Aiming to better equip enterprises for big data and the Internet of Things, SAP recently rolled out a host of new features in its HANA platform and predictive-analytics portfolio.
UAE CIOs rank cloud as a top investment priority
With 85 percent of UAE CIOs ranking cloud as their top investment priority to 2020, managing multiple clouds will be the foundation for business success, industry experts revealed recently.0 3571Billionaires, icons and movie stars – why geek is now chic
From popular culture to big business, the geeks have inherited the earth. They are now often championed, given the limelight or even imitated – geek is now chic! So let’s take some time out to look how the geek – and our perception of the geek – has evolved…
Dell to open IoT lab
Dell has revealed it will launch a a dedicated Internet of Things (IoT) lab in Limerick, Ireland to focus on creating end to end IoT software, hardware and services.
Kaspersky Lab reveals cyberattack on its corporate network
Earlier in 2015 during a test, a prototype of an anti-APT solution developed by Kaspersky Lab detected signs of a complex targeted attack on its corporate network.
Huawei appoints new president for ME operations
Huawei announced that Charles Yang has been appointed President, responsible for the company’s business in the Middle East region.
Is SIEM really a white elephant?
In many organisations today, a Security Information and Event Management (SIEM) solution is like a “white elephant,” expensive to …
Home trading
The next big culture shift in consumer technology is clearly home automation, and both Google and Apple will have a lot to say about it in the coming days.
Five threat intelligence failures, and how to overcome them
As cybersecurity threats have become increasingly sophisticated, it’s become impossible to identify and defend against every probable attack with traditional security budgets. That’s where threat intelligence comes in.
Cisco to embed ‘Security Everywhere’ across the extended network
Cisco has announced new offerings to embed security throughout the extended network – from the data centre out to endpoints, branch offices, and the cloud – for pervasive threat visibility and control.
Going to the office? BYO-Apple Watch.
The launch of the Apple Watch heralds the transformation of BYOD into BYOX. How can businesses accommodate #GenMobile’s adoption of wearables, while still staying in control?