Fit for purpose

SMART Surveillance 2023 Integrated Solutions


Dave Keating.

Although Africa is a continent that is prolific in producing leading edge innovations in the software engineering space, often including world firsts, in my opinion we far too often look to first world products to solve some of our own continent’s problems.

We seem to always look outward for global technology trends, identifying products, services and providers that play in the latest and greatest arenas. In my software career spanning nearly 40 years, I know of, or have been close to, a number of projects that selected so called ‘first world’ products and providers to bring ‘new’ functionality onto the African continent with less than optimal results.

Here is my take on a few things that can cause these technologies to fail in the broader African context.

Suited to the environment

In many instances, businesses assume that a new product or technology is appropriate in an African setting. They then bring the product or technology into Africa, only to find that their assumption has been incorrect, due to any number of issues that pose barriers to entry. Examples include legal implications in our jurisdiction as opposed to the product’s domicile jurisdiction, the maturity of the target market or even the actual need for, and uptake of, the product or service.

First world solutions inherently assume first world infrastructure. We are all currently experiencing the impact of load shedding in South Africa and the effect it has on our computing infrastructure and networks. Often imported solutions require an inordinate amount of compute resource as well as permanent and robust online connectivity at generous bandwidth speeds.

This is not realistic for large swathes of Africa and the consideration for offline functionality in our context often goes unnoticed. Obviously large infrastructure requirements dictate large costs which sometimes mean that the product will not be feasible from the outset.

Algorithmic bias can be a huge downfall in software systems, particularly AI systems (see https://en.wikipedia.org/wiki/Algorithmic_bias). Some of the biggest incidences of this problem in AI over the last few years have manifested in facial recognition systems, and more recently large language models such as Galactica from Meta.

Localisation can be an issue when importing technologies from other regions and, in the past, systems have been released into the market without any localisation having been implemented by the provider. This has caused the product to fail, and more importantly, the underlying enabler to be discredited, resulting in rejection of useful technologies by the community at large. This has been particularly prevalent in African markets with facial recognition systems controlling enrolment and security access to systems and environments.

The problems caused by lack of localisation have been even more pronounced in voice recognition systems. When voice became the next big thing in the late 1990s and early 2000s, automated IVRs and voice attendants for everything from airport parking access to voice activated lifts sprang up all over the place in South Africa, but when people could not get them to recognise South African spoken English (in the myriad of accents our population holds) the systems were quickly abandoned, disabled or overridden.

These problems, although no indictment on the underlying technologies, caused the use of voice, which is probably the single most useful human factor that enables technology in the most ubiquitous way, to fall out of favour for a long period of time. This is a huge disservice to under-served African populations who could have leveraged their voices to access all kinds of services, enabled via the microphones on their telephones. Considering that the continent is a long way from having every citizen own a smart device, this technology could have played an enormous role in uplifting and including people in the formal economy and government.

Local support

Lack of competent local support can be a contributing factor in preventing systems from gaining general acceptance and going on to be successful. International players often only establish a local sales and distribution presence in the relevant African market. They will not invest in staffing and training of local people to enable proper support and localisation of the technology, choosing instead, to do this from their home base or from an outsourced region such as the Asian sub-continent or Eastern Europe.

This causes breakdowns in communication and delays in providing the type of support that business users require. In the industry we often hear of users having to wait for a resolution from someone in a time zone somewhere on the other side of the world. This, in my opinion, is arrogant behaviour by multi-national corporations who simply want to reap financial rewards from the continent without doing anything to uplift local communities, and should not be condoned or supported.

Provider selection is often driven by a very conservative and risk-based approach for large corporates. When a limited number of players dominated things, an old saying in the industry used to be that you couldn’t get fired if you used the dominant one, regardless of whether the project failed or not. This approach sometimes means an international or multi-national provider will be the de facto incumbent.

This in turn dictates the product selection which may suffer from one or more of the problems already highlighted. It also means that local providers are overlooked, and potential revenue and jobs are lost to the economy.

Meeting real needs

So, from all of this, my takeaway is that many of these pitfalls can be avoided through proper assessment of business needs and how to fulfil them.

This should include a formal assessment using performance acceptance criteria (documented before the assessment) for the applicability, cost, capabilities and limitations of any new technologies or platforms. This needs to be done together with an assessment of the provider of the technology to assess if they are fit for purpose.

Our problems and challenges are uniquely ours and Africa has seriously good talent in the ICT space, which is far too often overlooked by potential local customers. These people and solutions are ideally positioned to provide and/or produce truly African solutions for African problems. Keeping money on the continent and growing local talent whilst creating jobs is an imperative for our survival and growth.

For more information, contact Refraime, [email protected], www.refraime.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Using advanced surveillance technology as a smart city enabler
Duxbury Networking Integrated Solutions Surveillance
Smart cities are increasingly becoming a focus area for African governments and companies. However, the transition to these environments does not come without challenges, especially when it comes to security and resource management.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Dynamic Dashboard enhances security and operational efficiency
Suprema neaMetrics Products & Solutions Integrated Solutions Residential Estate (Industry)
In today’s data-driven world, security systems are overwhelmed by an unprecedented volume of data, from video surveillance and access control logs to intrusion alerts and a variety of IoT sensor data.

Read more...