Hewlett Packard Enterprise has announced that it has completed the spin-off and subsequent merger of its software business with Micro …
Omantel spearheads MECA digital transformation
Omantel has signed a Memorandum of Understanding with the Ministry of Environment and Climate Affairs (MECA) for Information and Communication Technology (ICT) solutions.
Asus launches new 25-inch monitor
ASUS Middle East has launched Designo MZ27AQ, a 27-inch monitor that heralds a new generation of frameless, ultraslim Designo MZ Series …
DEWA: Dubai to install smart Wi-fi light poles
Dubai will add low-energy light poles that provide Wi-Fi throughout the emirate next year, and is also evaluating technology to …
VPA-enabled wireless speakers market to reach $3.5B by 2021
End-user spending for the worldwide virtual personal assistant (VPA)-enabled wireless speaker market is forecast to reach $3.52 billion by 2021, up from $0.72 billion in 2016, according to Gartner.
Why blockchain makes sense for the Middle East
Arun Khehar, senior vice president of applications, Oracle ECEMEA, gives his take on why blockchain has the potential to revolutionise various industries and provide enhanced transparency to finance.
Recruitment tech firm Cazar deploys Azure
Cazar, developer of Sniperhire, an e-recruitment system in the GCC, has chosen Microsoft Azure to enhance its solution and future-proof its already-innovative software.
Attorney-General approves smart apps for Public Prosecution’s e-programme
The UAE Attorney-General Dr. Hamad Saif Al Shamsi has recently approved the launch of a number of smart applications as part of the Public Prosecutor’s e-programme.
Synnex completes purchase of Westcon Americas’ operations
Synnex Corporation has announced the completion of the acquisition of the Westcon-Comstor Americas businesses and minority investment in Westcon EMEA …
Poor cybersecurity hygiene, risky apps enable destructive attacks
Fortinet has announced the findings of its latest Global Threat Landscape Report, which revealed that poor cybersecurity hygiene and risky application usage enables destructive worm-like attacks to take advantage of hot exploits at record speed.