Blogs
AI-Powered contact centers are driving the next customer service revolution
During a time of increased adoption of AI, Ravi Saraogi, Co-founder and President of Uniphore APAC, writes on how AI ...Cloud services under attack: closing the virtual open doors to cyber crime
During a time of increased cloud adoption, Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East, elaborates on ...SD-WAN: 5 top benefits
Jacob Chacko, Regional Director – Middle East, Saudi & South Africa at Aruba, a Hewlett Packard Enterprise company, elaborates on ...How to find the best document scanning software
Naji Kazak, General Manager – Middle East, Africa, Turkey & Russia at Kodak Alaris writes on tips to find the ...Understanding Kubernetes
Michael Cade, Senior Technologist Product Strategy at Veeam Software writes on Kubernets. One of the ever more popular topics in ...Take the guesswork out of critical infrastructure cybersecurity
Saket Modi, Co-Founder and CEO at Safe Security elaborates on the importance of critical infrastructure cybersecurity. The disruption of critical ...Creating space for environmental protection and conservation
George Pawlyszyn, General Manager, Middle East and Africa, Rackspace Technology, elaborates on how businesses today are unanimously seeking to improve ...Networking technologies and solutions are changing the way we do everything
Lucas Jiang GM of TP-Link FZE elaborates on the growing change in networking technologies and solutions and its influence. The ...Cyberthreats during Russian-Ukrainian tensions: what can we learn from history to be prepared?
Chester Wisniewski, principal research scientist at Sophos reviews the history of known or suspected Russian state activities in the cyber ...Supply Chain Attacks: How cybercriminals exploit the trust between organizations
Check Point Software Technologies, a provider of cyber security solutions globally, explains how to keep your company safe from a ...