Search
Close this search box.

The Intelligent Cloud: AI-Powered Connectivity

Understanding the next wave of cloud computing

How much do you know about the intelligent cloud and the intelligent edge?

Microsoft CEO Satya Nadella discussed the company’s vision for the era of the intelligent cloud and the intelligent edge at the 2017 and 2018 Microsoft Build conferences in Seattle.

In both keynote speeches, he highlighted the fact that we’re living in a world powered by digital technology. And not just living in it, but participating in it, with the help of web-enabled devices that connect us in ways we often take for granted.

Nadella said the world is now, essentially, one huge computer. And he wasn’t wrong: Gartner’s research predicts that there’ll be 20 billion connected devices across the globe by 2020. Earth’s current population is around 7.4 billion. We’re definitely looking at a future with more machines than people. But what does that mean for human beings?

Opportunity, according to the Microsoft chief. The chance to take advantage of a diverse, digitally connected ecosystem. The chance to bring together industry players. The chance to create and deliver solutions that weren’t possible before. A window for change, and growth, and innovation. A time to leverage Artificial Intelligence, the Internet of Things, and Big Data to address the problems we face today, as well as the challenges we expect in the future.

Nadella calls himself an unrepentant tech optimist, and at both Build conferences he was confident about the continued evolution of cloud computing – especially as a vehicle for delivering products and services to customers. Microsoft aims to harness advancements in machine learning to give people the tools they need to accomplish more in less time. How? By capitalising on the processing power of the intelligent cloud, and the data-gathering power of devices at the intelligent edge.

What is the intelligent cloud?

Microsoft defines the intelligent cloud as “ubiquitous computing, enabled by the public cloud and artificial intelligence technology, for every type of intelligent application and system you can envision”.

If you take a closer look at the definition, you’ll see that Microsoft is talking about the everyday, everywhere kind of computing that we tend to dismiss. But don’t forget that computers themselves are no longer the big, clunky machines of yesteryear. Today, computers can fit inside the smartwatch on your wrist and the mobile phone in your pocket. Technological development, combined with industrial-scale production, has seen an explosion of small, powerful, and cost-effective computational devices that are web-enabled or directly connected to the cloud.

Nadella has also said that, simply put, the intelligent cloud refers to Microsoft’s ongoing drive to build AI into all of its applications and services, to ensure that customers’ data is always with them (and constantly available) no matter which device they use.

“Our homes, our cars, our workplaces, our factories and cities – every sector of our economy, whether it’s precision agriculture, precision medicine, autonomous cars or autonomous drones, personalised medicine or personalised banking – are all being transformed by digital technology,” Nadella wrote on LinkedIn after the 2018 Build event. “As computing becomes woven in to the fabric of our lives, the opportunities are endless.”

What is the intelligent edge?

“The intelligent edge is a continually expanding set of connected systems and devices that gather and analyse data – close to users, the data, or both. Users get real-time insights and experiences, delivered by highly responsive and contextually aware apps,” according to Microsoft.

Plainly speaking, the “edge” in intelligent edge is a reference to the devices that are close to where they need to be (in order to function purposefully), but are still connected to the cloud. Consider, for example, an agricultural research drone… It’s a physical device designed to operate in a specific location, but its accumulated data can be transferred via the cloud to farmers on the ground, to facilitate immediate decision-making. The drone’s on-board sensors can gauge environmental factors like wind speed, so the device has “intelligence” to enable it to “understand” and adapt to its surroundings.

“When we take the power of the cloud down to the device – the edge – we provide the ability to respond, reason, and act in real time,” explained Kevin Scott (Executive Vice President and Chief Technology Officer, Microsoft) in a recent blog post. “With the power of AI enabling these devices to intelligently respond to the world they are sensing, we will see new breakthroughs in critical areas that benefit humanity, like healthcare, conservation, sustainability, accessibility, and disaster recovery.”

Microsoft believes the intelligent cloud will inspire intuitive new apps and services that give organisations and businesses the insights they need to achieve greater productivity and efficiency. As cloud specialists ourselves, we’re keen to see what the next wave brings.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

BUI Shines At Microsoft SA Partner Awards, Scoops Cloud Accolade Again

Microsoft SA Partner Awards 2018

Managing Director Ryan Roseveare hails team effort as BUI scoops coveted trophy.

BUI has won the Microsoft Cloud Platform Partner of the Year accolade at Microsoft South Africa’s 2018 Partner Awards.

Well done, team!

The gala presentation was held on October 9, 2018, in Johannesburg.

BUI was also named as a finalist in the Hybrid Cloud Partner of the Year and Modern Workplace Partner of the Year categories.

The awards ceremony is held annually to acknowledge Microsoft partners that have excelled in delivering Microsoft solutions. Judging takes place across numerous competencies, and is based on criteria including innovation, customer acquisition, social responsibility commitments, and more.

Managing Director Ryan Roseveare was thrilled to receive the Microsoft Cloud Platform Partner of the Year trophy.

“This is a repeat win for BUI. It’s also the award everyone wants to win,” he said. This victory marks BUI’s fourth consecutive achievement in this cloud-centric category.

Roseveare congratulated the whole BUI team. “We grew our already large Azure base by 300% and performed several world-first Azure services migrations,” he said.

Cloud adoption continues to gain traction in South Africa, and the imminent launch of Microsoft’s hyperscale cloud data centres in Cape Town and Johannesburg is also driving interest in the technology.

BUI is proud to be recognised for its premier abilities in cloud.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

Five basic cyber security rules you need to start following today

Practical advice to help you be more secure online

Consider your machines, be aware of your own behaviour, and connect with care.

How are you protecting your sensitive data and personal information? Your cybersecurity could be at risk if you’re not implementing these fundamental precautions in your daily digital life…

Rule #1 | Maintain your security software

Obvious, right? We know. But life is hectic. It’s easy to forget a software renewal or security update when you’re busy at work or caught up in the daily realities of family life.

Having up-to-date security software, a modern operating system, and the latest version of your favourite web browser will strengthen your overall defence against cyber threats like viruses and malware.

Rule #2 | Safeguard all your web-enabled devices

How often do you connect to the Internet? And how do you do it? Tablet? Mobile phone? Smartwatch? Gaming console?

The computer on your desk is not the only machine that needs protection from online dangers. Think about the smaller devices on your wrist, in your hand, or in your pocket. They need to be shielded from cybercriminals, too.

Rule #3 | Pause before you plug and play

External hard drives, flash drives, and other plug-and-play peripherals are susceptible to the same malicious infections that could jeopardise your computer.

Stop and think before you connect a new device to your machine. Do you know what’s on that USB stick? Do you trust the person who gave it to you? Even if you do, run a security scan anyway.

Rule #4 | Crank up your login credentials

Usernames and passwords aren’t enough to protect important assets like your email and online banking accounts. Opt for the strongest authentication tools available to you: iris scans, fingerprint scans, and one-time codes will add extra layers of security to your logins.

In the absence of multi-factor authentication, make sure you create powerful passwords unique to each account. Include a mix of alphanumeric and special characters, and use uppercase and lowercase letters. Do not rely on easy-to-guess passwords like 12345678 and QWERTY. Ever.

Rule #5 | Look for proof of protection

When you’re banking or shopping online, check that the website is secure. Look for the https:// in the URL so that you know your connection to the website is encrypted.

Some web browsers provide visual cues about website safety… For example, a padlock icon in the URL field to indicate a secure website. Verify that protective measures are in place before you enter sensitive personal or financial information.

No technology is impervious to cybercriminals, but you can improve your personal cybersecurity by being more responsible online, today and every day.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

Introducing Legalty, Our Cloud-Powered Solution For Law Firms

Legalty by BUI

Security and mobility for small and medium-sized legal practices

  • Briefs. Memos. Notes.
  • Contracts. Deeds. Permits.
  • Statements. Agreements. Settlements.
  • Court papers. Case files. Transcripts.
  • Financial documents. Forensic reports.
  • Personal information. Client particulars.

Law firms handle large volumes of data

And they’re duty-bound to ensure the privacy and security of such sensitive material.

But it’s not always easy in digital environments with multiple end-users and multiple points of access.

That’s why we’ve created Legalty.

Legalty gives lawyers, attorneys, partners, paralegals, and their support staff the tools they need to work securely – and efficiently – everywhere, every day.

How?

By combining the law firm’s existing legal software and Microsoft 365 in a managed, cloud-based environment that supports data encryption and device control. With built-in security. With built-in redundancy protocols. With comprehensive technical support. With a transparent pricing plan. Without bulky hardware. And without costly local servers.

Unified, simplified, secured

Legalty can be deployed for legal practitioners using LegalSuite, Lexis Convey, and most other third-party legal software applications.

Our all-in-one solution helps law firms to:

  • deliver enterprise-grade, always-on security for their IT environments
  • provide secure access for their team members to work remotely
  • ensure data protection and data privacy across devices
  • safeguard their digital resources against malware.

Legalty includes Office 365, with perennially popular Microsoft applications (like Excel, Word, and PowerPoint) that are up to date and accessible anywhere, at any time, using a computer, tablet, smartphone, or other device connected to the Internet.

Legalty comes with top-notch communication tools that enable group email, team chat, and collaborative online meetings, as well as calendaring and scheduling facilities to simplify diary planning and management.

Legalty also features Advanced Threat Protection, a comprehensive security solution designed to protect organisations from increasingly sophisticated phishing and ransomware attacks.

Want to know how Legalty can help your law firm to achieve more? Explore the Legalty website.

Keen to see Legalty in action? Request a demo with our team.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

BUI Joins Cloudflare’s Partner Programme

A STRATEGIC ALLIANCE

We’ve teamed up with a global innovator to boost our range of security solutions

Ever heard of Cloudflare? It’s a web performance and security company on a mission to speed up and protect websites, ecommerce stores, SaaS products, mobile applications, APIs, and other properties connected to the Internet.

It’s also our newest ally.

Security and speed are critical for successful business operations in today’s digital economy, and our managing director, Ryan Roseveare, believes Cloudflare’s commitments in both areas mirror BUI’s own. “We investigated several vendors, as well as traditional technology providers, in this space. We chose to team up with Cloudflare because it’s a market leader with a cost-effective solution that complements our deep cloud security model.”

Cloudflare’s security services are designed to mitigate DDoS attacks, prevent data breaches, and block malicious web traffic. “We’re going to be able to offer our clients reliable and redundant solutions with security in mind for their cloud, hybrid, and on-premises requirements,” says Roseveare.

Cloudflare serves data from more than 150 international data centres, including three on South African soil. The company opened its Johannesburg data centre in 2014 and facilities in Cape Town and Durban followed in May 2017 and March 2018, respectively.

Roseveare is confident that Cloudflare’s SA footprint will translate into tangible performance benefits for BUI’s local clients. “We’ve completed several proof of concept demos and deployments already,” he says.

Cloudflare’s technology is easy to integrate and simple to scale. Watch the video below to learn about its real-world applications…

“We’re excited to collaborate with Cloudflare to provide our own clients with services that further secure their environments,” concludes Roseveare. “We’re looking forward to designing and deploying tailored Cloudflare solutions for our clients.”

As an Enterprise Partner, BUI is an authorised reseller of Cloudflare’s cutting-edge suite of services.

MORE ABOUT CLOUDFLARE

Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code.

Internet properties powered by Cloudflare have all traffic routed through its intelligent global network, which gets smarter with each new site added.

Cloudflare has been recognised by the World Economic Forum as a Technology Pioneer, and named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal.

Visit the Cloudflare website for more information, or follow Cloudflare on FacebookLinkedIn, or Twitter for news and updates.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

CASE STUDY: A Productivity-Enhancing Cloud Journey

AMPLIFYING WITH AZURE

Moving a fully functioning business to the cloud with minimal disruption takes expertise, preparation, and an innovative approach to problem-solving.

In the September 2018 edition of the BUI Bulletin, we briefly discussed our latest Azure migration project. Here, we highlight key stages in that journey to help you understand how we solved a complicated business problem with cloud technology.

The business problem

Our customer, a financial services company, was hosting its entire online environment with front-facing websites at a large local hosting provider in South Africa.

BUI was brought in to help the business migrate all its services to Azure. The move had to be done seamlessly, with zero downtime. It also had to happen in the background, without affecting normal operations.

The solution

Solving the customer’s problem involved end-to-end service delivery from BUI.

We harnessed the strength and expertise of our networking team and our Azure cloud architects to successfully migrate the customer’s digital environment into Azure – with zero downtime.

In technical terms, we moved the customer’s entire online environment by using Network Address Translation (NAT) to re-map the IPs across ExpressRoute. We secured the solution in Azure behind next-generation firewall virtual appliances and took care of the high availability concerns with Azure Load Balancers. The security happens when the previous provider NATs it over ExpressRoute into Azure, where it hits the Load Balancers. Now, we are passing through the traffic and keeping the source address throughout the whole transaction until it lands in the back-end database behind the firewall and two Load Balancers. The entire process runs without any downtime for our customer, or any of its own clients.

Azure services are now being used instead of Virtual Machines, all Load Balanced and Highly Available.

The following technologies were among those used or implemented to achieve a successful migration and an improved overall security infrastructure:

  • Azure Network Watcher
  • Azure Backup for instances
  • Azure Backup for SQL Server
  • Azure Batch (to run the customer’s batch jobs and queuing jobs efficiently in Azure)

The benefits

Our customer has been running services in Azure for more than 30 days, and already there is a substantial cost saving.

Improved performance has also been noted: batch processes that took 15 minutes to complete with the previous provider now take under 60 seconds.

Enhanced security has been a particular game-changer for our customer… There were audible gasps when the results were first viewed via Azure Security Center and Azure Network Watcher. “All of a sudden, we can see all the malicious attacks that are hitting our web front ends! A real eye-opener,” said a key staff member.

The future

The next step is to replicate the same environment to another region in Azure as a Disaster Recovery Site.

This customer’s appetite for Azure services has grown enormously – because the business benefits are clear.

Looking for ways to make your business more efficient and more agile?

Book your assessment with BUI’s Azure experts.

We’ll make cloud migration simpler and more manageable for you.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

Responding to a cyberattack? Bring your ‘A’ game

The actions that you take during a cyberattack can affect the speed and strength of your recovery afterwards.

Do you have a comprehensive incident response strategy?

Safeguarding business systems and software applications against cyberattacks and data breaches is essential in today’s connected world. We’ve already discussed why digital identity management and network security should be core components of your overall cybersecurity framework. We’ve also looked at the most common types of malware used by hackers, and seen that the threat landscape demands robust cyber protection throughout every organisation.

But what happens when cybercriminals actively bombard your defences? Or worse, when they find a way to override your security protocols and penetrate your systems? Sometimes, even the best precautions aren’t good enough to impede the rogue actors lurking in the darkest corners of the web. That’s why a detailed incident response plan is imperative. Here are five things to consider when you’re formulating your strategy…

It pays to be proactive

Cyber attackers are targeting corporate digital assets – repeatedly, and with diverse tactics. No industry is immune. No business is immune. And the fallout is not purely financial: recent intelligence reports have highlighted the risk to brands, reputations, and relationships.

If you accept that a security incident is probable, if not inevitable, then you can make advance preparations to limit the damage to your business.

You need the right team for the job

Your IT personnel will have critical roles to play in the midst of a cyberattack, but they won’t be the only staff members with key responsibilities. It’s important to assemble a multifaceted incident response team that includes:

  • technical professionals to analyse the problem, assess the impact on the business, implement remedial solutions, and monitor system integrity in the immediate aftermath of the attack;
  • public relations officials and spokespersons to handle internal and external communication and messaging related to the incident; and
  • lawyers to provide clarity on the legal implications of any action (or inaction) related to the incident.

The size and structure of your team should be determined by the scale and complexity of your organisation. National enterprises might need interdepartmental hierarchies of responders to co-ordinate efforts in different provinces; mid-market businesses in single locations might need only a handful of specialists to address the issues at hand. Define individual roles and responsibilities so that they’re clear to all team members.

The paperwork is necessary

Every second counts in a crisis scenario, so make sure that your documented incident response plan is easily accessible. Core team members should have hard copies (printed versions) stored securely in their respective offices. The digital master document should ideally be stored offline on a standalone machine: if the cyberattack in question is a network breach or disruption, there’s a chance you won’t be able to retrieve the digital file from a network location.

Communication counts

Your response team should be ready to communicate with a wide range of stakeholders, including employees, partners, suppliers, customers, board members, investors, shareholders, competitors, and the media. Interested parties will want to know how you’re responding to the cyberattack – and they’ll expect regular, in-depth updates that address their respective concerns.

Remember to consult your legal advisors regarding any communication obligations you may have as a result of local or international law. South Africa’s POPI Act and the European Union’s GDPR, for example, are pieces of legislation that deal with data privacy.

There will be lessons to learn

In triage mode, your team will be focused on problem-solving and damage control in line with the incident response plan – but a successful cyberattack should warrant a full investigation of your protocols and procedures. Plan for a review of your cybersecurity initiatives, or call in specialist consultants to put your playbook under a microscope.

Have you secured your digital assets? Ask us about cyber security consulting, penetration testing, and vulnerability scanning. We’ll help you strengthen your defences.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

Are You Prepared For A Network Breach?

Sly cybercriminals are refining their attack methods for maximum impact and minimum traceability.

Who is monitoring your network for suspicious activity?

If you read our recent post on cybersecurity, then you’ll know that malware is a growing menace in the virtual world. It’s also a popular tool for hackers looking to penetrate sensitive business networks. Early detection is critical if you hope to minimise the damage, disruption, and potential financial losses caused by a serious network breach.

Here are five ways to prepare your business for the challenges related to network security…

#1 | Get to grips with the modern threat landscape

Cyberspace is more like a battlefield than a business park – and you need to be familiar with the terrain. You also need to understand your enemies. What would they want? Where would they strike? How would they operate?

They could be financial hackers using fake accounts to target your money. They could be corporate spies intent on stealing your product plans. They could be rogue activists looking to publish your private data. Identify the prevailing risks so that you can plan accordingly.

#2 | Hire professionals with the right expertise

Cybersecurity experts have a deep understanding of historic, current, and evolving cyber threats. Highly skilled, and armed with both technical knowledge and social awareness, they are the guardians you need on the front line.

The integrated, interdependent IT systems found in mid-market and enterprise-level businesses are particularly complex in nature. Enlist specialists who can create customised solutions for your company’s unique network vulnerability issues.

#3 | Leverage the technology at your disposal

Security fundamentals like digital identity management and access control will help you to track the people authorised to utilise your network, but illicit users can be difficult to detect without the right resources.

Threat detection tools enable your cybersecurity pros to monitor network activity in real time. Consider investing in a comprehensive program that can provide detailed data, event logs, and incident reports for every action – and every anomaly – related to your network.

#4 | Follow recommended best practices and stay informed

Make sure that your technical staff are carrying out updates, implementing patches and fixes, and performing the maintenance required to ensure the integrity of your network, systems and applications.

Subscribe to industry newsletters, study threat intelligence reports from leading stakeholders, read cybersecurity blogs, and keep an eye on local and international headlines. The broader your knowledge, the greater your advantage over the perpetrators of cybercrime.

#5 | Educate and involve your non-technical staff

It’s easy to think of cybersecurity as the exclusive responsibility of your technical experts, but business-wide vigilance is increasingly necessary to combat today’s cyber threats. Teach your personnel – from data-capturers and personal assistants to financial administrators and senior executives – to look for warning signs that could indicate a breach.

Encourage all your network users to report any activity that seems out of the ordinary. Have they been locked out of their accounts for no apparent reason? Have they experienced random system reboots? Seemingly insignificant events can sometimes be the very symptoms your IT teams need to diagnose a network security issue.

Online ecosystems are becoming more complex. Networks are expanding. And relentless cyber fiends are targeting even the most comprehensive ring fences. To protect your digital assets, you need to make network security a priority for your whole team.

When last did you evaluate your network security protocols? Ask us about embedding cybersecurity at the heart of your business. We’ll help you balance your organisation’s productivity with robust prevention and detection initiatives.

You Can’t Afford To Be Complacent About Cybersecurity

Cybercriminals are targeting everything from networks to inboxes as they fine-tune their instruments of disruption and destruction.

How strong are your defences?

In last week’s blog post, we looked at digital identity management and why it’s essential to control access to your important assets and sensitive data. Compromised or stolen user credentials (including login names and passwords) are sometimes the only things required for hackers to penetrate business systems. But the most efficient villains in cyberspace are arguably the ones expanding their toolsets, refining their methods, and adapting their strategies. To combat their efforts, you must do the same – and more.

How many times have you seen the words “hacked” and “breached” in news headlines this year? Two industry studies – Microsoft’s latest Security Intelligence Report and Cisco’s Annual Cybersecurity Report – recently documented the most prevalent threats in the digital domain. Malware was highlighted as a growing problem.

A menace in the virtual world

Malware is the term for any kind of malicious software that’s designed to disrupt, harm or gain unauthorised access to a computer system. From the intrusive to the blatantly hostile, malware can take the form of a computer virus or worm, a Trojan horse, or even a piece of ransomware. The program code is created for a specific, nefarious purpose.

Computer viruses and worms were some of the earliest forms of malware. Viruses delete, corrupt, or steal data, and are capable of spreading from one infected computer to another. Worms spread copies of themselves from machine to machine, without any human involvement, and leverage networks to replicate rapidly.

Trojan horse malware masquerades as something else, much like its wooden namesake from Greek mythology. Computers become infected when people download insidious programs or applications disguised as legitimate resources. Trojan horses can be exploited to give hackers remote access to impaired computers, or to record sensitive data through keystroke logging.

Ransomware is an apt name for the type of malware that effectively limits or blocks access to files, folders, or systems until a ransom is paid. In some of the most prominent cases last year, cybercriminals encrypted, stole, or threatened to publish sensitive data belonging to banks, law enforcement agencies and corporate institutions unless they received hefty sums of money.

Malware is a formidable weapon in an attacker’s arsenal, but it’s certainly not the only one. Have you done enough to protect your network from sophisticated security threats?

Effective security is a team sport

You’ve heard that proverb about chains and weak links, right? We’d argue that the same applies for networks and people… The security of your network depends, in part, on the people connected to it. And if those people are ignorant about best practice, or complacent about passwords, or nonchalant about the perils of cyberspace, then your system could be vulnerable.

In modern enterprises, networks are often the foundations of all digital architecture. From enabling communication to supporting software and applications, networks are critical pathways for productivity. And that means they need to be protected – from internal and external threats. Creating a culture of awareness within your organisation is an important step. Get your employees involved by educating them about the latest cyber threats (especially those associated with the tools they use every day, like email) and the importance of people-centric enhanced security measures (like multi-factor authentication for account logins).

If your people are informed and aware, then they’ll be better equipped to identify and report any unusual or suspicious network activity. Early detection is critical in any threat scenario, and your IT staff would likely welcome business-wide vigilance.

Is your business challenged around cyber security and identity management? BUI’s experts have in-depth knowledge and experience across several next-generation solutions that are redefining the way the world looks at information security. Ask us about cyber security consulting, penetration testing, and vulnerability scanning. We’ll help you strengthen your security posture.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

‘Be Yourself – And Never Stop Learning’

BEHIND THE SCENES AT BUI

Business Development Manager Lizette van Wyk tells us why she’s still excited about technology after two decades in the industry.

Lizette van Wyk is a senior member of the BUI team in Johannesburg. She’s an experienced developer, solutions architect, project manager and sales consultant who joined us in 2015. We asked her about her role models, her biggest lessons, and her career journey.

Lizette, do you remember your first computer?

Yes! It was a Pentium I. My parents got it for me in my third year of university. I remember programming in Pascal and running MATLAB for my Honours project.

You studied Computer Science at North-West University. What influenced that decision?

I’ve always loved a challenge! Riddles, problems… The idea of solving problems using technology was really intriguing to me.

If you returned to university today, what would you like to learn about?

I’d probably study Psychology. I’m interested in the human mind, but also in artificial intelligence. I think AI is going to have a dramatic impact on our social and intellectual status quo.

Tell us about your career path.

I started out as a junior developer at Vircom, developing websites in Notepad. It was a blast! And I met exceptional people there. I’m still friends with them. When Vircom was acquired by another company, I moved into management. Later on, I worked as a solutions architect and project manager at Oakwell. And after that, I joined Digital Matter as a mobile software solutions architect and product manager. I started my BUI journey as a program manager and moved into sales about two years ago.

What’s the most rewarding aspect of your job?

Working with the BUI team! They’re all very intelligent, very motivated people. And also, for me personally, just being able to find the right solution at the right price for our customers.

What’s your biggest challenge at work?

Knowing enough to make sense!

We get it. The tech industry is always changing. How do you keep up with the latest trends?

I’ve come to realise that it’s impossible to know everything. I try to attend online sessions specific to BUI’s focus areas. And for industry news, I rely on social media.

Who is your role model in business?

I’d have to say Elon Musk. I think he’s shown the world that anything is possible, and that the status quo doesn’t have to be the norm.

What lessons from your parents do you value the most?

My parents gave me my moral compass. They taught me the importance of honesty, loyalty, and patience.

How do you think your colleagues would describe you?

I hope they think I’m a team player, and that I’m optimistic and fun to be around.

You’re a key part of the BUI team and you have a lot of responsibility. How do you balance the demands of your career and your home life?

Honestly, I don’t always get it right. For me, it’s about prioritising and scheduling. And I try to make family time quality time.

You probably know that America’s Silicon Valley had a “boys’ club” reputation for a long time. What do you think of South Africa’s tech industry, in terms of gender equality?

I can only speak from personal experience, but I’ve been in IT for more than 20 years and I’ve seen substantial progress. We’ve had a lot of social and political change in South Africa… I have to believe that the country will address gender equality as well.

What advice would you give to young women considering careers in technology?

Don’t change who you are to try to fit in. Because in this industry, it’s more important to be assertive, honest, and knowledgeable. And remember that university is about more than just your studies… You gain life skills, you make friends, you learn, you teach, you experiment… Never stop learning – and never stop challenging yourself.

What tech project or initiative are you excited about right now?

There are so many! And they’re all so exciting! But I’m ecstatic that Microsoft is launching two data centres in South Africa this year. I think cloud technology is revolutionary. And I’m very keen to see where it leads in the future… Automation, AI, data analytics… There are so many possibilities.

How did you spend Women’s Day this year?

Relaxing with family and friends. No email. Absolutely no email!