Wednesday, 24 August 2016

Teradata Aster Analytics Going Places: On Hadoop and AWS

Teradata announced important new deployment options for the world’s most advanced multi-genre analytics engine:  Teradata Aster Analytics on Hadoop and Teradata Aster Analytics on Amazon Web Services (AWS).  Although previous versions of Aster Analytics required dedicated systems, now companies have the flexibility to accelerate valuable analytic insight from their data wherever it resides, building on their existing investments in Hadoop.

BYOD Could Mean ‘Bring Your Own Disaster’ if Organizations in Middle East Don’t Plan for Security Risks

By: Ammar Enaya, Regional Director, HPE Aruba, Middle East & Turkey

As adoption of wearables becomes more mainstream in the Middle East, it brings added complexity to BYOD in an enterprise. One of the more interesting features of wearable tech is its ability to tether to, and control, smartphones over a remote connection. So even if wearables are denied access to enterprise networks, they may already be able to access it. Which means they can download and store company data. Many come with built-in cameras. This will understandably make IT departments worried.

Monday, 15 August 2016

5 Recommendations to Enterprises in the Middle East for Improving Network Security

By: Cherif Sleiman, General Manager, Middle East and Africa at Infoblox 

In May this year, we posted results of our ‘network protection survey’, which looked – among other things – at best practices in companies that were highly successful at network security. I will drill down into these best practices, and how to achieve them. Some of the recommended actions have the added benefit of positively influencing multiple outcomes, so organizations in the Middle East can benefit by prioritizing these actions first.

Maximizing Virtualization Investments in the Middle East

By: Gordon Haff, Technology Evangelist, Red Hat

In technology, we often seem seduced into chasing the latest shiny object. Cloud! Containers! Orchestration! IoT! Big Data!

These are all well and good and can not only deliver significant value but can enable new classes of applications and revenue streams over time. That said, it’s worthwhile for IT decision-makers to pause to think about practical ways to increase the value of existing investments while simultaneously planning for exciting future opportunities.

Modernizing Manufacturing: Leveraging Technology to Overcome the Sector’s Growing Pains

By: Hesham El Komy, Senior Director, International Channels, Epicor Software

According to a recent article in Emirates Business, manufacturing is already the second largest contributor to the UAE’s economy. Given the government’s focus on continuing to diversify the economy in line with the Vision 2021 Agenda, manufacturing is on a strong growth trajectory and is expected to contribute close to 25% of the GDP by 2025.

Sunday, 31 July 2016

CIOs Need to Rethink Branch IT to Better Navigate a Modern Business

By: Elie Dib, Managing Director, Middle East and North Africa at Riverbed

From an IT perspective branch offices, remote sites, retail locations and manufacturing sites are no less difficult to manage than corporate headquarters, despite having fewer employees and a much smaller physical footprint. In addition to this, these sites are the revenue-generating front lines when it comes to business today. Although cloud computing and SaaS-based applications offer an enormous amount of ubiquity, this will not eliminate the need to keep certain critical business systems and information in remote locations.

Robust Security Platform = Policy Management + Authentication + Authorization + Accounting

By: Ahmed Rezk, Channel Systems Engineering Manager, Middle-East and Turkey at Aruba, a HPE Company

Navigating the landscape of enterprise security can be daunting – the threats typically fly under the radar, and the broad array of malware, hacks and data theft shows real innovation. Worse, the level of malicious sophistication is also on the upswing. In tandem, corporate users enjoy communicating, computing and transacting business on a variety of wired and wireless networks – using multiple devices. And the threat vectors continue to grow, exponentially.

How Organizations get Public Cloud Security Wrong

By: Gordon Haff, Cloud Strategist at Red Hat 

If, just a few years ago, you were to ask a CIO about their advice for securing a public cloud, the odds aren’t bad that their response would have been “Just don’t use one.” Today, you’re far more likely to get a nuanced response, the result of increased practical experience with both security and broader governance issues in public clouds.

Preparing Smart Solutions for Smart Cities

By Anshuman Singh, Director, Product Management of Application Security, Barracuda Networks

Cities drive the economic growth of every nation. With only 31% of India's population currently urbanized and constituting 63% of India's GDP (up from 45% in 1990), urban sections of the society have clearly been the key engine of growth acceleration in the past decade. And with the initiatives of the current Indian government such as Digital India, these sections are now becoming highly advanced in terms of overall infrastructure, sustainable real estate and communications. The urban regions in India are hence being expected to contribute 70-75% of its GDP by 2020, Barclays said in a report.

Surviving the Century of Data Growth

By: Gregg Petersen, Regional Director, Middle East and SAARC, Veeam Software

Dramatic business digital transformation, the Internet of Things (IoT), and everyday digital activities are driving immense data growth worldwide. Research shows that by 2020, the world will generate 44,000 Exabytes (EB) of data in one year alone — 37 times more the 1,200 EB generated in 2010.