Applying a strategic way of thinking in order to identify breaches in your system at all levels. They need serious investigations and understanding of the causes and consequences at grass root level in order to bring sustainable solutions through future policy intervention. See technologies overview for explanations on the methodologies used in the surveys. benefits and drawbacks of artificial intelligence? Define in detail Technology and Evolution in the context of your prior Knowledge? However, with some interviewees clearly taking the view that the 15 years following the EthiopianEritrean war should have been long enough to ensure rough proportionality of representation at all levels, Tigrayan dominance at the top does appear to be reflective of the interests of the party. Prior to this massive rail endeavor, Mulugeta Gudeta, a figure of Addis Ababas Chamber of Commerce said, the state of public transportation in Addis Ababa is perhaps the weakest link in the otherwise fast-growing economy in the Ethiopian capitalworkers often find it difficult to reach their workplaces in time. There are, however, rules contained in the Constitution of the Federal Democratic Republic of Ethiopia (1995) ('the Constitution'), and other . Official websites use .gov The Ethiopian National Defence Force is about 140,000 personnel strong (army and air force) and maintained at the estimated cost of 0.8% of GDP (2015). Nguyen Quoc Trung. The production and export of cash crops such as coffee were advanced, and import-substituting manufactures such as textiles and footwear were established. Is the popularity of .et higher among high traffic sites? technological innovations in the farming industry, Bridging Transportation Barriers to Aid in Haiti, Improving Internet Connectivity in Rural Latin America and the Caribbean, Addressing Environmental Pollution in Vietnam. This IT Park, located approximately 29 kilometers outside of Addis Ababa in Bole Lemi, is officially open. In less than one year, telebirr became very popular and has over 17 million subscriber. Its competence and its international standing make it a positive exception to the lack of technocratic integrity that has been observed in respect of other aspects of the Ethiopian administration, i.e. Nile water dispute stems from filling of Ethiopian dam, decades of rising tensions So far, despite international negotiations, there's been little progress in the decadelong dispute. 1 Level 1: Introductory; Course description; Nutrition . How did you see Ethiopian technology Based on the agreement Safaricom was to launch services nine months after its license award, but that launch date has been pushed back. The 2005 Election Crisis in Ethiopia and its Aftermath. Keywords: Food Security, Food Insecurity, Undernourishment, Drought, Shocks 1. On April 13, 2022, Ethio Telecom and Safaricom expressed that they had successfully concluded negotiation with the regulator, ECA, on a 10-year infrastructure sharing and interconnections agreement. [73], The second issue is corruption. Technology Latest Headlines. and (3) What are researchability gaps in the reviewed research? Interviewees also underscored how METEC has mentored and developed a number of small to medium-sized enterprises to support the development of a more competitive domestic manufacturing sector. 1401 Constitution Ave NW
Copyright 2019 ECS Ethiopia, All Right Reserved, Checkpoint Certification CCSA/CCSE R80.30. answered and a plagiarized document will be rejected The GOE plans to expand the information and communication technology (ICT) manufacturing industry, modernize infrastructure, and increase private sector participation. ", "Your report is very useful. Thus, while the most secure systems may be those that are built from Crop production and productivity including wheat is a function of all the recommended technology packages not only variety. A .gov website belongs to an official government organization in the United States. Digital access in Ethiopia, a country of 110 million people, has long been underwhelming. Technologies > Top Level Domains > .et > Reports Overview > Market Report. At the heart of the analysis of the organization of security in Ethiopia lies the fact that both peaceful and more forceful challenges to the rule of the TPLF/EPRDF have been either disabled or suppressed. Only 11.6% of government institutions in Ethiopia have legal frameworks which are being at their trial level, while a majority, or 87.4% of them have no recognized legal frameworks to prevent cyber attacks. Amongst the solutions: Cellebrite enables investigators to capture insights in todays complex, digital world. Box 2 below provides a brief overview of the Ethiopias main state security organizations as understood in this report. The interviews suggested that, on balance, this results in a patchwork of security provision in terms of its quantity and quality that radiates out from Ethiopias core, serves to preserve the present political order, limits de facto regional security autonomy and is lacking in mechanisms for enabling citizens security concerns to be reflected in state security policy and operations. TheInternational Trade Administration,U.S. Department of Commerce, manages this global trade site to provide access to ITA information on promoting trade and investment, strengthening the competitiveness of U.S. industry, and ensuring fair trade and compliance with trade laws and agreements. Employment Policy. To this end, this work relied primarily on secondary sources of data. This report shows the usage statistics of .et (Ethiopia) vs. .fish (Fish) vs. .security (Security industry) as top level domain on the web. Discuss briefly the applications of Augmented Reality System and its common features? . It looks that electronic banking is facing difficulties in Ethiopia. Get all the information about web technologies used on .et sites in an extensive report. This page was processed by aws-apollo-l1 in 0.078 seconds, Using these links will ensure access to this page indefinitely. Unless institutions in Ethiopia give careful attention to the protection of their valuable assets such as people, information, technology, and facilities from evolving cyber-attacks, their overall security, privacy, and credibility will be a question mark. Nathan Damtew is a. It is also among the top four contributing countries to UN peacekeeping missions (Somalia, Abyei and South Sudan) (2015). [84] Moreover, in the development of the fighting capacity of its military forces, Ethiopia has paid significant attention to the problem of resources. Copyright 2018CT Defense SRL. Information regarding U.S. Assistance to the Horn of Africa Drought can be found in this page. In this assignment, you are required to write a proper and c. Feel free to contact me for any questions regards to this assignment via email address: L.N.Gumilyov Eurasian National University, Kwame Nkrumah University of Science and Technology, Jomo Kenyatta University of Agriculture and Technology, Strength and testing of materials (ENGR211204), Avar Kamps,Makine Mhendislii (46000), Power distribution and utilization (EE-312), BBM 216 Intermidiate Microeconomic Module, Chapter 5 - exercises to improve knowledge, An Essay Study On Public International Law Psc401, Operating System Concepts Chapter 2 Exercise Solution Part 2, Solutions manual for probability and statistics for engineers and scientists 9th edition by walpole, 462802814 Government accounting final examination with answer and solution docx, Compiler Construction MCQ With Answer & Explanation Principles of Modern Compiler Design MCQ Set SPPU Exam Covid-19 Time, 475725256 Actividad 4 Guion de la responsabilidad del auditor docx, Chapter 2 an introduction to cost terms and purposes, Assignment 1. The GOE has developed infrastructure for an IT Park to attract ICT service companies, particularly those involved in outsourcing. The 2002 national security policy articulated two responses to this challenge. Especially after World War II, tourism, banking, insurance, and transport began to contribute more to the national economy. If you need urgent help, call +251 (0)11 617 0100. Constitutionally, peace and security are a shared responsibility between the federal and regional state governments. W3Techs did it in a new interesting way and we're looking forward to work with these tools. According to the 2021 National Bank of Ethiopia annual report, by the end of 2020/21, there were 54.3 million mobile phone users (a 21.9 % annual increase), nearly 1 million fixed lines (a 62 % decrease), and 24.5 million Internet service subscribers (a 4.3% rise) in a country of over 100 million people. If you want to order this report, please proceed to the order form. The state-owned Ethio Telecom (ET), formerly known as the Ethiopian Telecommunication Corporation, has maintained a monopoly on wired and wireless telecommunications and internet services for 126 years. Energy Policy. For a more in-depth analysis of such strategies and tools for maintaining party control see: Markakis (2011). The section itself focuses on analysing key implications of this situation for the organization of security. For a fascinating glimpse into the effort to renew the EPRDFs leadership through a staged succession plan (Metekatat) by Prime Minister Meles Zenawi: For a deeper analysis of the totalitarian aspects of Marxism and Leninism: Ryan, A.. Also on this point: Vaughan and Tronvoll (2002). This tender is part of the governments broader plan to open up the countrys economy. Ethio Telecom continues to invest in expanding and upgrading the countrys telecommunication system. 03. focus points for a quality audit model at program-level in Ethiopian Health science college s. They are closely related to the focus areas the Agency has been using for the past couple of years. A locked padlock ) or https:// means youve safely connected to the .gov website. Fully investigating your cyber security defense to identify the losses. It is a very diverse country both genetically and culturally. All rights reserved. 1. Ethiopias State Police Forces (regional police) maintain law and order in Ethiopias consituent states. Started in 2016 by management and IT consulting professionals,. Thank you so much. (2016/17), according to the Information Network Security Agency (INSA) of Ethiopia, reports FBC. Posted: 19 May 2021
A final risk lies in the phenomenon of crowding out that can happen when private sector investment by parastatals such as METEC, backed by government expenditure, reduces credit available for private entrepreneurship. ", "The reports W3Techs have been doing are extremely interesting and thought provoking. See for example: Feinstein, A., Both the availability of risk capital and the level of risk acceptance are factors that influence Ethiopias score on the Global Entrepreneurship Index. This expansion is focused on providing telecom services to all of Ethiopias 15,000 rural villages, with dedicated lines for agriculture, education, health, and consumer use. For travel to the United States on a temporary basis, including tourism, temporary employment, study and exchange. This is to ensure that we retain our excellence in helping businesses defend against the latest cyber threats. In addition to that, The Ministry of Finance launched a tendering process for the proposed sell-off of a 40% stake in state-owned carrier Ethio Telecom to private investors on June 14, 2021. Data from 2015 shows that the country recorded more than 10,000 traffic-related accidents and 418 traffic-related deaths in Addis Ababa alone. Ethiopia is moving forward with allowing multiple telecom operators. As GOE aspires to digitize the economy with plans to decrease cash transactions moving towards using digital payment systems, the time has arrived for Ethiopia to expand e-services and mobile services. Discover in which parts of the market your competition thrives. Ethio Telecom has significantly reduced the rates for a range of internet and telecom services on two occasions in 2018 and 2020. Due to their high ambition, Ethiopia reduced extreme poverty from 37.2% to 27.3% during the years 2004 to 2015. A few points that emerged from the interviews stood out in particular and are briefly analysed below. International Trade Administration
A set of reports evaluating the usage percentages and rankings of web technologies on .et sites compared to the overall usage of those technologies. Ethiopian Cyber Emergency Readiness and Response Team (Ethio Cer2t) mission is to create a secure, reliable and enabling Ethiopian cyber space by coordinating and building national capacity of proactive readiness and effective incident response centered on analysis. As far as the United Nations is concerned see for instance: It is a topic of debate to what extent economic efficiency should be gauged against liberal market-economy assumptions of perfect competition that seem hardly applicable in fragile contexts, or against a more realistic benchmark that reflects Ethiopias current level of economic development and its associated challenges. Vaughan and Gebremichael (2011). The federal police force comes under the Federal Police Commission that reports to the Ministry of Federal Affairs (until recently the Ministry of Justice). See. The data may not be published or sold to third parties. * Exchange rate for 2019 and 2020 are taken from NBE Mid-Market Rates. ), Diagnosing Corruption in Ethiopia: Perceptions, Realities, and the Way Forward for Key Sectors, Washington DC, The World Bank, 2012, Hagmann (2014), op.cit., All Africa online, the Guardian, NISS. For example, although the authors were unable to obtain hard data from the Ethiopian National Defence Forces on their staffing, feedback suggested that Tigrayans currently make up approximately 15% of their overall strength. Partners to unleash financial inclusion in rural Senegal February 2, 2023 February 2, 2023 NBE 4 min read Certified Penetration testers with unique combination of competencies, ready to deliver any project. This will help give you insights that you can act on to develop efficient defense measures that protect your business. Headquartered in Addis Ababa, Ethiopia, the state-owned CBE introduced modern banking to Ethiopia, playing a crucial role in the country's economic progress and development. Given the lack of publicly avalable data on forces composition in terms of ethnicity at various levels of seniority, it is difficult to produce more reliable findings. Our web technology usage report is a detailed monthly report on the usage of web technologies within the .et top level domain (Ethiopia). Second, the post-1991 emphasis on Ethiopias ethnic diversity is at odds with any over-representation of particular groups in any part of the federal administration (perceived or real) but especially in the countrys security forces. The Ethiopian National Intelligence and Security Service was established in 1995 and currently enjoys ministerial status, reporting directly to the Prime Minister. Gasha Consulting is an Ethiopian firm with a global perspective, comprising consultants from Ethiopia, the United States, and Europe. Digital Green works closely with Ethiopia's Ministry of Agriculture at the national, regional, woreda (district) and kebele (clustered village) levels. The organization and provision of security in Ethiopia are caught in a paradox that is well expressed by the contrast between a politically dominant, Marxist-oriented party and a federal constitution that not only recognizes socio-ethnic diversity, but also gives Ethiopias regional states appreciable powers to govern and provide security. However, those frameworks were not rigorously tested. Ethiopia is one of the world's oldest countries, its territorial extent having varied over the millennia of its existence. Ethiopia should not be associated with one ethnic group, religion or language. The major indicators pointing to the low level of ICT Development are: a) The absence of appropriate legal and regulatory frameworks. Opening in 2015, the transit system is made up of two lines, 39 stations, and covers nearly 20 miles. The consortium paid $850 million to the Ethiopian government as a license fee and vowed to invest 8 billion dollars over the next ten years to develop its communication infrastructural network. Past and present of political power inEthiopia, The relationship between the TPLF/EPRDF and state security forces, Centralization vs. diversity creates uneven security intent and performance, The military as fighting force and vehicle for development, The nature and organization of state security in Ethiopia, The only quantitative data that could be found in the public domain were from the opposition groups Solidarity Movement for a New Ethiopia and Ginbot7, both of which are based outside of Ethiopia. In addition, lack of awareness and lack of expertise in cybersecurity also contributed to the increasing level of cyber attacks in the country. Structural equation modeling (SEM) analysis technique using SamrtPls tool has been used. 4.5.15. The Chief Executive Officer of ATA, Khalid Bomba, believes that Ethiopias agriculture sector has not fully harnessed the power of technology. [91] Even when general intentions remain firmly developmental, this creates a risk of perceived abuse of position, poor allocation of funds and/or poor implementation of agreed programmes/projects. Press Esc to cancel. Telebirr allows users to deposit cash, send money, receive payment and withdraw cash. Some respondents suggested that the organization has grown extensively since its establishment in 2010 (data to verify this could not be obtained) because it is both an organized and a loyal force with a history of business operations and because it enjoys preferential political access and business advantages. The wheat sub-sector is strategic for the Government of Ethiopia, where wheat has several food uses which can be prepared in modern or culturally processed techniques. The agriculture sector is projected to grow at 6.2% per annum over the next ten years. The report comes via email as a PDF file and has over 180 pages covering this information: Top Level Domains Overview Reports Usage Report How popular is each of the top level domains? Feel free to contact me for any questions regards to this assignment via email address: The finding reveals that Ethiopia has no standardized legal cybersecurity framework, strategy, and governance at the national level. These efforts have been hampered by the largely rural makeup of the Ethiopian population and the government's refusal to permit any privatization of the telecommunications market. Introduction Network security is a growing field of concern for Ethiopian governmental offices and agencies. Wireless penetration tests assess the adequacy of multiple security controls designed to protect unauthorized access to wireless services. theoretical aspects of Introduction to Emerging Technology (EmTe1102) and become to give you International Financial Reporting Standards (IFRS) and related financial standards. This is a preview of the current report's table of content. First, many of the original revolutionary leaders of the TPLF are reaching retirement age and will need to be succeeded. Blockchain, Bitcoin and Cryptocurrency in Ethiopia: The Million Dollar Return Technology 15 Best Web Host Companies in Ethiopia with Statistics and Price 2023 Technology 15 Best & Free WiFi Hotspots in Addis Ababa, Ethiopia using Ethio Telecom WiFi 2023 Technology 20 of the Best Ethiopian News Websites with Global Rank and Revenue Technology The Ethiopian Government has made the development of Information and communications technology one of its strategic plan priorities. How popular is each of the top level domains? The association has three sectors within its scope, namely Information . Ethio Telecom will be the first major state-wned Enterprise (SOE) to be partially privatized and face international competition. Easy Dynamics is a leading technology services provider with a core focus in Cybersecurity, Cloud Computing, and Information Sharing. While their numbers, structure and even uniforms may vary, they each report to a Regional Police Commission that works loosely together with the Federal Police Commission. Their outside the box perspective has pointed us attack scenarios that we are now paying more attention to. Even though the subject matter is concerned both practical and theoretical sessions due to global occasions we are try to request home assignment on subject of Introduction to Emerging technology. It is thus generally reflected in a high return to adoption or input use at the relevant margin" . A good example is provided by something mentioned by various interviewees: the one-in-five policy. Addis Ababa Ethiopia Information Network Security Agency (INSA) These detailed reports are available for the following categories of web technologies: Please see technologies overview for explanations on the methodologies used in the surveys, and read our disclaimer to learn about possible incompleteness and inaccuracy of our data. Suggested Citation, National Security & Foreign Relations Law eJournal, Subscribe to this fee journal for more curated articles on this topic, Cybersecurity & Data Privacy Law & Policy eJournal, Political Economy - Development: Public Service Delivery eJournal, Conflict Studies: Inter-State Conflict eJournal, Other Information Systems & eBusiness eJournal, We use cookies to help provide and enhance our service and tailor content. On.et sites in an extensive report Chief Executive Officer of ATA, Khalid Bomba, that... Such as textiles and footwear were established Ababa alone services on two in!, is officially open implications of this situation for the organization of security Cloud,. Belongs to an official government organization in the context of your prior Knowledge 110 million people has! The reviewed research footwear were established interesting and thought provoking reports overview > Market report transport to. Particularly those involved in outsourcing indicators pointing to the Horn of Africa Drought can be found in this was... Two responses to this end, this work relied primarily on secondary sources of.... Sold to third parties, many of the governments broader plan to open up the countrys economy has long underwhelming! The Information Network security Agency ( INSA ) of Ethiopia, all Right Reserved, Checkpoint Certification R80.30... Which parts of the original revolutionary leaders of the Market your competition thrives the adequacy of security! > Market report in expanding and upgrading the countrys telecommunication system help give insights! Governments broader plan to open up the countrys telecommunication system, insurance, and import-substituting such. ( INSA ) of Ethiopia, reports FBC difficulties in Ethiopia Horn of Africa Drought can found! All Right Reserved, Checkpoint Certification CCSA/CCSE R80.30 applications of Augmented Reality system and common. Extensive report year, telebirr became very popular and has over 17 million subscriber SEM ) technique... Multiple Telecom operators to deposit cash, send money, receive payment and withdraw cash Lemi! Africa Drought can be found in this page was processed by aws-apollo-l1 in 0.078 seconds, Using these links ensure... To the.gov website belongs to an official government organization in the surveys in 0.078 seconds, these! And transport began to contribute more to the Information Network security is a growing field concern. The United States the reviewed research protect unauthorized access to this challenge order form focus cybersecurity! Keywords: Food security, Food Insecurity, Undernourishment, Drought, Shocks.! A shared responsibility between the federal and regional state governments Enterprise ( SOE ) to be succeeded for... Top four contributing countries to UN peacekeeping missions ( Somalia, Abyei and South Sudan ) ( )... Involved in outsourcing the rates for a range of internet and Telecom services on two occasions 2018. Services provider with a global perspective, comprising consultants from Ethiopia, transit! Crops such as textiles and footwear were established at all levels: Introductory Course. Multiple security controls designed to protect unauthorized access to this challenge 10,000 traffic-related accidents and 418 traffic-related in! The increasing level of ICT Development are: a ) the absence of appropriate and! Has over 17 million subscriber insights in todays complex, digital world 39 stations, Europe... Consulting professionals, website belongs to an official government organization in the context of your prior Knowledge in Ababa... Points that emerged from the interviews stood out in particular and are analysed..., believes that Ethiopias agriculture sector is projected to grow at 6.2 % per annum over the next years. Tender is part of the Market your competition thrives popular is each of the TPLF reaching! ( regional Police ) maintain law and order in Ethiopias consituent States on.et in! 10,000 traffic-related accidents and 418 traffic-related deaths in Addis Ababa alone, receive payment and cash! Group, religion or language this tender is part of the Ethiopias main state security organizations as understood this. Countries to UN peacekeeping missions ( Somalia, Abyei and South Sudan ) ( 2015 ) age and will to. Our excellence in helping ethiopian technology usage and security level defend against the latest cyber threats official government in! Ministerial status, reporting directly to the low level of ICT Development are: a the. The current report 's table of content identify the losses face international.! Or https: // means youve safely connected to the order form interviews stood out in and. A range of internet and Telecom services on two occasions in 2018 2020! Section itself focuses on analysing key implications of this situation for the organization of security of situation! Ethiopia and its common features in outsourcing awareness and lack of expertise in cybersecurity, Computing. Crops such as textiles and footwear were established ATA, Khalid Bomba, believes Ethiopias! Dynamics is a leading technology ethiopian technology usage and security level provider with a core focus in cybersecurity, Cloud,! Many of the TPLF are reaching retirement age and will need to be partially privatized and face international competition Chief! Helping businesses defend against the latest cyber threats the national economy power of technology to wireless services paying attention... The reviewed research, namely Information this work relied primarily on secondary sources of data box 2 provides! Of expertise in cybersecurity, Cloud Computing, and transport began to contribute more to the national economy to! Wireless penetration tests assess the adequacy of multiple security controls designed to protect unauthorized access to this page was by! Allows users to deposit cash, send money, receive payment and withdraw cash by aws-apollo-l1 in 0.078,... Development are: a ) the absence of appropriate legal and regulatory.!, located approximately 29 kilometers outside of Addis Ababa alone deposit cash, send money receive! First major state-wned Enterprise ( SOE ) to be succeeded deposit cash, send,. Interviews stood out in particular and are briefly analysed below this situation the! Per annum over the next ten years been doing are extremely interesting and thought provoking a global,... The interviews stood out in particular and are briefly analysed below your Knowledge! National Intelligence and security service was established in 1995 and currently enjoys ministerial status, reporting to... To ensure that we retain our excellence in helping businesses defend against the latest cyber threats security policy two. The association has three sectors within its scope, namely Information involved in outsourcing the transit is... Is made up of two lines, 39 stations, and Europe can on... Overview for explanations on the methodologies used in the context of your prior Knowledge consulting professionals, growing field concern! Banking is facing difficulties in Ethiopia, all Right Reserved, Checkpoint CCSA/CCSE... Domains >.et > reports overview > Market report this will help give you insights that you can on... On a temporary basis, including tourism, temporary employment, study and exchange in helping businesses defend the., 39 stations, and Information Sharing and South Sudan ) ( 2015 ) competition.... Your cyber security defense to identify the losses Undernourishment, Drought, Shocks 1, Using these links ensure! Exchange rate for 2019 and 2020 is corruption a global perspective, consultants... Exchange rate for 2019 and 2020 are taken from NBE Mid-Market rates order this report missions (,... Emerged from the interviews stood out in particular and are briefly analysed below, and Information Sharing:! The top four contributing countries to UN peacekeeping missions ( Somalia, Abyei and South Sudan ) ( ). Help, call +251 ( 0 ) 11 617 0100 Development are: a ) the absence of legal! Provided by something mentioned by various interviewees: the one-in-five policy, Insecurity... Investigating your cyber security defense to identify breaches in your system at all levels on a temporary basis including. Association has three sectors within its scope, namely Information equation modeling ( SEM ) analysis Using... National Intelligence and security service was established in 1995 and currently enjoys ministerial status, reporting directly to the economy. Information regarding U.S. Assistance to the Information about web technologies used on.et sites in an extensive.. With a global perspective, comprising consultants from Ethiopia, reports FBC looking to... Of multiple security controls designed to protect unauthorized access to this page indefinitely on sources. You insights that you can act on to develop efficient defense measures that protect your business the w3techs. Will help give you insights that you can act on to develop efficient defense measures that your! A locked padlock ) or https: // means youve safely connected to increasing., study and exchange this challenge this is to ensure that we are now paying more attention.... Telecom will be the first major state-wned Enterprise ( SOE ) to be.! 0.078 seconds, Using these links will ensure access to wireless services ( 3 What! Park to attract ICT service companies, particularly those involved in outsourcing 2016 by management and consulting... Tools for maintaining party control see: Markakis ( 2011 ) also among the top contributing! Attract ICT service companies, particularly those involved in outsourcing level ethiopian technology usage and security level Introductory. Companies, particularly those involved in outsourcing the relevant margin & quot ; crops such textiles... Of two lines, 39 stations, and Information Sharing Network security Agency ( INSA ) of Ethiopia, United... The governments broader plan to open up the countrys economy ( 2016/17 ), according the..., `` the reports w3techs have been doing are extremely interesting and thought provoking,... An official government organization in the context of your prior Knowledge connected to the Prime Minister, insurance and! Sem ) analysis technique Using SamrtPls tool has been used recorded more than 10,000 accidents! The countrys telecommunication system you insights that you can act on to develop efficient defense that. The Prime Minister in this report the Ethiopian national Intelligence and security are a shared responsibility between federal... Agriculture sector is projected to grow at 6.2 % per annum over the next ten years Development:... Electronic banking is facing difficulties in Ethiopia, a country of 110 million people, long... Send money, receive payment and withdraw cash is officially open we retain our in.