Six critical lessons Google taught business owners in 2015
Six critical lessons Google taught business owners in 2015

Google is a world leader and no one can refute that. It is one of the biggest companies in the world. It has a presence in practically all countries all over the globe. As a search engine, it is the most popular one with competition from the likes of Microsoft's Bing. The company also has the Android mobile platform which faces competition from Apple's iOS and Microsoft's Windows. Generally, Google owns just about everything that is related to IT. They have their own tablet and smartphones. The company is responsible for the most accurate maps in the world. What does Google lack?

By Vinod Jethwani 25 Nov 2015 15:39

©Marcel de Grijs via 123RF
HEVC a significant advancement in video compression technology

High efficiency video coding (HEVC), or H.265 as it has become known, is arguably one of the most significant advancements in video compression technology that has been made in the industry in the last ten years. Why? Think about how much video we consume, create and transfer, on a daily basis.

25 Nov 2015 15:17

Agri-tech startups the future of farming
Agri-tech startups the future of farming

The AMPION Veture Bus, a seven day startup bootcamp with 40 participants from South Africa, Botswana, Namibia, Zimbabwe, France and Germany and supported by the German Ministry for International Cooperation and Development (BMZ), aims to create ten agri-tech startups to provide innovative solutions to transform the agricultural sector in Africa. The bus tour started on 13 November in Windhoek (Namibia) and led through Ghanzi and Gaborone (both Botswana), Johannesburg, Bloemfontein to Cape Town (all South Africa).

25 Nov 2015 10:00

©Wavebreak Media Ltd via 123RF
Majority of internet users would download malicious files

A survey has revealed that 74% of internet users would download a potentially malicious file, because they lack the cyber savviness they need to spot dangers online.

25 Nov 2015 07:59

©Robert Churchill via 123RF
Ten ways you can optimise page load time with a website speed test

Technology and the internet is constantly evolving and with that said, so does people's perceptions and expectations change over time as more and more things are made available online...

By Charl Vollmer 25 Nov 2015 07:44

©Wavebreak Media Ltd via 123RF
Enterprise mobility management can enable schools to stay in control

The accelerating trend towards bring your own device (BYOD) and bring your own application (BYOA) continue to challenge African CIOs, as the perimeter is no longer the mature and robust firewall or the enterprise facilities. In the modern workplace, the perimeter has shifted beyond the traditional firewall of the enterprise to the mobile devices.

By Charl van Niekerk 24 Nov 2015 15:57

©ximagination via 123RF
Kaspersky Lab: avoiding online fraud at all costs

According to Kaspersky Lab's latest report based on Corporate IT Security Risks Survey results - a global survey of more than 5,500 company executives and professionals from 26 countries - 60% of businesses admitted experiencing at least one IT security incident which can lead to or may be related to financial fraud.

24 Nov 2015 12:58

Hans via pixabay
Big data analytics can reduce energy consumption

The world we live in has become increasingly digital and connected, and we now have the ability to collect data from many new sources. Sophisticated sensor technology has given rise to the Internet of Things (IoT) and machine-to-machine (M2M) communication, embedding intelligence, integrating more data sources than ever and providing the potential for informed decision-making based on comprehensive insight.

By Syed Mansoor Ahmad 24 Nov 2015 12:31

©diego cervo via 123RF
Five things you need to know about connecting abroad

The December holidays are only a few weeks away and many business owners, executives and entrepreneurs are planning to take their work home or on holiday with them. There are few people who can afford to completely disconnect from the office, particularly at a time when businesses of all sizes and across sectors are under pressure.

By Craig Lowe 24 Nov 2015 12:09

Advantages and disadvantages of fixed wireless connectivity for business -
Advantages and disadvantages of fixed wireless connectivity for business

In this era of the need for speed in communication across multi-platforms, it becomes apparent that to compete in this evolutionary phase of human ecology we need to be ready for eventualities with contingencies set in place. The varied forms of communication devices including the wired and wireless, all have their features, pros and cons but we will be laser-focused on the fixed wireless for business as this provides for a reliable source of backup connection with a wired network as the main hub albeit variations of the same are a possibility.

Issued by 24 Nov 2015 10:13

The death of the telephone - WebRTC and other top comms-tech trends for 2016 - Connection Telecom
The death of the telephone - WebRTC and other top comms-tech trends for 2016

WebRTC (a programming interface definition enabling plugin-free, real-time Web-based communications) embeds communications functionality in browsers and operating platforms to enable casual communication between browsers or apps.

Issued by Connection Telecom 23 Nov 2015 13:38

SA hit by cyber bullies
SA hit by cyber bullies

While high-profile cyber hacks may dominate headlines, unpublicised attacks are taking place against individuals and companies all the time. This according to Paul Williams, major account manager at Fortinet. "We are seeing more and more targeted attacks happening locally," he says.

23 Nov 2015 12:55

nafets via pixabay
Energy sector an attractive target for cyber criminals

Given their high visibility, central role in the world economy and the politically sensitive nature of their global operations, energy businesses are becoming increasingly attractive targets for cyber attackers. Energy firms are being targeted every day by attackers leveraging social engineering and using partner organisations to gain access to high-value targets, according to Arbor Networks. The attackers mainly use credentials to stay under the radar, resulting in companies not finding out they have been breached until it's too late.

23 Nov 2015 12:11