If Countries Were Computer Software --By Dr. Chao






Here is a great piece from an accomplished computer scientist DR CHAO (Phd).
You can follow her up on twitter @evangelinechao


Kenya.
Loads in micro seconds. Comes with 37 folders to install. Some may be corrupt but you have to open all to find out which one.

Tanzania.
Recently received an upgrade and now runs 50% faster. You need an encryption key to install. Pirating it lands people in jail.

Uganda.
Has had the same version for 30 years. Its loyal users have been reported to still punch holes on cards in order to process info.

Rwanda.
Most shops showcase it as a 'model secure package'. That's because the programmer has refused to open-source the source code.

Ethiopia.
People buy it because it creates beautiful pictures.
That's it.

Ghana.
Currently being given out as a free software to 'enhance computer performance'.

Nigeria.
Everyone tells everyone installing it will crash your computer.

South Africa.
Advertised as the best software in the market. But only 50% of its packages actually work properly.

Lesotho & Swaziland.
You have to install and unzip South Africa to get them. Swaziland often automatically fails to download.

Zimbabwe.
You can only buy it in dollars. Installation takes 16 hours because each package needs approval by a remotely-based admin.

Britain.
Contains patches for most other software. Only available on request. Limited stock.

Germany.
You need a 128-character key to unlock installation folder. Then you only have 6 days to use it. 100% performance.

France.
Most pirated software.

USA.
Recently uninstalled by 60% of its users.

Canada.
Out of stock.
Buyers have to wait for 2 years for manufacturers to produce the next batch.


Botswana.
Most upgraded software in recent years. Performs superbly. Automatically creates shortcut on desktop.

Zanzibar.
Everyone goes to the shop to see it. Few buy the full product. Contains the highest number of users on  'Trial version'.

UAE.
People buy it only for that one package called Dubai that has been installed so many times, manufactures couldn't keep up.

THE END....


No comments:

Post a Comment

Intel Tiger Lake CPUs to come with Anti-Malware Protection

Intel’s Tiger Lake CPUs will come with Control-flow Enforcement Technology (CET), aimed at battling common control-flow hijacking attacks. I...