Global chemical company Solvay has announced that it chose Orange Business Services to manage and secure its fleet of 7,500 mobile devices and simplify mobility management.
Airlines invest in cybersecurity for connected world of travel
As the connected world of travel becomes a reality 91 percent of airlines plan to invest in cybersecurity programmes over the next three years, according to the SITA Airline IT Trends 2016 Survey.
Blueprint for IoT
Companies are excited by the opportunities around the Internet of Things (IoT), but CIOs are realising IoT is not a one size fits all solution. We give you five architectural components to better implement Internet of Things capabilities.
Wi-Fi second most important living essential for families
According to a recent research titled The Home Network, the Neglected Workhorse by IDC and Linksys, 84 percent of users cite performance as the most important attribute when purchasing a new router, far out distancing range, security and even price.
Multi-factor authentication goes mainstream
Good-bye username plus password, hello smartphone plus thumbprint
Review: HTC 10
Unveiled in April this year, HTC’s new flagship device, HTC 10 is a well-crafted, responsive and sturdy smartphone option for customers today.
Apple’s iPhone 6 faces potential sales ban in China
Apple’s iPhone 6 and iPhone 6 Plus face a potential sales ban in China due to a patent dispute with a local company.
ECity opens ninth store in the UAE
ECity, a part of the ALBATHA Group of Sharjah, has recently opened its ninth store in the UAE.
Review: HTC 10
Unveiled in April this year, HTC’s new flagship device, HTC 10 is a well-crafted, responsive and sturdy smartphone option for customers today.
IDC: MEA tablet market continues to decline
The Middle East and Africa (MEA) tablet market declined 12.3 percent year-on-year in the first quarter of 2016 to total 3.32 million units, according to the latest figures from International Data Corporation (IDC).
Ericsson ConsumerLab: Personal safety to drive wearables market
According to the latest Ericsson ConsumerLab report, titled “Wearable technology and the internet of things”, six in 10 smartphone users state that wearables have uses beyond health and wellness.
Review: Honor 5X
The Honor 5X is one of the latest mid-range smartphone released by ICT company Huawei, we took it for a spin and here’s what we think…
TP-LINK honours top performing partners
TP-LINK has honoured Dubai-based partners at the first Partner ConneXion Awards ceremony held in Dubai. The awards, held at Jumeirah Emirates Towers Dubai, saw more than 60 partners from the reseller and distributor awards attend with a total of 13 awards handed out.
Bittium releases new mobile VPN remote access solution
The new software version, according to the company, enhances the information security of mobile workers by supporting performance-improving encryption methods.
Set for success
Jerome Belan, CEO, PNY Technologies, elaborates on company plans for the region, having recently entered the local market through the acquisition of Imation, a data storage and security manufacturer.
Google I/O 2016: Google’s biggest announcements
Last week, search giant Google held its annual developer’s conference, Google I/O, during the event tech experts and enthusiasts got a sneak peek at everything the company has been working on over the past few months.
The power of mobile capture
As everything is becoming more mobile, so is document and data capture. Emma Isichei, Worldwide Category Director for Capture Solutions, Kodak Alaris, discusses the increasing need organisations have to capture on the move while maintaining the same workflow
Review: Honor 5X
The Honor 5X is one of the latest mid-range smartphone released by ICT company Huawei, we took it for a spin and here’s what we think…
Getting a grip on cloud security
Cloud use continues to grow rapidly in the enterprise and has unquestionably become a part of mainstream IT – so much so that many organisations now claim to have a “cloud-first” strategy.
The blind spot
Data at rest is data at risk, as the old saying goes. We take a look at different database strategies that can help organisations fight back against any cyber threats.