Taiwanese computer maker Acer has named Jason Chen, Vice President, Worldwide Sales and Marketing, Taiwan Semiconductor Manufacturing, as its new president and CEO, effective 1st January.
Why are so many IT projects failing?
Fifty percent of businesses had an IT project fail during the last year, according to a survey by cloud portfolio management provider Innotas. The primary reason, according to 74 percent of respondents, was a lack of resources to meet project demands.
Symantec appoints new CTO
Symantec has announced the appointment of Amit Mital as Chief Technology Officer, who will be responsible for technology strategy, focusing on innovation, product development and R&D.
A class of its own
All-in-one colour printers have been gaining popularity in the last few years. Reseller ME analyses why and how it impacts the channel.
Looking ahead
Condo Protego CEO Andrew Calthorpe puts the spotlight on some of the key trends likely to make a mark in 2014.
Symantec appoints Amit Mital as CTO
He will be responsible for driving the company’s technology strategy with a focus on accelerating innovation, product development and R&D.
EMC: EMEA Predictions for 2014
The following predictions from Havier Haddad, Channel and Alliances Director , Turkey, Emerging Africa & Middle East, EMC are highlighting the big trends, changes and issues affecting the EMEA technology channel in 2014 and covering what Haddad believes will happen in the industry over the next year.
SophosLabs’ trends to watch in 2014
Major technology developments over the last year—and a series of revelations about the National Security Agency that shook the international security community—made 2013 an interesting year. In highlighting the past year’s security events, we’ve considered some emerging trends we are likely to see in the coming year.
10 Steps to a highly effective IT helpdesk in 2014
It is that time of the year again when you sit down, take stock of your IT Help Desk’s performance over the past 12 months, and chart a course for success in the New Year. We’ve decided to go ahead and do the heavy lifting for you by creating a list of things you could focus on in 2014.
CSC: Security the top CIO concern going into 2014
Expanding the reach of IT security and protecting the organisation from cyber-security threats has become the primary challenge for CIOs, and will remain so in 2014, a study of CIOs and peers by CSC has found.
The ‘Uncertainty Index’
The potential business impact of cyber attacks and data loss, along with high-profile data breaches experienced by organisations like LexisNexis andEvernote, seems to have done little to convince small and mid-size businesses that they should be making cyber security a priority.
Analysis: security weak spots
Reading the coverage of the recent breach of Adobe passwords, we learned that 1.9 million users used “123456” as their password. That’s right: out of 38 million cracked passwords, almost two million adults used ones more suited to five-year-olds.
Virtual desktop infrastructure offers risks and rewards
Virtual desktop infrastructure (VDI) is designed to deliver virtual desktops to client computers over a network from a centralised source. With traditional VDI, you create a master image (reference computer, or core) to use for all clients, then personalise images as needed.
Citrix predicts five technology trends in ME for 2014
These trends highlight potential technological development opportunities for businesses across the region.
Brocade predicts 5 top Middle East IT trends for 2014
Marcus Jewell, vice president, EMEA at Brocade looks into his crystal ball to outline the top technology trends that Middle East enterprises should watch out for in 2014:
Charting a course for success
Reseller ME catches up with Ajay Singh Chauhan, Group CEO, Spectrum Group to get the lowdown on the company’s perspective in the changing landscape of the channel.
Xerox: 60% of employees don’t need office for productivity
Xerox has released results of surveys into mobility in and out of the workplace, which reveal that 38% of workers feel most productive when at home.
Cyber-crime will not stop for Christmas
Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.
Trend Micro reveals 2014 security forecast
Trend Micro has outlined its security predictions for 2014, and it has forecast that one major data breach will occur every month next year.
Interactive Intelligence hires senior staff
The three new VPs are appointed to enhance cloud communications infrastructure, service and support.