A recent series of cloud briefings sought to address the technology, legal and change management aspects of cloud. They prompted some thought-provoking discussions around the longevity and value of cloud computing.
The IPv6 wave is moving, just not as expected
Now, it’s not often a single board member will order a CEO to do anything, but he couldn’t bite his …
Creating your first cloud policy
While cloud-based services can help you reduce time to market, increase availability and ease management, challenges include loss of control, …
9 Proven Ways to Generate Sales Leads
When it comes to the best way (or ways) to generate sales leads, or find new customers, “there is a lot of buzz surrounding social media,” says Mick Hollison, the CMO at InsideSales.com, a provider of cloud-based sales automation and predictive analytics for inside sales professionals. Social media “is exciting and highly utilized.
The top 10 BlackBerry apps for your Z10
We’ve hand-picked the most popular BlackBerry 10 apps of the month so that you can get the most from your Z10 handset.
UAE's top 10 Android apps of 2013
CNME’s picks on the top apps for your android smartphone device in the UAE. The following are a must have; the top UAE apps in 2013.
Calculating value-add
Is providing additional value to vendors and partners the only way to get ahead?
Top 5 mistakes you should avoid when embracing the cloud
This year, cloud computing is definitely poised to gain importance among enterprises. Chief information officers (CIOs) are now convinced that …
Gartner predicts limited IT outsourcing growth and increased volatility
The worldwide IT outsourcing market is poised to grow more slowly than previously expected, reaching $288 billion in 2013, a …
Time for Chromebooks in the enterprise?
A new report from Forrester Research says these “post-PC” devices could fill a niche, or more than one, in the enterprise.
Why help desk employees are a social engineer's favourite target
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal.
BYOD: Who's in control?
As more employees demand to use their personal devices for work, IT managers are struggling to both accommodate them and safeguard confidential company data.
Mobile users to embrace LBS and QR codes, says TNS study
Location-based services (LBS) and quick-response (QR) codes are set to become the next big mobile growth feature, according to the …
How to protect your PC from PRISM surveillance
Thursday afternoon, a bombshell dropped: Two leading reports claimed that the U.S. government has been spying on emails, searches, Skype calls, and …
To boldly go…
For Star Trek fans, it seems like a long time ago since the Starship Enterprise attempted to boldly go where …
Google woos developers as software becomes more important
Google did its best to court developers at this year’s I/O conference with a much-needed integrated developer environment, API for …
New Citadel malware variant targets Payza online payment platform
A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local …
SunGard brings cloud service to disaster recovery
Can the old guard in business continuity and disaster-recovery services thrive in an era when the companies are looking at …
The big issue
As CNME prepares to host the Middle East’s first event entirely focused on big data, it delves head first into …
Hackathon shows how public sector data can be used for community apps
Google in east London hosted a two day “hackathon” last month to help demonstrate how open public sector data can …