Microsoft will train one million young South Africans in useful digital skills within the next 12 months. Lillian Barnard, ...
AI could contribute up to $30-billion to sub-Saharan Africa’s economy by 2030, according to Google’s Digital Opportunity of ...
Donald Trump launched the $TRUMP meme coin this weekend, and its skyrocketed by over 300% in less than 24 hours. As of Sunday morning, $TRUMP hit a market cap of $5 ...
Gartner has highlighted several trends set to shape the automotive sector in 2025, as the industry faces regulatory pressure on emissions and intense growth from China. “Software and electrification ...
Check Point Software Technologies’ Global Threat Index for December 2024, emphasises the growing sophistication of cybercriminals. For Africa, December was hardly a season to be jolly with eight of ...
Significant shifts in the cloud ecosystem occurred in 2024, driven by factors such as repatriation, sovereignty, and market consolidation. As we kickoff 2025, the cloud landscape can expect to witness ...
The 2025 Gartner CIO and Technology Executive Survey indicated that 94% of power and utility chief information officers (CIOs) plan to increase their AI investments in 2025, with an average spending ...
Government requests for content removal on Google climbed to nearly 330 000, with an annual average growth rate of 34% since 2020. This is according to a global Surfshark study, which found that the ...
AI agents are poised to transform productivity for the world’s billion knowledge workers with “knowledge robots” that can accomplish a variety of tasks. To develop AI agents, enterprises need to ...
SpaceX’s Starship exploded during its ascent burn yesterday. According to SpaceX, posting on X: “Starship experienced a rapid unscheduled disassembly during its ascent burn. Teams will continue to ...
Throughout 2024, the most common type of security incident faced by companies was related to network protection according to the latest Kaspersky IT Security Economics report. Ninety-seven percent of ...
However, it creates a double-edged sword for cybersecurity. Essentially, disruptive technologies bring many opportunities, but they also usher in significant vulnerabilities, changing the cyber risk ...