Saturday, May 25, 2024
No menu items!

Mobile commerce

Mobile commerce tech driving South African businesses

Retrenchment, recession and reduced spending – signs of an economy under pressure, but, it would seem from research that SA companies are fighting back! Local ICT managed services provider and leading infrastructure management firm Integr8 says there is clear evidence...

20% of consumers in South Africa use iOS in contrast to 74% using Android

Ten years since the launch of iOS, a research conducted by Upstream, mobile commerce platform in high growth markets has found that Apple’s operating system could see a new opportunity over the next decade in South Africa where currently...

MEA mobile wallet market expected to grow globally by 2020

Consumers within the Middle-East and Africa use mobile phones to pay for a wide range of services, and digital or hard goods. The growth in smartphone and mobile internet users, and greater convenience and accessibility are the key growth drivers for...

Are South Africans ready to give up their wallets?

After years of hype the mobile commerce bandwagon may have just rolled into town. And if projections are anything to go by, the days of the traditional wallet might be numbered. The global mobile wallet market is projected to grow...

Chad gets first mobile money offering

Airtel Chad has collaborated with Ecobank to launch Airtel Money in the West African nation. Touted as the first Mobile commerce product in the country, the service will allow subscribers to carry out financial transactions on their mobile phones...

MFS going global after Libya trial

Libya is being used as a trial country for mobile commerce and financial services as part of a new partnership of Nokia Siemens Networks and MoreMagic Solutions. Although the project is currently stalled due to the unrest in Libya,...
- Advertisement -spot_img

Latest News

Regular Vigilance Crucial for Spotting Software Breaches

Chief Technology Officer for Obsidian Systems, Karl Fischer, says "Constant vigilance is essential to identifying software security breaches." Fischer recounts,...
- Advertisement -spot_img