The firm's acquisition of two other wearables manufacturers enables it to make a play in the premium market dominated by Apple.
Semtech teams up with conservation groups to develop IOT sensors for rhino horns that enable tracking and prevent poaching.
After being approved by Cabinet last December, the controversial Bill will soon be tabled in Parliament.
ITWeb, in partnership with MTN Business, is running a survey on ICT maturity to gain a clear, data-driven understanding of where SA businesses stand in terms of ICT maturity. The survey covers everything from infrastructure and cybersecurity to digital literacy and compliance.
To gather further insights into ICT maturity within respondent organisations, the survey poses the following questions:
By completing the questionnaire, you’ll contribute to this local research project and stand a chance to win a Takealot voucher to the value of R3 000. The detailed results of the survey, and the prize winner, will be published on ITWeb.
The telco says increased data consumption and high bills can be blamed on a range of things - from the use of mobile social media platforms to faster network speeds and automatic updates.?
The smartwatch market will grow to $21bn, boosted by basic hybrid and analogue watches, says Juniper Research.
Once a company understands its goals, customers and those customers' needs, an appropriate strategy can be designed, the company says.
Second-hand goods account for as much as 40% of all items recently sold on bidorbuy, says the company.
Spectrum and regulatory battles will dominate telecoms this year, alongside the positive rollouts of the Internet of things and fibre.
The CCO of Zinia, Warren Bonheim outlines his predictions for the year ahead.
Thousands of experts from around the world are in South Africa to find ways of using technology to capture data more accurately.
Millions of passwords gathered from last year's large data breaches revealed 123456 as the most commonly used password.
Bitcoin and encryption are some of the technologies users can deploy to avoid being compromised on the Internet.