Blogs

Should you invest or outsource your security operations

As with any security service, three core pillars of operations are people, process and technology. In order to simplify understanding, we compare each of these options in two scenarios: as an in-house Security...

What makes us Red Hat?

Open source software is, in fact, eating the world. It is a de facto model for innovation, and technology as we know it, would look vastly different without it. On a few occasions, over the past several years,...

Crossing the finish line first with cloud

For your business to lead the race, it needs, like a champion athlete, to have the ideal build. By that I am referring to IT infrastructure, which has now become vital to so many organisations that succeed in crossing...

Transformation in regional retail channels

The retail landscape has since been diversified from the time of souks to online stores. At its core, retail is always defined by customer relationship and experience. Through the years, this foundation has not...

Why databases of today cannot support demands of digital transformation

Rapid onslaught of digital technologies and growth in digital communities have prompted IT managers to look beyond traditional ERP frameworks to what is next. Business and enterprise applications have relied on...

Overview of networking technologies used to build IoT solutions

The ability to connect machines, devices, sensors, and other everyday things into an intelligent network and make sense out of them, has huge promises to change everyday life. As can be expected by taking in our...

Browse our latest issue

Intelligent Tech Channels

View Magazine Archive