encoded file
which of the two supported encoding schemes was used and whether or not the
output file name has been encoded with base64 encoding.  See 'uuencode(5)'.

Please send bug reports to: