Review: Dell Venue 8 Pro, Windows 8.1 in a pint-sized package

Miniature tablets are becoming more and more popular, with devices like Google’s Nexus 7 and Apple’s iPad mini in the vanguard. Acer tried to bring Windows to the mini form with its Iconia W3 earlier this year, but that tablet was hampered by an awful screen, a bulky chassis, and a slow processor.

Through the looking glass

And it was all going so well. As vendors began to build more comprehensive cloud-based product roadmaps, Middle Eastern users were beginning to see just how cloud services can streamline their businesses. According to a Gartner report from earlier in the year, cloud adoption was due to grow monumentally in the region up to 2016. This was largely due to issues surrounding security and compliance being ironed out.

In the virtual realm

Redington Value has been recently signed up by VMware to distribute its whole portfolio in MENA region, with a special focus on software-defined data centres. We speak to B. Ramkumar, Senior Vice President, Redington Gulf-Value Division, about the deal and further plans for 2014.

Brocade worldwide channel survey

The survey reveals that channel partners who can help customers migrate to fabric-based networks will succeed in new networking landscape

Time to face the facts

Network downtime translates to big financial losses for Middle East businesses, says Sufian Dweik, Regional Manager, MEMA, Brocade

The Way Forward

When it comes to security, it seems everyone’s in a state of perpetual panic. Whether it’s mobile malware, BYOD or hacktivism, over the course of 2013 the issue of protecting valuable information and resisting attack has inspired a dizzying and persistent challenge.

Empowering the Crowd

As Powering The Cloud hosted its 10th anniversary show in Frankfurt, few would question that cloud computing uptake is on the rise. The same few would question that it is a trend that is here to stay, and one that businesses will have to adapt to.

Insight: top signs that you’ve been breached

Because data is often the most valuable corporate asset – especially when customer information is concerned – staying alert for potential compromise is a critical IT job. Unfortunately, looking into a potential data breach is not easy.

The worse for malware

Through the advent of mobility, smartphones and tablets are now more dangerous devices to enterprises than laptops and PCs.
Mobile malware continues to proliferate, and at the same time employees are insisting on bringing their personal devices to work.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines