Archive for Październik, 2011

OpenWeb introduces online Debit Card payments

By admin, 29 października, 2011, No Comment

Great news for Standard Bank and Nedbank Debit Card holders, may now purchase your OpenWeb ADSL bandwidth using one of these cards.

Gone are the days of online purchasing being limited to the folks with credit card.

From 1 November 2011, clients with a Standard Bank or Nedbank pin enabled debit card will be able to purchase their OpenWeb ADSL bandwidth from our online signup form.  Please keep your cellphone handy.

“Many more people will now be able to benefit from OpenWeb’s superior service and A grade ADSL bandwidth! We are also working on some fantastic new ADSL products that will enhance the debit card offering even more!” says Keoma Wright, Founder of OpenWeb.co.za.

CA Southern Africa launches CA Access Control for Virtual Environments

By admin, 25 października, 2011, No Comment

CA Southern Africa launches CA Access Control for Virtual Environments, a new solution that extends the company’s identity and access management (IAM) security expertise and complements and protects VMware virtual environments.

CA Access Control for Virtual Environments helps customers confidently virtualise critical applications by addressing security and compliance concerns, and helping control privileged user access to the virtual environment.

“Virtualisation management tools provide IT administrators with tremendous flexibility and power to make significant, rapid changes to their virtual environments,” says Andrea Lodolo, CTO of  CA Southern Africa. “This authority increases the insider threat and raises the need to protect virtual environments from user mistakes, misuse or blatant, malicious actions by those users with the most privilege.”

The need for virtualisation security was reinforced by recent reports of significant operational disruption and financial impact at a Japanese pharmaceutical company. A former employee reportedly used his credentials to remotely access and delete multiple virtual systems that were running critical applications, such as email and others that supported financial functions.

“The security and control of virtual machines that can be rapidly produced is a contributing factor to the concept of ‘virtual stall’ and slow adoption of virtualisation,” says Lodolo. “Security is commonly cited as a reason why virtualisation is not used more pervasively in a production environment for critical applications. Now, with CA Access Control for Virtual Environments in our IAM security portfolio, we can offer customers the technology needed to automate end-to-end security of the data centre, from the mainframe and physical servers to virtual environments.”

CA Access Control for Virtual Environments helps customers: achieve compliance for their virtual data centre through privileged user management for the hypervisor and guest virtual machines; gain visibility and control over virtual environments with activity logging and privileged user password vaulting; automate security operations and reduce security costs by applying security controls according to pre-set policies; expedite adoption of virtualisation technology for critical applications by improving security controls; and create a secure, multi-tenant environment by isolating virtual machines through network zoning.

“We see CA Access Control for Virtual Environments as a key solution that will meet customer needs in virtualisation security,” says Lodolo. “By complementing and extending the security that comes with VMware, CA Access Control for Virtual Environments allows segregation of duties and control of privileged user access, all provided automatically.”

Opinion: How todays intelligent video applications can improve public safety

By admin, 25 października, 2011, No Comment

By Claude Kee, a director of ANV, supplier of the Aimetis intelligent IP video management software

Whether attempting to reduce crime in communities, defend the homeland, or deal with natural or manmade threats, public safety agencies at all levels are faced with significant challenges. To overcome them, many companies are implementing surveillance systems with intelligent video applications that automaticallyanalyze video data to collect useful information.

Intelligent video systems accomplish their tasks by using complex mathematical algorithms to extract moving objects or other recognisable forms from the recorded video, while filtering out irrelevant images or movement. Decision-making rules govern the data search to determine if the events recorded in the video are normal, or if they should be flagged as alerts tosecurity staff or police.

Historically, organisations viewed live video feeds or used simple motion detection applications to be alerted to potentially dangerous activities. But studies have shown that after 12 minutes of continuous video monitoring, anoperator will often miss up to 45 percent of screen activity.

After 22 minutes of viewing, up to 95 percent is overlooked. Meanwhile, manually looking through recorded video for incidents is so time consuming that many agencies actually view as little as 1 percent or less of the footage they record. So despite increasing their surveillance coverage, public safety agencies may actually experience greater security risks without additional technology support. And while motion detection applications are useful, they often produce so many false positives that real incidents may be ignored.

Fortunately, surveillance technology has evolved tremendously in recent years. Analytic technology today can filter out naturally caused pixel changes, such as lighting, cloud movements and blowing leaves, making applications more accurate. Sophisticated technology is used to compare pixels in a referenceframe to each subsequent frame in the video to determine which objects are moving.

After detecting motion, it categorises what it sees (a car, luggage, a human, etc.), then segments it by color, size and direction of motion. Once this metadata is gathered, the software can then perform a number of applications, such as people counting, crowd detection, object tracking and perimeter protection.

Perimeter Protection
Used primarily to protect buildings such as government or utility buildings during off hours, law enforcement agencies have also found success with perimeter protection in keeping individuals out of parks and other areas prone to criminal activity when closed. Perimeter breach detects instances of peoplecrossing a virtual, user-defined line at defined times in a more accurate manner than basic motion detection applications. This application can be used for areas directly outside of buildings, for example, such as doorways and loading docks, so that on-site security guards can be alerted immediately from central command if someone is detected after hours or on weekends.

Loitering
While it is normal for individuals to stop at times while walking, loitering applications can be used at building entry points, parking garages and other areas to alert public safety officials when someone seems to be loitering too long or in a vulnerable area. For example, one organisation uses cameras and intelligent video in a parking garage to determine when individuals stop outside of cars for more than 45 seconds.

When they do, an alert is sent to a roving guard so he can check out the circumstances. Loitering applications can also be combined with pan/tilt/zoom (PTZ) cameras that automatically turn to and focus on suspects to determine if there is an innocent situation or a break-in.

Left-Item Protection
In non-busy environments, “left-item” applications have proven useful in identifying when individuals leave objects on the floor and then walk away.Like loitering applications, alerts can notify roving guards, or PTZ cameras can first examine if the situation is potentially dangerous. These applications are often used in low- to medium-traffic public buildings or on quiet sidewalks outside of buildings of concern.

Integration with Traffic Systems
Several cities have implemented intelligent video systems that are integrated with their traffic systems to determine when individuals drive through red lights at dangerous intersections. Real-time alerts notify officers of the event, and video backup can be used to corroborate events and identify vehicles.

Forensics
While today’s intelligent video technology is very good, it isn’t perfect. As a result, you may be able to determine that an object was left behind, but not know whether it was simply an individual who put down a suitcase to purchase a soft drink or a terrorist who left behind an explosive device.

Likewise, it’s hard to know whether an individual loitering next to a car in a parking garage simply couldn’t locate his keys or was attempting to break in. Particularly when the event in question didn’t trigger an alert, you need human operators to review video to filter out innocent events, especially in very crowded areas where the accuracy of theanalytics is further reduced.

As law enforcement officers know, the first hours following a crime are themost important. Intelligent video’s forensic capabilities can be crucial in getting to the actual event quickly. Faced with 48 hours of video, intelligent video analytics may be able to parse out 20 qualifying events in a matter of seconds and then enable law enforcement officers to pin down the actual incident of interest in a matter of minutes.

Environmental Factors
While intelligent video applications are extremely advanced, six environmental factors will impact their success. As a result, working with trained and experienced integrators and suppliers to account for these issues is critical.

Camera Angle: The angle of the camera can influence several factors used in video analytics, including perspective, occlusion and segmentation of objects. As a result, the type of camera and its placement should be carefully selected.

Distance to Object: The object’s pixel size is an important element to video analytics. Most video analytics require a minimum pixel size (e.g., 15 x 15). Conversely, if the pixel sizes of the objects are too large, that too can distort the performance of the analytics (e.g. reflecting light into the camera). Thermal cameras perform over longer distances with higher accuracy.

Lighting Level: Lighting can influence video analytics in a few ways. First, for video analytics to detect objects, there must be some minimum light available (unless infrared or thermal cameras are being used). Second, abrupt changes in lighting (e.g., opening of doors) can cause false conclusions. Once again, consider the use of outside lighting, day/night cameras and/or infrared or thermal cameras, depending upon the application and environment.

Degree of Activity: The degree of activity or “busyness” of an environment has influence over the performance of video analytics. Generally, the higher the level of activity, the more false conclusions will be drawn by the video analytics algorithm. That’s why loitering and left-item applications are less suited for heavy traffic areas such as airports and train stations.

Weather: The volatility and variance of weather (sun, rain, snow, wind, trees, clouds, shadows, etc.) can cause false conclusions for video analytics, especially in outdoor environments. Weather also has an impact on video analytics in indoor environments where there exist large glass windows and doors and the mentioned conditions create changes to the scene viewed by the indoor camera. Some sophisticated cameras can compensate for these variableconditions.

Backgrounds: The degree of change to the background of a camera view can impact the performance of video analytics. For instance, if the view of thecamera includes a constantly moving escalator, this could result in false conclusions and needs to be taken into account when developing or installing a solution.

Computational Factors
Beyond the environment, public safety organisations should consult with integrators and vendors regarding the features of their video surveillance systems.

Processing Power: There are many different analytics engines. One can require 10 times as much CPU as another. More CPU is usually required if you want to detect small objects moving quickly. This is because to accomplish this, engines need to run more quickly to run at both a high resolution (todetect small objects) and a high frame rate (to track fast objects).

Resolution: Normally you can record video at 4CIF (704 x 480 resolution) and do analysis at CIF (352 × 288 resolution) to save CPU. But to detect very small objects during analysis, you may have to run video at 4CIF. The higher the resolution, the more network traffic and storage is required.

Frame Rate: Most analytics engines need between five and eight frames per second (FPS), with a record rate even higher. Faster moving objects require higher FPS for tracking. Even left item detection analytics often use motion tracking to cut down on false positives. Higher frame rates also result in more network traffic and storage requirements.

Hard Disk: If you want to be able to search through analyzed footage (e.g., objects moving near a car), you will need to store the XML metadata produced by the analytics engine. This is normally a negligible amount of HD—a few percent of video storage requirements.

Memory: An analytics engine usually requires an additional 10MB to 100MB when run on a PC. Higher resolutions need more memory. Video analytics algorithms can vary greatly on the amount of computational power needed to perform adequately.

Before implementing any analytic applications, make sure you fully understand your goals and accuracy needs. Then consider the appropriate applications along with environmental and computational factors affecting performance. A school might be happy with 90 percent accuracy to detect vandalism, but that same percentage would be dangerously low for critical applications that protect the safety of dignitaries. So take all of these factors into account to reduce risks and enhance the safety and security of citizens and public buildings.

Vodacom gets South Africa’s first 6-star Green Star SA rated building

By admin, 25 października, 2011, No Comment

This is the first time that a South African building has achieved this rating.

The Vodafone Innovation Centre will be carbon neutral and powered by renewable energy.  Once completed, the Centre will house a team of experts tasked with creating energy efficiency solutions that are expected to significantly reduce Vodafone’s global emissions.

According to the Green Building Council of South Africa, a green building is a building which is energy efficient, resource efficient and environmentally responsible.  It incorporates design, construction and operational practices that significantly reduce or eliminate the negative impact of development on the environment and occupants.

Pieter Uys, Vodacom CEO says:  “We are delighted that our building has achieved this accolade.  Over the last few years, we have worked hard to reduce the Group’s impact on the environment; it is a core strategic priority for both Vodafone and Vodacom.  The Innovation Centre, as the hub of our creative thinking around a low-carbon future, will play a critical role in the reduction of carbon emissions across the Group.”

According to the World Green Building Council, the built environment is one of the main contributors to climate change.

There are number of international reports that state that buildings represent the single largest opportunity for greenhouse gas abatement, outstripping energy, transport and the industrial sectors combined. Building green really is an opportunity to use resources efficiently and address climate change while creating healthier and more productive environments for people to work and live in.

Bruce Kerswill, Executive Chairman of the GBCSA, says that the GBCSA is proud that South Africa has its first 6-star certified building.  “6-star Green Star SA is equivalent to World Leadership – meaning that the Vodafone building puts South Africa firmly in line with global best practice in terms of green building – this is a fantastic achievement for Vodacom and Vodafone.

“Our rating systems are all about recognising excellence in sustainable design.  The highest rating, six stars, is reserved for those projects that are truly world class. Vodafone has set a new South African benchmark and we are so proud that this huge international company chose South Africa for the location of this innovation centre and that they targeted, and achieved, the highest Green Star SA rating possible,” concludes Kerswill.

The Vodafone Innovation Centre is expected to open in the first quarter of 2012.

Technology assessments crucial to business efficiency

By admin, 25 października, 2011, No Comment

As the end of the year fast approaches, organisations strategically evaluate and examine aspects that need to be modified within their business models, to continue to drive innovation and competitiveness into the coming year. While operational and financial features are key in this regard, it is critical to evaluate the technology infrastructure, according to MTN Business.

Says Justin Colyn, general manager of Fixed Mobile Convergence at MTN Business; “Technology capability and the continual accurate investment of this spend, is no longer a luxury but an essential cornerstone to business success. As a result spending the time and gaining the right expertise to evaluate your services should be a non-negotiable.”

MTN Business strongly encourages organisations to review their overall technology investments, with particular focus for 2012 being on voice communication infrastructure. Continues Colyn; “The digital age, massive mobile opportunity and shift to everything as a service means that a stable, scalable and viable voice platform must be a key consideration for any business wanting to take advantage of communication innovations including Telecoms Expense Management (TEM), Unipresence and Fixed Mobile Convergence (FMC).”

“Take FMC for example. A single device can connect through and be switched between wired and wireless networks. This means that there is no need for desk phones anymore. Users can make and receive calls wherever they are over many of the available connections. And instead of having multiple numbers, there is only one. Instead of having multiple voice mail boxes, there is only one. And best of all the management system is intelligent. If you are in a meeting, out of the office or simply not available, the re-routing and message capabilities are sophisticated enough to manage the caller’s expectations at all times.”

MTN Business is not only advising businesses of all sizes to spend the crucial time needed evaluating their technology platform, but is supporting this advice with a real outcome, by offering a complimentary voice communication audit for companies. “Through this industry initiative, we hope to provide telecommunication insight that, if pursued, will enable participating businesses to drive growth well into the coming years.”

All companies registering for the audit will also stand a chance to win R50 000,00 to use for their end of year function, or to donate to charity. Concludes Colyn; “At this time of year, we understand that business is manic and wrapping up on a number of urgent priorities. Sometimes the important priorities fall by the wayside, and at the end of the day have a larger impact than realised. As part of our drive to change the status quo and support viable technology implementation decisions, we hope this complimentary audit and competition will be that extra encouragement for companies to look at the important future priorities, today.”

Closing date to register for the complimentary audit and automatically be eligible for the prize valued at R 50 000,00 is 25th November 2011 at 12h00, with the winner to be announced on Friday, the 28th of November.

Should businesses go for capped or uncapped?

By admin, 25 października, 2011, No Comment

Andre Joubert, GM of MWEB Business says the answer to that question will depend on each business’s individual situation and requirements.

“There is no right or wrong when it comes to a capped or uncapped solution. However, businesses must ensure that they understand what they will ultimately be paying for because not all uncapped – or capped – solutions deliver the same level of performance, even if they appear to offer the same specifications.”

There are three issues that businesses need to weigh against each other before making a decision: speed, capacity and budget.

According to Joubert, if budget is an issue and speed is more important to you than capacity, then a capped solution – what MWEB Business provides as a Fixed IP solution – might be the answer.

“That’s provided you know how much capacity your business requires each month,” he adds.

“However, if staying within the cap requires you to monitor employee Internet usage and place restrictions on this, it could impact negatively on their productivity or creativity.”

If you don’t know how much capacity your business needs every month, or you want to explore applications such as online education, or you want to back-up your data more regularly and budget isn’t too much of an issue, then an uncapped, unshaped and unthrottled business solution is clearly the answer.

According to Joubert, MWEB Business understands that connectivity is crucial for most businesses and recommends that businesses follow the following basic guidelines when deciding whether to cap or not to cap:

  • When in doubt and capacity is a priority, go for uncapped, unshaped and unthrottled.
  • If you have a large number of employees, there is no question that uncapped, unshaped and unthrottled is best.
  • Ensure that you are comparing apples with apples when shopping for a connectivity solution.

“Ultimately, businesses need planning and foresight to get what is best for their operation in terms of functionality and price. MWEB Business has a competitively priced product option that will suit your needs regardless of which way you need to go,” Joubert concludes.

Business mobility won’t compromise security

By admin, 25 października, 2011, No Comment

Robyn Milham, the Head of Enterprise Sales for Southern Africa at Research In Motion (RIM), the company behind the BlackBerry solution argues that business mobility can come at the steep price of serious compromises to enterprise security, unless companies put effective strategies in place that address security at the device and network levels according to Robyn Milham. She says that organisations should look at three layers in their enterprise mobile security strategies: securing the mobile device and its data; securing communications to and from the device; and optimising the corporate network to support business mobility.

Says Milham: “Until the advent of mobile devices and wireless networks, network security was reasonably easy to manage. The only way onto the network was through a password-protected desktop computer connected by a physical Ethernet connection.

“Now, however, end-users can access the corporate network from anywhere in the world using mobile devices such as notebooks, tablets and smartphones. This is a potential security nightmare without the right tools and polices in place to manage the mobile workforce,” states Milham.

Milham says that mobile information security starts with the fundamentals of securing the device and its data. The number of cellphones lost and stolen in South Africa each year is staggering, meaning that the device is often the weakest link in a company’s information security network.

“Many of these devices contain sensitive financial or customer data and can be used to access the corporate network. Access to the device should be protected with passwords or even biometrics. Sensitive data stored on the phone should be encrypted so that it is useless to an unauthorised user,” says Milham.

“Information may also be vulnerable when it is in transit from the smartphone to another user,” says Milham. “Many mobile users send data from unsecured public networks and access strategic business applications on the road using devices that lack security software. Companies should therefore seek out solutions that offer end-to-end security for data in transit, including advanced encryption.”

One of the major challenges lies in consumerisation of technology since most end-users will carry one device for both their business and personal needs. RIM is addressing this challenge with BlackBerry Balance – new technology that makes possible the convenience of using a single BlackBerry smartphone for both work and personal purposes without compromising the security of company content and the privacy of personal content.

RIM is introducing this technology in response to the growing trend by businesses to allow employees to use personal BlackBerry smartphones for work, or company-owned smartphones for personal, and the need by businesses to secure, manage and control confidential company or client information on these devices.

The third piece of the puzzle lies in putting in place network architecture designed to support mobility.

“With the rapid growth in mobile computing, companies must extend their definition of the network perimeter to include mobile devices and their wireless connections to the network,” says Milham.

Mobile devices are often used outside the firewall from unknown IP addresses, which makes it more difficult for the corporate network to determine whether a device seeking access to the corporate network should be trusted or not.

For that reason, many companies prefer to push information to the mobile device rather than allowing users to pull it. This model is more secure since the destination is known and there is less likelihood of the data being intercepted.

Milham says that a mobile platform that allows central configuration, management and enforcement of security policies is essential for any company that plans to mobilise its business processes. The BlackBerry Enterprise Server platform, for example, gives companies the ability to set and control more than 500 IT policies from a central platform.

The policies in BlackBerry Enterprise Server are not designed as a “one-fits-all solution” – they can be configured around the needs of different end-user profiles in any company.

IT managers can set policies for everything from passwords to which third-party applications end-users may install and use on their smartphones, giving them complete control over their data and networks.

Concludes Milham: “There needn’t be a security price to business mobility, so long as you look for a solution that offers a flexible approach to security that offers an intuitive user experience, paired with central control for the IT department. The investment and effort required to build a secure mobile environment are minimal, provided you choose the right platform for your needs.”

ContinuitySA on brand value

By admin, 25 października, 2011, No Comment

Companies spend fortunes on advertising and marketing to enhance their brands. A strong brand generally equates to greater profits. However, in a crisis, a brand is at its most vulnerable.

Previously one generally had the luxury of a little time to assemble and assess the facts before issuing a statement. The basic rules of media management stay the same, however, technology has changed and we now live in a world of instantaneous news.

Research In Motion (RIM), the Canadian multinational telecommunications company found this out, to their detriment, with the latest four-day BlackBerry service outage. RIM, already in a rocky year of layoffs, poor sales and falling market share, could face lawsuits resulting from the service disruption.

Since the start of the four day malfunction, RIM had only released three official statements. Out of the three, the company only mentioned the cause of the delay in the last message released on the second day of the outage. Asked why the company couldn’t avoid network traffic backlogs by re-routing traffic by bypassing the faulty network operating centre, RIM did not give a straight answer.

This is the third major BlackBerry outage since 2007 and has placed the company’s network under further scrutiny, and has caused harm to the brand’s image, at a time when they are facing stiff competition from the iPhone and Android devices.

The outage has many customers wondering whether it’s time to switch to another mobile device, and users’ comments mainly target the company’s failure to tell them about the problem they were facing, and the cause.

“Effective and rapid management of a crisis, with a tried and tested incident management plan, is the significant factor in protecting an organisation’s brand from financial and reputational damage. It’s pointless recovering a service but having your customer base desperate to leave you,” said Lynn Jackson, Senior Advisor, Advisory Services, ContinuitySA.

We live in a fast moving world, especially as regards communication. In the event of a disruptive incident that could affect an organisations image, speed and accuracy of communication are vital and companies must be ready to react quickly, honestly and openly if they are to protect their reputation, their brands and their profits.

An up-to-date and comprehensively tested incident management plan will ensure effective and rapid management of a crisis and is vital to ensure that the company’s image and brand name are protected and even possibly enhanced in a crisis.

The contents of an incident management plan, that  includes how an organisation will manage communication with their stakeholders, is a set of components and resources to assist the organisation’s decision makers in handling crises.

BBB-SA now agent for Doro AB

By admin, 20 października, 2011, No Comment

BBB-SA director Mervyn Visagie, a former operations director of the Vodacom Service Provider Company (VSP), managing director of Vodacom Lesotho and Vodacom Congo (DRC), said the three Doro cellphone products to be marketed in South Africa are targeted at people over the age of 60 and have been fully certified and approved by ICASA.

“Senior citizens tend to find it increasingly difficult to understand and to use new technology as they grow older. Besides the difficulty of trying to deal with the complexity of ‘gee-whiz’ features that may ‘wow’ younger generations of consumers, the aging process makes it more difficult for them to read, listen to and handle devices that would otherwise make their lives a little easier.

“Doro does just that – by producing cell phones that are easier to read, easier to understand and use, easier to hear and easier to handle. In addition the Doro handsets feature an alarm button that triggers calls and SMS to five pre-selected numbers in case of emergency. The alarm calls continue until one is answered to provide ‘peace-of-mind’ for the user as well as loved ones,” he said.

Visagie added that Doro’s unique user-adapted design, exceptional quality and single-minded focus on a niche but important sector of the cell phone market is what attracted BBB-SA to partner with Doro.

Doro chief executive officer Jérome Arnaud said Doro’s entry into South Africa was influenced by the maturity of the country’s cell phone industry and market research that indicates that a high percentage of almost 5-million elderly South Africans are not being specially catered for when it comes to keeping in touch with family and friends with a device that is easy to use.

“Doro’s experience in more than 30 countries confirms that people over the age of 60 care less about extreme functionality and gimmicky features and more about being able to easily and comformatbly use a cell phone. Doro’s ability to turn sophisticated technology into products that are truly easy to use and that help people who face the challenges of aging to live an easier, safer and more fulfulling everyday life is what we are all about,” he said.

The three Doro cellphones  to be sold in the South African market market are the range-topping Doro PhoneEasy® 615 that includes a camera, the Doro PhoneEasy® 410s gsm and the Doro PhoneEasy 341gsm. All include the “panic” button and have excellent design features, including raised edges, soft touch coating and widely spaced, concave keys, easy to read large format text and display and loud, clear sound. The Doro PhoneEasy® 615 and Doro PhoneEasy® 410s gsm also feature hearing aid compatibility.

“Simplicity, ease of operation through simple menus, clear, easy to read screens, ensure that the Doro cellphone products are perfectly suited to this niche but important and growing market,” said Visagie.

He added that the Doro handsets will be available in selected cellphone retail outlets before the end of the year.

RSAWeb reduce business ADSL line prices

By admin, 20 października, 2011, No Comment

Following their recent ADSL line rental price-cuts which offered consumers as much as 30% savings on the standard Telkom prices, local ISP RSAWEB has slashed the prices of ADSL lines on their business-grade ADSL products as well. The ADSL line prices currently offered on both their consumer and business ADSL products are the cheapest in South Africa.

Managing Director of RSAWEB Rob Gilmour explains the reason for further price-cuts: “The overwhelmingly positive response we’ve received from customers to our recent ADSL line price-cuts is a clear indication that this is what the market wants, and where the next battleground for customers could be. Offering this deal to business users was the next logical step.”

Commenting on the positive response from the market thus far, Gilmour noted: “The majority of customers we’ve seen move across to us since we launched our cheaper line rentals are frustrated Telkom users who are looking for a better deal. There is also a large portion of the market that is unaware that you can have your ADSL line hosted with anyone other than Telkom.”

How the new prices stack up:

 

RSAWEB

Telkom*

Annual Savings

Savings %

384kb/s

R129

R152

R276

15%

1Mb/s

R211

R289

R1056

30%

10Mb/s

R322

R413

R1092

22%

* Telkom prices as of 17/10/2011 and include VAT.

“In addition to slashing the line rental costs, we’ve also adjusted our data prices to be more competitive, and added extra features,” adds Gilmour.

RSAWEB’s Business DSL products offer a true business-grade service, with lower contention ratios, higher redundancy, network prioritization for business uses and business features like static IPs and soft-capping.

“Consumers should also note that they are not stuck with their existing provider, and have the power of choice. Transferring your line to another ISP is a quick and easy process, and should not incur any penalties,” concludes Gilmour.

wielkoformatowe wydruki Lublin kolorowe kopiarki Warszawa wielkoformatowe skanowanie kolorowe skanowanie Lublin drukowanie projekty powykonawcze archiwizacja dokumentacji skanowanie do pliku wielki format wizytówki w godzinę wizytówki Lublin wizytówki od ręki kopiarki warszawa