The potential business impact of cyber attacks and data loss, along with high-profile data breaches experienced by organisations like LexisNexis andEvernote, seems to have done little to convince small and mid-size businesses that they should be making cyber security a priority.
Cisco: Dubai can be Smart City leader
Cisco used its roundtable event to explore the potential for its Smart+Connected City Wi-Fi and sensor technology, saying Dubai has the power to be a world leader in the technology.
Cybercriminals clone pirate versions of top Android and iOS apps
Cybercriminals are using third-party app sites to peddle reverse-engineered or ‘pirate’ versions of almost all the most popular paid apps available on the Google Play and Apple App Stores, software firm Arxan has discovered.
Analysis: security weak spots
Reading the coverage of the recent breach of Adobe passwords, we learned that 1.9 million users used “123456” as their password. That’s right: out of 38 million cracked passwords, almost two million adults used ones more suited to five-year-olds.
Virtual desktop infrastructure offers risks and rewards
Virtual desktop infrastructure (VDI) is designed to deliver virtual desktops to client computers over a network from a centralised source. With traditional VDI, you create a master image (reference computer, or core) to use for all clients, then personalise images as needed.
Oracle’s Q2: What to expect
Oracle is gearing up to report its second-quarter earnings Wednesday and given the restrained expectations CFO Sandra Katz earlier set for key areas such as software revenue, Oracle’s results are sure to come under even more scrutiny than the tech bellwether already gets.
Google’s recent hires and buyouts point to a robot-filled future
For as much as Google is known for today, it’s easy to forget that it’s also the force behind a hefty number of research projects. Those projects have led to things like wearables and self-driving cars, but the latest news gives a clear idea of where it’s going next.
Seagate Central: One of the easiest network-attached storage devices to set up
If you shudder when hearing the words “network-attached storage” you can at least take solace knowing that you aren’t alone.
Judge rules NSA spy efforts may be unconstitutional
In a potential blow to government surveillance efforts, a federal judge in Washington D.C., today ruled that the National Security Agency’s practice of collecting phone metadata records on millions of Americans may be unconstitutional.
Avaya builds massive Wi-Fi net for 2014 Winter Olympics
Avaya engineers are putting the final touches on a network capable of handling up to 54Tbps of traffic when the Winter Olympics opens on 7th February in the Russian city of Sochi.
Avago agrees to buy LSI for $6.6 billion
Semiconductor company Avago Technologies has agreed to buy storage and networking company LSI for US$6.6 billion in an effort to expand its data centre offerings.
North Korea embarks on Internet purge of executed official
The North Korean state propaganda machine has edited and deleted hundreds of news articles that mention Jang Song Thaek, the former top government and party official who was executed Thursday.
Citrix predicts five technology trends in ME for 2014
These trends highlight potential technological development opportunities for businesses across the region.
Brocade predicts 5 top Middle East IT trends for 2014
Marcus Jewell, vice president, EMEA at Brocade looks into his crystal ball to outline the top technology trends that Middle East enterprises should watch out for in 2014:
NetApp highlights cloud bridging strategy
NetApp has outlined its strategy to deliver “seamless” cloud data management, bridging public and private clouds.
Xerox: 60% of employees don’t need office for productivity
Xerox has released results of surveys into mobility in and out of the workplace, which reveal that 38% of workers feel most productive when at home.
Cyber-crime will not stop for Christmas
Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.
R&M: Middle East Telcos Require Foresight and Meticulous Planning to Protect FTTH Network Investments
High demand for superfast broadband and internet services by households across the region necessitates large scale rollout of FTTH networks. Field cabling or Outside Plant (OSP) cabling is now the biggest challenge in these deployments and the long term success of telecom operators will be decided by how they plan and deploy these networks today.
U.S. hacker who sold documents to FBI jailed for 18 months
A Pennsylvania man who hacked into multiple corporate, university and government computer networks and tried to sell access to them, including supercomputers from a U.S. national security laboratory, has been sentenced to 18 months in prison.
Samsung to merge smartphone and camera divisions
Samsung has announced plans to merge its smartphone and camera divisions, according to Korean news station ETNews.