16 Shawwal 1445 - 25 April 2024
    
Sign up for newsletter
Eye of Riyadh

Cisco Tetration Analytics Provides the most Comprehensive Data Center Visibility and Analysis in Real Time, at Scale
Technology & IT | Monday 27 June, 2016 3:59 pm
Cisco announced Cisco Tetration AnalyticsTM, a platform designed to help customers gain complete visibility across everything in the data center in real time– every packet, every flow, every speed. Cisco Tetration Analytics gathers telemetry from hardware and software sensors, and then...
Canon unveils the CJ20ex7.8B – a 2/3” portable zoom lens for 4K broadcast cameras
Technology & IT | Monday 27 June, 2016 3:29 pm
Canon Middle East today introduces the CJ20ex7.8B, a 2/3” portable 4K zoom lens for professional broadcast, offering a 20x zoom ratio and focal-length range from 7.8mm to 156mm. First shown as a prototype at IBC 2015 in Amsterdam, the new lens enables the creation of high-resolution,...
Mobily launches an in initiative of Iftar to its staff with Orphans Welfare Societies
Technology & IT | Monday 27 June, 2016 1:58 pm
Mobily launched an initiative of Iftar  to its staff with Orphans welfare Societies which enhanced staff to participate in Iftar with Orphans Societies (Ikhaa & Ensan). This initiative is brought according to charity methodology that Islam Religion calls for, particularly during...
Lenovo Bring Loved Ones Together through HadiaTime
Technology & IT | Monday 27 June, 2016 3:43 am
This Ramadan, Lenovo Smartphones launches HadiaTime, an Android-based application that aims to encourage family members to spend time together during the holy month, while donating data to others to reach out to their loved ones back home. The application which can be downloaded for free from...
Accenture to Help Organizations More Effectively Detect and Remediate Fraud and Abuse with New Advanced Analytics Applications
Technology & IT | Monday 27 June, 2016 2:53 am
Accenture (NYSE: ACN) is launching seven new advanced analytics applications to help organizations more effectively detect and remediate fraud, and ultimately reduce losses to improve their bottom lines. Designed specifically for banks, telecommunications companies, government agencies and...
Canon expands network camera range with launch of new 2MP cameras at IFSEC 2016
Technology & IT | Sunday 26 June, 2016 12:51 pm
Canon, world leader in imaging solutions, has announced the launch of eight new 2MP network cameras unveiled at IFSEC 2016. The new range includes an outdoor 360⁰ endless panning model with 30x optical zoom and fast autofocus, and two new fixed box “bullet” models with 20x optical...
Cloud Computing Is More Than Just A Tech Shift
Technology & IT | Sunday 26 June, 2016 12:27 pm
Cloud computing delivers significant benefits in terms of tangible business metrics such as simplified and flexible IT environment, right sizing of IT requirements, and pay per use consumption model. These benefits are applicable whether the use case is a large enterprise with thousands of...
Mobily Offers 3GB Free for Customers when Documenting Fingerprint for Their Data Sim Cards
Technology & IT | Sunday 26 June, 2016 3:27 am
Bayanat Al Oula, a subsidiary company of Etihad Etisalat (Mobily) offers 3GB free for all existing subscribers when registering their fingerprint for data SIM cards.   Mobily clarifies, the existing subscribers in Mobily data packages can visit any Mobily’s branch or authorized...
20 Saudi innovators participate in tech summit
Technology & IT | Saturday 25 June, 2016 7:37 am
More than 20 Saudis recently participated in the 7th annual Global Entrepreneurship Summit in Silicon Valley, showcasing some innovative work aimed at helping to create a better life for fellow citizens in the Kingdom. The summit featured thousands of specialized technology companies with a market ...
F5 Introduces Standalone Security Products to Defend Against Targeted Attacks
Technology & IT | Friday 24 June, 2016 5:05 pm
Today’s organizations are tasked to protect a growing number of attack vectors. A rising number of exploits seek to simply overwhelm servers with requests and deceptively use encryption to target networks and applications in ways that traditional products struggle to detect and defend. To...
ADD TO EYE OF Riyadh
MOST POPULAR