Google and Cisco are teaming up in the enterprise collaboration market, bundling WebEx with Chromebooks and integrating the Cisco Web conferencing and online meeting product with Google Apps.
Will Satya Nadella launch Office for iPad next week?
Satya Nadella will hold his first press conference as Microsoft’s CEO next week, and reports are emerging that he’ll unveil a version of the Office suite for Apple’s iPad.
Quest for growth
Jumbo Electronics is tapping new technologies as it forges the path to business innovation
IDC forecasts deeper declines in PC shipments for 2014
Shipments of new personal computers, most of them equipped with Microsoft Windows, will face greater declines in 2014 than earlier anticipated, IDC said Tuesday.
Android topples iPad in fast-growing tablet market
The iPad has been the king of tablets for a number of years but Android has taken top spot, according to new figures from Gartner.
BlackBerry CEO Chen: 'We are here to compete, regain lost ground'
BlackBerry will launch a new version of its enterprise management server software later this year that the company hopes will strengthen its business with major corporations and help turn around its flagging fortunes.
Nokia unveils affordable smartphones
At the 2014 Mobile World Congress, Nokia has released five new affordable handsets, including Nokia X, a family of smartphones …
Bogged down in Big Data
The infinite monkey theorem states that if enough monkeys were to type on typewriters for long enough, they would eventually produce the works of Shakespeare. To some, that may seem incomprehensible.
Cutting through the cloud hype
Cloud computing is no longer a new concept, and many organisations have been consuming cloud services for the past several years. The use of cloud computing is growing, and by 2016 will increase to become the bulk of new IT spending, according to Gartner.
Samsung to replace Android with Tizen on next Gear smartwatch
On Monday Samsung will unveil its second-generation Galaxy Gear smartwatch, this one running the open source Tizen operating system, not the Android software that runs the first-generation model, according to reports.
Intel's new Xeon server chip pushes Itanium closer to end
The writing is on the wall for Intel’s high-end Itanium chip, with the launch this week of the high-performance usurper, the chip maker’s 15-core Xeon E7 v2 chip.
Syrian Electronic Army breaches 1 million Forbes accounts
The Syrian Electronic Army has defaced the Forbes news website and publishing the names, email addresses and encrypted passwords of over a million of its users.
Ringing in changes
Can regional telecommunication providers go beyond vanilla services and offer more value to consumer and business markets alike?
IDC: Smartphone shipments hit 1 billion in 2013
The world’s love affair with the smartphone continued unabated in 2013 with consumers snapping up more than 1 billion handsets during the year, according to an IDC estimate published on Wednesday.
Ericsson announces Azuki Systems acquisition
Ericsson has announced the acquisition of Massachusetts-based Azuki Systems, a provider of TV Anywhere delivery platforms for service providers, content owners and broadcasters.
Changing Dynamics
When it implemented Microsoft Dynamics AX 12, Fair Point Furniture in Sharjah completely changed the way it was able to do business, providing itself with a strong platform on which to grow.
State secrets
What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?
Windows 8.1 Update 1 leaks online with new features aimed at PC users
A future update to Windows 8.1 has leaked online revealing new features.
Daunting challenges await Nadella as he takes over from Ballmer
Satya Nadella will face a host of problems upon assuming his mantle as Microsoft CEO
How to use Syrian Electronic Army attacks to improve security awareness
Recently, we have been called in to help companies handle attacks from the Syrian Electronic Army (SEA). Our first priority is to help contain the damage, figure out which accounts have been compromised that have not been used yet to cause damage, and clean things up.