Author: Contributors

1 3 4 5 6 7 10 50 / 96 POSTS
Customer Education, Empowerment Key to Cloud-based Ebilling Security

Customer Education, Empowerment Key to Cloud-based Ebilling Security

By Stergios Saltas, MD at Striata South AfricaPhishing attacks continue to exploit the most vulnerable part of a system: people.Every day, all ...
Twenty Years of DDoS Attacks – Looking Back, Looking Forward

Twenty Years of DDoS Attacks – Looking Back, Looking Forward

By Bryan Hamman, Arbor Network’s territory manager for Sub-Saharan AfricaDistributed Denial of Service (DDoS) attacks are more popular and dangero ...
VR – Empty Head(set)s?

VR – Empty Head(set)s?

By James MoarWhile a variety of VR (virtual reality) units have been in development for decades, the technology has come to th ...
The “start-up” Powertrain for Electric Cars

The “start-up” Powertrain for Electric Cars

By BoschIt’s now common knowledge that a more powerful battery will increase an electric car’s range. But can a new powertrain have a comparable i ...
Screen for Pancreatic Cancer by Snapping a Smartphone Selfie

Screen for Pancreatic Cancer by Snapping a Smartphone Selfie

By Staff WriterThe University of Washington researchers have developed an app that could allow people to easily screen for pancreatic cancer and o ...
How Tech can help with Wildlife Conservation

How Tech can help with Wildlife Conservation

By Reshaad Sha, CEO at SqwidNetThe rise of the Internet of Things and other mobile technologies offers humanity the opportunity to truly advance t ...
IoT.nxt Attains Microsoft Gold Partner Status

IoT.nxt Attains Microsoft Gold Partner Status

By Staff WriterSouth African innovators in Internet of Things technology, IoT.nxt, achieved Microsoft Gold Partner status for data platform this m ...
Bosch’s Perfectly Keyless Turns the Smartphone Into a Car Key

Bosch’s Perfectly Keyless Turns the Smartphone Into a Car Key

By Staff WriterIt’s a scene most of us will be familiar with: in the mad morning rush, the car key is nowhere to be found. And anyone who ...
How effective is two-factor authentication?

How effective is two-factor authentication?

By MJ Strydom, MD at DRSShould a password get hacked, it could expose the user to viruses, malware and data breaches on their mobile phones and ot ...
Turrito Networks Extends SME Portfolio with Reliable Backup Solution

Turrito Networks Extends SME Portfolio with Reliable Backup Solution

By Staff WriterMicroMega Group company, Turrito Networks is extending its cloud services portfolio for SMEs, by becoming a strategic partner for g ...
1 3 4 5 6 7 10 50 / 96 POSTS