In 2018, Kate Maakane placed second in a hackathon. She was hungry for the opportunity, bright and ready to be challenged. The tech industry didn’t come knocking. It took six more years before she got ...
WiFi has evolved into a strategic growth engine capable of delivering a multiplier effect – where a single network investment drives compounding returns across employee productivity, customer ...
A new global report from the Chartered Institute of Procurement & Supply (CIPS), the global professional body for procurement and supply with a presence in over 180 countries, has revealed a ...
The memory and SSD crisis is real – and it’s broader and faster‑moving than many in the IT industry expect. This is the stark warning from Craig Nowitz, CEO of Syntech, who recently returned from the ...
Staff churn is an ongoing challenge across the business process outsourcing (BPO) industry, especially in call centres where long shifts and constant performance pressure are part of daily operations.
As Iran’s Internet blackout goes past 50 days, some Iranians will be able to connect – with limitations. Most of the country’s 90-million citizens have been without international Internet access since ...
As warehouse workers become less willing to perform manual tasks, many organisations will be challenged to sustain operations through hiring alone, as labour costs and labour supply remain under ...
Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies, has released its Brand Phishing Ranking for Q1 2026. The latest findings show that Microsoft remained the ...
As South Africa sharpens its focus on economic growth, digital inclusion and future-facing skills, Huawei is building one of the country’s most visible ICT talent ecosystems, with nearly 37 -00 ...
Artificial intelligence (AI) is entering a new phase with agentic AI: autonomous systems that perceive, decide, act, and learn without constant human oversight, operating independently across ...
The cybersecurity industry has long treated Q-Day – the point at which quantum computing shatters current encryption standards – as a distant, theoretical problem. However, this complacent timeline ...
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead ...