scholarly journals A computer network for South African researchers

1988 ◽  
Vol 7 (4) ◽  
pp. 191-194
Author(s):  
T. McDonald

A computer network holds the key to several important benefits for researchers. The services provided by modern networks enable scientists to collaborate on research projects, both on a national and international level, and to gain access to a large variety of hardware and software, irrespective of its location. Two recent investigations showed that researchers have an urgent need for a network. It was recommended that a phased approach be used to establish a network as soon as possible.

2012 ◽  
Vol 10 (H16) ◽  
pp. 544-544
Author(s):  
M. Pović ◽  
P. Nkundabakura ◽  
J. Uwamahoro

Until 2009, astronomy was undeveloped in Rwanda, without astronomy courses at universities and schools, astronomical facilities, or any outreach programmes. With the international year of astronomy in 2009, Dr. Pheneas Nkundabakura and Dr. Jean Uwamahoro from the KIE Maths-Physics department, both graduates from the South African NASSP Programme (http://www.star.ac.za), started a program of implementing the astronomical knowledge at schools and universities. During the same year 2009, IAU donated 100 galileoscopes for the secondary schools, and several astronomy workshops were organised for the teachers. IAU donated also 5 laptops to help students and lecturers to learn and use astronomy software. With this, KIE students have now a possibility to choose astronomy/space science for their undergraduate final year research projects. Moreover, there is an ongoing effort to look for further collaboration towards establishing the first astronomical facility (observatory) in the country.


2011 ◽  
Vol 23 (2) ◽  
pp. 45 ◽  
Author(s):  
RA Stretch ◽  
RP Raffan

Objective. The aim of the study was to determine the incidence and nature of injury patterns of South African international cricket players. Methods. A questionnaire was completed for each cricketer who presented with an injury during the 2004 - 2005 (S1) and 2005 - 2006 (S2) cricket seasons to determine the anatomical site, month, diagnosis and mechanism of injury. Results. The results showed that 113 injuries were sustained, with a match exposure time of 1 906 hours for one-day internationals (ODIs) and 5 070 hours for test matches. The injury prevalence was 4% per match, while the incidence of injury was 90 injuries per 10 000 hours of matches. Injuries occurred mostly to the lower limbs, back and trunk, upper limbs and head and neck. The injuries occurred primarily during test matches (43%), practices (20%) and practices and matches (19%). Acute injuries comprised 87% of the injuries. The major injuries during S1 were haematomas (20 %), muscle strains (14%) and other trauma (20%), while during S2 the injuries were primarily muscle strains (16%), other trauma (32%), tendinopathy (10%) and acute sprains (12%). The primary mechanisms of injury occurred when bowling (67%), on impact by the ball (batting – 65%, fielding – 26%) and when sliding for the ball (19%). Conclusion. The study provided prospective injury incidence and prevalence data for South African cricketers playing at international level over a two-season period, high-lighting the increased injury prevalence for away matches and an increased match injury incidence for test and ODI matches possibly as a result of increased match exposure time.


2020 ◽  
Vol 6 (2) ◽  
pp. 190-211
Author(s):  
Fareed Moosa

Under the Tax Administration Act, 2011 (TAA), taxpayers enjoy a right to privacy of information disclosed to the South African Revenue Service (SARS). This note shows that tax officials are obliged to protect the secrecy thereof. It is argued that the Commissioner for the SARS correctly resisted compliance with a subpoena issued by the Public Protector for access to the records of former President Jacob Zuma. If it acquiesced without objection, shock waves would have reverberated through South Africa’s tax community. It is contended that the Commissioner’s decision to maintain taxpayer secrecy under pain of a potential criminal sanction contributed to restoring some of the lost confidence and respect for the SARS which has, in recent times, endured reputational damage owing to internal squabbles which morphed into public scandals. This note hypothesises that CSARS v Public Protector is good authority for the proposition that governmental departments and state institutions not expressly mentioned in s 70 of the TAA do not have statutory rights of access to taxpayer information and must, to gain access, follow due process. This note argues that the judgment in casu is not only a victory for taxpayer rights but also for the rule of law.


Author(s):  
Arun Vishwanath

The ubiquitous use of the Internet has made it possible for terrorist groups to remotely foment attacks with little risk of capture. Among the newest forms of attacks is cyber hacking, which has seen increased use by terrorist groups for acts ranging from pinpointing targets for assassination to holding organisations hostage and embarrassing governments. In almost all these attacks, spear phishing is the vector used to gain access to a computer network – making it imperative that policymakers find ways to stop it. This chapter provides an overview of the different types of spear phishing attacks and the reasons they succeed. The chapter then provides an overview of the different strategies being used to combat it and their relative effectiveness. Drawing from the latest social science research and from initiatives that have worked around the world, the chapter culminates with six policy suggestions, which could significantly reduce the effectiveness of spear phishing and protect nations from a major cyber attack.


1989 ◽  
Vol 33 (1) ◽  
pp. 105-115
Author(s):  
A. J. G. M. Sanders

At national as well as international level the South African Freedom Charter has become a symbol of the long-standing struggle against apartheid. In this essay the emphasis will be on the charter's provisions relating to ethnicity. The question of ethnicity is a crucial one, for on its solution depends the outcome of the economic and other social problems which trouble South African society.The 1955 Freedom Charter, which was the outcome of a joint venture of the African National Congress (A.N.C.), the South African Indian Congress, the South African Coloured People's Organisation and the predominantly European South African Congress of Democrats, suggests a unitary, participatory welfare state, which will acccord equal rights to all “national groups and races”.For the A.N.C., the senior partner in the “Congress Alliance”, the reference in the charter to “national groups and races” soon became a major headache. Could it be said that the charter lent support to the creation of “four nations”? A number of people within the A.N.C. feared that much. Prominent among them were the “Africanists” who in April 1959 broke away from the A.N.C, and formed the Pan-Africanist Congress (P.A.C.) “Charterists” and “Africanists” are still at loggerheads, but the A.N.C.'s “Revolutionary Programme” of 1969 and its “Constitutional Guidelines for a Democratic


1982 ◽  
Vol 1 (18) ◽  
pp. 139
Author(s):  
K.S. Russell

The paper presents a review of the historical movement of ships around the South African coastline, traces the evolution and development of the harbours of South Africa, describes the development of coastal engineering and summarises the organisations and their activities in both basic and applied research projects contributing towards coastal works.


2021 ◽  
Vol 1 (13) ◽  
pp. 29-38
Author(s):  
Serhii Krivenko ◽  
Natalya Rotaniova ◽  
Yulianna Lazarevska ◽  
Ulyana Karpenko

The problems of the cybersecurity are becoming a daily threat to the business sphere and the Internet users. The field of the cybersecurity is constantly changing, but it is obviously that the cyber threats are becoming more serious and occur more often. The statistics on the number of cyber attacks in 2020 showed a sharp surge in the cybercrime. In the field of the information security, the majority of incidents has been related to attacks on the various distributed information systems recently. At the same time, a significant amount number of the successful attacks are those that carried out using such attacks as "Man in the middle" (MITM). MITM - attacks are dangerous because with their help attackers gain access to the confidential information, not only the companies but also the ordinary users. Therefore, the purpose of this article is to study the types of MITM - attacks, as well as to develop the recommendations for combating such types of attacks. The study was conducted using methods of analysis and description. The object of the study is MITM attacks. The subject of the study is to determine ways to counter attacks such as MITM. As a result of the conducted research the basic types and the technique of carrying out MITM - attacks are considered. The result of the study was the development of the recommendations for the countering MITM attacks. The proposed methods of preventing "Man in the middle" attacks can ensure a certain high level of the computer network security. This study will be useful in ways suggested to prevent MITM attacks, not only for security administrators, but also for Wi-Fi users trying to protect their personal data. The results of the study can also be used to develop better software that can increase the security of any computer network


Sign in / Sign up

Export Citation Format

Share Document