Huawei plans to launch world’s first foldable smartphone

Huawei plans to launch world’s first foldable smartphone

By using foldable screens, smartphone-makers notably hope to double display size for consumers while maintaining pocket-sized form factors.

While smartphone giants are working on foldable phone there were expectations that Apple will be the first to launch a Foldable iPhone in 2020.

However, it seems that Chinese Smartphone brand has come first in the race of Foldable Smartphones as Huawei plans to launch world’s first foldable smartphone in November.

According to ETnews, the South Korean website evokes a smartphone with a display that can fold inwards on itself. However no information has yet transpired about this mysterious handset, which is, nevertheless, likely to debut in Huawei’s home market.

In order to beat Samsung at its own game, Huawei has reportedly sourced bendy OLED screens from rival South Korean tech firm, LG.

The foldable Huawei device is a full-sized tablet. It appears to fold in the middle to become a smartphone. But there is a “small gap” between the two screens when they are opened in the tablet position. By using foldable screens, smartphone-makers notably hope to double display size for consumers while maintaining pocket-sized form factors.

Huawei the world’s third largest smartphone vendor (153 million handsets shipped in 2017) hit headlines in March 2018 with its freshly launched P20 Pro, the first smartphone to feature a triple camera, with a 40-Megapixel sensor for color, a 20-Megapixel sensor for black and white and an 8-Megapixel sensor for the 3x optical zoom.

Until now, Samsung has been blazing the trail for foldable smartphones, showcasing various forms of folding and flexing display prototypes since 2011. Moreover, the firm is rumored to have discreetly presented several prototype handsets with foldable screens to a privileged few at CES 2018 in January. Production and sale, under the name Galaxy X, could be on the cards for late 2018 or early 2019.

Edited by Neo Sesinye
Follow Neo Sesinye on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico

The Most Misunderstood Characters in World of Warcraft

The Most Misunderstood Characters in World of Warcraft

The Most Misunderstood Characters in World of Warcraft.

In a massive world such as in World of Warcraft, there will undoubtedly be numerous characters. As with anything in fiction, people interpret these characters’ motives and personality differences. So here are some of the most misunderstood characters in WoW.

Deathwing
Before he was an omnicidal dragon bent on destroying the world, he was Neltharion the Earth-Warder. As one of the five dragons the Titans empowered, he created the very mountains and rivers he would destroy later as the world was shaped. Unfortunately, he became corrupted by the Old Gods, and he turned into Deathwing the Destroyer. He was the one who changed the landscape of Azeroth forever and would have destroyed everything had he not gotten himself thrown into the sea.

Grommash Hellscream
Nobody else has it worse than this orc. He was a chief back when humans were their primary concern. Then he got thrown into Azeroth, where he wanted to die, but he met Thrall. Together, they wanted to find a place where their race could live in peace.

However, they encountered the same demons that practically caused all the trouble for their race in the first place. Grom fell into old habits and drank demon blood, which turned him into a thrall for those demons. Thrall (the character) worked to free his friend from the curse and succeeded just long enough for Grom to sacrifice himself to defeat the demon that cursed him.

That was supposed to be the end of it. At least until his son, Garrosh, went back in time to stop the orcs from becoming the demon’s slave in the first place. Similar to all other time-traveling adventures, this resulted in consequences worse than what they wanted to keep from happening. Without meeting Thrall, an angrier alternate Grommash Hellscream led a new Horde from the past to kill and conquer everybody else.

Lady Sylvanas Windrunner
The Banshee Queen herself is a very interesting character to study. She was once a proud high elf ranger until she was killed and raised as a banshee by a Lich-King-controlled Prince Arthas. She spent some time under the control of the Lich King but broke free when circumstances weakened the King’s influence. Resenting what she had become, she and the rest of the Forsaken (rebel undead) vow to avenge themselves. She gives a higher purpose for those who have already died once.
Despite being mistrusted by a majority of the Horde, she becomes its warchief, being named so by the dying Vol’jin during the battle for the Broken Shore.

Jaina Proudmoore
The most powerful human sorceress alive, Jaina suffered at the Horde’s hand again and again. It was enough to harden her once kind personality into one bent on the defeat of her enemy. She was once Prince Arthas’ lover and witnessed his fall into becoming the Lich King. After the fall of Lordaeron, she gathered all the survivors she could and fled to Kalimdor. She then founded the city of Theramore, which was almost destroyed by a Horde attack after Deathwing’s demise.
Then she became the leader of the Kirin Tor. After some events involving the Horde stealing the Divine Bell, her hate solidified. It all came to a head when the Horde abandoned the Alliance during the Battle for the Broken Shore. Despite that, the rest of the council of Kirin Tor pled to readmit the Horde back, which Jaina vehemently refused. Unable to accept that decision, she left the Kirin Tor.

The Lich King
The Lich King is actually the spirit of orc shaman Ner’zhul, trapped within the Frozen Throne and a tool to raise an undead army for the Burning Legion. When Prince Athras took up the Frostmourne in an attempt to stop the undead plague that’s adding to the Scourge’s army, their spirits merged and became the Lich King that everybody knows. Athras meant well, but his actions cost more than what his intentions could ever make up with.

As for Ner’zhul, he was a good leader for the orcs, was able to unite the disparate tribes and even saved his race from total demonic possession. Once it was revealed that he unknowingly was following those same demons, he essentially told them to leave the orcs alone. Unfortunately, his apprentice betrayed him to those demons, and Kil’jaeden the Deceiver was able to bind his increasingly corrupted and psychotic spirit into the Frozen Throne.

Illidan Stormrage
A powerful sorcerer in his own right, Illidan Stormrage was thought to be a betrayer when he joined the Burning Legion. Turns out, he wanted to sabotage the Legion from the inside. Still, it got him imprisoned in the Barrow Deeps for a long, long time. He was released by Tyrande during the Third War, and through the manipulations of the Lich King, absorbed the energy from the Skull of Gul’dan. He became a demon as a result, and his body reflected the change.
After the war, he was approached by Kil’jaeden, the same demon who ‘created’ the Lich King. The demon wanted him to destroy the traitorous King. Illidan used an artifact to follow this order but was stopped by his brother. He abandoned the mission to save the woman he and his brother loved, and then he fled to Outland. Joined by new allies, they overthrew the tyrant of Outland and claimed its stronghold and army. He was again reminded of his task but was stopped by the King’s champion, Arthas.

He retreated to prepare to destroy the Legion. In spite of destroying one Legion stronghold, he was struck down by a combined effort of Akama, some adventurers, and his former jailer. His body was then stored in a vault to serve the rest of his eternal sentence.
Now that you’re finished reading the article, it’s back to grinding for WoW gold. Happy adventuring!

Daniëlle Kruger

Powered by WPeMatico

Icasa rolls out new regulations for data bundles

Icasa rolls out new regulations for data bundles

New regulations for data bundles but no change in prices #Icasa

Data may not have fallen yet, but consumers will soon have more control over the data they do have.

The Independent Communications Authority Of South Africa (Icasa) has announced new regulations that will block operators from charging out-of-bundle (OOB) tariffs without subscriber consent.

In a presentation held on Thursday afternoon (25 April) in Sandton, the regulator said that the decision was made after publishing its draft End-User and Subscriber Service Charter regulations for comment in 2017, and subsequent public consultations.

Icasa said the new data usage regulations would allow users to keep the data as long as they remained active on the cellphone network. Service providers are now required to present subscribers with the option to buy a new bundle, or agree to out-of-bundle billing – alongside usage depletion notifications (SMSs) as customers consume their data bundles.

Icasa councillor Bontlenyana Mokhele also announced that subscribers should receive notifications on their data usage‚ transfer data to other users on the same network and network providers cannot charge different rates for data used out of bundle without subscribers’ consent.

The new regulations will be effective a month after they have been published in the government gazette.

Edited by Neo Sesinye
Follow Neo Sesinye on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico

MiX Telematics sponsors iPad lab at Phelang School

MiX Telematics sponsors iPad lab at Phelang School

MiX Telematics sponsors iPad lab at Phelang School

MiX Telematics, a leading global provider of fleet and mobile asset management solutions, today announced the launch of an iPad Lab, in partnership with the Phelang School in Kwa-Thema Springs and ISchoolAfrica – donating some much-needed technology equipment and training for the school’s newly developed lab.

This lab, which will support the needs of the 16 Autistic children within the school (4% of their learners), is also part of the school’s commitment to ensuring that each of these learners is afforded a setting that is conducive to their special needs – in a one-on-one learning environment.

“MiX Telematics is in the business of information, communication, change and solutions that make a difference,” says Mariette Myburgh, Executive: HR and Transformation at MiX Telematics (Africa). “Our Socio-Economic Development initiatives focus on the elderly and women, as well as children and the youth of South Africa, because we believe that this is where the future of our country lies. Within the areas of Socio-Economic Development, we also dedicate our energy to issues of health and education, by providing care and support to disabled individuals.”

“MiX Telematics is honoured to be a part of such an incredible initiative, as we believe that technology can make a real difference. It is a gift that we hope will help each child, and especially those dealing with Autism Spectrum Disorder (ASD), to strengthen and enhance their skills, knowing they are equipped with the right tools, and continued training, to reach their full potential.”

According to Mr. Ledwaba, Principal at the Phelang School; “Recent studies from Autism South Africa indicate that, due to a lack of understanding and stigmatisation, only 0.8% of children with ASD are enrolled in any type of school and only 0.4% of our country’s children with ASD receive an education that really benefits them.”

“Part of our commitment to all the children of this nation is that we fight for better education opportunities for all. Through the support of companies like MiX Telematics, ISchoolAfrica, and the work of the Department of Education, we continue to make a difference by not only helping the children that cannot cope with mainstream education, but also ensuring that their learning experience is adapted to their specific needs.”

“I hope that MiX Telematics will shine as a light and beacon of hope and development, making a difference this Autism Awareness Month and in the lives of each and every child at Phelang,” concluded Myburgh.

 

Edited by Daniëlle Kruger
Follow IT News Africa on Twitter

Powered by WPeMatico

Westcon appoints new head for Sub-Saharan Africa

Westcon appoints new head for Sub-Saharan Africa

Tidiane Lo, newly appointed Director of Westcon Sub-Saharan Africa.

Westcon-Comstor has announced the appointment of Tidiane Lo in the capacity of Director of Westcon Sub-Saharan Africa. The announcement follows a strategic realignment of the company’s African business and will provide additional leadership to help the organisation realise its goal to be the premier value-added distributor on the continent.

Lo formally filled the position from 1 April 2018 and will report into Rakesh Parbhoo, CEO of Westcon-Comstor Sub-Saharan Africa. He will have oversight of the Westcon business practices that extend its Mobility, Security, Software, Unified Communications and Collaboration portfolios as well as its strategic Cloud and Services capabilities.

“Africa is a key region for Westcon, but it is not a region that one can manage at arm’s length,” states Rakesh Parbhoo, CEO at Westcon-Comstor Sub-Saharan Africa. I believe that with the appointment of Tidiane, we have someone who is not only exceptionally knowledgeable and passionate about the continent, but who also understands the dynamics of our geographically dispersed resellers. Furthermore, with his knowledge of our business and his roles in leading transformation in his previous positions, he is ideally suited to help us consolidate and mobilise our teams to better service our customers.”

Hailing from Senegal, Lo joined Westcon in 2011 at its Dakar offices, where he held the position of Regional Sales Manager for French Africa including Morocco, Algeria and Tunisia. In 2015 he was promoted into the role of Sales Excellence Lead and Area Implementation Lead for Africa, based in both Dakar and Nairobi. Prior to joining Westcon he worked for the distribution company Tech/Data Azlan (from 2005 – 2011), where he had oversight of its sales operations in the French market, including the management of its strategic resellers.

In his new role he will not only have oversight of the day-to-day sales, customer service, partner relationships and services operations, but will also lead the charge to unlock further potential for new and existing vendors within the Westcon solutions portfolio. This will include a particular emphasis on security, unified communications and collaboration as well as mobility, all of which he has identified as key growth areas on the continent.

“As someone who is passionate about distribution and sales I am eager to embrace my new role and work with the management team to help consolidate the business in Sub-Saharan Africa,” states Lo. “Part of this progression in the business will be to explore synergies between vendors and partners, identify new market opportunities and continue to offer a best in class experience to our customers and vendors.

“Africa sits at the precipice of a technology revolution, where the cloud and digital transformation are at the forefront of how we as a continent want to work. As a distributor we need to be ready to provide our partners and their customers with technologies and services that act as an enabler for this,” he ends.

Edited by Fundisiwe Maseko
Follow Fundisiwe Maseko on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico

Google upgrades Gmail privacy controls

Google upgrades Gmail privacy controls

The “all new” Gmail is available to the more than four million businesses that pay for G Suite services

Google recently ramped up privacy controls in a Gmail overhaul, aiming first at businesses that use its suite of workplace tools hosted in the internet cloud.

The “all new” Gmail is available to the more than four million businesses that pay for G Suite services.

People who use the email service personally for free can opt in by making the choice in settings, vice president of product management David Thacker said in a blog post.

Revamped Gmail has “a brand new look on the web, advanced security features, new applications of Google’s artificial intelligence and even more integrations with other G Suite apps,” according to Thacker.

“A confidential mode added to Gmail promises to let people sending messages set expiration dates and block them from being forwarded, copied, downloaded or printed. Messages can be revoked after being sent, ” Thacker added.

Senders of mail can also require that a code delivered by text message be entered before an email can be viewed, in an added layer of security.

“Because you can require additional authentication via text message to view an email, it’s also possible to protect data even if a recipient’s email account has been hijacked while the message is active,” Thacker said.

According to Google, confidential mode will begin to roll out to personal Gmail users and a limited number of G Suite customers in coming weeks.

Artificial intelligence is being put to work in new Gmail features including “nudging” people to tend to neglected messages and automated reply suggestions along the lines of those added to a mobile version of the email service last year.

“Gmail can also recommend when to unsubscribe from mailing lists,” Thacker said.
“Using intelligence, unsubscribe suggestions appear based on cues like how many emails you get from a sender and how many of them you actually read.”

Google and rival technology titans such as Apple, Amazon, and Microsoft have followed people into the internet cloud with services, digital content, and software hosted online at data centers but accessed from the gamut of devices.

Edited by Neo Sesinye
Follow Neo Sesinye on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico

Vox launches Internet of Things solutions

Vox launches Internet of Things solutions

Jacques du Toit, Vox CEO.

Integrated ICT provider Vox has announced the launch of several fully-managed Internet of Things (IoT) based solutions.

When coupled with advanced analytics, big data collection will bring new security options including asset and animal tracking to South African customers.

As user requirements expand, tamper and tracking, asset, animal, utility and security devices are being deployed pervasively on movable assets like vehicles or trailers, on animals and in less accessible places. End users want to know much more than just location, with proactive notifications of out of the ordinary behaviour and activity allowing them to identify and track trends, amongst other features.

Vox has positioned itself as a network neutral platform provider and will support NB-IOT, LTE-M1, LoRa and Sigfox technologies. “This is going to be like Beta vs VHS” – du Toit says. Vox has initially partnered with leading operator Sqwidnet, the provider of Sigfox technology in South Africa. Sqwidnet has the lowest price point from a hardware and connectivity perspective and the technology extends to more than 42 countries. These “Things” could include any object embedded with electronics, software, sensors, actuators and coupled with network connectivity to collect and exchange data, communicate and control objects remotely.

Simply put, Low Powered WAN technology (Sigfox & LoRA) works well in situations where devices need to send small amounts of data over a wide area while maintaining battery life over many years. This distinguishes LPWAN from other wireless network protocols like Cellular with regards to bandwidth and range capability.

Adds du Toit, ¨The Sigfox network is unique in that towers can transmit information over long distances – up to 90 kilometres or more in the regions from a single base station with very low emissions and a small visual impact.”

Asset tracking

While tracking in itself is not new, it has traditionally been reliant on GSM networks – which are expensive to adopt and maintain, and have a higher power consumption requirement to transmit data. Furthermore, GSM devices are now increasingly susceptible to being disrupted, with signal jammers the size of a cell phone making theft of movable assets much easier and untraceable.

“Apart from the signal being harder to interfere with, our IoT devices are self-powered and don’t draw power from an external source, says du Toit,

“Other embedded sensors measure temperature, battery life, occasionally provide GPS co-ordination and detect if someone is trying to tamper with the IoT device”.

Depending on how frequently the device transmits information, the IoT devices support a low power design and up to 10-year autonomy. The IoT devices can support anything from 2 to 50 to 100 to 140 transmission frames per day. At 140 transmission frames – that is 1 message every 15 minutes.

All telemetry information is collected and analysed in the cloud, which is shared with end-users through online websites or mobile applications. Bulk users will have the ability to customise the application to suite their business requirements.

In addition to steadily declining IoT device prices over the past few years, using an IoT network will help organisations to cut down on the operational costs of using traditional GSM networks, including SIM fees, network connection fees, and data costs.

Automated workflows will be a key differentiator for Vox – given the number of connected devices anticipated it will be impossible for humans to make action based decisions. We will be focussing on automation, starting off with basic workflows and advancing into AI and Machine Learning.

The market requires a lot of education wrt understanding the real meaning of AI – it is only the “silver bullet” if you know exactly what you want to achieve. A lot can be achieved without applying AI from inception

Tamper Alert

Doors, gates and windows are the weakest security points in a building or farm and as such, we have been able to bring to market an “early warning device” if you will, that notifies one when a door, gate or window is tampered with. This self-powered device is not susceptible to jamming technologies and will alert you once the device’s integrity has been breached, allowing business owners to secure any building at a low cost, while also addressing the main weakness of security

The power supply is the other ‘Achilles’ heel’ of security systems. Our tamper alert devices enable low energy consumption: connected movement detectors can run on batteries for up to 10 years.”

Enabling the connected farmer

Aimed at small, medium and large-scale farmers, Vox uses IoT to help with animal management, reproductive control, fattening management, and in heat and calving detection. The smart collars used have multiple sensors, are lightweight and easy to use, and improve on previous solutions with network coverage and extended battery life.

In this scenario, each animal is fitted with an IoT collar to monitor its location and condition, with the data being transmitted securely to the Vox cloud, and resulting analytics collected, interpreted and delivered back to web portals or smartphone applications. This allows farmers to set geofencing boundaries, monitor and track their animals and get real-time notifications for theft and other behavioural events.

On the back end, all information collected is securely sent to a multi-platform system in the cloud, which analyses data and displays it in a user-friendly application that allows farmers to set geofencing boundaries, monitor and track their animals and get real-time notifications for theft and other abnormal events.

Think of it as an IoT eco-system which extends to security, humidity and moisture as well as tracking.

Collectively, this provides farmers with a comprehensive management tool to increase productivity, reduce costs and animal losses, and improve operations efficiency by cutting down on the paperwork.

Edited by Fundisiwe Maseko
Follow Fundisiwe Maseko on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico

Youtap and Lonestar Cell MTN launch New Pay Service in Liberia

Youtap and Lonestar Cell MTN launch New Pay Service in Liberia

Youtap and Lonestar Cell MTN launch Momo Pay for MTN customers in Liberia

Mobile network operator Lonestar Cell MTN and Youtap have launched Momo Pay, a contactless mobile payment service for Lonestar Cell MTN Mobile Money users in Liberia.

Momo Pay enables Lonestar Cell MTN customers to ‘tap and pay’ for goods and services instantly and securely with their mobile phone at the point of sale. This move is aimed at making daily financial transactions comfortable and convenient as well as eliminating the risk associated with handling cash, such as theft, leakage and loss. This new service relies on near field communication (NFC) technology developed by Youtap, a global provider of contactless mobile payments and financial services software.

Speaking at the launch of the Tap and Pay service, Massa Mayson-Dennis, Head of Mobile Money – Lonestar Cell MTN, was excited about the launch of Momo Pay, saying “Lonestar Cell MTN made a promise to the Liberian people to provide world class digital financial services. We are honouring that commitment with the launch of our newest service dubbed Momo Pay.”

Shaun Morgan, VP Sales and Marketing – Africa for Youtap, was equally enthusiastic, saying, “We are excited about launching our Youtap Pay solution in another MTN market. Youtap is firmly committed to supporting Lonestar Cell MTN’s promise to provide world-class digital financial services in Liberia. This innovative service is a great step in helping to fulfil this promise.”

The Momo Pay service is being rolled out to a wide range of merchants such as supermarkets, pharmacies, petrol stations and all other payment acceptance points. Initially, the ‘tap and pay’ service will be powered by smart stickers attached to subscribers’ mobiles which utilize near field communication (NFC) technology. There are plans for the service to incorporate other methods of payment such as QR codes in the future.

 

Edited by Daniëlle Kruger
Follow IT News Africa on Twitter

Powered by WPeMatico

Facebook partners Digify Africa to launch youth online safety programme

Facebook partners Digify Africa to launch youth online safety programme

Facebook partners Digify Africa to launch youth online safety programme.

Facebook announced on Wednesday, 25 April 2018, a new dedicated youth online safety programme in partnership with Digify Africa. Aiming to train 1,000 South Africans between the ages of 13 to 18 across high schools and youth groups nationwide, the programme will challenge students in understanding how they can stay safe online, provide practical tips and guides, whilst creating a number of youth ambassadors to provide peer-to-peer support.

Titled Ilizwe Lam —Xhosa for ‘My World’— the launch of this programme underscores Facebook’s ongoing local commitment to youth safety and education. Created in consultation with youth groups, the dedicated online safety curriculum will feature interactive and engaging learning modules which will provide advice in how to make the most of the opportunities on the Internet, whilst protecting themselves from issues such as scams and harassment.

“The Internet is a gateway to a world of economic opportunities, educational possibilities, fun, and friendships for many young South Africans,” says Emilar Gandhi, Public Policy Manager for the SADC region at Facebook. “But it is also important for them to learn how to protect their personal information and to safeguard themselves online. Increasing awareness and ensuring that young people feel empowered is important and something we’re committed to. That is why I’m proud to be launching Ilizwe Lam to form part of the work Facebook is already doing in South Africa.”

The training programme will include modules featuring content such as:

Looking after your digital footprint and managing your privacy online.

What to do when you encounter inappropriate content or behaviour on social media.

How to decide what you share online.

What to do when you share something online that you regret.

Dealing with cyber-bullying, harassment and scams.

Examples of young digital hustlers furthering their studies and careers by accessing content and making connections online.

“The digital economy is growing fast in Africa, opening up a world of opportunities for young South Africans to connect with content, other people and create sustainable livelihoods for themselves” says Qhakaza Mthembu, Head of Strategy at Digify Africa. “We’re really proud to have co-created this programme with young South Africans, to enable them to safely tap into all the resources of the online universe.”

Edited by Fundisiwe Maseko
Follow Fundisiwe Maseko on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico

Youtube removed over 8 million videos in 3 months

Youtube removed over 8 million videos in 3 months

YouTube is removing videos with questionable content.

Popular video-sharing website YouTube was forced to remove more than 8million inappropriate videos during the last three months of 2017.

YouTube released a transparency report that shows a high number of inappropriate content being uploaded, however automated flagging is speeding up the removal process.

It’s easy for the internet to get cluttered with spam and inappropriate content, which means major clean-up for big internet companies who receive massive amounts of uploads and traffic.

Seeking more transparency and less spam, Google, which purchased YouTube in 2006, has published an update regarding the ongoing removal of content that violates its policy. The company has released astonishing figures, along with a quarterly report on how Community Guidelines are being enforced.

According to Google eight million videos that have been removed from the popular video sharing platform were “mostly spam or people attempting to upload adult content,” and represent a fraction of a percent of YouTube’s total views during this time period.”

Machines were the first to flag 6.7 million videos and of those, 76% were quickly removed before they received a single view. These machines are allowing the company to flag content at scale and they claim the technology is paying off in terms of high speed removals across high-risk, low-volume areas (like violent extremism) and in high-volume areas (like spam).

More than half of all “violent extremism” videos have fewer than 10 views, whereas in the beginning of 2017 that number was eight percent.

Although the deployment of machines may suggest a lesser need for humans, that has not been the case for YouTube. Their systems supposedly rely on human review, and thus the company has been busy hiring.

“At YouTube, we’ve staffed the majority of additional roles needed to reach our contribution to meeting that goal. We’ve also hired full-time specialists with expertise in violent extremism, counterterrorism, and human rights, and we’ve expanded regional expert teams,” stated the company’s official blog.

As for this year’s goals, the brand is committed to bring the total number of people working on addressing violent content to the grand total of 10,000 across Google. Furthermore, there are plans to refine reporting systems and add additional data, including data on comments, speed of removal and policy removal reasons.

Edited by Neo Sesinye
Follow Neo Sesinye on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico