Beware the gap between perceived AI readiness and DR capability

Software-as-a-service (SaaS) data protection is seen as a high priority when implementing AI solutions – but a survey of senior IT decision-makers has revealed a gap between perceived readiness and tested, validated disaster recovery capability. This is among the...

As cost pressures mount, consumers shift spend to essentials

South African consumers are adjusting their financial behaviour in response to ongoing cost pressures, with TransUnion's Q1 2026 Consumer Pulse Study revealing meaningful shifts in how households spend, save and manage credit. While many households remain under...

Memory and SSD shortage set to impact SA

The memory and SSD crisis is real – and it’s broader and faster‑moving than many in the IT industry expect. This is the stark warning from Craig Nowitz, CEO of Syntech, who recently returned from the Hong Kong electronics shows and a week of factory visits in China....

Your next smartphone could be powered by a recycled toaster

For the past 20 years, the consumer electronics playbook has been simple: make it smaller, make it faster, and seal it shut. Manufacturers utilised industrial adhesives, proprietary screws, and integrated designs to create sleek devices that were virtually impossible...

Intel Gaudi AI accelerator drives doubled performance on GPT-3

MLCommons has published results of the industry standard MLPerf training v3.1 benchmark for training AI models, with Intel submitting results for Intel Gaudi2 accelerators and 4th Gen Intel Xeon Scalable processors with Intel Advanced Matrix Extensions (Intel AMX)....

HIV triples the risk of cervical cancer

New research has found that women with HIV in South Africa face a three times higher risk of cervical cancer than those who do not live with HIV. Cervical cancer is the fourth most common cancer among women worldwide, but women in sub-Saharan Africa are...

DDoS attacks return to pre-lockdown numbers

The number of DDoS attacks dropped by 29% in Q1 2021 compared to the same period in 2020, but increased by 47% compared to Q4 2020, according to data from Kaspersky DDoS Prevention. However, this growth is explained by an unusual spike in January - that month...

SA team for International Olympiad in Informatics announced

The Institute of Information Technology Professionals South Africa (IITPSA) has announced the South African team for the International Olympiad in Informatics (IOI 2021), where informatics students from around the world will compete against each other in June this...

Ericsson and Samsung sign global patent license agreement

Ericsson and Samsung have reached a multi-year agreement on global patent licenses between the two companies, including patents relating to all cellular technologies. The cross-license agreement covers sales of network infrastructure and handsets from 1 January 2021....

Ingenuity Mars helicopter completes first one-way trip

NASA’s Ingenuity Mars Helicopter completed its fifth flight on the Red Planet today with its first one-way journey from Wright Brothers Field to an airfield 129m to the south. After arrival above its new airfield, Ingenuity climbed to an altitude record of 10m and...

Most consumers will pay up for a sustainable future

The Covid-19 pandemic has elevated consumers' focus on sustainability and willingness to pay out of their own pockets - or even take a pay cut - for a sustainable future. This is according to a new IBM Institute for Business Value (IBV) survey of over 14 000 consumers...

Qualcomm vulnerability puts Android users’ privacy at risk

Check Point Research (CPR) found a security vulnerability in Qualcomm's mobile station modem (MSM), the chip responsible for cellular communication in nearly 40% of the world's phones. If exploited, the vulnerability would have allowed an attacker to use Android OS...

How do cybercriminals compromise passwords?

One of the most important parts of avoiding compromise is understanding how cybercriminals may attempt to gain access to critical data. Attack techniques continue to evolve and become more sophisticated, giving cybercriminals a vast toolkit to use to exploit users....

Which social media platforms have the most content violations?

Donald Trump, Azealia Banks, and Wiley are all celebrities who have been permanently banned from social media platforms, for reasons spanning from harassment, copyright violations, to the spreading of fake news. They join thousands of other social media users who are...

More News Today

EOH scoops top SAP awards

Listed technology group EOH once again scooped three top awards at a gala awards evening held in Cape Town recently. The SAP Partner Awards recognise partners who have achieved excellence in planning and executing SAP projects and programs and more importantly,...

Etisalat announces revenue increase

Etisalat Group, a leading telecoms operator in the Middle East, Africa and Asia, today announced strong results for the second quarter of 2013, with an increase of quarterly consolidated revenues and subscribers across its operating markets. Key highlights for Q2 2013...

Genesys launches Proactive Engagement

Genesys, a leading provider of customer service and contact centre solutions, has announced the launch of Genesys Proactive Engagement, a powerful new offering that increases Web sales and first contact resolution for customer service. With Genesys Proactive...

Moving from on-premise to the cloud

Gartner has said that by the end of 2013, 75% of global call centres will be making use of the hosted call centre model – which leaves 25% of call centres likely relying on premise-based solutions that use their private branch exchange (PBX) to perform basic call...

Supply chain management now a degree

As South African businesses continue to expand their footprint into Africa to tap into the continent’s expanding consumer market and growing middle class, so the shortage of managers with suitable high-level skills in export and supply chain management is becoming...

Five tips for securing a wireless network

Sophos has suggested best practices that can help administrators go beyond the basics of wireless security to provide advanced security, manageability and accessibility. “It isn’t hard to set up security for the wireless router in your basement by changing the SSID,...

SAP, Techno Brain to address skills shortage

SAP Africa has signed up Techno Brain as an official SAP Africa Education delivery partner. This was announced at SAP Africa’s first-ever Partner Summit held in Cape Town. Techno Brain is a custom software application provider that offers innovative software solutions...

Altonet implements solution for Anglorand

To successfully address its disaster recovery requirements, financial services company, Anglorand Securities, has installed HP Autonomy LiveVault, a secure, compliant and automated private cloud backup solution, as well as its TurboRestore Appliance for Rapid...

Etisalat to acquire stake in Maroc

Etisalat has announced that Vivendi has formally granted Etisalat a period of exclusivity for the acquisition of Vivendi’s 53% Stake in Itissalat Al Maghrib (Maroc Telecom) until 25 September 2013. Etisalat’s binding offer values each Maroc Telecom share at MAD 92.6,...

MWeb eSports Championship a success

The MWeb head office in Cape Town was teeming with excitement on 19 July 2013 as top gamers from Cape Town and Johannesburg clashed in the first ever inter-regional Electronic Sports (eSports) inter-regional championship in South Africa. The competitors were put to...

Cyber Security Engineer (Contract) – Gauteng Johannesburg North

Role:You will be a part of the Technology and Operations Team as a Cyber Security Engineer, to ensure that our client maintain a sound Cyber posture and protect our clients customer and employee information, you will do this by maintaining the Cyber Road map....

Tech Lead ( Full Stack Engineer) – Western Cape Woodstock

The Software Engineer/Tech Lead will work collaboratively with the Merchant Journey team to drive development of merchant onboarding and dashboard. How you'll be making a difference: Work alongside the team and be a part of the full software development life...

Network Engineer – Gauteng Centurion

Network Engineer - Taking the cloud phenomenon to another level! We are looking for a confident go getter individual who has an urgent sense of delivery looking for exposure to a variety of VMWare hosts with Windows servers! The Company: one of a few qualified and...

Developer – Front-End at Parvana Recruitment

About our client:Our client stands out as a recognised expert in automation technology, earning prestigious accolades for their innovative approach. Through the utilisation of state-of-the-art technology, they have positioned themselves as a prominent figure in global...

Technical Tool Owner

Technical Knowledge and experience in software design, platform design and application operations.Knowledge and experience in recent IT base technology (Azure, CICD, DevOps, Cloud,API's).Knowledge of IT standards and Security concepts.Knowledge of agile working...

Junior Data Engineer

We are seeking a talented and motivated Junior Data Engineer to join our dynamic team. The successful candidate will play a crucial role in supporting data-related initiatives and ensuring the efficient processing and analysis of data. If you are passionate about data...

Software Engineering Manager

Fully remote role The position reports to a Senior Software Engineering Manager in the Logistics engineering division Your mission, should you choose to accept it: Build and retain a high-caliber engineering teamBuild relationships through regular one on one...

Systems and Data Manager

Systems and Data ManagerRole:The role of the System and Data Manager shall play a key role insupporting the collection and analysis of key datasets within the organisation tosupport their strategic goals. Essential Duties and Responsibilities:Supporting the launch of...

Technical Tool Owner – Eastern Cape Port Elizabeth

Technical Knowledge and experience in software design, platform design and application operations.Knowledge and experience in recent IT base technology (Azure, CICD, DevOps, Cloud,API's).Knowledge of IT standards and Security concepts.Knowledge of agile working...

View more career listings on our Careers Section