Blogs

Right storage strategy as critical as data strategy

Data storage is as old as written language itself. We may use silicon microchips now, but once upon a time, data storage meant writing information by hand onto scrolls of parchment. Floppy disks and hard disk drives...

Mitigating BYOD security threats

The concept of bring your own device BYOD continues to be a growing trend for businesses around the world and the Middle East is certainly not lagging behind. The region is notably an early adopter of the most...

Mobile tickets soon the norm at spectator events

The rapid growth in smartphone usage is set to increase with the advent of electronic ticketing for sporting and entertainment events. Mobile ticketing is nothing new, especially in the transport industry where users...

Enterprises responsible for their cloud security

Security has long been the principal fear that weighs on cloud investments. While perceptions are improving, Intel Security’s recent State of Cloud Adoption study found that data breaches remain the biggest concern of c...

Improving enterprise log-ons with tap authentication

With the move to a mobile and cloud first world, corporate data has become increasingly difficult to protect. Employees’ expectations have changed too, they want to be able to access corporate cloud applications, data a...

New technologies driving IT and business alignment

It was not too long ago that technologies such as cloud, mobile, social, and big data analytics were little more than futuristic concepts whose true potential was largely unknown. Fast forward to today, however, and...

Browse our latest issue

Intelligent Tech Channels

View Magazine Archive