User lock-down or education? Cybersecurity issues in a rapidly evolving landscape

User lock-down or education? Cybersecurity issues in a rapidly evolving landscape

User lock-down or education? Cybersecurity issues in a rapidly evolving landscape.

According to the recent PwC report, The Global State of Information Security Survey 2018, companies around the globe are becoming more reliant on cyber capabilities and this means that, in turn, they must also recognise and manage the associated risks, or make themselves vulnerable to large-scale events with significant disruptive consequences.

Anton Jacobsz, managing director at Networks Unlimited South Africa, says, “There has been so much evolution in this arena that the cybersecurity of the old days is not the security of today, when we have so many different teams looking at so many angles of the data. Right across the security network, solutions need to be based on next-generation thinking, such as authentication, finger printing and the two-token system. The market needs to understand that threats do not come only from the outside – advanced threats also attack from the inside.

“Security today does not mean just your firewall – we need to think about the impact of applications security, Distributed Denial of Service (DDoS) mitigation and entry points into your network through e-mails and Wi-Fi, for example. There is a need to cover entry points and exit points: your perimeter means nothing if you don’t have security monitoring traffic to and from the edges. This raises issues such as, ‘Do you lock down your users or educate them?’ and so it can be seen that there is no one solution to the issue of cybersecurity.”

Jacobsz says security experts need to have a dual strategy: one for the network edge and one for the data centre. “However, these were not built to integrate and so bottlenecks are created with a two-phased security at both the edge and the core. You are also dealing with more than one vendor and this brings a multi-phase defence, and the need to continuously evaluate your environment. We also have to look at issues such as capex vs opex models in servicing, and what products to use and how to fund them.

“From a trend perspective, Gartner has predicted that in time, we’ll see mergers and acquisitions resulting in just three or four big security vendors, selling hosted services and offering massive data centres and very large teams in order to provide those services. Another trend that we see in the future is the ongoing rise of digitisation and the Internet of Things (IoT), and with it the mindset of instant consumption from your consumer-based clients. In turn, this means that from a security perspective, you need to know what you want to secure, and where. For example, a bank needs to be able to secure everything on the network to make it unappealing to the would-be thief.

“Finally, I think the biggest trend we will see in our market in the next two years is the onset of requirements around the Protection of Personal Information Act (PoPI), and how this legislation is set to change what businesses can do with customer and corporate data.”

Under PoPI, any business that holds customer or client data is responsible for securing that information. In order to prevent confidential personal information from being stolen or compromised, companies must ensure that they have put in place technical measures to protect the information that exists within the organisation, such as network firewalls, disk encryption for all hard drives, antivirus and anti-phishing software, and strong password protection.

Jacobsz says, “Customers should ask themselves the following when investing in security infrastructure and software: what do we need to protect, and why; how do we want to protect it; where is the highest risk; how do we weigh up costs versus security mitigation; is the business actually willing to invest in cybersecurity in order to protect itself; how much data do we need to protect; can we store off-site; how easy is it to manage our network security requirements; and can we outsource our network security? The question of liability, as per the looming requirements of the PoPI Act, needs to be implicit in all of these aforementioned issues.”

Against these concerns, Jacobsz clarifies that Networks Unlimited offers solutions at all stages of network security, including offerings in the realm of DDoS, advanced threats, prevention and response, next generation firewalls, next-generation deception-based tools, ransomware, phishing and Wi-Fi security.

Networks Unlimited partnerships in the cybersecurity realm include the following:
· Network security and network monitoring products, to protect networks from denial of service attacks, botnets, computer worms and attacks aimed at disabling network routers.

· Unified threat management to deliver solutions that improve performance, increase protection and reduce costs.

· Comprehensive phishing defence solutions to condition users to recognise and report attacks, while working to reduce phishing-related breaches by speeding the collection and response of phishing threats in real time.

· Intelligence-driven security solutions that give clients the ability to detect, investigate and respond to advanced threats, confirm and manage threats, and prevent IP theft, fraud and cybercrime.

· Encryption, advanced key management, tokenisation and privilege control to protect and manage data, identities and intellectual property as well as meet regulatory compliance.

· Deception-based platforms which exercise deception-based detection throughout every layer of the network stack, enabling efficient detection for every threat vector, ultimately deceiving attackers into revealing themselves and thus closing the detection deficit.

Jacobsz concludes, “It can be clearly seen that we cannot define security as falling into just one area, but rather it requires attention to many areas. This brings with it the need for multiple interactions across partners and the need for seamless communication and seamless data sharing. Collaboration is most definitely on the rise, which can only be a good thing as the threat landscape itself keeps evolving in complexity.”

Staff Writer

Powered by WPeMatico

Bitcoin is not really money and Visa wont touch it says CEO

Bitcoin is not really money and Visa wont touch it says CEO

Alfred Kelly, CEO of Visa.

In an interview with CNBC, Alfred Kelly, the CEO of credit card giant Visa, revealed that he believes that Bitcoin – the world’s largest cryptocurrency – is not really money and Visa won’t touch it.

During the interview, which was recorded at the National Retail Federation conference in New York City, Kelly said, “I don’t view it as payment system player. We at Visa won’t process transactions that are cryptocurrency-based. We will only process fiat currency-based transactions.” Fiat currencies, such as the U.S. dollar, are issued by governments as legal money.

This is where the differences come in as Bitcoin is not issued by anyone but rather it’s “mined” or “discovered” by powerful computers around the world competing with each other to solve certain algorithms. The miners then write those transactions to the online blockchain ledger, where all activity is recorded and shared with everyone, according to the CoinDesk description.

“My take is that bitcoin is much more today than a commodity that somebody could invest in; and honestly, somewhat of a speculative commodity,” said Kelly, who became the chief executive of Visa in December 2016.

This view is backed by the volatility of the Bitcoin market. The market which soared to record high of $19 000 per Bitcoin in the later parts of 2017 was quickly brought back down to earth as its value has dropped to half of that high at the beginning of 2018

Edited by Dean Workman
Follow Dean Workman on Twitter
Follow ITNewsAfrica.com on Twitter

Powered by WPeMatico

How telcos can use technology to address #Datamustfall

How telcos can use technology to address #Datamustfall

How telcos can use technology to address #Datamustfall

The South African telecom industry is marked by high SIM card penetration (160%) due to the popularity of broadband services. According to GSMA, average mobile broadband connection in South Africa is 74 persons per 100. Yet it is also one of the markets with one of the most expensive data tariffs in Africa.

A report by Research ICT Africa (RIA) shows that data tariff in South Africa is one of the highest in the top six African markets. In South Africa, the average data tariff is $7.6 per GB, which is much more than that of the second most expensive market Kenya (at $4.9 per GB).

The same report suggests that data tariff in the country has not changed much since 2014. Vodacom and MTN, which together corner 78% of the market share in South Africa, charge over R150 for one GB of data (MTN charges R160 and Vodacom R150). Telkom, which is partly state-owned, has slashed its data tariff substantially. It now charges R99 for one GB data.

Even at R99 offered by Telkom, data tariff in the country is too high for most consumers comfort. In RIA’s Africa Mobile Price Index, even the Telekom’s cheapest R99 per GB tariff ranks 16th(out of 47 countries) most expensive.

A key reason for the high cost of mobile broadband is the high capital expenditure of setting up and managing a network. Besides, high cost of power, which is used to run the cell sites also adds to the expenditure of the telcos.

#DataMustFall
South Africa’s high tariff rates, which activists believe is above the international ‘norms,’ has led to a unique campaign, #DataMustFall, under which activists are protesting outside the offices of telecom service providers asking them to cut data prices.

The protests did get the attention of both the regulator, the Independent Communications Authority of South Africa (ICASA) and the telecom players. Reacting to the protests, ICASA said that it is looking into the issue of how to address the high cost of communication, including data costs, in the country. It is also in consultation with regulators like the Competition Commission and the National Consumer Commissions to find ways to bring down data cost.

Telecom companies also paid heed and promised a reduction in data prices. Vodacom reduced the out-of-bundle rate of R1 per megabyte to 89c for post-paid customers 1 October 2017.

The protests have rightly brought focus on the high cost of data despite high data demand. According to an ICASA report, mobile data traffic increased significantly by 55% in 2016. However, it failed to acknowledge the fact the telecom sector in the country faces significant challenges due to policy and infrastructure constraints.

Group CEO of Vodacom Shameel Joosub in a press statement admitted that lack of access to spectrum is hampering their ability to drive down infrastructure costs and in turn, enable preventing them to pass savings to the consumer.

Get the Virtualisation advantage
The telecom industry needs to take the demand of a lower tariff seriously and look for cost-effective technologies to provide affordable data services. Technology disruptions, like cloud, virtualisation and other software-driven approaches are already helping telecom companies save cost on equipment and energy.

One of the key selling points of Network Functions Virtualisation (NFV) is that it promises better energy efficiency resulting from consolidation of resources and dynamic utilisation of the same. This feature is especially relevant for the South African operators because of the high cost of energy in the region.

Typically, servers use a very low physical server capacity. Virtualising the server would not only save space but also make the system much more energy efficient. Virtualising the systems hardware would also help save on equipment cost.

Generally, telecom companies invest a fortune in hardware to run data centers. They, thus, incur a lot of cost in procuring, installing and operating massive specialized network hardware. Not just cost, physical hardware also increases response time and reduces the overall efficiency of the system.

Essentially, NFV enables telcos to add agility and flexibility to the network leading to an overall simplified network. This in turn allows them to rollout services at a faster rate. Virtualisation also allows telcos to be flexible towards the need of the customers by being quicker in response to their demands.

South African service providers can also use automation for network maintenance to bring down their cost of network management. Virtualisation allows automation of different components across the network enabling service providers to best utilise their resources. Greater visibility and control of the network also leads to better security.

By shifting the physical hardware on to a virtual platform, companies would not just save a lot on capital expenditure but also increase the overall efficiency. Some estimates put the savings in capital cost to as much as 60%.

Last but definitely not the least is the opportunity for the telcos to increase their revenue by overhauling their networks. It allows them to better address the consumer demand for mobile broadband. As the quality and reach of services improves, the consumption is sure to go up, further allowing them to bring down the tariff.

The concept of virtualisation is a key part of telco transformation and enables the service providers to simplify the networks while enhancing their efficiency. The South African telcos would need to adopt technology solutions in line with the concept of virtualisation to save cost in the immediate future and to pass on the benefit to their customers in the form of cheaper data tariff.

By Lux Maharaj, Director, Africa Sales at Parallel Wireless

Powered by WPeMatico

Samsung scraps Nigerian manufacturing plant plans

Samsung scraps Nigerian manufacturing plant plans

Samsung scraps Nigerian manufacturing plant plans.

On Thursday 18 January 2018, Samsung revealed that the company will no longer look to establish a manufacturing plant in Nigeria because its market share in the country is not big enough.

The revelation was made by Sung Yoon, chief executive officer of Samsung Electronics, Africa during an interactive session with reporters in Lagos.

Samsung will also reportedly be reducing their investments in Nigeria by shutting down the Business to Business (B2B) Unit and the Corporate Social Responsibility (CSR) Unit.

Yoon, during the interactive session, also claimed that manufacturing a mobile phone requires 400 components and that none are available in Nigeria. He added that although Samsung was the leading consumer electronic company in Nigeria, its share of the Nigerian market is smaller to South Africa’s. In South Africa, the company’s smartphones market size is 80 percent, but is significantly lower in Nigeria, according to Yoon.

Other issues that affect the building of manufacturing plant in the country are infrastructure, return on investment (ROI) and grey market. “We are trying to be a local company here. Building factory depends on return on investment and efficiency of the economy. There are lots of grey products coming into the country and this will affect the return on investment,” he said.

He said that the company had manufacturing plants in Vietnam, China, South Africa and Korea, hence, having one in Nigeria is a thing of the future. Yoon said Nigeria’s population of 180 million was a power for the future, a reason why Samsung wanted to be part of the corporate citizenship.

Samsung Africa’s vision was to be the most admired brand, through partnership and profitable growth, concluded Yoon.

Edited by Dean Workman
Follow Dean Workman on Twitter
Follow ITNewsAfrica.com on Twitter

Powered by WPeMatico

Watch 30 minutes of Monster Hunter World gameplay

Watch 30 minutes of Monster Hunter World gameplay

Watch 30 minutes of Monster Hunter World gameplay.

The third and final beta for Monster Hunter World had begun on Friday, January 19, 2018, at 2 a.m. (UTC) and will conclude on Monday, January 22 at 1:59 a.m. (UTC).

The download client, for the PlayStation 4 beta, was made available to players for pre-load two days ahead of the start of the beta on the 17th of January 2018.

In regards to content for the beta, Capcom stated that: “For this third and final round of the beta, we’re adding a new quest featuring the fearsome Nergigante! Take this last opportunity to dive into the new world of Monster Hunter ahead of the game’s release!”

Our overall experience with the beta was rather great. Granted, Monster Hunter World has a steep learning curve; however, after a few practice sessions, you will find yourself wanting to take on the biggest, baddest monsters in the game.

Monster Hunter World’s performance was impressive, during the beta, when running on the PlayStation 4 Pro. The game ran at a solid pace with little to no drops when running in ‘Prioritise Graphics’ mode.

By: Darryl Linington
Follow @DarrylLinington on Twitter
Follow @ITNewsAfrica.com on Twitter

Powered by WPeMatico

IBM Cloud now connected to BT’s ‘Cloud of Clouds’

IBM Cloud now connected to BT’s ‘Cloud of Clouds’

Keith Langridge, vice president of network services at BT.

BT has announced the launch of a new service to provide global businesses with direct access to IBM Cloud via the BT network on Wednesday 10 January 2018. BT Cloud Connect Direct for IBM offers businesses the benefits of network performance when building and deploying business applications and data on the IBM Cloud.

With Cloud Connect Direct for IBM, BT customers receive a connection to the IBM Cloud so they can access services including compute, network and storage infrastructure as well as an extensive catalogue spanning AI, Blockchain, Internet of Things (IoT), data and analytics capabilities. Direct cloud connectivity helps businesses achieve better performance, security and availability compared to connecting over the open internet.

Cloud Connect Direct for IBM is being delivered into IBM Cloud data centres in the UK via IBM Cloud Direct Link, a network service designed to secure and accelerate data transfer between private infrastructure and the public cloud. This will be followed in the coming months with direct connectivity into IBM Cloud data centres in mainland Europe, the US, Australia and Asia, optimising performance and compliance for customers in those regions. Cloud Connect Direct for IBM will be managed and supported from a single BT-managed service desk, providing proactive management and quality of service.

Keith Langridge, vice president of network services at BT, said: “Cloud Connect Direct for IBM is designed to help businesses fully harness the potential of high-value digital services delivered via IBM Cloud. Businesses deploying IBM Cloud services can now benefit from improved performance, security and reliability, creating a rich digital experience for their customers and employees.”

Kit Linton, vice president of network, IBM Cloud said: “Enterprises are rapidly turning to the cloud to modernise their core applications and build cloud-native solutions that leverage AI, IoT, Blockchain and more. The collaboration with BT will help enterprises around the world seamlessly connect to the IBM Cloud so they can maximise their data and generate new business value.”

Cloud Connect Direct for IBM leverages BT’s global network reach, spanning 198 countries and territories. The service is designed, implemented and supported as part of the customer’s existing network infrastructure. This means less redesign, less change and more consistency with existing network practice when connecting to new cloud services.

Cloud Connect Direct for IBM is available to customers globally today. Cloud Connect Direct for IBM is the latest development in BT’s Cloud of Clouds portfolio strategy, which has been helping customers since 2015 on their digital transformation journeys by connecting them easily and securely to a world-class ecosystem of cloud services, applications and data.

Edited by Fundisiwe Maseko
Follow Fundisiwe Maseko on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico

Execution is key to digital success

Execution is key to digital success

Monique Williams, Hyland Southern Africa Regional Manager.

Many companies have enjoyed significant efficiencies from partial digitisation in recent years, but there’s still a lot of paper flying about many everyday offices. Most agree that achieving truly paperless processes would greatly impact business and enhance customer service. However, many find the idea of implementing the tools they need to achieve digitisation daunting.

But it doesn’t have to be. Enterprise content management (ECM) does most of the hard work, allowing digitised documents and files in a wide range of formats to be searched, managed and made available to staff across the organisation, often automatically. While the path to success may be manageable, the outcome of a digitisation project will be significantly enhanced by addressing some fundamental issues.

Step 1: Know what you want
It’s important to have a clear vision of exactly what you want from your ECM solution – as well as why. What specific processes are too complicated or paper-heavy in the business? What problems would your ideal solution solve? Could platform capabilities including ECM, assist one department or be extended throughout the organisation?

ECM is about streamlining as much as it is about organising. Setting out what you want from an ECM solution is a good way to re-examine where business processes can be automated, attenuated and ultimately made more efficient.

Step 2: Know your users
Once you have a vision of a new digital way of working, you will need to think about implementing it from a practical viewpoint. Many IT projects fall short of their full potential because they are not widely adopted by staff. It is essential to keep staff on board during the planning and implementation stage and, in particular, key team members.

A good approach is to involve the people who will actually be using the system from the very beginning. Talk to them, find out what their challenges are and ask for their input and ideas. This helps build end-user buy-in and vastly increases the chances of achieving full adoption once the technical installation is complete.

Allow key staff to become ‘champions’ of the new technology, experimenting with it at an early stage and developing uses for the system within their area of expertise of work.

Early buy-in across the organisation will not only spread the idea and generate usage scenarios, but will also increase user adoption once the system is implemented. You will, therefore, end up with a system that uses technology for the benefit of company and staff, rather than an imposed solution that resourceful workers will rapidly bypass.

Step 3: The end game
Whenever you consider a business-wide system change, you should keep in mind how it will affect your staff. Empathy is key here. Remember that your end users may not care about projected cost savings. What matters to them is the efficiency they can achieve to complete tasks faster, which allows them to spend their time on more satisfying and valuable work.

Appropriate planning, vision and engagement are key to swift adoption across the business. Target quick wins, thereby building staff confidence and belief in the new approach.

As the new way of working evolves and customer trends are taken into account, the system will become flexible enough to allow even more business processes to be automated or changed into more appropriate digital formats.

By Monique Williams, Hyland Southern Africa Regional Manager

Powered by WPeMatico

Using cyber intelligence to catch cybercriminals

Using cyber intelligence to catch cybercriminals

Using cyber intelligence to catch cybercriminals. (Image Source: ).

The story of a local bank being taken for R300 million by cyber criminals who had 100 people withdrawing money from ATMs in Japan made the headlines. But South African companies, unlike their US counterparts, are not required by law to report cases of cyber theft so how many more have gone by unmentioned? The bank reportedly never got its cash back so it’s still wise to secure your systems from attack; the more proactive the better.

The likelihood of cyber attackers plundering your vaults is already vast and growing daily. The threat landscape today is highly sophisticated but our defences are typically out-dated and reactive systems. That’s because today’s hackers are often young professionals who work for organised crime syndicates and in many cases they target specific, high-value organisations.

A colleague from IBM, which supplies the i2 Enterprise Insight Analysis solution, worked with the Mexican secret service to combat drug cartels funding organised cybercrime, for example. The cartels have a well of finances the envy of many enterprises so they get the best skills, the best tools, and they have time on their side.

The i2 solution is a sophisticated, next-generation threat analysis solution used by the Mexican secret service, 32 out of 36 policing organisations in the UK, including MI5 and MI6, the FBI, Israel’s Mossad, various military units, and the police in South Africa. It has evolved to be relevant by helping catch bad guys for 26 years and is now commercialised and available for enterprises.

The reason you need it yourself instead of going to the police for help, when they already have this tool, is that they are under-resourced, just as their counterparts are elsewhere in the world. And they have much bigger physical world crime issues on their hands. They are good at kicking down doors. They’re less experienced at hunting cybercriminals who lurk in basements behind packet sniffers, tapped cables, and who make man in the middle attacks on obscure data centres in Brussels back rooms.

But to get the cops to kick in a specific door you must be able to reliably tell them which one. That’s what we’re doing with i2. And we’re helping businesses understand their vulnerabilities at any given moment – as well as giving them the tools to investigate, rapidly find the perpetrators, and give law enforcement actionable insights.

Another fact of cyber attacks is that they almost never materialise out of the blue and they’re almost never successful on the first attempt. They typically occur in stages. The crooks test your defences, fail, and return with new approaches to defeat your static counters. They’re fluid and you’re not, the warning signs are usually there, and we would have seen them had we looked.

We need to keep tabs on insider fraud via structured transactional data, chatter in the deep web in services such as Pastebin, unstructured data in our internal reports, and social media feeds where more human chatter occurs. We wrap that up in a dashboard that’s easy and quick for executives to keep an eye on but into which they can drill as deep as they like to ascertain the precise facts.

Behind the dashboard tiered security with intelligent analyses form sophisticated barriers that help you pivot faster than the bad guys. Tier one firewalls have policies that zap IPs that originate from countries in which you don’t operate. They trap known malware and vaporise it. They trap large attachments for human inspection. At tier two you correlate events. They take care of what’s known as the 5km, one-minute card rule where a single bank card cannot be used to withdraw money from two different ATMs, 5km apart, within one minute of each other.

Once you’ve matured tier two you begin to create the intelligence I’ve spoken about. It’s tier three, human-driven intelligence with automated help that visualises the associations to feed intelligent questioning. And the entire time it’s updating the dashboard vulnerability scenario so the executives can see that cutting security personnel or other resources increases work in progress and cycle times, indicating problems, and demonstrating their exposure in light of legislation such as Protection of Personal Information (POPI) Act.

It’s an approach that helps you find the crooks when they’re still trying to access your systems and helps you feed law enforcement actionable intelligence they can use to kick down doors.

By Tallen Harmsen, head of IndigoCube Cyber Security

Powered by WPeMatico

South African top Google searches this week

South African top Google searches this week

South African top Google searches this week.

South Africans generally tend to search for topics related to sports and news, and this week was no different.

Some of the most searched topics this week in South Africa included the death of a musical legend, a collapse in the world’s largest cryptocurrency, an ongoing disease outbreak, as well as the emergence of a sporting superstar.

To start off the week, the world learned of the sudden death of Cranberries lead singer Dolores O’Riordan. The 46-year-old singer received tributes from peers, celebrities, and millions of ordinary fans around the globe. As people sought to find out more about the life and death of the Irish artist, South Africans searched her name more than 50 000 times.

South Africans were again searching for “Listeriosis” over 50 000 times on Tuesday. It has been reported to date, that 67 people are known to have died from the disease, with the outbreak potentially being the world’s worst. Again on Tuesday, interest spiked in Bitcoin which was searched over 50 000 times as the price of the cryptocurrency fell dramatically, plummeting 14% amid fears of crackdowns by regulators.

On Wednesday, cricketer Lungi Ngidi topped search rankings with over 10 000 searches as his man-of-the-match performance helped South Africa wrap up the test series against India. That same day also saw 10 000+ searches for Hoerskool Overvaal, an Afrikaans school where the Gauteng Education Department tried to place 55 English-speaking learners. Kim Kardashian also made the list as she announced the birth of her third child, this one by a surrogate.

Other top searches for the week included “Manchester United” with 20 000+ searches following their 3-0 defeat of Stoke City, “Unisa Online Application” at over 10 000 searches, with the same amount of searches was “Siam Lee” and “Australian Open.”

People search for things they hear or see on the news, and sports search terms trend several times a week, on average, every week.

Edited by Fundisiwe Maseko
Follow Fundisiwe Maseko on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico

CONNECT Hackathon Series to run in five cities in Africa

CONNECT Hackathon Series to run in five cities in Africa

CONNECT Hackathon Series to run in five cities in Africa

WhereIsMyTransport a provider of public transport data service provider has partnered with Facebook for Developers to host the ‘CONNECT Hackathon Series’. The first event is taking place at GEN’s 22 on Sloane Campus in Johannesburg, South Africa from 19 to 21 January 2018.

Hosted across four additional cities including Kampala, Dar es Salaam, Kigali and Nairobi, the CONNECT series will bring together diverse developers and startups looking to build innovative location-aware applications to address the challenges and opportunities of moving people and goods in the region’s cities.

In Johannesburg, Facebook and WhereIsMyTransport will provide access and expertise to help participants build mobile solutions that combine the Facebook Places Graph API and the WhereIsMyTransport Public Transport API. In all the cities across the region, the CONNECT series will partner with local hubs of innovation, like 22 on Sloane, and local Developer Circles from Facebook – the company’s program to support communities of people passionate about technology, sharing ideas, learning, and collaborating.

The winning team will be awarded $1000 USD, with second and third place winners provided with $500 each in Facebook advertising credits. Additionally, all three teams will be provided with a year’s worth of free access to the WhereIsMyTransport Public Transport API.

Commenting on the CONNECT Hackathon series, Marsh Reddy, Platform Evangelist from WhereIsMyTransport said: “I think we have put together something really special for the Gauteng. Digitalising public transport routes in the region allow for local talent to build solutions that help citizens directly. We’re looking forward to seeing what gets built.”

Proud Dzambukira, Strategic Partner Manager Platform Partnerships; Sub-Saharan Africa, Facebook, added: “Facebook is defined by its hacker culture, and we’re excited to be partnering with WhereIsMyTransport to bring this hackathon series to the developer community. Efficiently moving people and goods between places is a fundamental problem that a number of startups are solving for cities in the region. Our platform can help add significant value to that work and we’re eager to see the innovative solutions which will be created from these events.”

For the Gauteng instalment of the CONNECT Hackathon series, additional support from MLabs, The Gauteng Provincial Department of Roads and Transport, Gautrain Management Agency, SANRAL, National Department of Transport, the Cities of Johannesburg, Tshwane, and Ekurhuleni helped bring this special initiative to life.

Edited by Fundisiwe Maseko
Follow Fundisiwe Maseko on Twitter
Follow IT News Africa on Twitter

Powered by WPeMatico