Smart cities: Building the connected future
by Mark Walker, International Data Corporation
By 2050 80% of South Africans will be living in cities. This shift from a rural to an urban population coupled to increased use and prevalence of information and communication technology by governments... ( more) |
Q&A: Six tips for keeping your mobile apps secure
by Lindsay Britz, Magic Software
Recent reports show that mobile penetration keeps growing in South Africa. Today, cell phones are as common in South Africa as they are in the United States and according to the latest Statistics South Africa (Stats SA) report, 53,3%... ( more) |
In conversation with Isaac Mophatlane
by Hans van de Groenendaal, EE Publishers
"In my wildest dreams I could never have imagined 20 years ago that I would one day be a CEO of a company that employs 7000 people and that would be owned by the largest telco in South Africa - the Telkom group... ( more) |
Connecting the UPS to the IoT: Knowledge is power
by Marco da Silva, Jasco
In 2015 Gartner predicted that 6,4-billion connected things would be in use worldwide by 2016, with 5,5-million new things being connected every day. The internet of things (IoT) is collectively the networking of physical objects... ( more) |
Opportunities and challenges for mobile operators
by Sherry Zameer, Gemalto
Today operators face challenges on multiple fronts, which include decreasing revenue per user; the gradual erosion of SMS revenues as phones have become smarter; apps and OTT services devaluing lots of operator innovation investments... ( more) |
Virtual panel discussion: To encrypt or not to encrypt?
Compiled by Hans van de Groenendaal, EE Publishers
Encryption is a much debated topic with many diverse viewpoints. Some experts say encryption provides a valuable extra layer of protection against hackers. In some political circles the call is to stop encryption to make it easier to catch crooks and terrorists... ( more)
|
Reactionary security posture will not protect from advanced threats
by Bryan Hamman, Arbor Networks
The statistics in the 2016 Verizon Data Breach Investigation Report (DBIR) report show - in a straight line - that the difference in length of time between detecting an advanced cyber-attack and the time to compromise continues to grow. The news is not good... ( more)
|
Rugged wireless technology for asset utilisation and operator profitability
by Mike Dalton, Siemens Industry
Wireless communications are well-suited for the oil and gas industry, especially given the often remote locations of production facilities, both on- and offshore. In the past, satellites provided producers with high-latency, low-bandwidth communications sufficient for... ( more)
|
Control comes to I/O
by David Greenfield, Automation World
A new field logic controller offers a different take on the edge computing concept by bringing simple logic control to Ethernet I/O blocks. The field logic controllers (FLCs) are programmed via the ARGEE environment, which uses a flow chart system to program... ( more)
|
Combining communication and power in a single cable
by Thomas Rettig, Beckhoff
EtherCAT P technology has become an established global standard. It combines ultra-fast communication with 24 V power for the system and peripherals - and optionally with additional power supply capabilities. One cable automation can... ( more)
|
Techniques for advanced cable testing
Information from Keysight Technologies
To successfully test or troubleshoot anomalies on transmission lines, an understanding of transmission line theory and the limitations associated with coaxial and waveguide transmission lines is required. When the purpose of a transmission line... ( more)
|
Terrestrial lidar and UAV aerial triangulation for open pit mines
by János Faust, Geo-konzept
Say what you will about the past few years, it has produced some useful tools for the surveyor. First, lidar technology made it possible to collect high-density 3D data with spectacular speed, so that now almost any surveyor can afford a terrestrial lidar scanner... ( more)
|
DC/DC converters in extreme environments
by Anja Moldehn, Phoenix Contact Power Supplies, Germany
DC/DC converters are used in a wide range of applications. They compensate voltage drops in long cables, and they increase availability by decoupling circuits or establishing separate input circuits. The variants with protective coatings furthermore withstand... ( more)
|
What can FPGAs do for a renewable energy system?
by Raviteja Chivukula, National Instruments
In typical renewable energy systems (RES) functionalities such as power conversion control and monitoring are implemented on custom-built embedded boards. This is done using microcontrollers/digital signal processors (DSPs) that have fixed architectures... ( more)
|
Building WiFi networks for the industrial internet of things
by Jeffrey Ke, Moxa
Despite its image as a consumer-level technology, WiFi is actually an ideal basis for an effective, low-cost mobile data network with wide area coverage. When used correctly, WiFi is a perfect fit for many applications that need highly mobile network access... (more)
|
How to tell category data cables apart
Information from Helukabel
Customers often ask about data cable categories and what they mean. For many end-users, engineers and purchasing agents, who don't work with these types of cables on a daily basis, the different categories can seem complicated and overwhelming... (more)
|
Data: the outsourcing question
by Hans van de Groenendaal, EE Publishers
Outsourcing your data is no longer an "if" or a "when", but rather a case of where and what to outsource. According to Lex van Wyk of Teraco, when designing new office buildings, large enterprises no longer plan for on-premise data centres... (more)
|
Cloud's disaster recovery as a service
by Hans van de Groenendaal, EE Publishers
Uptime is crucial for absolutely every single organisation, no matter how large or small. If any critical business application and data becomes unavailable for a few hours, it has the potential to wreak havoc across the organisation especially the bottom line... (more)
|
Securing the enterprise network
by Paul Williams, Fortinet
Cybercrime is a real threat to everyone today; no matter the size of your business. It affects everyone who has an identity or a corporate image to protect. It is already a reality in southern Africa with incidents happening on a daily basis... ( more)
|
Compiled by Hans van de Groenendaal, EE Publishers
- Capture moments in 360°
- All-in-one home printer
- Handy card reader
- King of all hubs... (more)
|
Compiled by Aimée Clarke, EE Publishers
- Tanzania rural connectivity project
- Roadshow in Namibia aims to bridge digital divide
- Nigeria to curb unsolicited messages
- Technology connects students in Kenya and UAE
- Angola's corporations to get improved connectivity
- Swazi telco gives back to customers
- MNO acquisition in Sierra Leone... (more)
|