Home » tech news » Page 161

tech news

South African Emergency Powership Deal Scrapped Due to Environmental Concerns

Image sourced from Karpowership SA. /* custom css */ .tdi_4_964.td-a-rec-img{ text-align: left; }.tdi_4_964.td-a-rec-img img{ margin: 0 auto 0 0; } Karpowership has been refused environmental approvals for three gas-to-power projects in South Africa. Approvals were blocked by the country’s Department of Forestry, Fisheries and the Environment for reasons including that it did not comply with public participation rules. The Turkish company gained significant media attention after it was announced the winner in a 2000 megawatt (MW) government emergency power tender designed to help ease the massive strain on South Africa’s embattled power utility Eskom and lessen the impact of the rolling blackouts the country faces every year. /* custom css */ .tdi_3_349.td-a-rec-img{ text-align: left; }.td...

Antivirus Pioneer John McAfee Found Dead in Prison Cell

Image sourced from Reuters. /* custom css */ .tdi_4_66d.td-a-rec-img{ text-align: left; }.tdi_4_66d.td-a-rec-img img{ margin: 0 auto 0 0; } John McAfee, tech pioneer and creator of the popular and widely used eponymous antivirus software has been found dead in his cell in the Brians 2 penitentiary outside of Barcelona, Spain on Wednesday. The 75-year-old is believed to have committed suicide. McAfee has been serving time in Spain since being arrested at Barcelona airport as he was boarding a flight to Istanbul. McAfee was wanted for arrest in the US for allegedly deliberately failing to file tax returns between 2014 and 2018, despite earning millions from consulting work, cryptocurrencies and selling the rights to his life story. /* custom css */ .tdi_3_491.td-a-rec-img{ text-align: left; ...

Why Hospitals Are Such Lucrative Targets for Cybercriminals

Image sourced from Alpine Security. Ransomware attacks are on the rise. After a surge in remote working and with employees accessing organisational networks in ways that aren’t always perfectly secured, cybercrime has spiked over the past few months as malicious parties have taken advantage of the sudden move to life in lockdown. Opportunistic hackers have found a particularly tender target to focus on: hospitals and healthcare providers. Across Europe, hospitals are being taken down on a far too regular basis, causing IT systems to fail – sometimes with fatal consequences. Of all the industries to attack, why healthcare in particular? While all organisations suffer when cybercrime strikes, with lives at stake cybercriminals know hospitals can’t afford any downtime. This means those in the...

Synology Launches DSM 7.0 and C2 Cloud Expansion – Taking Data Management into Next-Gen

/* custom css */ .tdi_4_d6f.td-a-rec-img{ text-align: left; }.tdi_4_d6f.td-a-rec-img img{ margin: 0 auto 0 0; } Synology today announced the imminent release of DiskStation Manager (DSM) 7.0 and a massive expansion of the Synology C2 platform with four new cloud services. Focusing on enhancing security, system management capabilities, and improving data collaboration, DSM 7.0 is an enormous step forward for Synology’s NAS and SAN product lines. Building upon the success of C2 Storage, Synology is rolling out both hybrid and cloud-only products, including a new password manager, directory as a service, cloud backup, and secure file transferring solutions. Synology is heavily invested in expanding the availability of its cloud platform by starting work on opening a new data centre location t...

How AfChix and USAID Are Helping African Women Connect Their Own Communities to the Internet

Image sourced from AfrikaTech. AfChix – a network of African women in technology – is enabling women in rural Kenya, Senegal, Namibia, and Morocco to take the lead in connecting their communities to the internet for the first time. The organisation is one of the winners in the third round of the WomenConnect Challenge, funded by the United States Agency for International Development (USAID). The WomenConnect Challenge WomenConnect is a global call for solutions to improve women’s participation in everyday life by meaningfully changing the ways women access and use technology. As a winner in the first round of the WommenConnect Challenge, launched in 2018, AfChix has already built four community networks by installing communications infrastructure in rural areas. AfChix trains local women t...

Comic Con Africa Sets Live Return Date After Being Forced Online

Image sourced from YOMZANSI. /* custom css */ .tdi_4_106.td-a-rec-img{ text-align: left; }.tdi_4_106.td-a-rec-img img{ margin: 0 auto 0 0; } Comic Con Africa is set to return on 22-25 September 2022 for a 3-day event to be hosted at the Johannesburg Expo Centre. The first two events, Comic Con 2018 and 2019 were both organised by Reed Exhibitions Africa. The third live event was planned in 2020, but it was moved online due to the onset of the COVID-19 pandemic. Along with similar expo events in the country. The event is seemingly going to skip 2021 in the hopes that next year’s landscape is a little less COVID positive. /* custom css */ .tdi_3_42f.td-a-rec-img{ text-align: left; }.tdi_3_42f.td-a-rec-img img{ margin: 0 auto 0 0; } ⚠️ IMPORTANT UPDATE⚠️ To our Com...

3 Important Reasons for African SMEs to Revise their Business Models Post-COVID

Image sourced from CodeXtra Trends, /* custom css */ .tdi_4_3b6.td-a-rec-img{ text-align: left; }.tdi_4_3b6.td-a-rec-img img{ margin: 0 auto 0 0; } For every company, innovation is tremendously important, but in many cases, innovation is only associated with new products or technical renewals. However, business model innovations can be significantly more profitable, and current pandemic-driven changes in customer behaviour and technological innovations have created a window of opportunity for companies to explore new business models. Every company has a business model, but at times, this must change to ensure the company’s ongoing success and ultimately, its survival. /* custom css */ .tdi_3_a9d.td-a-rec-img{ text-align: left; }.tdi_3_a9d.td-a-rec-img img{ margin: 0 auto 0 0; } Even minor ...

President Buhari’s Administration Facing Lawsuits Over Twitter Ban

Image sourced from Reuters. /* custom css */ .tdi_4_896.td-a-rec-img{ text-align: left; }.tdi_4_896.td-a-rec-img img{ margin: 0 auto 0 0; } There are at least 2 large-scale pending legal suits that have been filed against the federal government of Nigeria over its controversial 4 June decision to indefinitely suspend access to Twitter in the country. Since the ban, the legality of the government’s decision has been widely questioned, and stakeholders in the civic space have seemingly begun moving to challenge the decision which has sparked national outrage and attracted international media criticism in the weeks since the ban. SERAP Seeks Legal Action /* custom css */ .tdi_3_622.td-a-rec-img{ text-align: left; }.tdi_3_622.td-a-rec-img img{ margin: 0 auto 0 0; } The Socio-Economic Rights an...

5 Intriguing Business Ideas for You to Make Extra Money After Work

/* custom css */ .tdi_4_0ab.td-a-rec-img{ text-align: left; }.tdi_4_0ab.td-a-rec-img img{ margin: 0 auto 0 0; } Additional income is an important way to provide more financial security for yourself and your family. It likewise allows you to achieve your goals faster or afford certain items or holidays that were just out of reach before. These ideas below are not just for once-off boosts in income, they are intended for those who are looking for new permanent sources of income, both additional and main. This collection contains ideas from different areas so that people from many walks of life and interests can find a suitable option for themselves. /* custom css */ .tdi_3_dd2.td-a-rec-img{ text-align: left; }.tdi_3_dd2.td-a-rec-img img{ margin: 0 auto 0 0; } Perhaps you already have an idea...

How to Fix the “d3dx9_42.ddl Error” You Get Playing Classic Games Like EverQuest

Image sourced from Polygon. /* custom css */ .tdi_4_068.td-a-rec-img{ text-align: left; }.tdi_4_068.td-a-rec-img img{ margin: 0 auto 0 0; } Whenever you play a game on Windows PC or laptop, Microsoft DirectX handles most of the tasks in game programming. d3dx9_43.dll is just one of the files in DirectX. But if this file goes missing, you may end up in various errors while playing any sort of game that was published before more modern versions of the Windows OS. Examples include classics like EverQuest, Fallout New Vegas, The Elder Scrolls 3: Morrowind, and so on. /* custom css */ .tdi_3_6aa.td-a-rec-img{ text-align: left; }.tdi_3_6aa.td-a-rec-img img{ margin: 0 auto 0 0; } Sometimes the errors may happen if you’re using an outdated version of DirectX or you had deleted the d3dx9_43.dll fil...

South African Investors Lose $3.6-Billion in Massive Crypto Scam

Image sourced from Shutterstock. AfriCrypt, a South African cryptocurrency investment company, has reportedly defrauded around $3.6-billion in investor funds after the company made claims that its trading systems had been hacked. Investors in AfriCrypt reportedly count amongst South African celebrities and other high profile individuals. In a matter of hours the staggering monetary amount, around R54-billion, seemingly disappeared without a trace on 13 April. $3.6-Billion in Stolen Cryptocurrency Shortly after claiming that its systems had been shut down by a hack, AfriCrypt’s teenage “directors”, brothers, Ameer and Raees Cajee (17 and 20, respectively) allegedly transferred all investor funds from their South African bank account before fleeing to the UK, reports Independent Media. AfriC...

Broken Endpoints in Your Organisation’s Cybersecurity: The Role of Superior Endpoint Detection

Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited. Networks Unlimited is applying a ‘broken window, broken business’ principle when looking at an organisation’s internal cybersecurity posture, in order to have a positive effect on its business processes. The moral of the ‘broken window’ story, which has been studied by psychologists, is that once a window in a building is broken, people then feel that they are able to damage the property even further, and ultimately loot and steal from it, with impunity. “When we put this into a cybersecurity context,” says Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited, “this means, in essence, making sure that you have no ‘broken windows’ or gaps in your security through which uninvited elements coul...