Archive for Lipiec, 2011

Opinion:Enterprise Networking and Connectivity

By admin, 27 lipca, 2011, No Comment

By Louis Helmbold, AxizWorkgroup Networking Business Development Manager

“Connectivity revolves around speed and from an internal Ethernet connection, South Africa is on track.  The problem however lies in the bottleneck that internet connectivity creates as far as speed and the cost of it is concerned in South Africa and Africa at large,” says Helmbold.

More providers are slowly emerging with international connection initiatives such as Seacom, providing the means for Africa to become connected to the world.  “The process will however take time and the access and connectivity landscape is set to undergo a major facelift in the next year or two,” says Helmbold.

Developments in the networking and connectivity market have propelled network security into the spotlight in the last four to five years, with security being taken to the edge of the network.  “The switch at the edge of the network assists to authenticate the user.  The process previously occurred at the core of the network which posed its own risks, with research indicating that nearly 80% of breaches in security originate from an internal location,” says Helmbold.

Helmbold says that user profiles are being created on the central server, which allows administrators to place boundaries on the profile.  “You can quite literally shape the identity of the user granting them access from specific locations, placing limits on internet usage and directing their access to the network.  It provides better mobility and enhances security measures substantially, effectively stopping users with malicious intent dead in their tracks.”

Another big development that has changed the network environment is the need for the users to be mobile, allowing remote access to the network.  “Virtualisation is providing a means to save on costs and optimise usability.  Previously the lifespan of a server was pegged at around 18 months to a year, but with optimisation and virtualisation a server lifespan can be extended for up to eight years. “

Networks have effectively become more intelligent by allowing access to specific aspects of the network.  “Previously a large part of the network intelligence was located in the core and has now been moved out to the edge of the network.  The fact that there are more intelligence at the edge of the network enables higher security, end point mobility and integrity.

“A virtual desktop grants the IT manager more power to specify and standardise which applications are used.  The connection simply serves as a means of refreshing the screen, which allows traffic on the network to be minimised quite substantially,” explains Helmbold

End point integrity plays an important role, especially from a security point of view.  “It is possible to run a small application on a user’s laptop that is initiated from the network as soon as they log in.  It pinpoints possible threats and the switch at the edge of the network will place the user on a quarantine network if a threat is detected.  The quarantine network will contain the necessary software to neutralise the threat quickly and effectively without hampering the user,” he explains.

It is however very important to design the network correctly from day one.  “Choosing your vendor is also important as it will affect costs and performance.  Some vendors will give a lifetime warranty and others will specify costs for software upgrades that can be quite substantial.  Read the fine print and make sure it complies with the projected lifespan of your network and server from a cost perspective.  Every client needs to be assessed in their own right and the network needs to be tailored to suit their specific needs,” says Helmbold.

Key message of CPA shared with Marketers

By admin, 27 lipca, 2011, No Comment

The recently-promulgated Consumer Protection Act (CPA) expects a commitment to transparent dealings with consumers. That was the key message delivered to an audience primarily comprised of the marketing fraternity at Friday’s (22 July 2011) “E-mail/SMS marketing and the law” seminar.

Held at the Forum in Bryanston, Johannesburg, and hosted by specialist ICT law firm Chetty Law with speakers including Attorney Katherine Thompson how the new CPA makes South African consumers among the best protected in the world. It has significant implications for all businesses, including the use of digital media to market goods and services. “The new Act has direct implications for marketers,” she said.

The seminar was sponsored by pMailer, a leading bulk Email and SMS marketing platform developed by Prefix Technologies. Josh Adler, CEO of Prefix Technologies, provided the audience with the e-marketer’s perspective. “In the world of digital marketing, reports of the death of e-mail areas premature now as George W. Bush’s Second Gulf War victory proclamation was several years ago. E-mail remains the standard way much of the business gets done and it’s a very mature environment,” he noted. “The key lesson is that nothing great ever dies, it evolves. New legislation like the CPA and later the Protection of Personal Information Bill will have an impact on that evolution,” said Adler.

According to Thompson, the key message of the CPA is that marketers have to be transparent in their dealings with consumers. Most of its provisions, it could be argued, are designed to make it much easier for consumers to understand exactly what is being offered. Following that basic understanding they also need to understand what their rights are. However, the Act sometimes doesn’t go as far as current practice. An example is refunds. Said Thompson, “Most retailers give full refunds with no questions asked, but the CPA actually has quite strict conditions that govern when a full refund is mandatory.”

Businesses should see the CPA within the context of keeping their customers happy. Furthermore, companies have an onus to investigate and understand its obligations to consumers in terms of the Act, and take reasonable steps to comply.

Chetty Law’s principal, Pria Chetty, argued that the CPA needs to be seen within the broader context of the total legal and regulatory framework. In the case of e-mail and SMS marketing, the Electronic Communications and Transactions (ECT) Act is hugely important. “This is a great piece of legislation that actually enables e-commerce in South Africa rather than frustrating it,” said Chetty.

The ECT Act gives digital communications the same legal force as written documents. “The legislation is technology-neutral, so it covers all types of digital technology,” said Chetty.

One important corollary is that digital marketers need to practice strict version control of the terms and conditions of electronic marketing tools so that they can demonstrate which conditions pertain to specific offers.

Chetty noted that the ECT Act also contained consumer protection provisions, among them the need for proper disclosures by the vendor or marketer and a cooling off period of seven days for all electronic transactions. This is slightly longer than the five business days specified in the CPA for contracts initiated through direct marketing. The ECT Act also specifies that electronic payment channels must be ‘sufficiently’ secure. This implies that payment channels had to be secure in the context of available technologies and also appropriate to the industry. For example, a transactional banking site would be held to higher standards than one facilitating the purchase of items like CDs, for instance.

Spam is one of the hottest topics in e-marketing but South Africa does not have specific anti-spam legislation. “That’s why we have to look at the total regulatory and legal framework,” said Chetty. She pointed out that both the ECT Act and CPA make provision for opt-out direct marketing, which means that companies can market to people with whom their company has no customer relationship, provided the company meets the requirements under the various legislation.

Regarding future legislative changes, the forthcoming Protection of Personal Information Bill was set to change South Africa to an opt-in model, effectively limiting direct market practices. “In other words, the use of personal information will be reliant on the consent of the person concerned unless the person is a customer of the company,” said Chetty.

Adler concluded, “The CPA is the next stage in the evolution of digital marketing. The ECT Act opened things up, now we’re protecting the little guy. It’s good for our industry because it guides us into best practices, and that will ultimately improve the return on investment in digital marketing.”

Vox Telecom to partner with AppNeta

By admin, 27 lipca, 2011, No Comment

Vox Telecom, one of South Africa’s leading, independent telecoms companies, announced today, a multi-million Rand partnership with AppNeta, a leading provider of cloud-based instant-value network performance management services in the US.

AppNeta has pioneered a range of network monitoring and troubleshooting services that evaluate any business’s network health to ensure superior application performance across all data centre, cloud, remote office and mobile environments.

Vox Telecom will offer the cloud-based PathView Cloud network performance monitoring and troubleshooting services to enterprises and SME businesses throughout southern Africa. The PathView Cloud solution provides unmatched insight into and across networks for monitoring and troubleshooting telecommunications services. The zero-administration network management service allows for immediate visibility into how an application will perform on any network, including all security and traffic shaping technologies.

“We are excited to launch this new partnership with the leading telecom carrier and network provider in South Africa. With PathView Cloud, Vox Telecom can provide 24/7 network performance monitoring and troubleshooting to ensure predictable and consistent delivery of business critical IT services,” said Jim Melvin, CEO of AppNeta.

“PathView Cloud will enable the Vox Telecom Group to offer customers a cost-effective approach to ensuring their networks and key applications such as voice, video and web services are meeting performance SLAs,” said Gary Sweidan, Managing Director of Vox Datapro. “With PathView’s insight, we gain a level of visibility into our customers’ network performance that, quite frankly, other carriers can’t provide.”

Vox will be the exclusive southern African provider of PathView Cloud network monitoring and troubleshooting services.

Interactive Intelligence reports Q2 2011 financial results

By admin, 27 lipca, 2011, No Comment

Interactive Intelligence Group Inc., a global provider of unified IP business communications solutions, has announced operating results for the three and six months ended June 30, 2011.

The company reported revenues of $52.0 million, an increase of 34 percent over the second quarter of 2010. Product revenues were up 34 percent, recurring revenues increased by 35 percent, and services revenues increased 30 percent compared to the same quarter last year.

The company reported operating income on a generally accepted accounting principles (GAAP) basis of $5.5 million for the 2011 second quarter, up 18 percent from $4.7 million in the same quarter last year. Non-GAAP operating income was $7.3 million for the second quarter of 2011, up 29 percent from $5.7 million in the second quarter of 2010.

“We are executing on our primary strategic initiatives,” said Dr. Donald E. Brown, Interactive Intelligence founder and CEO. “We are moving up-market with more sales to larger customers, rapidly increasing revenues from our cloud-based solutions, successfully expanding our presence internationally, performing well in our targeted vertical markets, and seeing increased interest in our process automation capability.”

GAAP net income was $3.8 million, with diluted earnings per share (EPS) of $0.19, compared to $2.5 million, or EPS of $0.13, for the second quarter of 2010. Net income on a non-GAAP basis was $6.3 million, with EPS of $0.32, compared to $5.0 million, or EPS of $0.27, for the same quarter last year.

Non-GAAP net income and EPS for the 2011 second quarter exclude purchase accounting adjustments of $496,000, or EPS of $0.03, charges for stock-based compensation of $1.3 million, or EPS of $0.06, and non-cash income tax expense of approximately $727,000, or EPS of $0.04. For the second quarter of 2010, non-GAAP net income and EPS exclude charges for stock-based compensation of $964,000, or EPS of $0.06, and non-cash income tax expense of $1.5 million, or EPS of $0.08.

Cash and investment balances as of June 30, 2011 increased to $94.4 million. The company has no debt.

First-half 2011 results included the following:

  • Total revenues of $99.7 million, a 35 percent increase over revenues of $73.8 million for the first half of 2010.
  • GAAP operating income of $10.4 million, up from $8.6 million for the first half of 2010.
  • Non-GAAP operating income of $14.0 million, compared to $10.7 million for the first half of 2010.
  • GAAP net income of $6.9 million, or EPS of $0.35, compared to $4.3 million, or EPS of $0.23, for the first half of 2010.
  • Non-GAAP net income of $11.8 million, or EPS of $0.59, compared to $9.1 million, or EPS of $0.49, for the same period last year.

For the first six months of 2011, non-GAAP net income and EPS exclude charges for purchase accounting adjustment of $1.0 million, or EPS of $0.05, stock-based compensation of $2.6 million, or EPS of $0.13, and non-cash income tax expense of $1.3 million, or EPS of $0.06. For the first half of 2010, non-GAAP net income and EPS exclude charges for stock-based compensation of $2.0 million, or EPS of $0.11, and non-cash income tax expense of $2.8 million, or EPS of $0.15.

Additional highlights in the second quarter of 2011 include the following:

  • Certification by Joint Interoperability Test Command (JITC) for U.S. federal government deployments.
  • Announcement of the upcoming release of CIC 4.0.
  • Named by the Indiana Chamber of Commerce as a Best Place to Work.
  • Inclusion in Gartner’s Contact Center Infrastructure leaders quadrant.

As previously announced on July 5, 2011, the company acquired CallTime Solutions, a partner in the Australia and New Zealand markets to expand sales, support and service capabilities for direct customers and resellers throughout the region.

Interactive Intelligence will host a conference call July 25 at 4:30 p.m. Eastern time (EDT) featuring Dr. Brown and the company’s CFO, Stephen R. Head. A live Q&A session will follow opening remarks.

To access the teleconference, please dial 1 877.324.1969 at least five minutes prior to the start of the call. Ask for the teleconference by the following name: “Interactive Intelligence second-quarter earnings call.”

MTN Business launches two new mobile applications

By admin, 27 lipca, 2011, No Comment

MTN Business has announced the addition of two tools to its Mobile Application Solutions.  These tools compliment the company’s existing range of applications – specifically designed for organisations looking to empower their mobile workforce and increase collaborative mobile efficiencies.

Mobile Forms

Mobile Forms is a specialised application developed specifically for the mobile worker with the aim of simplifying their business life.  This tool is particularly suited to mobile field researchers as it supports the delivery of  accurate information via an employee’s chosen cell phone to enable them to convey information and data collected ‘in the field’ back to the source in a timely and straightforward manner. The forms application allows instant access to a range of templates while an employee is ‘on the move’ and is built with intelligent validation software, meaning the form actually guides the field workers as to the  sections that are compulsory to complete as well as what information is required for improved workflow integration.  In addition, it provides a set-up that incorporates rich data sources (including GPS and photography in data capturing, without needing to switch applications), all while having the ability to works online and offline allowing the mobile worker more flexibility, as they are often not dependent on cellular tower coverage

“Businesses can now expect a reduction in the risk of data loss, improved data security and workflow integration, managed largely by a sophisticated integrated backend system.  This is accomplished through a secure and central cloud distribution centre which pushes data into one or many backend processes via the most relevant communication mediums such as SMS or e-mail, allowing for increased productivity and high level data efficiency,” says Tebogo Mogapi, Chief Business Sales and Services Officer at MTN South Africa.

Data Management

The Data Management app – a data spend tracker, provides a solution that can be easily implemented across a variety of applications. This application provides businesses with the ability to manage and control data spend, as it identifies any areas that result in data misuse, improve service delivery; or could increase productivity and greater customer satisfaction – giving business owners the power to grow and expand their operations while being able to easily manage typically abused commodities such as bandwidth more efficiently.

“It’s obvious that we are living in an “I work where I am” age, and as the mobile workforce continues to proliferate, what is becoming essentially important is the business owners’ and shareholders’ views towards obtaining a healthy balance between mobile worker efficiency and business control,” adds Mogapi. s

Softline Launches VIP Cares Life and Business skills programme

By admin, 26 lipca, 2011, No Comment

The programme was inaugurated during the recent school holidays and saw a group of thirteen Grade 10 learners from the Louis Botha children’s home and a High School in Mamelodi, reaping the benefits of the campaign.

Ingrid Theunissen, an internal trainer and industrial psychologist at Softline VIP, says the programme outline has been divided into three distinct sections which are designed to span from Grade 10 through to Grade 12.  “The curriculum progressively increases the learner’s overview and background of basic life and business skills, providing them with much needed insight into the business world.  It is a long term project that will reach its full potential by the year 2013, when our first group of learners will reach Grade 12,” says Theunissen.

The Grade 10 curriculum provides learners with a basic overview of life skills including self development, communication, interpersonal relationships, conflict handling and assertiveness.  “It also reviews personality styles and profiling, and covers basic PC literacy which includes an introduction to MS Word and Excel as well as basic telephone skills,” explains Theunissen.

The curriculum compilation for Grade 11 learners takes the process one step further by focusing on organisational skills and includes an introduction to the payroll environment, a closer look at career choices, and an overview of successful presentation skills and good time management.  It also aims to teach learners to optimise their memory and takes a closer look at intermediate Excel.

The curriculum for Grade 12 learners will see the group undergoing VIP payroll system training, which is further enhanced by English business writing.  “We walk them through the ‘how’ of compiling an effective CV and conducting a job interview.  It also presents the learners with advanced Excel and MS Word skills,” says Theunissen.

The team working on the VIP Cares life and business skills programme comprises of Ingrid Theunissen, Christie Leisegang, Madelein Botha, Lizel de Beer, Annette Viljoen and Christine Schoeman.  “The first rendition of the programme was a resounding success and proved to be very rewarding to all that participated.  The group of learners found the sessions insightful and have indicated that they will definitely return for the Grade 11 programme next year,” concludes Theunissen.


Softline celebrates 30 years of Sage celebrations

By admin, 26 lipca, 2011, No Comment

Softline commemorates its eight years of being part of the Sage Group plc by joining the Group’s “30 years of Sage” celebration in July.

Ivan Epstein, the Co-Founder and CEO of Softline, says that he is proud to represent Sage in the newly formed AAMEA (Africa, Australia, Middle East & Asia) region at such an auspicious time for the company.

“Reaching a 30 year milestone is significant for any company regardless of size.  It is not only an opportunity to reflect, but also to celebrate the individuals who make our company great.  Through their hard work and dedication, we have become a leader in our field,” says Epstein.

He says that this milestone also serves as a reminder that Softline, and fellow Sage teams in 24 countries, are part of a global community of 13 600 employees with a shared vision of becoming the most admired and respected software provider in the world.

With over 6 million customers worldwide, Epstein says that preserving the Group’s exceptional customer experience is of paramount importance.   “With our global strength and local expertise we know what our customers’ needs are and will ensure we have specific and relevant solutions to meet these now and in the future.

WACO Africa implements Mimecast email solution

By admin, 26 lipca, 2011, No Comment

Mimecast, a leading supplier of cloud-based email archiving, continuity and security for Microsoft Exchange, was implemented by WACO Africa to assist in disaster recovery, business continuity and email backup.

WACO Africa was created through a buyout by management and an investment capital firm, resulting in the separation of the local operation’s management and back-office activities from those of its US and UK operations. This led to rapid de-linking of technology systems, particularly the global standard Lotus Notes messaging system.

“We had separated our system architecture from that of the UK, cutting dependency on that system and implementing our own services,” explains Ivan Caldwell, head of ICT at WACO Africa. “We were converting the company from Lotus Notes to Microsoft Exchange and didn’t want to overspend on technology infrastructure. We didn’t really know how we were going to address the issues of backup and archiving. At the time of separation we hadn’t made any final decisions on services such as email continuity and archiving, but we knew those were extremely important to the business. WACO Africa’s IT needed re-architecture, and we were slowly putting in plumbing to provide the required framework.”

WACO Africa has 700 email users across 45 branch offices in the sub-Sahara region, with over 20 other project sites running simultaneously.
Caldwell prefers to follow a strategy of outsourcing. This entails employing Software as a Service (SaaS) and cloud computing whre it makes sense and can add meaningful value to business process, as well as reducing the demands placed on the technology team.

Mimecast simplifield migration to Microsoft Exchange, with the additional benefit of a ten-year email archiving solution that forms part of the disaster recovery and high availability strategy. It also includes perimeter-based antivirus and antispam, with no need to invest in additional hardware or software infrastructure. With the Mimecast UEM service, WACO Africa did not need to make any significant alterations to its system or to user behavior. Staff can use the archive search functionality either through the Mimecast Service for Outlook add-ons or the intuitive and secure web-based console known as the Mimecast Personal Portal.

The implementation of Mimecast’s UEM system was easy and took WACO Africa’s team just a week: “It was seamless and transparent. The cutover was really smooth. We have a good technical guy working alongside Mimecast’s excellent technical people,” says Caldwell.

Kaspersky Internet Security 2012 and Kaspersky Anti-Virus 2012 released

By admin, 26 lipca, 2011, No Comment

Eugene Kaspersky, CEO and co-founder of Kaspersky Lab, says: “The new 2012 versions continue the long tradition of excellence that our home user products have come to be known for. They feature integrated, world-class protection technologies designed to combat even the most complex of threats. At the same time, these products are now simpler and more user-friendly than ever before. We have taken yet another huge step in protecting Internet users against the most dangerous, unknown threats out there. Many of the modules featured in Kaspersky Internet Security 2012, such as web-antivirus, heuristics, the threat rating sub-system and anti-rootkit components, have been made easier to update and now interact more effectively with cloud technologies.”

The new Kaspersky Internet Security 2012 and Kaspersky Anti-Virus 2012 incorporate advanced protection technologies such as:

  • a sandbox for launching suspicious applications
  • a program activity monitoring module,
  • a script emulator
  • a cloud-based reputation database
  • a virtual keyboard

First-rate protection against unknown threats

New malware appears at an extremely rapid rate these days — roughly 35 thousand new malicious programs each day. There are no signatures for these new threats, meaning innovative methods are required to detect them. Kaspersky Internet Security 2012 and Kaspersky Anti-Virus 2012 effectively neutralise new threats using non-signature-based behavioural analysis of suspicious programs. Kaspersky Lab’s latest products are capable of tracking program activity during present and previous work sessions.

Monitoring program activity uses data from other components, such as the proactive protection module, email, web and IM antivirus components, the firewall, etc. The monitoring module tracks complete chains of events that could impact security, and literally pieces together an entire picture of program operations or even groups of operations affected by malware. If there have been a number of related incidents on your computer, all the monitoring module needs is to detect one of them in order to find all of the others. Importantly, it is now possible to cancel and roll back all of the actions executed by a program not only in the current working session, as was the case with Kaspersky Internet Security 2011 and Kaspersky Anti-Virus 2012, but in previous working sessions too. Furthermore, the list of actions that can be cancelled has been expanded to include the creation, renaming and modification of files, as well as changes to or new entries in the system registry, etc.

Malicious activity detection has also taken a step forward with the use of behavioural templates. Kaspersky Lab data about malicious programs is incorporated into these behavioural templates, and a centralised template database helps to quickly locate unknown malicious code with complex behavioral patterns.

  • Improved protection from the cloud

In the 2012 versions of Kaspersky Lab’s home user products, cloud-based technologies, the cutting-edge of antivirus development, have been improved. By regularly exchanging information between products installed on users’ machines and the centralised databases in the cloud, the most up-to-date threat information is made available for the protection of users. Now, in addition to superior protection from the cloud, the new product versions also demonstrate how they do it. The main program window provides users with in-depth information about which cloud components are active and how they are protecting users’ computers and personal data.

Users of Kaspersky Internet Security 2012 and Kaspersky Anti-Virus 2012 can find out about the reputation of any file on a local computer and decide whether or not to use it. All users need to do is right-click on the file’s icon and select the ‘View file reputation in KSN’ menu option. Users will then be shown the file’s threat rating as determined by the Kaspersky Security Network cloud service, which has been greatly improved since its inception and development three years ago. In addition to a file’s rating, users can also find out about the geographical distribution of the file, the level of trust attributed to it by other users and other similar information stored by Kaspersky Lab’s cloud tracking and rapid response systems.

The 2012 versions of Kaspersky Internet Security and Kaspersky Anti-Virus warn Internet users of links that pose a threat and which will redirect users to fraudulent, malicious and spammer websites. Kaspersky Lab’s latest products receive up-to-date information available about undesirable Internet resources directly from the cloud, including websites with adult, violent and other similarly unsavoury content. Users can rest assured that they will not find themselves entering websites designed to steal their personal information or infect their computers.

Cloud technologies have even improved protection against spam. Databases located in the cloud provide templates for new spam emails in real time. This helps Kaspersky Internet Security 2012 and Kaspersky Anti-Virus 2012 to quickly adapt to ever-changing spammer tactics and be able to provide proper protective measures. Users do not have to fine-tune the new, user-friendly Anti-Spam module before getting down to work — the cloud already has all of the latest available data on spam mailings.

Furthermore, Kaspersky Lab believes that the combination of cloud protection and security software running on users’ computers is an ideal way of ensuring multilayered protection. At present, this hybrid approach is the best option in terms of combating the wide range of threats out there in the wild. That is why both of the new product versions feature improved cloud technologies and enhanced program capabilities.

Convenience and speed

Kaspersky Internet Security 2012 and Kaspersky Anti-Virus 2012 are both high-performance products designed for minimal impact on your computer’s running speed and program operations. Kaspersky Lab’s products have been streamlined for optimal day-to-day use when surfing the Internet, searching for and viewing web pages, making VoIP calls, watching HD videos and playing online games, etc

The “intelligent update system” downloads updates for active product components only and launches them immediately after they have been plugged in. That means that antivirus database components are kept right up-to-date and download traffic is minimised. The update launch mode has been adapted to suit typical laptop and desktop work modes and will not slow down performance when operating system activity is resumed or a user launches programs.

The Kaspersky Internet Security 2012 and Kaspersky Anti-Virus 2012 interfaces have been improved and now feature 3D and animated graphics, yet remain straightforward and user-friendly. The animated area of the main window contains icons for key actions, including disk scans, database updates, etc.

“The latest versions of Kaspersky Internet Security 2012 and Kaspersky Anti-Virus 2012 can now be used with touch-screen devices. Product installation has also been optimised, minimising any conflicts with incompatible security software. Additionally, the steps for activating and purchasing licenses can now all be found in one window,” concludes Kaspersky.

Bytes leads ICT empowerment in SA

By admin, 25 lipca, 2011, No Comment

In its most recent BEE rating, the group has scored an average of 89,66 out of a potential total of 100. This is as rated by Empowerdex, which has confirmed and ratified the scoring.

“We have worked relentlessly to ensure we both achieve BEE targets and contribute to the growth of South Africa,” says Skip Franzsen, HR executive at Bytes Technology Group. “It is gratifying that we can achieve our targets while continuing to deliver value to customers and shareholders.”

Particular highlights for Bytes in the year under review were:

  • Ownership, where the group exceeded requirements significantly, with 22,83 against a possible 20.
  • Preferential procurement, where the group scored 19,13 out of a possible 20.
  • Enterprise development and corporate CSI, where the group scored a full house out of a possible 15 and 5, respectively.
  • LaserCom , which scored 95,44 out of a possible 100.
  • Bytes Systems Integration, whose management soared from 1,92 to 5,30.
  • Bytes People Solutions, which was named as the BEE star of the year at the annual Altron awards, earning close to 90%.
  • Bytes Document Solutions, which breached the 90% barrier for the first time, earning 92,34%. Employment equity in this company soared from 6,53 to 10,43 in the period under review.

“Broad-based BEE is not a nice-to-do, or nice-to have. It is a critical input into addressing the historic inequalities of South Africa, and ensuring all can participate actively in the economy,” says Rob Abraham, CEO of Bytes Technology Group. “While we are pleased with these results, we will continue to drive our group towards full and proper demographic representivity, and we thank Skip and all our managers for their commitment to this goal.”

wielkoformatowe wydruki Lublin kolorowe kopiarki Warszawa wielkoformatowe skanowanie kolorowe skanowanie Lublin skanowanie lublin kopiarki warszawa tanie ksero lublin tanie ksero lublin szybki druk wysokonakładowy serwis kopiarek convert Warszawa naprawa ksero Warszawa