Ten times the power

The tenth edition of the Powering the Cloud conference held in Frankfurt, Germany, suggested a bigger-than-ever drive to adopt cloud computing, despite continuing security concerns.

Insight: top signs that you’ve been breached

Because data is often the most valuable corporate asset – especially when customer information is concerned – staying alert for potential compromise is a critical IT job. Unfortunately, looking into a potential data breach is not easy.

Bring on the services

There is an increasing emphasis on service-aligned approach to IT operations so that CIOs can deliver on the promise of partnering with business. Ashish Kuthiala, Chief Marketing Officer, Business Services Management Software, HP, talks about the value of a services aligned view of IT.

When In Roam

Long term evolution (LTE), often marketed as 4G LTE, currently serves as the optimum standard for wireless communication of high-speed data for mobile devices and data terminals.

Profiting on IPv6

Although the new Internet Protocol version was launched over a year ago, alarmingly, its adoption is still quite low in the Middle East. Reseller ME finds out how this could be an opportunity for the channel, if partners play their cards right.

Integration advisor: no surprises

It’s 12 o’clock, midnight. You’re hunched over a spare desk in the dimly lit room housing your company’s data centre. The only sources of light come from a few overhead lights by the door, left on by the last employee to be sent home after a dismally long day, and the laptop screen in front of you.

The worse for malware

Through the advent of mobility, smartphones and tablets are now more dangerous devices to enterprises than laptops and PCs.
Mobile malware continues to proliferate, and at the same time employees are insisting on bringing their personal devices to work.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines