Honeywell launches intelligent heads-up display with voice augmented reality

Honeywell launches intelligent heads-up display with voice augmented reality

Honeywell announced a handsfree, wearable technology that allows industrial workers to more safely, reliably and efficiently accomplish their tasks in the plant or the field. Honeywell Connected Plant Skills Insight Intelligent Wearables uses a head-mounted visual display that responds to voice and brings live data, documents, work procedures, as well…

Read More
Pros and cons of outsourcing your organisation's security events management

Pros and cons of outsourcing your organisation’s security events management

Any cyber security service is based on three core pillars of security operations which are people, process and technology. It is a known fact that Security Information and Event Management or SIEM is a complex technology and requires skilled resources to implement and manage. In addition, SIEM loses its value…

Read More
How security vendors are moving away from using decision trees to deep learning

How security vendors are moving away from using decision trees to deep learning

The recent replacement of the decision-making tree with deep-learning neural networks to build tomorrow's cyber security solutions, promises to be a significant differentiator amongst security vendors. Analytical tools usually in the realm of artificial intelligence and machine-learning take into consideration user profiles, user behavior, normal business, to establish thresholds for…

Read More
Can the cloud be used to boost artificial intelligence and security solutions

Can the cloud be used to boost artificial intelligence and security solutions

Organisations face a growing number of increasingly complex and ever-evolving threats – and the most dangerous threats are often the hardest to discover. Take the insider threat or stolen credentials, for example. We have seen many high-profile attacks stem from the unauthorised use of legitimate user credentials, which can be…

Read More
Using integration middleware to unravel legacy applications and siloed data

Using integration middleware to unravel legacy applications and siloed data

Today, organisations are acutely aware of the need to become more digital in order to stay competitive and serve customers in new ways. We have entered an era of agile development practices, hybrid technology footprints and a resulting API economy. This all holds great promise, but as an upshot IT…

Read More
Relooking at CISO operational metrics using automated detection and response

Relooking at CISO operational metrics using automated detection and response

CISOs have become leaders in their businesses rather than just experts in their departments. They need to educate their peers on the scope, scale, severity and solutions for cybersecurity and how emerging threats affect each aspect of the business, elevate the cybersecurity discussion out of the trenches of speeds, feeds…

Read More
How IoT will make buildings intelligent by connecting systems to the Internet

How IoT will make buildings intelligent by connecting systems to the Internet

The Internet of Things is getting a lot of attention these days. A reason is the size of the economic activity generated – as much as $11.1 trillion by 2025 in an analysis from the McKinsey Global Institute. According to McKinsey Global, the IoT economic impact on factories, retail settings,…

Read More
Ten personal technologies and how they can affect your business

Ten personal technologies and how they can affect your business

PREDICTIONS 2018 With all the personal technology currently available, it can be difficult for businesses to decipher which represent an opportunity for end customers and which are too immature to warrant any attention. But when used correctly, these technologies can have big business impact. For example, Mastercard recently revealed card…

Read More
Exploiting data breaches

Exploiting data breaches

High profile data breaches are regularly in the news and, seemingly, businesses are losing the battle to protect their intellectual property (IP), corporate and customer data from the threats posed by professional cybercriminals. It is no surprise that financial gain is the single biggest motivator for cyberattacks. The 2016, the…

Read More
Four ways to become master of your cloud data

Four ways to become master of your cloud data

Early Tuesday a public cloud had an issue and many IT departments got the call they do not want: Our website is down, ecommerce is down. What else is affected? What are you going to do about it and when? Just after noon US Eastern Standard Time, the Amazon Simple Storage Service,…

Read More
How document capture is boosting digital transformation

How document capture is boosting digital transformation

Whilst it is a commonly held belief that reducing and removing paper is a best practice, we are still a long way from becoming a paper-free world. 25% of the businesses polled in the AIIM Paper-Free in 2016, Are we there yet? Report, indicated that they run a totally paper-free…

Read More
Getting around those weak passwords in an organisation

Getting around those weak passwords in an organisation

Hackers got hold of over one billion identities last year, as data breach incidents just kept on escalating. If ever a statistic highlighted the failure of current approaches to protect corporate systems, it is this one. In fact, two-thirds of organisations have experienced an average of five breaches over the…

Read More
Six tips to make your cloud journey successful

Six tips to make your cloud journey successful

Today, cloud is a well-known buzzword with leading business executives and business decision makers. However, initiating an end-to-end cloud journey for an organisation, as a first step into digital transformation, is a more challenging task. An organisation's cloud journey involves strong interplay between heads of business and IT decision makers…

Read More
Havelock AHI implements Epicor ERP

Havelock AHI implements Epicor ERP

Epicor, a global provider of industry-specific enterprise software to promote business growth, has announced that Havelock AHI, a leading interior manufacturer and fit-out contractor, has implemented the next-generation Epicor ERP (enterprise resource planning) solution across its six locations in the GCC. With Epicor ERP serving as the backbone of the…

Read More
2016 Awards Banner

Latest Whitepapers

Whitepaper

Whitepaper

Whitepaper

Whitepaper