Microsoft Digital Summit: Some of Europe’s most prominent and influential ICT thought leaders were in Dublin last week for Microsoft’s …
Over 80% of UAE centennials are mobile gamers: study
The global gaming market will reach over $115 billion in 2018. At over $50 billion, the mobile gaming industry accounts for nearly half of all the global gaming revenue.0 3945China’s Huawei unveils new operating system to rival Android
Huawei has announced the launch of HarmonyOS, which is a new microkernel-based, distributed operating system designed to deliver a cohesive user experience across all devices.
Google will use recycled materials in all hardware products by 2022
In a bid to reduce waste, Google announced that starting in 2022, 100 percent of Made by Google products will …
US to lift ban on Huawei: report
US President Donald Trump and Chinese President Xi Jinping have agreed to resume trade talks at the G20 summit in Japan.
Amazon overtakes Apple and Google as world’s most valuable brand
US retail giant Amazon is now the world leader in terms of brand value, eclipsing both Apple and Google, according to a recent report.
Huawei retains No. 2 spot in global smartphone sales despite restrictions
Global sales of smartphones to end users declined 2.7 percent in the first quarter of 2019, totaling 373 million units, according to Gartner.
Ai Everything Summit: Dubai Police champions safer societies
Global tech supremos will make their way to Dubai to participate in the region’s first “Kaggle Days”, a two-day global competition that is organised by Google-owned Kaggle and LogicAI.
Middle East’s 5G ecosystem growing faster than expected: Huawei
At Huawei’s 5G is ON forum, organisations from the public and private sectors laid plans for 5G readiness in the Middle East.
Tenable integrates with Google Cloud Security Command Center
Tenable has announced the integration of Tenable.io — for vulnerability management in the Cloud — with Google Cloud Security Command …
How to prevent data manipulation attacks
Data manipulation attacks—attacks in which adversaries don’t take data but instead make subtle, stealthy tweaks to data usually to elicit some type of gain—can be just as, if not more crippling for organizations than theft.