Gautam Kumar, co-founder and COO, FarEye, elaborates on how advanced logistics can transform customer experiences. The supply chain and logistics …
Excessive technology use to blame for child obesity in UAE, Saudi Arabia
Nine in 10 children across UAE and KSA have access to tablets, smartphones or other handheld electronic devices with screens.1 3449Samsung introduces remote access through smart TV lineups
Samsung Electronics has announced Remote Access, a new feature that will be available on its Smart TV lineups starting 2019. …
Microsoft initiative to make AI ideas into reality in the Middle East
Microsoft has launched the ‘Make your Wish’ campaign across the Middle East. The initiative calls on individuals and organisations of …
SonicWall boosts EMEA presence
SonicWall has announced its record year-on-year growth in the EMEA region.
Prospects in peripherals: opportunities for tech channel partners
Industry experts reveal how technology channel partners can capitalise on the opportunities present in the PC peripherals market.
Intel funds NYU Abu-Dhabi led cybersecurity research
The American technology giant, Intel Corporation, has awarded NYU Abu Dhabi, NYUAD, a research grant of three years of funding, …
NetApp Insight announces new data services and solutions
NetApp has concluded its annual, three-day conference to help data visionaries across industries and disciplines create their own data-driven journeys …
Fortinet’s SD-WAN continues to gain momentum
Cybersecurity player Fortinet has announced recent customer, partner and market momentum, as well as independent testing results, of its FortiGate …
Raqmiyat achieves ISO 9001:2015 certification
Regional systems integrator Raqmiyat has achieved International Organization for Standardization (ISO) 9001:2015 certification. By meeting the extensive criteria for these …
How to close the cybersecurity gap in the digital era
What’s stopping global businesses from protecting their assets despite significant investments in cybersecurity programmes? That’s the question we asked ourselves when trying to determine the reasons are behind the dangerous gap in modern IT security.