Media
Let’s get real: AI is part of our here and now
Let’s kick off by positioning artificial intelligence (AI) – not just in the cyber security and automation space, but in our everyday lives. It’s easy to think you are a voyeur in the artificial intelligence (AI) debate, as realistically speaking, what has it got to do with you and your life today – surely, it’s a... Continue reading→
iOCO becomes African partner for Jedox EPM software
Jedox, Germany-based provider of performance management software, has appointed iOCO Software Distribution as its African channel partner. According to Jedox, it serves 2 500 organisations acrosss 140 countries and South Africa is its biggest market in Africa. Its s enterprise performance management (EPM) SaaS platfom helps customers with budgeting, planning, forecasting and reporting, giving them... Continue reading→
BRICS Future Skills Challenge showcases innovation and talent across five nations
This year’s BRICS Future Skills Challenge covered topics like Robotic Process Automation (RPA), agri-IOT, cyber security, data science, and mobile app development, to name a few. Following a rigorous judging process, the top 15 competitors from Brazil, Russia, India, China and South Africa pitched their concepts in a Dragon’s Den set-up, with five experts on... Continue reading→
Fighting the good fight
CIOs have never had more to contend with – or more to offer the business From the person interested in technology pushing for its inclusion in the company’s operations, to the IT manager reporting to the Financial Director, to today’s strategic technology leaders whose voices are heard at board level, the role of the CIO... Continue reading→
The fix to broken software? Proper testing
‘Broken software’ has been a hot topic at many software development conferences around the world in recent years, with stakeholders pondering why the agile approach to development is not meeting expectations and fixing bugs fast enough. The agile approach of taking risks, failing fast and iterating may help to optimise solutions, but failing at all... Continue reading→
AI in software testing – friend or foe?
Artificial intelligence (AI) and machine learning are changing the face of software development and testing, promising to speed up the development and release of quality software. But for many people, AI also appears to pose a threat to the software testing practice as a whole. It should be noted that testers have been expressing similar... Continue reading→
CA Southern Africa delivers Symantec Enterprise Cloud to SA’s largest corporations
Symantec Enterprise Cloud, a Broadcom cyber security solution, brings data-centric hybrid security for the largest and most complex organisations in the world. It enables enterprises to meet legal, regulatory and corporate data compliance requirements. Symantec Enterprise Cloud also empowers today’s modern workforce to securely access sensitive company assets from anywhere. “It unifies intelligence across control points, enabling... Continue reading→
Take the pain out of moving data to the cloud
The intricacies of cloud data migration can be managed, to navigate this transformative endeavour with confidence It is said that three of the most stressful things in life are death, divorce and moving. While moving to a new house can indeed be a daunting prospect, similar sentiments hold true when considering the migration of data... Continue reading→
Rock-solid data resilience is the only option
Why backups, high availability and immutability should be the foundation of all companies’ cyber security strategy. Let’s kick off by answering the question – why should backup, high availability and immutability be the foundation of cyber security strategies? In a nutshell, because together they provide a rock-solid comprehensive cyber security strategy that delivers resilience against a... Continue reading→
The road to Zero Trust not necessarily paved with gold
As discussed in my first article in this series, whilst Zero Trust must be the goal, there are a few potholes to navigate on the journey. Let me expand slightly more on these caveats, but also expose the greatest ally of Zero Trust. Paul Meyer. Peer to peer (P2P) technologies – prevalent in the... Continue reading→