Blogs

Key Channel Trends for 2016

As IT technologies continue to evolve to support the inevitable Digital Transformation, 2015 has been a year of significant change in the market, driven mainly by customers. Over the past year, the technologies that...

The next generation of cyber-security threats

I am sure most of us in the cyber-security community were happy to flip the calendar to 2016 for obvious reasons! Given what we witnessed in 2015, while cloud, mobile and IoT will continue to dominate the discussion...

Enterprises are going ‘MAD’ for mobile

Mobile phone user base in the Middle East and Africa (MEA) is second only to that in Asia-Pacific, with “just over 606 million people in this region having at least one mobile phone, and the total will pass 789...

Can digital rejuvenate bricks-and-mortar retail?

In-store retailing has been under rising pressure from increased costs of doing business, as well as the growth of online shopping. Yet, bricks-and-mortar sales still accounts for the majority of retail spend,...

Towards a ‘Frictionless IT’

With the term Frictionless IT, we mean an enterprise IT that just works, reshaped after the experience offered by modern consumer-grade public cloud services, which business users are growing to expect. If we...

Advanced cyber attacks that hide in SSL traffic

From Target to Sony, and Anthem to Ashley Madison, no company is immune to the risk of cyber-attacks and the resulting loss of customer information. Network security solutions can reduce the risk of attack, but...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive