Connect with us

Featured

Kid’s stuff

Published

on

At a time of more focus than ever on the protection of children, the digital world becomes ever more dangerous. Two devices could help change that, writes ARTHUR GOLDSTUCK.

It is deeply ironic that, the more options parents have for keeping their children safe through the use of technology, the more vulnerable their children become.

It doesn’t help that many kids are more tech-savvy than their parents, but that is more of an excuse than a reason for parents to abdicate responsibility for their children’s digital lives.  The real issue is that the seemingly simple process of finding the right phone for a child – in terms of budget, style and capabilities – has become absurdly complex.

And then, once a phone is handed to the child, the parent is usually clueless about how to set it up, how to limit activities and types of access, and how to configure parental control functions.

The solution lies in stylish devices that are designed for children without detracting from their experience and even self-image.

Two gadgets launched in South Africa in the last two weeks address exactly these questions.

KidTech: Huawei P8 Lite adapted for children

unnamed

The first, from a new South African company called KidTech, sensibly uses an existing phone, but adapts it extensively for children’s use. The base phone is a Huawei P8 Lite, a stylish, mid-range handset that has already been successful in South Africa for the past two years.

A 2017 edition, released last year, brings the phone up to date for current apps, while the KidTech adaptation makes it relevant, safe and fun for children. It is provided on a Telkom Mobile contract, and comes with parental controls that sort out these deceptively complex tasks:

  • blocks harmful websites and apps;
  • protects children from cyber-bullying and sexually-inappropriate behaviour;
  • allows parents to control when and how the cellphone is used;
  • tracks kids’ whereabouts at any time;
  • sends alerts when the user leaves a designated area, like home or school.

unnamed-1

“The idea came from witnessing arguments about cellphones between kids who want cellphones and parents who are worried about their kids being exposed to all the negatives that cellphones can introduce,” says Antony Seeff, CEO of KidTech.

The company is a subsidiary of the cellphone account management company, Tariffic, and was started by its executive team.

“KidTech has selected a suite of apps which have been pre-installed and pre-configured to ensure that parents need not worry about their kids online,” says Seeff.  “One app helps parents identify if their kids are being the victims of cyberbullying by monitoring all WhatsApp and Facebook Messenger messages and alerting parents the moment certain bullying keywords are used.”

unnamed-1

Nic Botes, KidTech co-founder, says the software is pivotal in preventing bullying and sexually-inappropriate conversations. And it goes further than conversations.

“Photos taken on the phone are also backed up and shared with parents, so they can identify any worrying behaviour before its too late,” says Botes.

KidTech also drew on Tariffic’s 12-year track record and expertise in identifying ideal contracts for specific needs. Usually geared to companies trying to make their staff accounts more cost-effective, Tariffic’s system was used to identify the perfect cellphone contract for kids.

The R249-a-month top-up contract comes with 1GB of data and free WhatsApp use.  Parents can also top up the account with prepaid airtime or data, allowing tight control of bills.

unnamed

“The stories that we’re hearing about what young kids are getting up to on their cellphones are frightening”, says Toma Batev, a  KidTech co-founders. “There are many reports of kids under 10 sending nude photos of themselves, and becoming suicidal after being cyber-bullied online. Parents need to be able to protect their children from these dangers.

“Not giving children phones is not a realistic answer. Rather give them the right phones with the correct safeguards and protections.”

Aside from the customised phone, KidTech has has also created a website, http://www.ismychildbeingcyberbullied.co.za, to help with the wider cyber-bullying problem.

* Visit www.kidtech.co.za for more information

Connected MoveTime Family Watch MT30

TCL-MOVETIME-Family-Watch-MT30

Ensuring the safety of children is also the motivation behind a new smartwatch designed for younger kids. The MoveTime  Family Watch MT30 was created by TCL Communication, the company that also produces Alcatel and BlackBerry phones.

It is based on the Qualcomm Snapdragon Wear 2100 chip, developed to allow any manufacturer to make small wearable devices. It takes forward Qualcomm’s own vision for the Snapdragon Wear platform, geared to a “new generation of wearable devices designed just for kids”, as the chipmaker put it.

Qualcomm, which announced the platform last year, explained the motivation: “These 3G or 4G LTE connected kid smartwatches can empower a child with a sense of independence, while giving mom and dad some peace of mind with an always-connected device that provides an age appropriate user experience.”

Devices based on the platform were exhibited by Qualcomm at the Consumer Electronics Show in Las Vegas earlier in January, making it all the more surprising that the first gadgets based on the platform have already arrived in South Africa.

Says Ernst Wittmann, TCL’s regional manager for Southern and East Africa, “TCL’s Movetime Family Watch MT30 combines the robust technology of Snapdragon Wear 2100 with TCL’s design and manufacturing expertise to deliver a connected rich and fun experience for kids and peace of mind for parents, It offers seamless connectivity and reliable safety features to help parents monitor their children’s safety in a fun, feature filled watch.”

The watch has a colourful touchscreen, which makes it both enjoyable and easy for young children to use. Aside from playing built-in games, it allows them to add friends through Bluetooth, and to send them emoji icons and messages.

While instant text messaging is not possible on the device, it allows parents and children to exchange voice messages and to make calls. Eight pre-determined numbers can be set on the watch, and the child can make and receive voice calls, using just this device, to and from those numbers. Calls to and from strangers are, therefore, not possible.

The MT30 promises two days of battery life on a single charge, and it is IP67 rated for water resistance up to one metre deep. It is also dust-proof, making it a great playground companion.

GPS functionality allows for location features, which provide parents with instant indoor and outdoor positioning via an app on their own phones, as well as geofencing, meaning they are alerted when the child leaves designated areas. A prominent SOS button allows the child to call for help in an emergency simply by pressing the button – and parents can then also locate the child instantly.

Startlingly, the watch is also a productivity gadget: it provides to-do lists, with reminder functions, both to ensure kids do chores and homework, and remember events or appointments. It also helps teach kids time management.

The MoveTime Family Watch is available on contract at R149 per month, including a SIM card in the watch, or R2699 as a prepaid purchase.

  • Arthur Goldstuck is founder of World Wide Worx and editor-in-chief of Gadget.co.za. Follow him on Twitter on @art2gee and on YouTube

Featured

How to rob a bank in the 21st century

Published

on

In the early 1980s, South Africans were gripped by tales of the most infamous bank robbery gangs the country had ever known: The Stander Gang. The gang would boldly walk into banks, brandishing weapons, demand cash and simply disappear. These days, a criminal doesn’t even have to be in the same country as the bank he or she intends to rob. Cyber criminals are quite capable of emptying bank accounts without even stepping out of their own homes.

As we become more and more aware of cybersecurity and the breaches that can occur, we’ve become more vigilant. Criminals, however, are still going to follow the money and even though security may be beefed up in many organisations, hackers are going to go for the weakest links. This makes it quintessential for consumers and enterprises to stay one step ahead of the game.

“Not only do these cyber bank criminals get away with the cash, they also end up damaging an organisation’s reputation and the integrity of its infrastructure,” says Indi Siriniwasa, Vice President of Trend Micro, Sub-Saharan Africa. “And sometimes, these breaches mean they get away with more than just cash – they can make off with data and personal information as well.”

Because the cyber criminals operate outside bricks and mortar, going for the cash register or robbing the customers is not where their misdeeds end. Bank employees – from the tellers to the CEO – are all fair game.

But how do they do it? Taking money out of an account is not the only way to steal money. Cyber criminals can zero in on the bank’s infrastructure, or hack into payment systems and even payment documents. Part of a successful operation for them may also include hacking into telecommunications to gain access to one-time pins or mobile networks.

“It’s not just about hacking,” says Siriniwasa.. “It’s also about the hackers trying to get an ‘inside man’ in the bank who could help them or even using a person’s personal details to get a new SIM so that they can have access to OTPs. Of course, they also use the tried and tested method of phishing which continues to be exceptionally effective – despite the education in the market to thwart it.”

The amounts of malware and available attacks to gain access to bank funds is strikingly vast and varies from using web injection script, social engineering and even targeting internal networks as well as points of sale systems. If there is an internet connection and a system you can be assured that there is a cybercriminal trying to crack it. The impact on the bank itself is also massive, with reputations left in tatters and customers moving their business elsewhere.

“We see that cyber criminals use multi-faceted attacks,” says Siriniwasa. “This means that we need to come at security from multiple angles as well. Every single layer of an organisation’s online perimeter need to be secured. Threat isolation is exceptionally important and having security with intrusion protection is vital. Again, vigilance on the part of staff and customers also goes a long way to preventing attacks. These criminals might not carry guns like Andre Stander and his gang, but they are just as dangerous – in fact – probably more so.”

Continue Reading

Featured

Beaten by big data? AI is the answer

Published

on

by ZAKES SOCIKWA, cloud big data and analytics lead at Oracle

In 2019, it’sestimated we’ll generate more data than we did in the previous 5,000 years. Data is fast becoming the most valuable asset of any modern organisation, and while most have access to their internal data, they continue to experience challenges in deriving maximum value through being able to effectively monetise the information that they hold.

The foundation of any analytics or Business Intelligence (BI) reporting capability is an efficient data collection system that ensures events/transactions are properly recorded, captured, processed and stored. Some of this information on its own might not provide any valuable insights, but if it is analysed together with other sources might yield interesting patterns.

Big data opens up possibilities of enhancing internal sources with unstructured data and information from Internet of Things (IoT) devices. Furthermore, as we move to a digital age, more businesses are implementing customer experience solutions and there is a growing need for them to improve their service and personalise customer engagements.

The digital behaviour of customers, such as social media postings and the networks or platforms they engage with, further provides valuable information for data collection. Information gathering methods are being expanded to accommodate all types and formats of data, including images, videos, and more.

In the past, BI and Data Mining were left to highly technical and analytical individuals, but the introduction of data visualisation tools is democratising the analytics world. However, business users and report consumers often do not have a clear understanding of what they need or what is possible.

AI now embedded into day to day applications

To this end, artificial intelligence (AI) is finishing what business intelligence started. By gathering, contextualising, understanding, and acting on huge quantities of data, AI has given rise to a new breed of applications – one that’s continuously improving and adapting to the conditions around it. The more data that is available for the analysis, the better is the quality of the outcomes or predictions.

In addition, AI changes the productivity equation for many jobs by automating activities and adapting current jobs to solve more complex and time-consuming problems, from recruiters being able to source better candidates faster to financial analysts eliminating manual error-prone reporting.

This type of automation will not replace all jobs but will invent new ones. This enables businesses to reduce the time to complete tasks and the costs of maintenance, and will lead to the creation of higher-value jobs and new engagement models. Oracle predicts that by 2025, the productivity gains delivered by AI, emerging technologies, and augmented experiences could double compared to today’s operations.

According to the IDC, worldwide revenues for big data and business analytics (BDA) solutions was expected to total $166 billion in 2018, and forecast to reach $260 billion in 2022, with a compound annual growth rate of 11.9% over the 2017-2022 forecast period. It adds that two of the fastest growing BDA technology categories will be Cognitive/AI Software Platforms (36.5% CAGR) and Non-relational Analytic Data Stores (30.3% CAGR)¹.

Informed decisions, now and in the future

As new layers of technology are introduced and more complex data sources are added to the ecosystem, the need for a tightly integrated technology stack becomes a challenge. It is advisable to choose your technology components very carefully and always have the end state in mind.

More development on emerging technologies such as blockchain, AI, IoT, virtual reality and others will probably be available on cloud first before coming on premise. For those organisations that are adopting public cloud, there are opportunities to consume the benefits of public cloud and drive down costs of doing business.

While the introduction of public cloud is posing a challenge on data sovereignty and other regulations, technology providers such as Oracle have developed a ‘Cloud at Customer’ model that provides the full benefits of public cloud – but located on premise, within an organisation’s own data centre.

The best organisations will innovate and optimise faster than the rest. Best decisions must be made around choice of technology, business processes, integration and architectures that are fit for business. In the information marketplace, speed and informed decision making will be key differentiators amongst competitors.

¹ IDC Press Release, Revenues for Big Data and Business Analytics Solutions Forecast to Reach $260 Billion in 2022, Led by the Banking and Manufacturing Industries, According to IDC, 15 August 2018

Continue Reading

Trending

Copyright © 2018 World Wide Worx