Pure Storage has announced that it will showcase its vision for the future of infrastructure—a Data-Centric Architecture.
Cisco accelerates AI adoption with new offering
As artificial intelligence (AI) and machine learning (ML) open up new ways for enterprises to solve complex problems, Cisco has unveiled its first server for AI and ML workloads.
9 essential elements for a strong privileged account management strategy
In this age of IT revolution, organisatons are spending a huge amount on information security, as they need to secure the sensitive and strategic information that is valuable to their business.
The paradigm shift of voice
At this year’s GITEX we’re going to be showcasing the very latest enterprise communications ideas that will shape the customer …
Avaya to flaunt unified comms experience at GITEX
Avaya will demonstrate several platforms that unify UC and CC “to drive holistic and impactful customer and employee experiences” at …
Pure Storage acquires cloud-first storage firm
Pure Storage has announced the acquisition of privately-held, Sunnyvale, California-based software company StorReduce, a cloud-first software-defined storage solution for managing large scale unstructured data.
Middle East region leads $2.6 trillion smart cities market
The Middle East and North Africa, and especially the GCC, are spearheading the $2.6 billion global Smart Cities market, according to Schneider Electric.
Huawei secures No. 2 spot in global smartphone market
Huawei surpassed Apple to secure the No. 2 worldwide smartphone vendor position for the first time ever, according to Gartner.
Employees in EMEA have the “worst cybersecurity discipline”: study
Workers in Europe, Middle East and Africa (EMEA) have the worst cybersecurity discipline in the world and displaying signs of “security fatigue,” according to a new study.
Five tech trends that will blur the lines between human and machines
Gartner’s Hype Cycle for Emerging Technologies, 2018 revealed five distinct emerging technology trends that will blur the lines between humans and machines.
Why voice-activated AI is the UI of the future
Technology has brought everything to the fingertips of the users. Today, the most prominent form of artificial intelligence that touches …
Disaster Recovery 2.0: protecting businesses from catastrophic risks
Whether it is caused by cataclysmic weather, technological malfunctions or human actions, an IT outage can be devastating.
Global PC shipments see growth for the first time in six years
Worldwide PC shipments totaled 62.1 million units in the second quarter of 2018, a 1.4 percent increase from the second quarter of 2017, according to preliminary results by Gartner, Inc.
Raqmiyat becomes authorised GCC reseller for OutSystems
IT systems integrator Raqmiyat is now a regional strategic services partner and authorised reseller of OutSystems products and services for …
GITEX continues to be a venue of firsts
Bigger and better over the last four decades, GITEX Technology Week is scheduled to take place from 14th to 18th …
Mimecast expands cyber awareness capabilities with new acquisition
Mimecast has announced it has acquired Ataata, a cybersecurity training and awareness platform designed to reduce human error in the workplace and help enable organisaions to become more secure by changing the security culture of their employees.
Five security roles to plan for in the digital era
CISOs must evolve the talent strategy to reflect the changing roles, competencies and skill sets to address digital risk.
GITEX 2018: Robots are descending to Dubai
Robots will turn into one of the most sought after technologies to become a $500 billion industry by 2025 globally, …
5G plays a vital role in the autonomous future: study
With this new level of network capability, communications service providers (CSPs) can secure future market opportunities with manufacturers of autonomous vehicles (AVs) in the fields of driver safety and data processing and management.
SoftwareONE: Why does SAM stumble in the dark
SAM, as we define it, is the people, process, and technology necessary for the effective management, control, and protection of the software assets and investments throughout all stages of the software lifecycle.