Review: Microsoft Lumia 640 XL

Microsoft has a lot of ground to cover in the competitive handheld segment, before it catches up with the likes of Apple, Google, and BlackBerry. With the Lumia 640 XL, Microsoft is targeting consumers in need of a capable, mid-range phablet.

Upgraded opportunity

Fady Sleiman, CIO, Waha Capital, does not see areas of weakness. Instead, he prefers to see opportunities. When he had the opportunity to streamline the technology infrastructure in the office, he and his team went all in.

cloud business, AlJammaz Distribution

GE to launch Predix cloud for industrial apps

General Electric has recently announced that it’s pitching a cloud service for the Internet of Things market, with the primary focus on heavy industries like aviation, healthcare, energy and transportation.

Review: Microsoft Lumia 640 XL

Microsoft has a lot of ground to cover in the competitive handheld segment, before it catches up with the likes of Apple, Google, and BlackBerry. With the Lumia 640 XL, Microsoft is targeting consumers in need of a capable, mid-range phablet.

EMC announces Q2 financial results

EMC recently reported its second-quarter 2015 financial results. EMC generated $1 billion in operating cash flow and $647 million in free cash flow in the second quarter, and ended the quarter with $14.8 billion in cash and investments.

Connecting the world

Tarek Saadi, Vice President and Head of Sales, Ericsson Region Middle East and East Africa, talks about the company’s Network Society vision and the trends shaping the regional telecom landscape.

Future ready

Mobility is without a doubt a huge piece of the IT ecosystem’s future. With this, the spotlight turns toward mobile access and the doors it opens for future users. Siva Shankar Maheswaran, End User & Consultant Business Manager, HID Global, discusses current and future trends in mobile access control.

Bad behaviour

Companies can spend untold funds on the latest security software, keep their firewalls and security infrastructure up-to-date, monitor networks, and employ the highest level of IT talent all in the name of security. However, it can all be rendered useless by one simple thing – employees choosing to ignore basic regulations.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines