Creating digitally activate communities

Creating digitally activate communities

The long lamented ‘digital divide’ remains alive and well but an increasing number of companies are realising the benefit of fast-tracking digital access for their workforce and neighbouring communities. CanPro, a provider of digital workplace development and...
Bridging gender divide in the boardroom

Bridging gender divide in the boardroom

Women are still largely under-represented on corporate boards, despite continued efforts to improve boardroom gender diversity.  The fifth edition of Deloitte Global’s Women in the Boardroom: A Global Perspective publication explores the efforts of more than 60...
Are you prepared as IoT threats mount?

Are you prepared as IoT threats mount?

As the Internet of Things (IoT) continues to gain traction, organisations will have to reassess their security practices to accommodate the increase in security alerts. According to Patrick Rhude, head of product management in Nokia’s Security Product Unit, security...
Tech and superhumans: Where’s your cape?

Tech and superhumans: Where’s your cape?

By Paige dos Santos, Senior Specialist: digital transformation and innovation for SAP Africa The future beckons… A world where the impossible becomes possible, where the imagined manifests. A world where we metamorphise into super humans. Where man and machine merge,...
The five phases of an IoT project

The five phases of an IoT project

By Morne Bekker, Country Manager at NetApp South Africa The Internet of Things (IoT) is a driver of digitalisation and offers many advantages for businesses. Sensors on networked devices continuously collect data. Evaluating data with a specific goal increases...
Cognitive computing improves IT security

Cognitive computing improves IT security

Kathy Gibson was at the IBM Watson Summit 2017 in Kyalami and reports that cybercrime is out of control; it is a systemic problem and it is getting worse. Cybercrime is estimated that about 4-billion records were breached last year because of cyber-attacks. But why is...
Security as a service as threats evolve

Security as a service as threats evolve

The constant evolution of the global security threat landscape is playing a part in the rise of cyber ‘security as a service’ offerings. In addition, the evergreen discussion around cost modelling, namely the ‘Capex vs Opex?’ issue, is also a factor in the promotion...