Gbps upload speeds through carrier aggregation now a reality
New Fujitsu Notebook LIFEBOOK models designed for hybrid workplace
Enhanced connectivity, extended battery life and compatibility with a single port replicator simplify working from home or on the go.
Why are e-mail threats still a problem?
Attackers are using known good platforms and more targeted impersonation mails to trick users and get past traditional solutions.
VC becomes the collaboration tool for global business
There has been massive worldwide adoption of video collaboration tools as companies switch from in-person to virtual meetings, says Axiz.
SA to make significant gains in SD-WAN market
The South African software-defined wide area network market is on a growth trajectory, says BMIT.
Adapt, don't change! Empower legacy systems in the cloud era
mWtech provides legacy modernisation solutions that cover services like finance management, fleet management, logistics operations and welfare onboarding processes.
Make sure you pay the CEO
Change of bank details fraud uses fake banking confirmation letters and the trust of finance people to update an existing supplier’s details, says John Mc Loughlin, CEO at J2.
Telspace Africa, DFIRLABS announce partnership
Telspace Africa has partnered with DFIRLABS to provide digital forensics and incident response services to its clients.
Broadcom solutions accelerate client value on z16 Mainframe
Broadcom Software announces Day One support for its solution stack on next-generation IBM z16 Mainframe.
White paper: Understanding the impact of electronic trading on financial markets
Technology has transformed electronic trading of securities. Saurav Sharma of Forex Beginner South Africa discusses the advancements in execution and order management in electronic trading in this white paper.
Huawei unveils Intel-powered HUAWEI MateBook D14
HUAWEI MateBook D14 supports Super Device to provide a more convenient way for users to connect the laptop with other devices.
When data is held to ransom
Business can establish mitigating and remediating systems by conducting vulnerability assessments and internal audits, says Michael Morton, solutions architect at Securicom.