Dgix Technologies is a company offering Information Technology services and products mainly to Kenyan and soon East African consumers. We mostly work with low-income businesses and individuals, giving them an opportunity to grow by providing them with affordable and seamless access to state-of-the-art software and hardware products. In order to achieve our core mandate, we are a team of Tech experts who love coding, innovating and creating things from scratch. Our mission is to connect businesses (especially small and medium enterprises) and individuals with the global market. We do this by availing affordable and reliable technology services and products.
***Dgix is now offering Mobile, P2P Connection Services and Voice Over IP Solutions ***
We are growing. In addition to our services (Office Networking, Software and Web Development, Computer Sales and Service, Printer Sales and Services, Security Systems Installations and Maintenance, Network Management and Monitoring) and our products (New and Refurbished Laptops and Computers, Printers, Scanners and Photocopiers, Storage disks and devices, Networking Equipment), Dgix is now offering mobile phone services (Sales, repair, unlocking, tracking e.t.c) at affordable prices. Due to the rising demand, our recent stock also includes Wireless access points and P2P connection Services. We are also offering consultancy and installation services for Premise Security and Surveillance Systems.
Our Partners
Current Projects
Digital Skills Training Program
In this project, we have partnered with Tasi Educational and Computer Training Center to sponsor youth who have a desire to learn the use of Computers… read more
Neti Mashinani
Internet access is a key factor in job creation and youth empowerment. With most youth in the Kenyan rural areas not able to pay the required internet… read more
As part of Project Beacon, Google has been sending free beacons to businesses aimed at improving mobile visibility and customer experience. This has been very random, to the best of my knowledge, so if you haven’t received one for your business please do not go on a riot or accuse Google of bias. If you received this package from Google, this article is not for you. You already know what a beacon is, and how Beacon Technology works to the favor of your business. If you weren’t lucky enough to receive one, I will use this platform to introduce you to ...
Stand in any street of Nairobi, whether in the CBD or in the residential estates, and you will certainly read idleness and desperation on the faces of the majority of people – most of them young people – who trooped into the city from their villages in search of unavailable jobs. And hey, as you stand there, hold fast your valuables (in fact, conceal them as much as you can) because the menace of youth unemployment has brought with it a surge of crime cases, lest you be relieved...
A few weeks ago (on 14th October 2021, to be precise), in yet another classic episode, the Government of Kenya was badly humiliated by the high court. The Huduma Namba was declared illegal for conflicting with the Data Protection Act. Kenyans, starting with me, were (and continue to be) very excited about this. We just can't wait for more of these entertaining shows. And telling from the the Attorney General's reaction after the ruling, we are...
Last month (October 2021) was the CyberSecurity Awareness Month. One thing that has remained in our minds as cyber-security enthusiasts is the memorable Do Your Part campaign christened with the hash-tag #BeCyberSmart. This campaign has been very timely, and it comes against the backdrop of skyrocketing cases of cyber-bullying, hacking and other cyberspace security breaches. Led by the American Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA), “Do Your Part...
Perhaps in place of Intelligent Intrusion Detection System I should be talking about Cyber-security AI, but that is a very broad topic that cannot fit in this short article. Therefore, as time and space has allowed me today, I will narrow down to the specific subject of intrusion detection systems, their evolution to intelligent intrusion detection Systems, and why every organization should deploy one on its network and IT infrastructure. In the simplest terms, an Intrusion Detection Systems or just IDS…
You purchased a brand new computer; hyper – threaded i5 or i7 with a clock speed of 2.9 GHz quad core, a whole 8 GB RAM and 500 GB hard disk. In the initial months your machine was incredibly fast (of course as you expected). Opening 20 tabs of Mozilla firefox browser simultaneously never interfered with the speed, and even the RAM and CPU hogging google chrome had no effect on the efficiency of your computer. You would play games at any time of the day, not worrying about the display on the task manager, and regardless of how many applications...
I am many things in this life; a scientist, a farmer, a teacher, and whenever am all alone in my house, a dancer. In fact, the other day I danced so well to myself that I started fantasizing winning a dancing contest. I also fancy myself an athlete. Anyway, a couple of months ago I entered a final year computer science class to find excited students waiting for me. I teach Artificial intelligence (AI) and few other subjects, but among the subjects I teach AI has always seemed to excite students most. Well, I took the curious students through the introduction of this...
2022 Kenya general elections are here with us. ‘Here with us’, not because they are in a few weeks or even months’ time, but because of the heated campaign activities that are becoming the order of the day all over the country, in a very fervent way. Now, during this period of political agitation, you watch the TV news and deep in a far-flung Kenyan market, the area rabble-rouser or the head of a local car wash is railing against a foreseen election rigging, and he is categorically warning the iebc and the government of the day against meddling with...
Between the years 2014 and 2016, I worked in the IT department of one of the key Kenyan government organizations. I then left the country to look for life. It was after few months (around March 2017) when I tapped into the Kenyan news one evening and found a very interesting headline circulating. My former employer’s systems had been allegedly hacked and millions, no, billions of taxpayer’s money siphoned by the hackers. This came just months after the management of the said organization was...
The clock is ticking on digital transformation. Over the past decade, driven by a wave of technological breakthroughs, companies across industries have come to realize their fate depends on digitization. Remaining competitive and sustaining growth are now, to a huge extent, about integrating technology into every aspect of the enterprise. COVID-19 only raised the stakes and accelerated the timelines. When the office, factory floor...
The need for digital transformation has never been clearer as companies of all sizes now face an immediate challenge of employees working remotely. Covid 19 has changed the way we work; we have no other options but to move from offline to online. It can be hard to find great IT products that allow you to have a smooth and seamless shift, and to safely store, share, and collaborate on files from anywhere. Furthermore, we commonly see many SMEs having a hard time deciding between SaaS (Software as a Service) and on-premise...
In my last post I talked at length about Advanced Persistent Threat (APT) attacks; what they are, how they work as they remain undetected in your network all the while mining your organization’s sensitive information, and several key indicators that your company may be experiencing an advanced persistent threat attack. Now that you are armed with that information, I feel obligated to share another part of this troubling kind of attacks, namely, how to prevent them. In other words, how do you keep your...
If there's one thing that keeps corporate cyber-security professionals awake at night, it's the thought of an attack employing a range of sophisticated techniques designed to steal the company's valuable information. As the name "advanced" suggests, an advanced persistent threat attack (APT) uses continuous, clandestine, and sophisticated hacking techniques to gain access to a system and remain inside for a prolonged period of time, with potentially...
In my last post, I talked at length about the pros and cons of introducing tech and tech gadgets to kids from a young age. Needless to mention, the benefits of technology to our children outweigh the drawbacks. However, these benefits are only realized when parenting is done accurately. Sometimes raising kids in this era of technology can be overwhelming and weary. Almost every parent struggles to keep up with technology while kids seem to know all the latest gadgets and apps on the market. Keeping track of all the new developments can seem like...
There’s no denying the fact that we live in a world that is dominated by technology. Every year, the use of new tech ideas makes the world a better place to be. We can learn more, experience new things, and stay connected with one another through technology. Parents often struggle with decisions which involve technology access. A recent Report shows that kids today are getting a lot of screen time. Children under the age of 8 use technology for an average of 2 hours and 19 minutes each day, which is a consistent figure over the past decade...
You have a website/blog and you are wondering how to have it pop up at the top of the page every time a word relating to it is searched on Google? I am here to give you few tips on how to achieve exactly that. Google states that their mission is to display the most accurate and relevant information when a user performs a search. Therefore, it will benefit you to learn what Google considers important for search engine ranking. The top priority is quality of content. Gone are the days when you could put up a one-page affiliate site with mostly ads...
Gambling, the art of uncertainty! It is a highly risky but popular game of an unknown outcome where men and women wager something valuable, mostly money, and hold their breath for an outcome that can either totally change their lives for better or break their hearts. Gambling is a very old sport but its charm still continues to allure people. From ancient times where cards were played to today when the medium has turned digital, gambling still remains the game of choice. Well, the technological advancements we are witnessing today have had a major impact on all industries....
From education to the legal/justice system, to entertainment, transport, commerce, name them all; the central theme has for quite some time been the evolution of technology and its evident impact on the fields. Healthcare industry has not been an exception. This theme will go on into the foreseeable and unforeseeable future, for it is unlikely that the world, having tasted the sweetness of technology, will look back. The yester-years’ medical practitioners who did everything manually have now had to hone their...
Ever wondered why people are increasingly entrusting the safety of their kids to dogs instead of their neighbors or fellow human beings? Well, the reason can be summed up in this short sentence: Humanity is diminishing in humans, and in a very alarming way. For how else do we explain the high cases of child abuse, rape and other beastly acts perpetrated against our innocent children? The law has so far let us down. In Kenya for instance, child molesters have had a safe haven for way too long. They know that the judicial system is ineffective...
The internet of things (IoT) is the network of physical devices, vehicles, buildings and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data. In 2013 the Global Standards Initiative on Internet of Things (IoT-GSI) defined the IoT as “the infrastructure of the information society.” The IoT allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting...