Home Features Page 86

Features

In-depth analyses of the top Tech stories

Intelligent routing (IR) is not new to contact centers - the benefits of using this technology are proven. It's now no longer the exclusive domain of larger companies with sizable budgets and access to high level skills. Today, intelligent routing solutions are modular, easy-to-use and to configure, and are reasonably priced. Furthermore,...
Consumerisation, cloud computing, tablet computing and mobile collaboration are among the major trends that will drive the market for enterprise mobility solutions over the next year. That's according to Robyn Milham, head of enterprise sales for Southern Africa at Research In Motion (RIM), the company behind the BlackBerry® solution. She...
Microsoft has officially launched its new Internet Explorer 9 (IE9). Despite being newly hatched, IE9 has already met with serious criticism. Microsoft is marketing IE9 as a fast, secure and beautiful browser for the "prosumer" who wants to experience the best of HTML5. IE9 draws on the computer’s Graphics Processing Unit...
South Africa's government needs to carefully evaluate the track record of potential ICT service providers before entering into long term contracts. Effective delivery of information communication technology managed services and support is critical to the functioning of state departments. Media coverage of reported rifts between service providers and certain government...
Warner Bros is testing a new video rental service on Facebook, the first time a major media player has done so with a social network, a deal we believe precedes a more concerted move by the social network into video services and web TV. A Facebook video/ web TV service...
Across the world the IT industry has grown and changed dramatically over the past decade, with technological advances enabling computing to become increasingly powerful and users becoming ever more connected on a global scale. The African market however represents something of a dichotomy when it comes to IT and technology....
In the past the network was used primarily to connect a few PCs together – along with a peripheral device or two, and streamline communications in order to improve the efficiency of operations in business. It has always been a critical tool but was generally confined to the larger...
In November 2010, South Africans collectively guffawed at the ANC YL leader Julius Malema and his statements about twitter. Malema was being impersonated on the popular social media tool and he felt that his complaints were not being addressed by the website’s administrators. Malema's complaints were not taken seriously. As...
Abandoned calls – a silent ‘no response’ call terminated by the call originator when answered by a live individual – can be very harmful to the reputation of the direct marketing industry. Calls like these are inconvenient, annoying and can be downright disturbing. And now there are laws against it. In the UK,...
An effective communications infrastructure can, in today's competitive economy, supercharge organisations' process chain - from developing a product, to procurement, manufacturing, sales and customer management. However, in the real world the above is often theoretical "pie in the sky" as workflow can quite easily be disrupted as decision-makers aren't contactable and...
Most internet users are aware of the very common phishing attacks, blanket emails sent out en masse with links to infected sites that try to gather your personal information, and have taken the necessary steps to protect themselves from this and other cyber threats. But as the internet is...
In 1989, the first landmark IT outsourcing deal was signed between the Kodak Eastman Company and IBM, gaining worldwide attention. At the time the deal was heavily criticised, and the then CIO of Kodak, Katherine Hudson faced scorn from her peers, who feared that by abdicating responsibility for IT...
Virtualisation as a technology is not new, and has in fact been in existence since the 1970's when it was pioneered on IBM mainframes, allowing the machines to run multiple operating systems on a single physical system with shared hardware resources. However, the IT world has changed dramatically since those...
Most businesses don’t intend to use illegal software, or break the terms of their license agreements, but through a combination of bad planning, inadequate IT policies or simply a lack of awareness, many end up doing so. Software piracy takes many forms, but whatever guise it takes, software piracy carries...
The Protection of Personal Information Bill, or PoPI, has been in discussion for years and will become a law which deals with a critical part of global society today - the increasing ability to store and process personal information. However, protecting personal information has become more and more complex...
According to trends analysts IDC, IT strategies in Africa for the year 2011 will be characterised by technologies including the cloud and virtualisation. This trend is being driven in large by increasing availability and affordability of bandwidth, making hosted services more of a reality than ever before. This combined with an almost insatiable appetite for...
- Advertisement -

Get in touch

9,200FansLike
22,774FollowersFollow
581SubscribersSubscribe

Recent Posts