Paul Cormier, President of Products and Technologies, Red Hat, explains how cloud, middleware, storage and virtualisation technologies will drive the …

Paul Cormier, President of Products and Technologies, Red Hat, explains how cloud, middleware, storage and virtualisation technologies will drive the …
Mervyn Kelly, EMEA Marketing Director, Ciena, predicts network make-overs, 4G mobile, connected TV and more for the Middle East in …
Wieland Alge, Vice-President and General Manager EMEA, Barracuda Networks, explains how firewalls improve the cloud while the cloud improves them. …
Sufian Dweik, Regional Manager, MEMA, Brocade Communications, explains how fabric networks can provide a comprehensive solution to five critical enterprise …
Den Sullivan, Head of Architectures and Enterprise, Emerging Markets, Cisco, explains how service providers can accelerate Big Data evolution to …
Shi Yaohong, Middle East President, Huawei, previews the innovations that are set to usher in a new age of digital …
Information rights management (IRM) is the set of techniques and methods which protect the highly sensitive information of the organisation …
Hurricane Sandy is settling down after having wreaked havoc on the eastern seaboard of the US, with several dozen fatalities …
IT managers in corporate and mid-size businesses have to balance both network performance and network security concerns. While security requirements …
With the advent of numerous mobile devices into global business, Middle East is proactively adapting to mobility. It has geared …
Network-related professional services are poised to undergo a significant transformation driven by the complexity and demands of today’s business and …
Feroz Qureshi, OneWireless Market Development Leader, Honeywell Process Solutions, discusses the process of choosing the right Wireless environment.
The world of computing is always changing; corporate mainframe computers were replaced by desktops; desktops became laptops; phones became mobile …
In today’s digital world, the identity of users is defined by their digital credentials. The ability to demonstrate their identity, …