Transparency in F&B supply chain promotes consumer trust

65% of shoppers would switch from a brand they usually buy to another that is more transparent about its products’ origins and supply chain.

Unleashing the power of email lead-gen for business

When done right, well-crafted emails can supercharge your B2B lead generation game

Overcoming resistance to changing operating model

Research at Accenture found that 74% of executives need to rethink their existing operating model entirely,

Impact of always-on connectivity

Always-on connectivity and a proliferation of mobile devices has had an unprecedented impact on the world says Edward Carbutt, executive director at Marval Africa.

Creating digitally activate communities

For South Africa’s communities to become economically active, it is essential that they have access to Information and Communication Technology.

Bridging gender divide in the boardroom

Deloitte Global’s Women in the Boardroom: A Global Perspective publication explores the efforts 60 countries to promote boardroom gender diversity, and shows women hold just 15 percent of board seats worldwide.

Are you prepared as IoT threats mount?

For organisations to adequately protect themselves in the IoT era, they must move from static defence to agile responses to security threats via workflow automation and orchestration in their security operations

Tech and superhumans: Where’s your cape?

If we constantly rely on government alone to solve the world’s problems, our challenges will remain and get worse. What is our insurance policy of the future?

The five phases of an IoT project

“Different interlinked building blocks are required for companies to be successful in their implementation of IoT” ~ Morne Bekker, Country Manager at NetApp South Africa

Education: Blockchain manages student data

Blockchain technology can help bring transparency and help build trust to transactions. It enables users to create networks that are permissioned and immutable; meaning they cannot be changed or altered by any one party.

Cognitive computing improves IT security

Cybercrime timeline: In South Africa, it takes an average of 199 days to detect and contain a breach – 144 days to detect it, and often it is another company that actually detects it; then 55 days to contain it.

Security as a service as threats evolve

“Network security requires a multi-pronged approach, as modern-day networks are borderless” ~ Anton Jacobsz, managing director of Networks Unlimited

Dr Abedian and Cell C’s Hangman . . .

“Spiritually, entrepreneurship is everywhere. No country, no part of  human beings is denied the spirit of entrepreneurship. The question is do we have a favourable and supportive socio-political and economic environment?”~ Dr Iraj Abedian

The business benefits of hyperconvergence

Kathy Gibson reports from Dell EMC Channel Update in Sandton – The IT world is at an inflexion point as the environment we have worked in for the last 15 years is changing.

Workforce transformation completes circle

The accelerating pace of technology innovation means that there is a constant demand for new user experiences. Dell EMC is leading with an innovative portfolio and solutions that help end users become more productive.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.