Technology News
Protecting your business data
Unstructured data is burgeoning. In order to protect and manage that data, organisations need to have systems and structures in place, and must understand how the data is being used, by whom it is being used, and most of all, they must know exactly who should not be...
Panda Security continues XP protection
The number of threats exploiting Windows XP is expected to increase as more unpatched vulnerabilities are discovered. Despite Windows XP having reached its end-of-life, Panda Security’s 2014 corporate and retail solutions will continue to protect customers using the...
Mayfox Mining starts systems upgrade
Mayfox Mining, a Kenyan-owned gold exploration company, has signed an agreement with Wingo.net, an authorised Sage ERP X3 solution provider, for the installation of an enterprise resource planning (ERP) solution. The deal sees Mayfox Mining become the first mining...
Dell enhances security portfolio
At the Dell Enterprise Forum customer and partner event last week, Dell showcased new security services and solutions that further expand its security portfolio. With the new offerings, businesses can defend all technology touch points to better safeguard the...
Is cloud right for your business?
Cloud computing is now evolving and growing exponentially, and businesses of all sizes, and across all industries are adapting to and adopting cloud technologies. Industry experts concur – cloud is here to stay, and will only continue to grow and develop more in the...
Epson wins TIPA award
The Technical Image Press Association (TIPA) has named the Epson EH-TW7200 as Best Photo Projector for 2014. TIPA, comprised of the editors and technical specialists at the world’s leading photography and imaging magazines, judges the innovation, technology, design,...
Check Point protects against Heartbleed
Check Point Software Technologies, a worldwide leader in securing the Internet, have announced that its network security products offer multiple protections from the Heartbleed vulnerability, providing for the security of customers’ clients, servers and the integrity...
BYOD is usurped by CYOD in 2014
Until very recently enterprise mobility has been considered one of the most disruptive trends. While it is exactly that, there is a misconception as to why it is so disruptive. Quinton Pienaar, CEO of Agilitude, the first African Salesforce.com reseller, says that it...
Shadow IT illuminates business, IT gap
As TDWI put it in its story, Meet the new BI-Enabled IT, “Industry luminary Jill Dyche champions a new, more responsive IT – enabled by business analytics.” Dyche was addressing attendees of TDWI’s World Conference in Las Vegas and offered alternative roles for IT: as...
Security challenges in a virtual world
Mobility and cloud computing are currently hot topics in the IT space, enabling users to work on the move and from practically anywhere in the world. However, in order to deliver the full capabilities of these two technologies, virtualisation is critical to creating a...
Microsoft, Nokia Devices come together
Microsoft has completed its acquisition of the Nokia Devices and Services business. The acquisition has been approved by Nokia shareholders and by governmental regulatory agencies around the world. The completion of the acquisition marks the first step in bringing...
Leveraging real-time predictive analytics
Predictive analytics may not be a new concept in business but the convergence of new market forces such as big data, mobility and cloud computing have resulted in a host of new and powerful opportunities for the application of this valuable technology toolset....
WiFi fundamentally alters smartphone use
Despite the availability of LTE in South Africa, WiFi will remain the preferred form of connectivity for the foreseeable future according to Ruckus Wireless. A Mobidia-sponsored Informa White Paper has found that, globally, WiFi data usage is much greater than...
Protecting your business data
Unstructured data is burgeoning. In order to protect and manage that data, organisations need to have systems and structures in place, and must understand how the data is being used, by whom it is being used, and most of all, they must know exactly who should not be...
Panda Security continues XP protection
The number of threats exploiting Windows XP is expected to increase as more unpatched vulnerabilities are discovered. Despite Windows XP having reached its end-of-life, Panda Security’s 2014 corporate and retail solutions will continue to protect customers using the...
Mayfox Mining starts systems upgrade
Mayfox Mining, a Kenyan-owned gold exploration company, has signed an agreement with Wingo.net, an authorised Sage ERP X3 solution provider, for the installation of an enterprise resource planning (ERP) solution. The deal sees Mayfox Mining become the first mining...
Dell enhances security portfolio
At the Dell Enterprise Forum customer and partner event last week, Dell showcased new security services and solutions that further expand its security portfolio. With the new offerings, businesses can defend all technology touch points to better safeguard the...
Is cloud right for your business?
Cloud computing is now evolving and growing exponentially, and businesses of all sizes, and across all industries are adapting to and adopting cloud technologies. Industry experts concur – cloud is here to stay, and will only continue to grow and develop more in the...
Epson wins TIPA award
The Technical Image Press Association (TIPA) has named the Epson EH-TW7200 as Best Photo Projector for 2014. TIPA, comprised of the editors and technical specialists at the world’s leading photography and imaging magazines, judges the innovation, technology, design,...
Check Point protects against Heartbleed
Check Point Software Technologies, a worldwide leader in securing the Internet, have announced that its network security products offer multiple protections from the Heartbleed vulnerability, providing for the security of customers’ clients, servers and the integrity...
