Subscribe
About
3:50

How Blockchain will transform your business

Cryptocurrency may be in its infancy, but like the Internet, its adoption has been far reaching and its implications are enormous, says Naresh Pema, Enterprise Engineer Open Source.

5:20

Cloudera launches New Solutions Gallery

This is an online marketplace for machine learning and advanced analytics solutions.

2:40
OpenStack CloudMar 10, 2017

Suse buys HPE assets

Suse has finalised the purchase of talent and technology assets from HPE.

1:40
DevConfMar 7, 2017

Obsidian Systems, Atlassian collaborate

The companies have teamed up to participate as a silver sponsor at this year's DevConf conference.

8:20
SDIMar 6, 2017

SUSE Expert Days in SA for the first time

ITWeb interviews the regional manager for SUSE South Africa, Matthew Lee, to gain insight into its SDI, digital transformation and DevOps plans.

1:10
ReactMar 3, 2017

South Africa's first React Native mobile app

Bluegrass Digital was appointed by Names & Faces to rebuild its new mobile application using React, React Native and Redux.

1:30
Microsoft AzureFeb 27, 2017

BUI, Ascent partner

Ascent Technology and BUI will accelerate digital solutions that improve clients' productivity.

4:30
PRIMEFLEXFeb 22, 2017

Fujitsu presents SUSE OpenStack Cloud

The latest addition to the PRIMEFLEX family combines a high-performance hardware stack, open source software and professional services.

2:20
Docker SAFeb 21, 2017

Open source docks with mainstream vendors

Software containerisation platform Docker comes under the spotlight in Cape Town and Johannesburg this week.

2:50
GoogleFeb 21, 2017

DVT spotlights agility in software development

The company will highlight the motivational role of?agility?in software development and Google's Android Things?platform at?DevConf 2017.

2:10

CTU Training Solutions joins Red Hat Academy

The company has collaborated with Red Hat to create the CTU Training Solutions Red Hat Academy.

2:50

Proper planning key to pre-empting invisible cyber attacks

Specialists say behavioural monitoring and control of the core network component are important for protecting companies against "invisible" cyber attacks.