Deciding which applications in the data center should be virtualised is an important process, says Alexey Strygin, Senior Solutions Architect, Veeam Software, Middle East

Deciding which applications in the data center should be virtualised is an important process, says Alexey Strygin, Senior Solutions Architect, Veeam Software, Middle East
Telcos now face threats on their mobile network from their own subscribers and their device says Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks
The mountain of information devices create is forcing companies to rethink how to securely capture, store and retrieve data to derive more value from it, says Greg White, Senior Manager of Product Marketing at CommVault
The Middle East and Africa region’s insatiable demand for smarter mobile devices and multimedia content delivered on-the-go is causing telecom operators to battle tremendous growth in mobile traffic on their networks.
Thunderbolt 2 made its debut when Apple released the latest version of its MacBook Pro last October, but it’s become more prominent with the relase of the new Mac Pro. How different is Thunderbolt 2 from its predecessor? Here’s what you need to know.
As an annual maturity assessment, the Gartner Hype Cycle continues to provide an accurate indication of those technologies and IT trends that are continuing to change the landscape around us, particularly those that have created large-scale technological shifts that impact a diverse set of users.
Shabbir Ahmad, Regional Sales Director – Networking, Dell, EMEA Emerging Markets discusses trends for 2014.
Condo Protego CEO Andrew Calthorpe puts the spotlight on some of the key trends likely to make a mark in 2014.
Major technology developments over the last year—and a series of revelations about the National Security Agency that shook the international security community—made 2013 an interesting year. In highlighting the past year’s security events, we’ve considered some emerging trends we are likely to see in the coming year.
It is that time of the year again when you sit down, take stock of your IT Help Desk’s performance over the past 12 months, and chart a course for success in the New Year. We’ve decided to go ahead and do the heavy lifting for you by creating a list of things you could focus on in 2014.
The potential business impact of cyber attacks and data loss, along with high-profile data breaches experienced by organisations like LexisNexis andEvernote, seems to have done little to convince small and mid-size businesses that they should be making cyber security a priority.
Oracle is gearing up to report its second-quarter earnings Wednesday and given the restrained expectations CFO Sandra Katz earlier set for key areas such as software revenue, Oracle’s results are sure to come under even more scrutiny than the tech bellwether already gets.
Marcus Jewell, vice president, EMEA at Brocade looks into his crystal ball to outline the top technology trends that Middle East enterprises should watch out for in 2014:
Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.