Dell has opened its Dubai Solution Centre to help customers in the EMEA Emerging region explore, test and deploy end-to-end solutions.
Is a move to the Cloud good or bad for IT?
There are four primary factors that can make the shift to the cloud a positive one for IT, says Joe Staples, Chief Marketing Officer and Senior Vice President, Marketing, at Interactive Intelligence Group
Cloud's worst-case scenario: what to do if your provider goes bust
Last September customers of storage provider Nirvanix got what could be worst-case scenario news for a cloud user: The company was going out of business and they had to get data out, fast.
2014: Great risks, greater responsibilities
The need for advanced security is heightened further as we witness the transition to the third platform of computing, says Art Coviello, Executive Vice President EMC, Executive Chairman RSA, The Security Division of EMC.
IDC: Africa to attract more ICT investment in 2014
Investments in ICT are expect to increase in 2014 in Africa as both public and private spending rises and local content businesses partner with larger operators and tech companies, according to IDC.
EMC: EMEA Predictions for 2014
The following predictions from Havier Haddad, Channel and Alliances Director , Turkey, Emerging Africa & Middle East, EMC are highlighting the big trends, changes and issues affecting the EMEA technology channel in 2014 and covering what Haddad believes will happen in the industry over the next year.
SophosLabs’ trends to watch in 2014
Major technology developments over the last year—and a series of revelations about the National Security Agency that shook the international security community—made 2013 an interesting year. In highlighting the past year’s security events, we’ve considered some emerging trends we are likely to see in the coming year.
Brocade predicts 5 top Middle East IT trends for 2014
Marcus Jewell, vice president, EMEA at Brocade looks into his crystal ball to outline the top technology trends that Middle East enterprises should watch out for in 2014:
Cyber-crime will not stop for Christmas
Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.
Trend Micro reveals 2014 security forecast
Trend Micro has outlined its security predictions for 2014, and it has forecast that one major data breach will occur every month next year.