Paul Cormier, President of Products and Technologies, Red Hat, explains how cloud, middleware, storage and virtualisation technologies will drive the …


Paul Cormier, President of Products and Technologies, Red Hat, explains how cloud, middleware, storage and virtualisation technologies will drive the …

Mervyn Kelly, EMEA Marketing Director, Ciena, predicts network make-overs, 4G mobile, connected TV and more for the Middle East in …

Wieland Alge, Vice-President and General Manager EMEA, Barracuda Networks, explains how firewalls improve the cloud while the cloud improves them. …

Sufian Dweik, Regional Manager, MEMA, Brocade Communications, explains how fabric networks can provide a comprehensive solution to five critical enterprise …

Den Sullivan, Head of Architectures and Enterprise, Emerging Markets, Cisco, explains how service providers can accelerate Big Data evolution to …

Shi Yaohong, Middle East President, Huawei, previews the innovations that are set to usher in a new age of digital …

Information rights management (IRM) is the set of techniques and methods which protect the highly sensitive information of the organisation …

Hurricane Sandy is settling down after having wreaked havoc on the eastern seaboard of the US, with several dozen fatalities …

IT managers in corporate and mid-size businesses have to balance both network performance and network security concerns. While security requirements …

With the advent of numerous mobile devices into global business, Middle East is proactively adapting to mobility. It has geared …

Network-related professional services are poised to undergo a significant transformation driven by the complexity and demands of today’s business and …

Feroz Qureshi, OneWireless Market Development Leader, Honeywell Process Solutions, discusses the process of choosing the right Wireless environment.

The world of computing is always changing; corporate mainframe computers were replaced by desktops; desktops became laptops; phones became mobile …

In today’s digital world, the identity of users is defined by their digital credentials. The ability to demonstrate their identity, …