Technology News
Symantec uncovers Regin spyware
An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008. This is according to Symantec’s company blog, which reveals that Regin, a back door-type Trojan, is a complex piece...
Social media key for utilities
A new IDC Energy Insight study reveals that around two in every three European utilities use social media for business purposes or plan to do so in the short term, compared with 48% a year earlier. The study also highlights that further expansion in the social media...
Gijima appoints Hoggarth to the board
Gijima has announced the appointment of Bill Hoggarth to the company’s board with effect from 20 November 2014. “Hoggarth brings a wealth of expertise in the ICT industry, and we are pleased to welcome him to the Board of Directors,” says Robert Gumede, Gijima...
Acer introduces service centres
Acer South Africa has announced that it appointed PartServe Channel Support as its carry-in warranty service centre. PartServe now carries out all repairs to Acer equipment, regardless of whether it is in or out of warranty. PartServe is a broad-based repair company...
Innovation award winners announced
The Innovation Hub has announced the winners of the Gauteng Accelerator Programme Innovation Competitions for 2014. These awards honour top innovators, researchers and entrepreneurs for exemplary work in the green and health technology sectors; the biosciences; and the information and communication technology (ICT) sectors.
Operational efficiency key to healthcare systems
With healthcare costs rising, operational inefficiency will become critical at 25% of hospitals, resulting in the development of a data-driven digital hospital strategy requiring budget in 2016. This is according to IDC Health Insights’ IDC FutureScape: Worldwide...
SSL encrypted traffic management key
According to Blue Coat, NSS research has uncovered that 25% to 35% of network traffic is encrypted within most modern organisations and according to Gartner by 2017 over half of the network attacks targeting enterprises will use encrypted traffic to evade controls....
Electronic signatures boost paperless office
The paperless office is a goal many organisations have been striving towards for a decade or more, with the aim of enhancing efficiency, saving money and improving green credentials. However, one of the biggest challenges in the quest to reduce paper usage is the...
CA innovates with lifecycle management
CA Southern Africa has revealed that CA Technologies has announced availability of CA Application Lifecycle Conductor, a new lifecycle management solution that automates and manages application development spanning mobile to mainframe environments - from the initial...
Innovative SAP Hana option from Barnstone
SAP Hana offers businesses the ability to turn vast volumes of data into insight extremely rapidly, thus allowing them to operate more smartly in realtime. A real competitive advantage in today’s fast-moving markets. However, in today’s tough economic climate,...
Embrace showrooming to ensure customer loyalty
As trends like online shopping, smartphones and social media have matured, so has the way in which customers research and purchase products and services, says Mark Hiller, GM at Lexmark South Africa. Although physical stores are far from dead, retailers continue to...
ICT urged to invest in youth
The ICT industry should stop wasting its money on top-heavy events like GovTech and rather invest in developing South Africa’s untapped youth market. This is the word from Prof Barry Dwolatzky, who says companies with foresight would rather support events like the...
Mobile backlog affects enterprise revenues
New research shows that a slow approach to app development is increasingly damaging revenue opportunities in the enterprise. The study found that organisations are currently struggling with a significant mobile backlog and are unable to cope with business demands. The...
Symantec uncovers Regin spyware
An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008. This is according to Symantec’s company blog, which reveals that Regin, a back door-type Trojan, is a complex piece...
Social media key for utilities
A new IDC Energy Insight study reveals that around two in every three European utilities use social media for business purposes or plan to do so in the short term, compared with 48% a year earlier. The study also highlights that further expansion in the social media...
Gijima appoints Hoggarth to the board
Gijima has announced the appointment of Bill Hoggarth to the company’s board with effect from 20 November 2014. “Hoggarth brings a wealth of expertise in the ICT industry, and we are pleased to welcome him to the Board of Directors,” says Robert Gumede, Gijima...
Acer introduces service centres
Acer South Africa has announced that it appointed PartServe Channel Support as its carry-in warranty service centre. PartServe now carries out all repairs to Acer equipment, regardless of whether it is in or out of warranty. PartServe is a broad-based repair company...
Innovation award winners announced
The Innovation Hub has announced the winners of the Gauteng Accelerator Programme Innovation Competitions for 2014. These awards honour top innovators, researchers and entrepreneurs for exemplary work in the green and health technology sectors; the biosciences; and the information and communication technology (ICT) sectors.
Operational efficiency key to healthcare systems
With healthcare costs rising, operational inefficiency will become critical at 25% of hospitals, resulting in the development of a data-driven digital hospital strategy requiring budget in 2016. This is according to IDC Health Insights’ IDC FutureScape: Worldwide...
SSL encrypted traffic management key
According to Blue Coat, NSS research has uncovered that 25% to 35% of network traffic is encrypted within most modern organisations and according to Gartner by 2017 over half of the network attacks targeting enterprises will use encrypted traffic to evade controls....
