Polycom has unveiled the industry’s first 360-degree, panoramic 1080p HD video collaboration solutions custom-built for Microsoft Lync.
![](http://www.tahawultech.com/wp-content/uploads/2013/07/2013-03-21-13.06.13-300x199.jpg)
Nationwide dominance
Tom Quirke, VP and General Manger of Motorola Solutions’ Global TETRA Organisation, tells CNME that the worldwide leader in TETRA technologies has set its sights on the Middle East.
Issues and opportunities
Given the record number of attendees at this year’s Reseller Middle East Partner Excellence Conference, it was clear that the region’s channel players wanted to hear how to tackle new challenges.
![](https://www.tahawultech.com/wp-content/uploads/2013/07/Jim-Hagemann-Snabe1-1-840x440.jpg)
SAP's Snabe to step down in 2014, McDermott to become sole CEO
SAP co-CEO Jim Hagemann Snabe will leave his post in May 2014 to become a member of the enterprise software vendor’s supervisory board, leaving Bill McDermott as sole CEO.
![](https://www.tahawultech.com/wp-content/uploads/2013/07/helpdesk-web-1-840x440.jpg)
Why help desk employees are a social engineer's favourite target
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal.
![](http://www.tahawultech.com/wp-content/uploads/2013/07/1_photo-300x188.jpg)
Possibility in the privacy pitfalls?
Last month, a former CIA technician leaked information on the National Security Agency’s data gathering surveillance programme dubbed PRISM. Joe Lipscombe investigates what relevance this holds for the Middle East.
![](https://www.tahawultech.com/wp-content/uploads/2013/07/microsoft-reorg-pictures-100045698-large_500-1-840x440.png)
Microsoft undergoes sweeping re-org for product focus
Microsoft chief executive Steve Ballmer has re-organised Microsoft, as expected, eliminating the ‘silos’ of product groups and giving responsibility to key executives in charge of key technologies.
Future-proofing your physical access control system
A number of factors are increasing demand for improved access control; new technology capabilities, escalating security threats, and the trend to converged access control solutions that combine multiple applications either on smartcards or a new generation of Near Field Communications (NFC) – enabled mobile phones.
![](http://www.tahawultech.com/wp-content/uploads/2013/07/network-security-300x225.jpg)
5 security-bolstering strategies that won't break the bank
Security experts offer five tips for enhancing security that don’t cost a lot of cash – and sometimes no money at all – so companies can spend their security dollars on the hard stuff.
![](https://www.tahawultech.com/wp-content/uploads/2013/07/460x-1-840x440.jpg)
Picky spyware ranks sensitive military documents
A noisy malware campaign against South Korea is revealing deeper secrets.
![](https://www.tahawultech.com/wp-content/uploads/2013/07/shutterstock_129223205-1-840x440.jpg)
South Korea hit by disk wiping attack blamed on 'DarkSeoul' gang
South Korea has come under attack from a vicious new disk-wiping Trojan that is almost certainly part of a long-term campaign against organisations in the country, Symantec has said.
![](https://www.tahawultech.com/wp-content/uploads/2013/07/man-watching-tablet-in-bed1-460x306-1-840x440.jpg)
Tablets in bed are damaging sleep and killing productivity
Right before bedtime, bright lights are the enemy, inhibiting the production of melatonin, which helps you fall (and stay) asleep.
![](https://www.tahawultech.com/wp-content/uploads/2013/06/Gagan_EDIT.black-and-white-1-840x440.jpg)
Creating memories
Software AG-acquired Terracotta is making big moves in Big Data; its in-memory tools have seen 2.5 million deployments. Chief evangelist Gagan Mehar talks to CNME about the hype surrounding Big Data and the company’s love/hate relationship with SAP’s in-memory technology, HANA.
![](http://www.tahawultech.com/wp-content/uploads/2013/06/instagram-562x350-300x186.jpg)
5 products Facebook should announce instead of Instagram video
Facebook’s coffee-stained paper invitation to a Thursday announcement in Menlo Park promised a new product, which by all accounts …
![](https://www.tahawultech.com/wp-content/uploads/2013/06/kesecure_sap_security-1-840x440.jpg)
Many companies are negligent about SAP security, researchers say
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to security researchers.
![](https://www.tahawultech.com/wp-content/uploads/2013/06/Headshot-website-203x300-1-840x440.jpg)
Running through a minefield – Google’s Play store is still unsafe
The things that cyber-criminals are able to do with your phone are terrifying.
![](https://www.tahawultech.com/wp-content/uploads/2013/06/SAPPHIRE_NOW_Orlando_2013_030-1-840x440.jpg)
SAP goes soppy at Sapphire
With approximately 80,000 people tuning in digitally around the world, SAP’s board of executives preached to a near 100,000 strong crowd in Florida — and the message could not have been clearer; it believes HANA is the future of business.
![](https://www.tahawultech.com/wp-content/uploads/2013/06/11-12-19-george-colony-1-840x440.jpg)
Forrester CEO George Colony touts CIO-CMO collaboration
Forrester founder and CEO George Colony has touted the shift from IT to business technology and urged CIOs to get …
![](https://www.tahawultech.com/wp-content/uploads/2013/06/shutterstock_119236960-1-840x440.jpg)
Unstructured data: Can you crack the code?
A simple motive for code cracking has always been the benefits of what lies beneath the complexity. As with the universe-load …
![](https://www.tahawultech.com/wp-content/themes/bitz-child/images/tahawultech-578x400.jpg)
How to protect your PC from PRISM surveillance
Thursday afternoon, a bombshell dropped: Two leading reports claimed that the U.S. government has been spying on emails, searches, Skype calls, and …