Wednesday, January 26, 2011
Our immature ICT industry
Wednesday, January 19, 2011
Good Corporate Governance
Corporate governance is the set of processes, customs, policies, laws, and institutions affecting the way a corporation (or company) is directed, administered or controlled. Corporate governance also includes the relationships among the many stakeholders involved and the goals for which the corporation is governed. The principal stakeholders are the shareholders, the board of directors, executives, employees, customers, creditors, suppliers, and the community at large.
Corporate governance is a multi-faceted subject.[1] An important theme of corporate governance is to ensure the accountability of certain individuals in an organization through mechanisms that try to reduce or eliminate the principal-agent problem. A related but separate thread of discussions focuses on the impact of a corporate governance system in economic efficiency, with a strong emphasis on shareholders' welfare. There are yet other aspects to the corporate governance subject, such as the stakeholder view and the corporate governance models around the world (see section 9 below).
There has been renewed interest in the corporate governance practices of modern corporations since 2001, particularly due to the high-profile collapses of a number of large U.S. firms such as Enron Corporation and MCI Inc. (formerly WorldCom). In 2002, the U.S. federal government passed the Sarbanes-Oxley Act, intending to restore public confidence in corporate governance.
Thursday, December 30, 2010
Reflecting on 2010
We acquired new customers in Tanzania and South Africa. The new customers are in the education and retail sectors. We serve customers in several countries in Africa. Apart from our largest customer, based in Nigeria, customers generally paid on time. The customer has a history of being a bad payer in spite of changing ownership several times in the past five years. Good corporate governance and business practise is always relevant. We lost a competitive bid and as a result a supplier due to unfair practises.
In this year we submitted several large tenders for amongst others Call Centre, IVR and Service Desk solutions.
Our technical team developed skills in Lotus Foundations, Lotus Connections and Tivoli Service Manger, to mention a few. Internally we migrated to Lotus Notes as messaging platform.
The VPN and VoIP telephony between our office in Tanzania and South Africa is improving productivity beyond expectation.
Appointing BE Agency as media consultants is paying dividends. Social media like Twitter and blogs are being used more and more. IBM’s co-funded marketing strategy is used to compliment our own initiatives with success.
In this year new people joined on the sales and marketing side. Leon in South Africa has already contributed significantly in acquiring new business. Sumitra recently joined ICMA in Dar es Salaam.
On a personal level I lost my son in law, Pieter, which reminded us all of the brevity of life. It is now 10 years ago that my son Andre drowned in the sea. At that time I was in Egypt on an IVR project. On the brighter side, my first grandson was born in May. It is a real delight. These events underline that we all have diverse dimensions comprising the whole.
The outlook for 2011 is positive. We have a good base to work from. It will not be easy as we live in an imperfect world, but let’s take the challenge and run to the best of our ability. May you all have a successful 2011 and remember that on Friday 11 November 2011 at 11h11 it will be a day of ones.
--
Johan Grobler
C.a.T.S. Pty Ltd (Computer Assisted Telephony Systems (Pty) Ltd), www.ivr.co.za
ICMA Ltd (Information Communication Mid Africa Limited), www.icma.co.tz
Monday, September 20, 2010
IBM to handle IT for Bharti Airtel's Africa Operations - Deal of the decade
Bharti Airtel has selected IBM to manage computing technology and services that power its mobile networks in 16 African countries in a 10-year planned agreement, the companies said on Friday.
An agreement would be finalised in the fourth quarter, the companies said in a statement.
Bharti was the first Indian mobile operator to outsource its network to save on costs, a strategy that helped it on its way to become the country's top mobile operator.
IBM already manages Bharti's IT infrastructure in India in a 10-year deal that began in 2004. The deal had an initial value of about $750-million, but is estimated to have grown manifold as it is linked to Bharti's subscriber and revenue growth.
"Bharti Airtel plans to replicate the success of its relationship with IBM by lowering the barrier to entry for the people of Africa to own a mobile device," the statement said.
Bharti said the partnership will help it scale its network and systems to more than 100 million African customers by 2012, from about 36 million currently.Read more:
Wednesday, August 18, 2010
Corporate IT Security: Theoretical and Practical Training, 25-27 August 2010, TGDLC, Dar es Salaam, Tanzania
ethinktanktz@yahoogroups.com | ||
vincent@africanedevelopment.org |
Apologies for cross-posting.
+++++++++++++++++++++++++++++++
Re: Corporate IT Security: Theoretical and Practical Training, 25-27 August 2010, TGDLC, Dar es Salaam, Tanzania.
African eDevelopment Resource Center (AeRC) in collaboration with Tanzania Global Development Learning Centre would like to invite delegate/s to a 3 day unique, authoritative, high-value, hands-on practical course which will provide participants with essential understanding of the tools, methodologies and vulnerabilities that fraudsters could employ to exploit IT systems on the 25-27 August 2010.
Most Organisations now realise that in order to defend themselves against the threat of attack by fraudsters and indeed any individual intent on causing disruption to their IT systems, IT staff must have an informed and current understanding of the present-day methodologies, tools, and vulnerabilities which allow these exploits to happen. For the banking sector, this course will be very useful in preventing revenue leakages through fraudulent activities.
COURSE OBJECTIVES
This course fulfils two vital objectives for anyone working in IT systems administration, IT security or IT support roles:
1. Build a strong awareness of the Information Security Management Framework
2. Offer a business-oriented, architectural perspective that defines how to organize and oversee a risk-based enterprise information security program, blending best management practices with key physical and information technology
By the end of this course, the participant will have learnt about:
· Security Management Practices
· Access Control Systems
· Telecommunications and Network Security
· Cryptography
· Security Architecture and Models
· Operations Security
· Application and System Development
· Business Continuity and Disaster Recovery Planning
· Law, Investigation and Ethics
· Physical Security
COURSE SPECIAL FEATURES
Targeted Tracks: You will benefit from the expertise of industry front-runners, learn from real-world case studies and leave with everything you need to know to safeguard your IT Environment
Tangible Take-Aways will be given to you including useful documents, guidelines and checklists that you can use as a springboard to your own initiatives.
Optimum networking opportunities are available through breaks, receptions, and luncheons. You will have the opportunity to talk shop with information security professionals and you will return to the office with new ideas and fresh contacts.
Obtain materials in 2 easy ways:
At the training you will receive bound volumes of the training materials
After the training: download the materials you want from the web with a special access code.
WHO SHOULD ATTEND
· Information Security Officers, Directors and Managers
· Internal Auditors, Finance Managers, Risk Managers
· Information Technology Auditors, Managers and Staff
· Network Security Managers and Administrators
· Security Managers
· Local Area Network Administrators
· Technical Support Staff
· System Administrators
· Others charged with various security responsibilities
The registration fee for this course is US$ 715 and includes the Course handbook and CD, administrative costs, Certificate issued on successful completion and meals and refreshments during the course.
Due to the practical nature of the course, we have limited spaces available and they will be offered on a first-come-first-served basis.
Attached, please find the course outline.
Kindest regards,
Vincent Wambua
African eDevelopment Resource Centre
Landline +254 20 3741646/57 : : Cell +254 725 541916
Email: vincent@africanedevelopment.org Website: www.africanedevelopment.org
Attachment(s) from Vincent Wambua
1 of 1 File(s)
Thursday, June 24, 2010
IBM Co-Funded Marketing in Dar es Salaam Tanzania
The event has already attracted some media coverage - ITweb. It is also on our company press office