Magazine Button

Analysis

How decentralised AI can help Middle East businesses

Decentralised AI helps promote transparency and also ensures interoperability and encourages innovation among AI companies. Andy Coussins, Senior Vice President and Head of International at Epicor Software, discusses some of the pitfalls of AI and makes the case for how decentralised AI can help businesses. Artificial intelligence (AI) is making its presence felt in every […]


Is your organisation ready for the Windows 10 migration?

Kevin Alexandra, Principal Consultant at BeyondTrust, says that organisations should look at the migration to Windows 10 as an opportunity to upgrade their Windows management but they must also take measures to maintain security against evolving threats. Organisations worldwide are still coming to grips with the migration from Windows 7 to Windows 10. As we draw […]


Expedite application adoption in government

Dave Reber, Cybersecurity Director at Nutanix, talks about the benefits of desktop-as-a-service (DaaS) and how it helps government agencies quickly deploy applications.


Aruba report: How technology can help retailers fight back

While retail has been slow to implement workplace technology, a new report from Aruba says after years of reticence it’s now or never for the industry to embrace it. The study highlights five key technological trends that have emerged in the sector.   Every year, the battle to survive as a brick-and-mortar retailer gets tougher. As […]


How a team of data scientists can make a difference to your bottom line

Data scientists are brought in by businesses to find solutions to their problems but both sides need to be prepared for failures and hidden opportunities along the way, explains Islam Zeidan, General Manager UAE and MEA, Teradata. In today’s digital world of cloud, mobility, analytics and data, the focus for both business and consumers is […]


‘Zero trust security approach is gaining acceptance’: Centrify expert

Organisations are coming to realise that merely a user a user name and password are not enough to secure their cyber existence. And as Kamel Heus, Regional Manager – MEA at Centrify explains, a ‘zero trust security approach’ is increasingly gaining acceptance. The concept of zero trust is as profound in cybersecurity as the sweeping […]


Browse our latest issue

Magazine Cover

View Magazine Archive