Upload
min-magcom
View
233
Download
11
Tags:
Embed Size (px)
DESCRIPTION
Arabian Computer News (ACN) - January 2013 - Volume 26 - Issue 1 "68 Pages" ITP Technology Publishing, Dubai, UAE
Citation preview
Aligning business and IT strategies in the Middle East for 28 years
INDUSTRY REVIEW: GLOBAL IT LEADERS MAKING THE HEADLINESAn ITP Technology Publication January 2013 | Volume 26 Issue 1
Alig
nin
g b
usin
ess a
nd
IT stra
teg
ies in
the
Mid
dle
Ea
st for 2
8 y
ea
rsJanuary 2013 | V
olum
e 26 Issue 1A
n ITP Techno
logy Publicatio
n
Virtualdeliversvalue
End user
FUTURE ROADMAPIT ANALYSTS’
2013 PREDICTIONS46
Security Adding physical solutions 58
STORAGE:TACKLING BIG DATA VOLUMES38
Project Round UpNew deals and ICT
project deliveries from around the region
Cyber Attacks Hacking tactics adapting
more quickly says Sophos
PLUS
Siddiqui Altaf, IT manager, Middle Eastern Region for
Hellmann Worldwide Logistics, on data centre virtualisation
Data centre virtualisation creates platform for growth for Hellmann Logistics40
Windows 8Does Microsoft’s
new OS create security risks?
CRM EVOLVESNEW CAPABILITIES
IN CUSTOMER MANAGEMENT
52
January 2013 ARABIAN COMPUTER NEWS 1
/CONTENTS
January 2013 VOLUME 26 ISSUE 01
Madhav Kurup, CEO Middle East and North Africa, Hellmann Worldwide Logistics.
Hellmann Worldwide
Logistics completes fi rst
phase of project to virtualise
its IT environment.
VIRTUALISINGTHE DATA CENTRE
40
40
/CONTENTS
2 ARABIAN COMPUTER NEWS January 2013
07 3825
THE FRONT
Nicolai Solling of
helpAG discusses the
pros and cons of security
for Microsoft’s new
Windows 8 OS.
SECURITY ON WINDOWS 8
37
IT analysts give their
predictions for the
technologies and trends
that will shape the
regional IT industry.
ANALYSTS PREDICT THE YEAR AHEAD
46 52 58
64
4612
52 40
58
/STARTThe latest news headlines and vital data from the local and international IT markets
/AFTER HOURSJohn Robert Pearson, Senior Project Manager for STME, on creating the company’s PMO.
/TRENDSTaking a look back at the industry leaders who madethe news in 2012.
/COMMENTIntelligent data management can help companies cope with big data, says CommVault.
Mobility, social media
and analytics are making
companies re-examine
the value of customer
relationship management.
CRM SYSTEMSGET SECOND WIND
Biometrics, IP
surveillance and access
controls taking their
place in the IT manager’s
security tool kit.
PHYSICAL SECURITY SOLUTIONS RISING
Back-UPS 650Line Interactive Back-UPS 650 features “double boost” and “single trim” Automatic Voltage Regulation (AVR) with wide input voltage range 140-300V. That instantly corrects voltage fluctuations, so you can work indefinitely during brownouts and overvoltages, without draining the battery. It also provides a combination Power/LED Status Indicator and Audible Alarms, a push button circuit breaker and automatic diagnostic testing.
BX650CI-ZAThis unit features PowerChute™ Software that lets you use your computer to access additional power protection and management features.
BX650CI-AF
APC Back-UPS protects your uptime during power sags, surges, and outages.Guaranteed protection on two levels
Download your white paper(s) within the next 30 daysfor FREE and stand a chance to WIN an iPhone 5!
Visit www.apc.com/promo Key Code 28470pCall +9714 7099691 Fax +9714 7099650
reinvented with your business in mind.
Introducing the new APC Back-UPS,
and data from the threat of bad or unpredictable power. But did you know that every APC Back-UPS offers you peace-of-mind protection on two levels?
spikes and surges that travel along utility lines. Second, if the power does goes out,
shut down your systems, protecting your valuable data.
Advanced features for maximum battery lifeBack-UPS features highly efficient electrical and inverter designs, making battery power last longer when the power goes out. Additionally, special features save your battery life for when you need it most.
power conditions without using your battery. And adjustable transfer voltage sensitivity lets you customize when your Back-UPS transfers to battery, preventing the Back-UPS from switching to battery power unnecessarily.
to deliver guaranteed reliability and innovative features to keep you up and running!
©2012 Schneider Electric. All Rights Reserved. Schneider Electric, APC, Back-UPS, PowerChute, and Legendary Reliability are trademarks owned by Schneider Electric Industries SAS
4 ARABIAN COMPUTER NEWS January 2013
Registered at Dubai Media CityPO Box 500024, Dubai, UAE
Tel: + 971 (0)4 444 3000 Fax: + 971 (0)4 444 3030Web: www.itp.com
Offices in Dubai & London
ITP TECHNOLOGY PUBLISHINGCEO Walid Akawi
Managing Director Neil DaviesManaging Director Karam Awad
Deputy Managing Director Matthew SouthwellGeneral Manager Peter Conmy
Editorial Director David Ingham
EDITORIALSenior Group Editor Mark Sutton
Tel: +971 4 444 3225 email: [email protected] Keri Allan, Georgina Enzer, Roger Field, Stephen McBride
ADVERTISINGSales Director George Hojeige
Tel: +971 4 444 3203 email: [email protected] Manager Ajay Sharma
Tel: +971 4 444 3398 email: [email protected]
STUDIOHead of Design Daniel Prescott
Principal Creative Simon Cobon
PHOTOGRAPHYChief Photographer Jovana Obradovic
Senior Photographers Efraim Evidor, Isidora BojovicStaff Photographers George Dipin, Juliet Dunne, Murrindie Frew,
Shruti Jagdesh, Mosh Lafuente, Ruel Pableo, Rajesh Raghav, Verko Ignjatovic
PRODUCTION & DISTRIBUTIONGroup Production & Distribution Director Kyle Smith
Deputy Production Manager Basel Al Kassem Managing Picture Editor Patrick Littlejohn
Distribution Executive Nada Al Alami
CIRCULATIONHead of Circulation & Database Gaurav Gulati
MARKETINGHead of Marketing Daniel Fewtrell
Marketing Manager Michelle MeyrickDeputy Marketing Manager Shadia Basravi
ITP DIGITALEditor ITP.net Stephen McBride
Tel: +971 4 444 3597 email: [email protected] Digital Publishing Director Ahmad Bashour
Tel: +971 4 444 3549 email: [email protected] Development Manager Josephine D’SaTel: +971 4 444 3630 email: [email protected] Sales Manager, ITP.net Vedrana Jovanovic
Tel: +971 4 444 3569 email: [email protected]
ITP GROUPChairman Andrew Neil
Managing Director Robert SerafinFinance Director Toby Jay Spencer-Davies
Board of Directors KM Jamieson, Mike Bayman, Walid Akawi, Neil Davies, Rob Corder, Mary Serafin
Circulation Customer Service Tel: +971 4 444 3000Printed by Emirates Printing Press Dubai, L.L.C
Controlled Distribution by Blue Truck
Subscribe online at www.itp.com/subscriptions
Arabian Computer News is audited by BPA WorldwideAverage Qualified Circulation: 10,198 (May - Jul y 2012)
The publishers regret that they cannot accept liability for error or omissions contained in this publication, however caused. The
opinions and views contained in this publication are not necessarily those of the publishers. Readers are advised to seek specialist
advice before acting on information contained in this publication, which is provided for general use and may not be appropriate
for the readers’ particular circumstances. The ownership of trademarks is acknowledged. No part of this publication or any part
of the contents thereof may be reproduced, stored in a retrieval system or transmitted in any form without the permission of the
publishers in writing. An exemption is hereby granted for extracts used for the purpose of fair review.
Published by and Copyright © 2013 ITP Technology Publishing Ltd. Registered in the B.V.I. under Company Registration number 1402846.
The Middle East’s Leading IT Magazines are read byThe Region’s Most Important IT Leaders…
To have your copy delivered directly to your doorstep, SUBSCRIBE online by logging on to:
www.itp.com/subscriptions
STORAGE SURGE SMB STORAGE SOLUTIONS
OFFERING SOLID MARGINS (42)
YEAR IN REVIEW A LOOK AT EVENTS THAT SHAPED THE MARKET IN 2012 (36)
MARKET MOVERSHonouring women executives driving marketing strategies in the IT channel (26)
Building and delivering IT solutions for the Middle EastAn ITP Technology Publication
ww
w.it
p.ne
tVo
l. 10
Issu
e. 1
2D
EC
EM
BE
R 2
012
LEN
OVO
CE
O V
OW
S T
O K
EE
P C
OM
PA
NY
ON
TO
P B
RO
CA
DE
RE
SH
UFF
LES
CH
AN
NE
L TE
AM
MIT
SU
MI S
IGN
S A
S W
D D
ISTI
E A
LFA
LA
K T
O D
ISTR
IBU
TE IX
IA E
MP
A, S
UP
ER
MIC
RO
PA
RTN
ER
2016
2012
""
""
""
""
"
_ww
w.it
p.ne
t_2012
12
An ITP Technology Publication
" "12
20
16
" "26
""
40
Critical analysis for telecommunications executives
DECEMBER 2012
An ITP Technology Publication www.commsmea.com
Middle East telcos are taking an early lead with LTE but major challenges remain
FUTURE NETWORKSEricsson’s CTO on the latest
technology trends and
applicationsp30
SCALING 4G NETWORKS
SEEKING SATELLITESSatellite solutions that allow
companies to work from
anywherep25
PlusANALYSIS
OPINIONRESEARCHPRODUCTS
CLINIC
COMMENTNINE KEY TERMS
TO UNDERSTAND IN CLOUD DEALS
P10
DECEMBER 2012 VOLUME 18
ISSUE 12
DISASTER RECOVERY: A NECESSITY,
NOT A LUXURY P36
“People want a data centre facility immediately; they want to be able to move quickly.”James Coughlan P28
Experts unveil the top global trends and innovations in the data centre sphere
FROM ATM TO IP/ETHERNET: NETWORK
CONVERGENCE STRATEGY
P13
DATA CENTRE TRENDS FOR 2013
t 2
Aligning business and IT strategies in the Middle East for 27 years
HUAWEI: ENTERPRISE BUSINESS CONTINUES TO BUILD MOMENTUMAn ITP Technology Publication November 2012 | Volume 25 Issue 11
AwardshonourregionalIT excellence
Arab Technology Awards
OFFICE SOLUTIONSEVOLVING POWEROF PRODUCTIVITY58
Project Managers Rising demand
for IT project professionals
52
CIO EXCLUSIVE:GLOBAL CIO TALKS
DELL ON DELL40
Hosting Growth VoiceTrust looks to
hosting for local ops
Governing ProgressPerformance solutions
for government manage strategic initiatives
PLUS
Ahmad Almulla, vice president of IT at Dubai
Aluminium, and winner of ACN’s CIO of the Year 2012
Arab TechnologyAwards recognise leaders in regional IT sector24
Cloud ConcernsSecurity holding back local cloud
computing adoption
Aligning business and IT strategies in the Middle East for 27 years
WINDOWS 8: NEW DEVICES AIMING FOR ENTERPRISE ACCEPTANCEAn ITP Technology Publication December 2012 | Volume 25 Issue 12
Buildingcloudsuccess
End user
INTEL INNOVATESR&D INITIATIVESDRIVE BUSINESS
46
Outsourcing Managing
service providers
52
GREEN IT:GOING BEYOND POWER SAVING
58
Breaking the silos Dunia takes different
view of fi nancial services
Hyper-connected CRMContact centres build
bridges to the social media generation
PLUS
Dr Jassim Haji, director of information technology
for Gulf Air, talks about the benefi ts of the airline’s
private cloud
Gulf Air streamlines IT as private cloud project proves its value40
Inside ERP MythsSix common
misconceptions that harm ERP roll-outs
BIGDATA:GOING BIG WITHOUT SPENDING22
January 2013 ARABIAN COMPUTER NEWS 7
support broadband, transparency in mobile roam-ing. Let’s focus on those things that matter most and if there are other issues around the internet, let’s find an acceptable place discuss those. But let’s not pollute this conference, let’s not hijack this conference — we want to come out of this thing with success.”
In comments made at the conclusion of the event, Dr Hamadoun I Touré, secretary general of the ITU stated: “The new ITR treaty does not cover content issues and explicitly states in the first article that content-related issues are not covered by the treaty. Likewise, in the preamble of the new text signatory Member States undertake to renew their commitment and obligation to existing hu-man rights treaties.”
A12-day summit convened in Dubai by the International Telecommunica-tion Union (ITU) was intended to es-tablish a new international treaty for telecom regulations, but instead cul-minated in a bitter schism that largely pitted East against West over the is-sue of Internet governance.
Eighty-nine out of a possible 144 delegates within the UN-affiliated ITU’s 193 members signed up to the treaty, first adopted in 1988. Among those refusing to sign were the US and much of Europe, nations that expressed concerns over proposals to formally regulate the Internet through governmen-tal control. More government control of the Inter-net had also been opposed by technology compa-nies, particularly Google.
The treaty was originally intended to spell out international regulations that would allow seam-less telecom services across international bounda-ries and mainly covered financial issues such as co-operative tariffs. The new treaty comes into ef-fect in 2015, but is thought to herald little change in telco operations.
The UAE and Saudi Arabia were among those nations, led by Russia, who advocated stricter policing of cyberspace. They were joined by China and several African coun-tries, together signing Russian proposals that included calls for an end to the US-based Internet Corporation for Assigned Names and Numbers› (ICANN) control over Internet naming and addressing. The pro-control group was also keen to control Web content and eliminate Internet anonymity.
However, the US, Australia and many European countries countered the move. In-deed, the US called on the ITU to focus on regulating the telecoms sector and not the internet. Speaking at the event, Terry Kramer, Ambassador, Department of State, USA, said that the US was “candidly disappointed” by the proposal co-signed by Russia, China, Saudi Arabia, Algeria, Sudan and the UAE, which called for regulation that would allow countries to block access to websites and take control of allotting Internet addresses.
Kramer called for the conference to focus on issues directly related to telecoms, in-cluding the deployment of broadband infrastructure and international roaming. “Let’s all agree that advancing international telecoms services, advancing the networks that
ITU summit held in Dubai fails to get backing of West over web control proposals
No consensus at UAE telecom summitCOMMUNICATIONS
Kramer: The US opposed proposals to allow greater government control of the Internet.
Imag
e: KA
RIM
SAHI
B/AF
P/Ge
tty Im
ages
/START
8 ARABIAN COMPUTER NEWS January 2013
AMD cuts chip commitmentAMD scales back wafer purchase from GlobalFoundries
AMD cut the value of silicon
wafers that it committed to buy from GlobalFoundries in the fourth quarter of 2012, in light of weakening PC markets.
The company renegotiated its Wafer Supply Agreement (WSA) with Abu-Dhabi owned GlobalFoundries, to purchase $115 million worth of wafers, down from the original agree-ment for $500 million. AMD had to make a termination payment to Globalfoundries of $320 mil-lion in relation to the deal.
The chip company does expect demand to recover however, committing to purchase $1.15 billion of wafers in fiscal 2013 and approxi-mately $250 million of wafers during the first quarter 2014.
AMD also said that as it standardizes
on 28-nanometer chip technology from GlobalFoundries, it will reduce R&D funding to the chip manufacturer.
Rory Read, president and chief executive officer, AMD said that the company was still committed to GlobalFoundries, but the deal would help AMD’s financial stability.
WD delivers SMB storage up to 16TBWestern Digital launches WD Sentinel DX4000 small office storage server, to give SMBs better control over their data
PRODUCT FOCUS
BUSINESSRead: the new agreement will strengthen
relations with Globalfoundries and help AMD get back on track fi nancially.
Setup within 30
minutes, has
backup and recov-
ery licences for up
to 25 client PCs
Available in configurations of up
to four 2TB or 3TB drives, for
total capacity of 4TB to 16TB
Connectivity
with two Gi-
gabit Ethernet
ports and two
USB 3.0 ports
WD Guardian
Services pro-
vide additional
support and
warranty op-
tions for small
business
customers
/START
9
December 3Dubai, UAE
Hamadoun Toure,
Secretary-General of
the UN International
Telecommunication
Union (ITU), speaks
ahead of the
World Conference
on International
Telecommunications
(WCIT-12) in Dubai.
The conference
convened to review
the International
Telecommunications
Regulations (ITRs),
which outline
governance of global
communications,
although disputes
between countries
meant little progress
was made.
THE BIGPICTURE
Imag
e: KA
RIM
SAHI
B/AF
P/Ge
tty Im
ages
/START
10 ARABIAN COMPUTER NEWS January 2013
The targeted cyber attacks that hit the Middle East last year could be seen as the evolution of previous attacks such as Stuxnet, and an indicator of the increasing complexity of security threats, but the fact that an organisation of the scale of Aramco could be hit, was perhaps something that could not be predicted. The security industry is very much in the business of prediction however and in 2013,
the leading security companies are predicting more of the same, with politically-motivated threats, mobile malware and more sophisticated and consumerised attack kits all on the radar for this year.t Here’s a break down of the 2013 IT security predictions from three leading vendors.
SophosTrend Micro Kaspersky Lab
WORDCLOUD
Bahrain CIO Council launchedTechnology and Business Society launches CIO group
Bahrain’s Technology and Business Society (TBS) has an-
nounced the formation of a new Chief Infor-mation Officers (CIOs) Advisory Council.
The council will create a forum to dis-cuss technology, and will also work to devel-op standards, guidelines and best practices for different industries, as well as host ven-dor presentations of new technologies.
The council has currently formed a steering committee to develop a plan for how its operations will develop.
Esam Hadi, chairman of TBS said: “This initiative will help the IT industry to serve as a medium for the exchange of ideas be-tween members, and will enable members to discuss IT strategic issues of common inter-est, develop solutions, provide perspective and direction for the development of stand-ards, guidelines and best practices. It will also provide a discussion platform for CIOs to proactively collaborate and provide per-spective and direction for the development of the IT industry.”
BUSINESS
The CIO Advisory Council will be a
discussion platform for CIOs, says Hadi.
/START
12 ARABIAN COMPUTER NEWS January 2013
Small-to-medium and midsized businesses that are struggling with out of date and unreli-able systems, need to
consider upgrades in order to manage the business risk as-sociated with these systems, according to research by IDC.
While larger organisations have the resources to address downtime issues, IDC says that for smaller companies, many of the risks caused by systems downtime can be mitigated by investment in more up-to-date hardware and software.
IDC suggests solutions to monitor and manage IT infra-structure, better security, and provisioning of proper backup solutions, can all have a signif-icant impact on the resilience of systems.
Although infrastructure in-vestment is a priority for most SMBs and midsized organisa-tions, (those with up to 1,000 employees), spending plans may well have been on hold exacerbating downtime risks.
Companies are facing down-time from outdated or poorly
managed infrastructure that throws up a number of differ-ent problems and consequenc-es namely system downtime, which means data and appli-cations are not available to end users or customers; network outages, that can halt business operations and in some cases suspend revenue-generating operations, as well as raise questions about the compa-ny’s reliability; and security breaches, that can compro-mise sensitive information and likewise damage the organisa-tion’s reputation.
The use of appropriate tech-nologies, including proactive monitoring of hardware com-ponents to single-pane-of-glass control consoles can cut administration costs. Combin-ing updated technology and IT best practices can reduce costs associated with downtime by 30% to 60% and reduce the amount of lost productivity by up to 80%. By adopting best practices and updating IT in-frastructure, companies can lower annual downtime by up to 85%.
SMBs and midsized organisation need to consider upgrades to new systems and management tools to cut outages
REDUCING DOWNTIME
Pain pointscausing downtimeOlder, unreliable systems & applications
Poor patch management
Inconsistent back up
Lack of network monitoring
Lack of single view of systems
No single sign-on
Backup not encrypted
Hardware at different software release levels
Inconsistent lifecycle management
AVERAGE ANNUALDOWNTIME HOURS DUE
TO NETWORK, SYSTEM, OR APPLICATION DOWNTIME BY MIDSIZED COMPANIES
16 20
/START
January 2013 ARABIAN COMPUTER NEWS 13
Sourc
e: IDC
$70,000ESTIMATED AVERAGE LOSS PER DOWNTIME HOUR
Sector ProductivityLoss / Hour
RevenueLoss / Hour
Average annual downtime hours
Financial $3.64 $9,997.50 3.57
Retail $2.58 $397.50 7.75
Healthcare $1.25 $157.50 21.70
Manufacturing $3.06 $59.93 8.01
Public Sector $0.85 $.00 9.41
Cost of downtime in different sectors
Hours per user per year spent on recovery
4Before investment
0.5After investment
60Before investment
6After investment
Hours per user per year spent on backup
Percentage reduction in downtime that can be gained from:
Use of Management
software tools
Upgrade servers,
storage etc.
Failover clustering for
inter apps
Standardisa-tion on single
desktop OS
Comprehen-sive PC
security
Thin clients/blades
Deploying multiple antivirus
65% 50% 43% 30%
28% 25% 15%
Investing in new technology and management tools cuts back and recovery times
/START
14 ARABIAN COMPUTER NEWS January 2013
QUOTE OF THE MONTH“I take it off. It’s too annoying.”
ANTI-VIRUS PIONEER JOHN MCAFEE EXPLAINS WHY HE DOESN’T USE THE PRODUCT THAT STILL BEARS HIS NAME, WHILE TALKING TO THE FT, ON THE RUN IN BELIZE DURING DECEMBER. MCAFEE WAS WANTED FOR QUESTIONING OVER THE DEATH OF HIS NEIGHBOUR IN BELIZE, BUT ESCAPED TO THE US.
TICKER: AAPL
GLOBAL NEWS: Apple suffered
a 6% drop in share price on
5th December 2012, its largest
single-day drop in four years. Fi-
nancial markets see a number of
concerns with company, although
the stock is still up nearly $100
from start of 2012.
Analysts cited increasing
competition, particularly from
Android-devices, and questions
over whether the company is still
capable of innovation.
“This is not going to be a short-
term trend. This is a management
test, of how well they can perform
without Steve Jobs,” said Brian
Battle, director of trading at Per-
formance Trust Capital Partners.
LOCAL NEWS: iPhone 5 was
launched in select countries in
the Gulf region on 14th December,
along with local iTunes Stores.
Apple sees biggest one-daydrop in four years
KPIs
Apple
Oracle CloudWorldto kick off in DubaiGlobal tour to promote Oracle Cloud will launch in the UAE on 15th January
Oracle has an-nounced Ora-
cle CloudWorld, an event series where senior Oracle executives, customers, partners and industry thought leaders will share how they drive business transforma-tion using the Oracle Cloud.
Oracle CloudWorld will comprise a series of global events, with the show starting in the UAE this month.
“Oracle Cloud is the most comprehensive cloud in the world, being used each day by more than 25 million users and more than 10,000 organisations,” the company said.
The debut of Oracle Cloud-World follows closely on the heels of the expansion of the Oracle Cloud services portfolio at Oracle OpenWorld 2012.
Oracle president Mark Hurd will kick off Oracle CloudWorld on 15th January in Dubai. The tour will include events in sev-eral cities around the world, in-cluding London, Los Angeles, Mexico City, Mumbai, Munich, New York City, Singapore, Syd-ney and Tokyo.
Keynote sessions at the evenet will highlight Oracle’s strategy and roadmap for cloud and social. Subsequent tracks for line of business executives will focus on sales and marketing, customer service and support, HR and talent management, and finance and operations.
The events will also have
CLOUD
Oracle’s Mark Hurd will present a keynote at the Oracle CloudWorld event in Dubai. (Photo by Justin Sullivan/Getty Images)
tracks for application develop-ers and DBAs focused on how to use the Oracle Database and Java Cloud Services. It will also high-light how organisations can best leverage social media to monitor, engage, and market to their cus-tomers. Oracle executives, along with customers and partners, will share ideas on how to drive business transformation and gain competitive advantage from technologies like cloud, social, and mobile to drive innovation across lines of business.
Each Oracle CloudWorld event will include customised local content, as well as multiple tracks, in-depth Q&A sessions, real-world case studies, and hands-on demos and exhibits.
DEC 3 DEC 10 DEC 17NOV 26
580
560
540
520
/START
16 ARABIAN COMPUTER NEWS January 2013
3 / SAUDI ARABIA
KSU controls network with
Procera’s PacketLogic
King Saud University (KSU) in Saudi
Arabia is deploying Procera Networks’
PacketLogic solutions for network traffic
management and user awareness.
KSU has over 100,000 students and
nearly 10,000 faculty members and has
seen network usage increase by over 50%
year-on-year recently.
The Procera solution allows KSU to
implement specific policies to manage
applications and control usage, prioritise
traffic and has improved network perfor-
mance and end user experience.
/START
Arabian Computer News brings you a regional roundup of recently announced and ongoing enterprise IT projects
PROJECTS
2 / QATAR
Qatar Airways connects
Boeing 787 Dreamliner
Qatar Airways has extended inflight con-
nectivity to its Boeing 787, using OnAir
solutions, the first such deployment for
the new Dreamliner.
The OnAir technology allowed passen-
gers to access the internet and use mo-
bile phones during the flight from Seattle
to Doha in November. Over 50 Internet
sessions took place during the flight,
using a total of 1,250MB of data, while
the mobile phone network was used by
nearly 75 phones, sending 340 text mes-
sages and 50MB of mobile data.
4 / UAE
Dubai Roads & Transport
Authority upgrades CRM
Dubai’s Roads & Transport Authority
(RTA) has rolled out the second phase of
its CRM system.
The system, which has been deployed
by software provider LINK Development,
is intended to increase customer care and
communications channels.
The CRM system is based on Microsoft
Dynamics, which has been upgraded from
version 4 to CRM 2011. The upgrade will
give the RTA access to a number of new
modules, for marketing and campaign
management, and a Facebook app.
1 / EGYPT
Smart Glass selects Epicor
ERP to manage operations
Smart Glass, an architectural glass pro-
cessing company, has chosen Epicor ERP
to manage operations at its headquarters
and manufacturing plant.
The Egyptian company, which produces
high-quality engineered glass products
at its state-of-the-art facility, will deploy
Epicor ERP to manage the complete
manufacturing cycle, and provide analyti-
cal tools and insight to decision makers,
to help deliver on the company’s strategic
business objectives.
Global Business Solutions (GBS), an
Epicor VAR in Egypt, will be carrying out
the implementation.
/START
January 2013 ARABIAN COMPUTER NEWS 17
User: Emirates Airlines
Project: Knowledge Driven
Inflight Service (KIS), in-flight
communication/CRM solution
The product: KIS application,
Windows 8, HP ElitePad 900
The objective: Roll out of
Emirate’s KIS on Windows 8
for better performance.
What they said: “At Emir-
ates, we strive to deliver the
world’s best in-flight experi-
ence,” said Kevin Griffiths,
senior vice president, Cabin
Crew at Emirates. “To support
our crew, we have created
an application on Windows 8
that delivers a unique, per-
sonalised experience with the
necessary information for our
cabin crew to better serve the
needs of customers. The Win-
dows 8 platform running on
HP ElitePad 900 devices gave
us this option.”
/START
A regional enterprise project at a glance
DEPLOYMENT
7 / UAE
Omnix delivers infrastruc-
ture for Sharjah Co-op
Systems integrator Omnix International
is carrying out the deployment of 80 point
of sale terminals for the Sharjah Co-
operative Society (SCS).
The deployment is part of a multi-
million dirham IT project, begun in 2011,
to completely redesign SCS’ IT infrastruc-
ture. The project has already seen the
provision of a new data centre for SCS,
including virtualized blade servers and
storage, and an new ERP application to
improve management and better analysis
of customer data and trends.
8 / OMAN
Bank Muscat deploys POS
customer service terminals
Bank Muscat has deployed new point of
sale (POS) terminals from OMA Emir-
ates to provide its customers with new,
secure, value-added services.
The terminal solution, using custom-
ised solutions from payment terminal
specialist Ingenico, will work with differ-
ent types of cards including magstripe
and smart contact cards, and are capable
of running multiple applications to deliver
services such as loyalty, mobile prepaid,
instalment/loan option, and dynamic cur-
rency conversation, on one device.
5 / UAE
Itzza Pizza improves
efficiency with Openbravo
UAE pizza restaurant chain Itzza Pizza
has turned to Openbravo ERP solutions to
help it manage growth and efficiency.
The chain has rolled out Openbravo for
Retail solution at six outlets in the UAE,
gaining improvements in efficiency.
Itzza Pizza selected the Openbravo
solution because of its seamless integra-
tion with web POS, so that it can operate
on commodity Android devices, and the
flexibility and low cost of the open source
system. The system was implemented by
Openbravo partner, SC Soft – Dubai.
6 / UAE
Dubai Taxi Corp enhances
asset management
Dubai Taxi Corporation (DTC) has select-
ed DSI’s mobile application development
platform, dcLINK, and on-premise mobil-
ity applications for inventory and fixed
asset management, to track the status
and condition of fixed assets, ensuring
more accurate and effective enterprise
asset management.
The solution will be used on a mix of
handheld devices and fixed work stations
for workers to track more than 34,000
parts per day from receipt to repair in
real time.
The KIS is used by pursers to brief crew and to provide infl ight customer service support and feedback.
/START
18 ARABIAN COMPUTER NEWS January 2013
The pace of cyber attacks and attack-
ers adaptability increased during 2012, according to security spe-cialists Sophos.
In the company’s Security Threat Report 2013, released at the end of last year, Sophos high-lights the fact that attackers are becoming quicker to respond to security research findings, and are leveraging zero-day exploits more effectively. Attackers are also creating more sophisticated malware and targeting attacks against a wider range of plat-forms and applications.
Writing in the report, Gerhard Eschelbeck, CTO of Sophos, commented: “Modern malware is effective at attacking new plat-forms and we are seeing rapid
growth of malware targeting mo-bile devices. While malware for Android was just a lab example a few years ago, it has become a serious, and growing threat.”
The report highlights the threats from sophisticated mal-ware such as the Blackhole mal-ware toolkit, which has been made available on a commercial basis by hackers to launch redi-rect attacks.
Sophos also noted the emer-gence of creative social engineer-ing attacks on social networking platforms such as Facebook, the widespread delivery of Twit-ter direct messages (DMs) that link to malicious sites, and also the growing number of account takeovers on Pinterest.
The growth in mobility and BYOD was also creating a wider range of platforms that need to be secured, and there are also ongoing concerns about the se-curity of cloud service providers, according to the report.
Eschelbeck said that while these new threats are emerging rapidly, the security industry is also moving quickly to counter these threats. End-user organisa-tions are beginning to recognise the importance of layered de-fences, and many organisations have begun to address the secu-rity challenges of smartphones, tablets, and BYOD programs. Enterprises are more aware of the risks from platforms such as Java and Flash.
Blackhole accounts for nearly one third of redirect attacks
SECURITY WATCH
SECURITY
Pace of cyber attacks increases says SophosCyber attackers reacting more quickly to security research and zero-day exploits
Eschelbeck: Security risks emerged more rapidly in 2012.
The Blackhole Malware kit has been identified by
SophosLabs as one of the most pressing security
threats today. Blackhole is a complex software tool
that can be used on a malicious web server to sneak
a variable malware payload onto computers.
BLACKHOLE MALWARE REPRESENTS27% OF EXPLOIT SITES AND REDIRECTS
Sourc
e: So
phos
Labs
WHERE ARE BLACKHOLE EXPLOIT SITES BEING HOSTED?
FOUR STAGES OF BLACKHOLE EXECUTION
Exploit site (Blackhole): 0.7%
Drive-by redirect (Blackhole): 28.7%
Exploit site (not Blackhole): 1.8%
Payload: 7.5%
Drive-by redirect (not Blackhole): 58.5%
SEO: 1.1%
Fake antivirus: 0.4%
Other: 3.4%
Germany: 3.68%
China: 5.22%
Turkey: 5.74%
Italy: 5.75%
Chile: 10.77%
Russia: 17.88%
Other: 20.16%
1. Sending users to aBlackhole exploit siteAttackers hack into le-
gitimate websites and add
malicious content which that
generate links to the pages
on their Blackhole site.
2. Loading infected code from the landing pageThe exploit code records how
you arrived at the Blackhole
server, along with your OS,
browser, plugins and more.
3. Delivering the payloadPayloads are typically
polymorphic—they vary with
each new system that’s been
infected, and use encryp-
tion to avoid detection by
anti-virus.
4. Tracking, learningand improvingBlackhole keeps a record of
which exploits worked with
which system configuration,
to learn from attacks.
United States: 30.81%
/START
20 ARABIAN COMPUTER NEWS January 2013
Financial institutions in the region are turning to risk man-
agement solutions to help them manage compliance with the new Basel III regula-tions, according to Moody’s Analytics.
The latest Basel regulations, which set global regulatory standards for bank’s capi-tal adequacy, stress testing and market li-quidity risk, begin implementation from the start of this year, and many banks in the re-gion are aiming for compliance with the new rules, said Wael Jadallah, director, Moody’s Analytics (DIFC).
“The biggest issue for banks is regulatory compliance. With the advent of Basel III — there’s still a lot of banks trying to come up to compliance with Basel II — the central banks are very much pushing for Basel III, which means the banks will have to become compliant, and that is the greatest area of fo-cus where we are able to assist,” he said.
Moody’s Analytics is offering a range of
FINANCE
Banks looking for solutions for Basel IIINew banking regulations driving demand for risk solutions says Moody’s Analytics
Jadallah: Financial institutions in the region have increased their use of risk management software and solutions.
software and services to the regional finance sector, including enterprise risk manage-ment for banks, loan risk management, and solutions to measure and report on the or-ganisation’s regulatory credit risk, an impor-tant aspect of Basel III compliance.
The uptake of new solutions is part of an increased acceptance of risk solutions in the region, Jadallah said. The company opened its local office in Dubai International Finan-cial Centre in 2008, and today has expanded to 15 people in the region, with growth driv-en by the increased awareness of the need for, and uptake of, risk solutions.
“We’ve seen across the board a massive increase in acceptance, visibility and adher-ence to risk, looking to having the right sys-tems and IT focus with the banks,” he said. “Over the last four years, while banks might be cutting budget overall, they are increas-ing their spend when it comes to risk man-agement and risk management IT systems.”
Five stages of business analytics readinessOrganisations are moving towards better analysis of their data, but are at different stages of the journey to getting the full benefits of analytics. The stage of adoption of analytics can be measured in five stages.
Analytically im-paired: Your or-ganisation is ‘flying blind,’ plagued by missing or poor-quality data and poorly integrated systems. The com-pany has some data and management interest in analytics
Localised analyt-ics: Your analytic efforts are isolated, opportunistic and function-specific. Your organisation collects transaction data efficiently but often lacks the right data for better deci-sion making.
Analytical aspira-tions: Your organi-sation has executive support for analyt-ics plus business intelligence tools and data marts, but most data remains unintegrated, non-standardised and inaccessible.
1 2 3Analytical compa-nies: Your organisa-tion begins to de-velop an enterprise wide analytics capa-bility as a priority, with high-quality data, an enterprise wide analytical plan and governance principles.
Analytical competi-tors: Your organi-sation is routinely reaping big benefits from its full-fledged, enterprise wide analytics archi-tecture, which is fully automated and integrated into processes.
4 5So
urce:
SAS/
From
Comp
eting
on An
alytic
s, Th
omas
H. D
aven
port
and J
eann
e G. H
arris
/START
January 2013 ARABIAN COMPUTER NEWS 21
The x86 server market in the Middle East and Africa (MEA)
saw a sharp year-on-year decline in Q3 2012, according to IDC.
The MEA x86 server market dropped 10.5% in volume, and 2% in value, combined to the same quarter last year.
IDC observed a similar trend in the GCC, with the regional x86 server market declining 9% in volume over the same period, although there was a 10% increase in revenue year-on-year. Qatar registered the highest rate of growth among these countries, increasing 88% in volume and 60% in value.
“Large deals were closed in Qatar’s educa-tion and banking sectors during Q3 2012 and these contributed significantly to the country›s strong growth,” said Zeeshan Gaya, research
BUSINESS
MEA x86 server market drops in Q3 2012x86 server shipments down 10.5% in volume in third quarter, says IDC
Gaya: Key projects drove shipment of x86
servers in the GCC, but the sector still declined.
HELLO MR. ROUTER.YOU CAN COUNT ON US.
KYOCERA Document Solutions Middle East
Dubai Internet City, Bldg. 17, Offi ce 157
P.O. Box 500817, Dubai, United Arab Emirates
Tel: +971-04-433-0412
Fax: +971-04-423-1944
http://www.kyoceradocumentsolutions.ae
KYOCERA Document Solutions Middle East - www.kyoceradocumentsolutions.ae
KYOCERA Document Solutions Inc. - www.kyoceradocumentsolutions.com
With KYOCERA’s output solutions you will defi nitely be on the safe side. As well as durable,
wear-resistant hardware, all systems offer hassle-free administration and exceptional
network reliability. As a result, you can profi t from low failure rates, long service intervals
and maximum performance. So, if you are looking for printing and multifunctional systems
that you can really rely on – count on us.
KYOCERA. COUNT ON US.
manager for servers and systems at IDC Mid-dle East, Africa, and Turkey. “Meanwhile, key projects in verticals such as oil and gas, gov-ernment, and telecommunications helped catalyse growth in the GCC region as a whole.”
Different countries showed varying results in terms of x86 shipments, with the UAE up 16% on the back of increased consumption in the telecommunications and government sectors; while Saudi Arabia dropped 45% due to delays to key projects and the shuffling of budgets in preparation for the new fiscal year. Morocco, Algeria, and Tunisia all saw a slow-down of 14% in volume due to political and social unrest, while South Africa slipped 16.1%.
The overall negative trend was observed across almost all form factors in the MEA re-gion during Q3 2012.
© 2012 Avaya Inc. All rights reserved.
Video conferencing with anadded bonus. Simplicity.
Avaya now offers high-performance video conferencing that easily connects across mobile
devices, desktops and conference rooms. It’s never been easier to keep your teams connected
and your customers happy. Find out how spontaneous video can be at avaya.com/easyvideo
Connecting your business with video comes easy with Avaya.
January 2013 ARABIAN COMPUTER NEWS 25
/TRENDS
It was an eventful year for the IT sector, with many of the majors undergoing significant changes. ACN takes a look at the industry leaders and events that made headlines in the past year.
2012 IN PICTURES
Still one of the most innovative and influential, not
to mention richest, technology companies in the
world, Apple had a year of mixed fortunes.
March saw the company’s first major product
launch since the death of company founder Steve
Jobs. Apple CEO Tim Cook took the stage for the
launch of the third version of the iPad andd an up-
dated Apple TV, followed by the launch of iPhone 5
in September and the iPad Mini in October. While
the products were well received by the Apple
faithful, many commentators felt that the new
launches were not the big bangs of yesteryear,
with even company co-founder Steve Wozniak
suggesting Apple has lost its innovative edge.
Apple’s patent battle with Samsung finally came
to court in the US in August, with Apple being
awarded $1.05bn in damages, although the ruling
was appealed and Apple’s many other patent law-
suits continue to grind on in different jurisdictions
around the globe.
The company made a rare slip with the launch
of iOS6, in particular its new Apple Maps app that
replaced Google Maps. The flawed application
misplaced locations, didn’t display properly and
gave wrong directions, even leading to warnings
from Australian police not to use the app for fear
of getting sent to the wrong location of several
remote towns, and ending up lost in the Outback.
TIM COOKAPPLE CEO AT THE
LAUNCH OF IPHONE 5 IN SEPTEMBER
Apple losing its shine?US patent win over Samsung nets Apple $1bn, but Apple Maps’ flaws prove embarrassing
Imag
e: Ju
stin S
ulliva
n/Gett
y Ima
ges
26 ARABIAN COMPUTER NEWS January 2013
/TRENDS
For HP, 2012 marked year zero in new CEO
Meg Whitman’s attempts to revive the for-
tunes of the PC giant. Whitman took over the
reins from Leo Apotheker the previous year,
but 2012 saw the first steps in the multi-year
turnaround plan, with variable results.
After confirming that HP is still committed
to the PC business, the company merged its
printer and PC units into the new Personal
Systems Group, which then launched 80 prod-
ucts in May. Across the various business units,
HP continued with product launches, notably
new Windows 8-based tablets, cloud technol-
ogy and services.
The revival plan was not all positive howev-
er, as the company announced 29,000 job cuts,
and financial performance was still problem-
atic. HP announced a write down of $8 billion
from its Services division during its fiscal third
quarter, a move that stemmed from its $13.9
billion acquisition of EDS in 2008, and then in
November took another charge of $8.8 billion
for the fourth quarter, after uncovering seri-
ous accounting irregularities in its Autonomy
business. HP said that more than $5 billion
of the charge related to these accounting
irregularities in Autonomy, which HP bought
for $10.2 billion in 2011. Overall the company
posted a loss of $12.7 billion for FY2012.
HP talks turnaroundStrategic plan to revive HP’s fortunes hit by EDS and Autonomy charges
MEG WHITMANPRESIDENT AND
CHIEF EXECUTIVE OFFICER OF HP
Imag
e: Ca
rla O
sberg
Photo
graph
y
/TRENDS
28 ARABIAN COMPUTER NEWS January 2013
2012 was a big year for product
launches for Microsoft, as the
company released the latest
version of the Windows OS and
more. Windows 8, complete
with a new touch-screen ori-
ented user interface, which may
or may not still be called Metro,
was released with much fanfare
at the end of the year, followed
by Windows Phone 8.
The OS was met with com-
plaints that the tablet-style
interface was confusing to use
on a normal desktop, and initial
uptake has been slower than
that of Windows 7. Other nota-
ble launches included Windows
Server 2012, and, in a shock
move, Microsoft announced its
first PC hardware, the Sur-
face tablet. Reaction from PC
OEM partners was mixed, with
some suggesting that Surface
threatened their relationship
with Microsoft. Last year also
saw rebranding efforts, includ-
ing a new Windows logo and
the rebranding of Hotmail as
Outlook.com.
Last year also saw the
departure of 23-year Microsoft
veteran Steven Sinofsky, who
was president of Microsoft’s
Windows and Windows Live
business. Sinofsky, who was
seen as a possible future leader
of the company, left under
something of a cloud, with sug-
gestions that he had fallen out
with other department heads
and was trying to take control of
the Windows Phone division.
Microsoft year of launchesWindows 8, Windows Phone and first tablet hit market
STEVE BALLMERMICROSOFT CEOLAUNCHES THESURFACE TABLET PC
Imag
e: Ke
vork
Djans
ezian
/Gett
y Ima
ges
Imag
e: KIM
IHIR
O HO
SHIN
O/AF
P/Ge
tty Im
ages
/TRENDS
30 ARABIAN COMPUTER NEWS January 2013
2012 also marked a landmark year for social media, or
at least a proof of its ubiquity among consumer users.
US president Barack Obama set a new record for Twit-
ter, after his Tweet announcing “Four more years” was
re-Tweeted 816,000 times. It was not the only record of
the presidential campaign, with the first US presiden-
tial debate generating ten million tweets, and another
record for number of Tweets per second, hitting 2,615
per second.
The 2012 London Olympic Games also set records, with
20 million hours of video streamed online, and 150 million
Tweets about the games sent throughout.
Further evidence of the importance of social media
came from the emergence of a number of cyber attacks
against popular services, including Facebook, Twitter
and even Pinterest.
Social media didn’t get everything its own way however.
In May, Facebook listed on the Nasdaq, with much hype,
and a share price of $38, which valued the company at over
$100 billion. Technical problems in trading, and market
skepticism, saw the stock drop almost immediately, reach-
ing a low of $17.55 by September. Facebook CEO Mark
Zuckerberg later described the share price as “disappoint-
ing... It’s not the first up and down that we ever had.”
Social media landmarksNew records for Twitter and others as social media continues to take hold
MARK ZUCKERBERGCEO OF FACEBOOK,STILL THE WORLD’SYOUNGEST BILLIONAIRE
Imag
e: Pie
rre Ve
rdy/AF
P/Ge
tty Im
ages
/TRENDS
32 ARABIAN COMPUTER NEWS January 2013
Among Middle East IT security professionals,
2012 will probably be remembered as a wa-
tershed year, with a number of attacks actively
targeting the region. Several advanced persis-
tent threats (APTs) were uncovered, including
Wiper, which destroyed data on systems at
Iranian oil facilities; Gauss spyware that moni-
tored transactions with Lebanese banks; and
Mahdi, another spyware targeted at Iran.
The most sophisticated malware uncovered
was the multi-part cyber espionage tool kit
known as Flame. The complexity of the spy-
ware and its ability to change methods, seek
specific targets and cover its tracks surprised
security researchers, with Kaspersky Lab
describing it as potentially “the most sophisti-
cated cyber weapon yet unleashed”.
In the most high profile incidents, Saudi Ar-
amco and Qatar’s RasGas were both hit by cy-
ber attacks at the end of August. Aramco was
forced to restore 30,000 workstations after the
Shamoon malware deleted their master boot
records. It is not known if the malware stole
data before destroying the systems. Khalid
Al-Falih, CEO of the oil company said that oil
production was not affected, and Aramco later
said that the attack did not involve insiders,
despite earlier reports to the contrary.
Security meltdownMiddle East targeted by wave of complex cyber attacks; Saudi Aramco takes hit
KHALID AL-FALIHPRESIDENT AND
CEO OF SAUDI ARAMCO
34 ARABIAN COMPUTER NEWS December 2012
/TRENDS/TRENDS
34 ARABIAN COMPUTER NEWS January 2013
RIM not in a death spiralMobility leader suffers through lack of new products, banking on BlackBerry 10 launch
BlackBerry maker Research in Motion had a turbulent
year, with product delays exacerbating the company’s fi-
nancial worries, and chief executive Thorsten Heins even
going as far as denying that RIM is not in “a death spiral”
during a radio interview.
Heins took over leadership at RIM from company
founders Jim Balsillie and Mike Lazaridis in January, as
the company saw market share slip and revenue decline
for the first time in nine years from its second quarter
results in June of the preceeding year.
The company launched a CORE project (Cost Optimisa-
tion and Resource Efficiency), in March, to reduce the
number of layers of management; streamline supply
chain and manufacturing, increase outsourcing and fo-
cus on sales and marketing to chase profitable business,
and also announced 5,000 job cuts as part of the plan. In
June RIM posted its first quarterly loss, of $518 million,
for seven years, and revenue was down 33% from the
previous quarter and 43% from the same quarter 2011.
The company’s share price improved towards the end
of the year, as RIM has announced the global launch
event for the new BlackBerry 10 operating systems and
smartphones that will take place on 30th January, but
analysts are still not convinced that the new launch and
an enterprise beta testing scheme for BlackBerry 10 will
be enough to turn around RIM’s fortunes.
THORSTEN HEINSRESEARCH IN MOTIONCEO PREVIEWSBLACKBERRY 10
Imag
e: Ju
stin S
ulliva
n/Gett
y Ima
ges
/EDITOR’S COMMENT
36 ARABIAN COMPUTER NEWS January 2013
CEO Marc Benioff recently let slip that Emirates Airlines is adopting its Sales Cloud solution for its reps, and Microsoft is aggressively promoting its Office 365 solution in the Mid-dle East. Several of the telecoms operators are also looking to roll out public cloud services, so we may finally see public cloud make an impact.
As for the other parts of the platform, you only have to at-tend any local IT conference to see the amount of attendees that rely on tablets or smartphones – most conference ses-sions are practically lit up by the glow from dozens of mobile devices. Not all corporate applications have been made mo-bile-ready, but the software vendors are putting a lot of em-
phasis on pushing applications to mo-bile platforms, so mobility could be just an upgrade away, if the device manage-ment problem can be addressed.
Analytics and social are the sticking points at present. Analytics, or big data analytics, is a little bit hard to define. Data warehousing and basic business intelligence solutions are not uncom-mon, but it would be interesting to know how many companies are genu-inely leveraging this business insight to steer strategy. ‘Bigger’ big data solu-tions, like in-memory computing, are still at the pilot stage at best.
My impression of businesses go-ing ‘social’ in the region is that there’s
not much beyond Facebook pages and Twitter accounts at present. The huge popularity of Twitter in the Arab world means that any consumer-facing organisation needs to keep social media in mind, but it might not be so relevant to most. The idea of social business technologies for internal collabo-ration and so on is interesting, but I’d suggest minimal in the region — but I’d like to hear from any organisation that has been able to make this work.
Although the Middle East might still be putting all the parts of SMAC, or the Third Platform, into place, it still rep-resents a potent vision of how the IT landscape could shape up. It is going to be interesting to see how closely the indus-try follows the prediction.
Mark SuttonSenior Group Editor
On the path to the Third PlatformWelcome to the first issue of ACN for the New Year, I hope it is peaceful and prosperous for you all. In this issue, we’ve gathered together some of the predictions made by IT analyst com-panies for the coming year.
As usual, there is some consensus and some disagree-ment, on the technologies and trends that are going to shape the industry in future. One of the most interesting predictions came from IDC. The company has essentially de-scribed a vision for computing that pulls together four key areas of tech-nology - cloud, social, big data analyt-ics and mobile – into what it is calling the Third Platform. IDC predicts that 80-90% of all industry growth between now and 2020 will be driven by this Third Platform, and that there will be an “explosion” of new solutions based on it. The vision extends to emerging markets, which will see a rapid up-take of all the component pieces of the Third Platform.
The importance and interrelation between these technologies is not an entirely new idea. The ‘SMAC’ acronym — for Social, Mobile, Analytics and Cloud — was in use at least by the middle of last year, but most commentators acknowledge that as a model, it is a coherent vision of how computing will develop.
At present however, it is perhaps premature to talk about a single ‘platform’ as the component parts of the model are at varying stages of adoption. Ranjit Rajan, IDC, research director, Software & Services, MEA region, told ACN that there was already interest in private cloud in the region, but with some of the major providers such as Google, Microsoft and Salesforce.com increasing focus on the region, public cloud is likely to get more attention this year.
Will 2013 be the year that public cloud is accepted in the Middle East? Quite possibly. Private cloud is on the rise among larger organisations, but it would be interesting to know what proportion of local companies are only just starting down the path to virtualisation. The OTT cloud providers are gaining ground in the region — Salesforce.com
January 2013 ARABIAN COMPUTER NEWS 37
/COMMENT
Windows 8 security implicationsNicolai Solling, director of Technology Services, help AG, discusses
some of the possible security implications of Microsoft’s new operating
system, and what it might mean for corporate deployments.
Reaction to Microsoft’s Windows 8 OS, with its new look user interface, has been mixed, and although there is lit-tle expectation of immediate corporate uptake, the OS is still likely to appear in the workplace through employ-ees’ own devices. According to Nicolai Solling, director of Technology Services for help AG, the technical secu-rity of the operating system is a major improvement over past iterations of Windows.
“Windows 8 has done away with a lot of the technical lack of secu-rity that was part of the old Windows platforms,” Solling said. “Every single time we see Microsoft release a new version of software, what has been very good to see is that at the core of any new enhancements, there have been security enhancements.”
Solling points to technical enhancements in Windows 8 that should help address specific threats. The OS now has a dynamic mem-ory allocation feature to combat buffer overflow problems. Windows 8 also supports a new way of controlling the pre-boot environment, to make it harder for rootkits to hijack the PC during boot-up, and the Early Launch Anti-Malware feature allows anti-malware solutions to be the first non-Microsoft application to run on boot-up.
“We are not going to get into the situation where Windows 8, or any kind of operating system, is going to be bullet proof,” Solling commented. “There is a very big concern with Windows 8, in that the change in the graphical user interface is pretty dramatic.”
The change to the way Windows 8 looks and works, has potential to cause problems initiated by the user, he explained. There are some specific features that are less secure, such as IE10 running on Win-dows 8 not showing the web address bar, but the issue in general is about users lack of familiarity with the operating system.
“Users do not know the normal behaviour of this operating sys-tem. If you have a security event on the system, is it because the system is behaving in a different way because it is Windows 8, or is it because there is a malware running on my PC? It is about user awareness of how that specific OS works,” he said.
“If look at Norton 360 in the Metro GUI, it looks very, very differ-ent than it did in Windows 7. One of the things that people ask is ‘what is a good AV?’ My advice is ‘one that you know and are comfortable with’. If you do not understand the information it is giving you, you are going to end up being less secure. It is going to be a steep learning curve for a lot of users.”
Solling also sees a risk from pirate software containting malware, that users might install as they upgrade their applications: “In Win-dows 8, in order to utilise the whole Metro UI, you also have to up-
grade your Office packages and other applications to take advantage of this new user interface. That means that people need to re-invest in all of this software, and when people need to re-invest in software, there is a big window for software piracy. Every time there is a release of a major Microsoft product, we see this.”
There are other risks that arise from features such as close inte-gration of the OS with SkyDrive cloud storage, which creates a poten-tial security hole for enterprises. As an OS that is initially going to get uptake with consumers, Windows 8 also shares the same BYOD con-cerns as iOS or Android. Overall however, Solling expects the security benefits of Windows 8 will prove themselves.
“We are going to see a short term increase in risk, but in the longer term, think about the benefits that organisations will have of running one unified security policy across smartphones, laptops, tablets, serv-ers, everything — that is where we will see the real security benefits of Windows 8 in the future.”
Solling: Lack of user familiarity with Windows 8 is likelyto cause some security issues.
“THERE IS A VERY BIG CONCERN WITH WINDOWS 8, IN THAT THE CHANGE IN THE GRAPHICAL USER INTERFACE IS PRETTY DRAMATIC.”
/COMMENT
38 ARABIAN COMPUTER NEWS January 2013
Intelligent Data Management cuts Big Data chaosAllen Mitchell, Senior Technical Account Manager, MENA, CommVault
outlines how businesses can best tackle the challenges of managing large
volumes of data while ensuring that information remains accessible
One of the big topics around IT discussions these days is Big Data. In thinking about today›s data centre trends — the growth of unstructured data, the uni-versal adoption of virtualisation and increasing con-solidation — an interesting paradigm is developing. Big Data is something that can creep up on you and before you realise it, it can be causing huge expense and present new types of risks, complexity and cost.
What often starts as a project can become business critical and the bigger it is, the harder it is to keep it available or recover in an emergency. Most organisations distribute data over a number of systems and because it’s distributed, the true costs are hidden.
As organisations experience the Big Data phenomenon, they are faced with several challenges. Protection and disaster recov-ery can be staggeringly expensive. To mirror 1TB these days is relatively inexpensive, but to mirror 500TB on high-end disk for scientific analysis is cost prohibitive for all but those with very big purses. Even backup to relatively cheap media like tape can be expensive due to the sheer volumes involved. The other issue is time — while everything is faster today than it used to be, mov-ing even modest amounts of terabytes around can take a while, let alone tackling petabytes!
So how do companies deal with Big Data? Using storage re-source management (SRM) software is a good start. SRM reports present a consolidated view of all storage resources, including logical and physical components, providing unified tools to ana-lyse storage requirements and plan storage infrastructure for the
purposes of capacity management, content management, and his-torical data management across the entire enterprise.
Not only will this type of trending warn you that you’re head-ing down the Big Data path, but it can help drive archiving poli-cies for effective long term storage and keep costs under control. Big Data needs expert handling and getting the right help early on can make a big difference. So while it’s not easy to spot a problem before it becomes acute, doing so can save companies a lot of ex-pense and pain. Choosing the right technology is critical. Today’s legacy data management tools just aren’t up to the task.
According to a CommVault-sponsored CIO Market Pulse Sur-vey on data protection and management that polled 111 IT and business management professionals, 42% of respondents de-scribed their organisations’ data management processes as ‘out-dated’, and 31% called it ‘chaotic’. More than half stated that data searchability and the current level of automated data manage-ment is less than adequate.
Overall, those surveyed cited improving operational efficiency, the ability to access and analyse information and flexibility as the top business drivers for investing in data management solutions.
So what if you could reign in the wild growth of unstructured data in the Big Data era using fewer resources? Managing, pro-tecting and understanding the business value of the data you have can have a tangible impact on business agility and the bottom line.
The advent of Big Data is causing IT to rethink and possibly redesign architectures to accommodate business requirements as data volumes grow. The only way to accommodate such growth is
Mitchell: Many companies struggle to properly manage their data.
“MANAGING, PROTECTINGAND UNDERSTANDING THE BUSINESS VALUE OF THE DATA YOU HAVE CAN HAVE A TANGIBLE IMPACT ON BUSINESS AGILITY AND THE BOTTOM LINE.”
January 2013 ARABIAN COMPUTER NEWS 39
/COMMENT
to implement a modern approach to data management. Custom-ers need:• A highly scalable repository for unstructured data• Protection and archive from a single pass through the data• Storage tiering to lower costs
And it all needs to be done from a single management console with application-aware snapshots, replication, data deduplica-tion, encryption, and a range of other built-in features.
Studies estimate that multiple copies of files now require organisations to use and administer 2 to 50 times more storage than they actually need. Given the impact on the bottom line, or-
ganisations need to recognise that, far from being a niche tech-nology, deduplication needs to become standard practice and an integrated element in their overall IT strategy. Data deduplica-tion lets you significantly reduce the amount of disk you need for backup. Deduplication results in improved backup windows, faster restore and recovery, and reliable transfer of data for disas-ter recovery copies.
Every IT vendor out there is trying to stake its claim to be the de facto standard for managing Big Data environments. Vendors who have a unique approach that stands out from competition will have success in the world of Big Data.
“BIG DATA IS SOMETHING THAT CAN CREEP UP ON YOU AND BEFORE YOU REALISE IT, IT CAN BE CAUSING HUGE EXPENSE AND PRESENT NEW TYPES OF RISKS, COMPLEXITY AND COST.”
August 2012 ARABIAN COMPUTER NEWS 41
/HELLMANN WORLDWIDE LOGISTICS
January 2013 ARABIAN COMPUTER NEWS 41
WHEN HELLMANN WORLDWIDE LOGISTICS NEEDED TO UPGRADE ITS LOCAL SERVER ENVIRONMENT, THE COMPANY DECIDED TO LAUNCH A PROJECT OF DATA CENTRE VIRTUALISATION, TO CREATE AN IT INFRASTRUCTURE THAT WOULD BOTH PROVIDE ENHANCED EFFICIENCY AND HELP THE COMPANY TO CONTINUE WITH RAPID REGIONAL EXPANSION
BY MARK SUTTON
Hellmann Worldwide
Logistics chose to virtualise its local
data centre, rather than just replace
its old servers and infrastructure,
says Altaf.
GETTINGVALUE FROM VIRTUAL
/HELLMANN WORLDWIDE LOGISTICS
42 ARABIAN COMPUTER NEWS January 2013
irtualisation is at the core of many of the advances made in ICT in recent years, bringing enhanced ef-ficiency to environments and ena-bling new models including cloud computing. The technology has taken off, with widespread adop-tion in many larger enterprises, al-though virtualisation has not been universally adopted. According to TechTarget, two-thirds of organisa-tions have virtualised 50% or less of their infrastructure. Roadblocks to virtualisation include lack of skills, confusion over tools for server availability and performance monitoring, managing storage and backup of virtual machines, and software licensing issues. Many
of these hurdles were faced by the Middle East operations of logistics provider Hellmann Worldwide Logistics when it looked to virtualise its data centre, but the company approached them as challenges to be overcome, rather than a reason not to go forward with modernising its infrastructure.
The logistics provider, which is headquartered in Germany with operations in 54 countries worldwide, began operations in the Middle East in 1999. With specialities in automotive and healthcare, both busy sectors for the region, Hellmann’s busi-ness in the Middle East has expanded rapidly. The company began with a user base of around 40 people, but has since grown from its local headquarters in Dubai’s Jebel Ali Free Zone, to include 15 facilities in the region and an internal user base of over 130 users. The rapid growth experienced by the company over the past few years resulted in a burden on the IT infrastruc-ture, according to Siddiqui Altaf, IT manager for the Middle East Region for Hellmann.
“We had a massive challenge of how do we accommodate IT, and facilitate our users with IT services, using the existing infrastructure. We decided to start off on a project for server virtualisation,” he explained. “We had a discussion, and came up with two options — option A, if we just replace the existing environment, or option B, if we plan for the future — and go with server virtualisation in a high-end environment. After discus-sion with the management and my regional boss in Australia,
we concluded that, based on our expansion, we would go with option B.”
The company scoped out the project, and selected local systems integrator NewRAS as the partner for the project, based on the support and interactions with NewRAS’ technical team and management, its expertise in virtualisation and integrating multiple vendor environments, and through understanding of Hellmann’s business needs, including strict compliance require-ments for standards including ISO 90001 2008.
A number of options for the hardware and software were considered for the project, with the final choice made to deploy IBM blade servers in a BladeCenter H Chassis, with VMware virtualisation software and Veeam virtualisation backup and management software.
IBM hardware was selected, as it is Hellmann’s global stand-ard, which simplifies the operating environment and means that Hellmann’s global IT team is able to provide assistance with any support issues. IBM BladeCenter H Chassis was selected as it has support for SAN, and the project also includes virtualised SAN storage and an IBM tape backup library, part of the com-pany’s audit requirements.
“The reason we selected VMware is it is one of the best prod-ucts in the virtualisation environment that we have seen so far; and it is used in our global and regional offices,” Altaf said. “We
Kurup: Flexible IT solutions are essential for the company to be
able to roll out innovative new logistics services and to expand
into new territories.
“THERE WERE DEFINITELY CHALLENGES TO DEPLOY LOCAL AS WELL AS GLOBAL APPLICA-TIONS. WE HAD TO OVERCOME IT, WE FOUND OUT VARIOUS SOLUTIONS TO OVERCOME THE PROBLEMS AND MAKE IT WORK IN OUR ENVIRONMENT.”
/HELLMANN WORLDWIDE LOGISTICS
44 ARABIAN COMPUTER NEWS January 2013
HELLMANN WORLDWIDE LOGISTICS VIRTUALISATION PROJECT SOLUTIONSIBM BladeCenter H chassis
IBM blade servers
VMware virtualisation
VMware vCenter Operations Manager
Veeam virtualisation backup
IBM fibre SAN
IBM Tape Library
WhatsUp server monitoring
AnywhereUSB
went with VMware vCenter Operations Manager, which gave us entire visibility on how the systems run, what the capac-ity utilisation is, and lets us manage our virtual environments with various alerts and automation.”
The need for backup that would meet compliance standards, and how to manage that in a virtual environment was a particular challenge to Hellmann. Many of the audit points related to SAN usage and FTP ports. The company selected IBM fibre channel SAN storage and tape drive, to standardise with the rest of the organisation globally, and to get the performance benefits of fibre channel systems, but selected backup administration solutions from Veeam, over its global vendor Symantec. Altaf said that Veeam offered a wider function-ality, and provides more flexibility and automation to manage the virtual storage.
“We are a heavily audited company and NewRAS came at the right time and helped us design our virtualisation project and consolidate our storage making it fully redundant, and gave us a perfect solution for our data backup and replication,” he said.
As virtualisation was a new technology to the local IT team, Hellmann drew on NewRAS’ expertise, while Altaf and another member of the team qualified as VMware Certified Professionals (VCP) to ensure that they had proper product understanding and
awareness to optimise and utilise the technology in-house.Another area where Hellmann faced challenges was in shift-
ing applications to a virtualised environment. While the local infrastructure hosts applications such as local apps, file and print servers, mail servers, billing management systems and access con-trol, the company has a number of applications hosted at its global data centre, along with applications including a Kofax archiving application and WhatsUp server monitoring, that reside locally, but which are integrated with central applications.
“There were definitely challenges to deploy local as well as global applications,” Altaf said. “We had to overcome it, we found out various solutions to overcome the problems and make it work in our environment.”
One of the sticking points was that several local applications used licences hosted on USB dongles. Without physical connec-tivity to the virtual machine, these licences would not work. The
/HELLMANN WORLDWIDE LOGISTICS
45
company was able to switch some licensing to a software-based model, while for other applications, a solution from Anywhere-USB was deployed to allow USB dongles to still be used.
With the first phase of the project completed, Hellmann has already realised a number of benefits from virtualisation. The physical server environment has been reduced from 30 servers down to the single chassis, providing more efficient power and cooling, reducing the physical footprint and simplifying adminis-tration. The project has enabled migration from Novell’s eDirec-tory to Microsoft Active Directory, and 80% of the points of audit have been eliminated, through following global security policies and standards while deploying the infrastructure.
The time to provision a new server has gone from four and a half weeks to just five minutes, which allows the IT organisation to be much more responsive to the end users and requests for resources, which is particularly important in providing special-ised logistics services, Altaf explained: “IT operationally is very important; it is a niche user organisation environment, the users are heavily dependent on IT for providing services to the custom-er — it is a very particular environment.”
Madhav Kurup, CEO for Middle East and North Africa at Hell-mann added that new infrastructure will help support the com-pany in its ongoing expansion into new territories in the region.
“In our business, IT and the investment in IT is becoming a critical part for the value differentiation that you bring to the customers, especially in the vertical specialisations we have that have helped us to grow, specifically in automotive and healthcare,” Kurup commented. “Creating customised IT solutions to support our operational processes is one of the key success factors behind our growth.”
“IN OUR BUSINESS, IT AND THE INVESTMENT IN IT IS BECOMING A CRITICAL PART FOR THE VALUE DIFFERENTIATION THAT YOU BRING TO THE CUSTOMERS.”
Altaf: Hellmann and NewRAS identifi ed a number of supplementary solutions that would assist them in making the virtualisation project workable.
The second phase of the project, one of the additional reasons for initiating virtualisation, is to move the local desktop environ-ment to a virtual basis. The IT team are aiming to eliminate pur-chases of fixed assets, and to that end, plan to roll out virtualised desktop solutions from Citrix for end users.
While Hellmann’s data centre virtualisation project faced many of the obstacles that currently dissuade companies from vir-tualisation, Altaf said that the project shows there are solutions to tackle those obstacles: “There are hurdles in every project, but we had to overcome them. Our planning, processes, and documenta-tion was done in great detail before we went into this project, to make sure that the outcome of this project was successful. It was tough at the start, but through hard work, we can enjoy the fruit of our labour.”
August 2012 ARABIAN COMPUTER NEWS 47
/2013 PREDICTIONS
January 2013 ARABIAN COMPUTER NEWS 47
WITH NEW COMPUTING MODELS EMERGING THAT ENCOMPASS ALL ASPECTS OF INFORMATION TECHNOLOGY, ARABIAN COMPUTER NEWS ASKS MIDDLE EAST IT ANALYSTS FOR THEIR PREDICTIONS FOR THE FUTURE OF THE INDUSTRY IN 2013
BY MARK SUTTON
The IT industry in the Middle East is
likely to see a lot more reliance on
cloud and services as companies
look to more cost effective models
of computing.
PREDICTING THE 2013 IT LANDSCAPE
“2012 SHOWED US THAT SO-CIAL MEDIA CAN NO LONGER BE IGNORED. ORGANISATIONS NEED TO BROADEN THEIR FOCUS FROM MAINSTREAM FORMS OF DATA COLLECTION TO INCLUDE NON-TRADITIONAL DATA TYPES.”
/2013 PREDICTIONS
48 ARABIAN COMPUTER NEWS January 2013
he start of a new year traditionally brings with it thoughts on the direc-tion that the IT industry will take in the next twelve months, with the major analyst companies setting out their predictions on the trends and technolo-gies that will shape the development of the business, and drive strategies and spending for CIOs. As a unique market, with its own distinct challenges, the Middle East doesn’t always follow glob-al trends, so Arabian Computer News asked analysts based in the region for their predictions for 2013.
There are many areas of general agreement among the analyst com-munity for the trends that are likely to have the most impact. Four of the big drivers — cloud computing, social, big
data analytics and mobility — are identified by IDC as a holistic, interrelated set of technologies, that are coming together in what it describes as the ‘Third Platform’. The Third Platform is seen as a once-in-twenty-year-shift in computing, that IDC predicts will ac-count for 90% of all industry growth to 2020, with a major growth of new solutions based on the platform.
Mahapatra: Green IT, social and cloud
computing will be talked about a lot
in 2013, without signifi cant uptake.
Ranjit Rajan, research director, Software & Services, IDC MEA region said that while there is an increased interest and ap-petite in these four technology drivers in the Middle East, there is a varying degree of interest in each.
In cloud computing, Rajan expects 2013 to be the year that the region begins to take a much larger interest in public cloud, with development previously confined to private cloud projects. Global Over The Top (OTT) cloud providers such as Google, Salesforce and Microsoft are actively promoting their offerings in the region, and more and more large enterprises are seeing the application-as-a-service model as an attractive option to rapidly provision services such as email and productivity for branch offices, along with CRM, project management and HR management.
“There has been a lot of interest in private cloud, but not so much in public cloud services, but I think we are beginning to see a greater interest in public cloud and I think that [in 2013] we are going to see a lot more,” Rajan said.
The adoption of ‘social’ technology has similarly been one-sided, with little business adoption, he added: “Obviously there is a lot of activity on the consumer side around social networking and social media, but on the social business side, it is still early days. The use of social platforms internally within the organisation will be the key shift, I think we will see this probably within the next two years; I don’t see it happening immediately.”
Haritha Ramachandran, program manager, Information and
January 2013 ARABIAN COMPUTER NEWS 49
/2013 PREDICTIONS
Communication Technologies Practice, Frost & Sullivan, also sees social media having more of an impact in the region. She points to ‘Social’ as one of three ‘S’s, the other two being security and services, that will drive the market in 2013. Social media is of particular relevance to big data analytics as companies look to better analytics tools to make sense of the data available from non-traditional sources such as social media.
“2012 showed us that social media can no longer be ignored. Organisations need to broaden their focus from mainstream forms of data collection to include non-traditional data types. To verify and garner a 360-degree view of their customers, companies need to gather non-traditional data via social customer relationship management and other social media sources. In 2013, with more organisations looking at big data, solutions such as open source-based Hadoop Distributed File Systems [HDFS] and database ori-ented NoSQL are likely to show significant growth, as are business intelligence tools for analysing and presenting results,” she said.
“2013 is expected to be all about looking at big data with proper analytical tools and deriving the right answers from the mountain of data available. The results of these projects will begin to be felt in 2013, but the scale of data and amount of processing required will not see results hitting most businesses until 2014.”
Not every analyst expects social and cloud to make an impact in the region however. Biswajeet Mahapatra, research director for Gartner, believes that lack of confidence in social solutions, and their perception as not enterprise-relevant, along with lack of major cloud providers and overwhelming data protection and security concerns, will make both technologies non-starters for the region at present.
“Green IT, social, and cloud will be much talked about but very much less adopted. Out of these, private cloud adop-tion will be done in bits and patches in enterprises, but nothing beyond that. So-cial is a big no-no for business and cloud is looked at with suspicion — especially the public cloud. Security and lack of data protection and privacy laws will be the major reasons for very low to negligible adoption of cloud,” he said.
Osama Ghoul, managing partner, Devoteam, also sees resistance to cloud in the region: “Cloud and mobility stand to be the two domains that we expect to see on the CIO agenda. Having said that, during
Rajan: 2013 will be the year that public cloud
makes an impact in the region, with
emphasis on global players and telcos.
Social media can no longer be overlooked
by organisations that want to improve customer data, says
Ramachandran
GROWTH SECTORSIT expenditure in the region is likely to follow a familiar pattern in the region in 2013, according to Biswajeet Mahapatra of Gartner.
“Government is one of the largest IT spenders in this region and will continue to be. Globally, spending by local and federal governments is predicted to be flat, or we will see a minimal 1% increase in spending. However, that percentage will be much higher for this region as governments are in overdrive working to IT-enable services and provide welfare schemes. Governments in this region are also looking at developing models to help provide cheaper IT services to SMBs and single users to help them in their business and education. Hence, overall IT spending in the Middle East, as a percentage of Opex, will also be much higher than the global average of 3.3%.”
Other sectors that are predicted to see IT spending higher than global levels include construction, healthcare, manufacturing, utilities, energies, oil & gas and banking, Mahapatra said, as these sectors adopt the latest technologies, including virtualisation, consolidation, application integration, hardware refresh and best practice adoption.
“The most interesting aspect of this investment is that most of it, except for the hardware refresh, will be in the Grow area, which means there is going to be a lot of push for newer technology and best practices,” he said. “This is also based on the fact that economies in this region are by and large doing well, so they expect business to grow and they need to adopt newer technologies to help them serve business needs.”
/2013 PREDICTIONS
50 ARABIAN COMPUTER NEWS January 2013
a survey that we did it was clear that more than 50% of CIOs are still skeptical with regards to adopting the cloud as a way of life, especially because the vendors have yet to clearly identify the real benefits of adopting this new technology in the context of the Middle East.”
Mahapatra expects to see organisations in the region continue to develop virtualisation projects, with realistic and cautious investments in virtualisation. Companies will virtualise non-core apps and develop proof-of-concept projects first. Data centre con-solidation, including storage, applications and infrastructure, will be one of the main areas for investment in 2013.
One trend that all of the analysts agree will have an impact in the region is the continuing influence of consumer technology in the workplace, although the trend is not without its challenges. Stephen Ardill, partner and lead for AT Kearney’s Strategic IT Practice in the Middle East, said that consumer consumption of technology is creating business end-users who demand better ac-cess, higher quality services, and a greater say over their comput-ing environment. They are also responsible for the proliferation of private devices in the workplace.
“Bring Your Own Device (BYOD) will come to the fore in 2013 as organisations struggle to contain the impact of consumer-led IT whilst reconciling the need for tighter security given some of the high-profile cyber-attacks that occurred in the region last year.
“2013 IS EXPECTED TO BE ALL ABOUT
LOOKING AT BIG DATA WITH PROPER ANALYTICAL TOOLS AND DERIVING THE
RIGHT ANSWERS FROM THE MOUNTAIN OF DATA AVAILABLE.”
Bring Your Own Device will bring
new challenges for security and data management this
year, says Ardill.
The other challenge to be addressed will be around personalisa-tion and the pressure to deliver more granular, segment-specific services in a cost-effective and repeatable manner,” he said.
Rajan also predicts that BYOD will create security issues for IT: “There will be significant challenges, particularly around secu-rity and mobile device management — it won’t be easy. IT depart-ments will be under a lot of pressure to allow BYOD from business, and IT is facing significant challenges on how to manage it.”
Ardill also expects that many companies will revisit their ERP deployments this year, driven by maturing solutions, and the need to ensure solutions are fit for ongoing regional expansion
“The focus going into 2013 will be on simplification and consolidation, with a rationalised ERP vendor base and a broader deployment of more standardised solution templates, enabling improved business integration and reporting and greater transpar-ency and comparability of enterprise information,” Ardill said.
Another area where the majority of analysts are in agreement, is the drive to extract value from existing solutions. With IT budg-ets still under pressure, IT departments are rationalising their solutions, and looking to gain maximum return on what they have, as well as looking to technologies such as cloud and virtualisation. According to Mahapatra, this pressure also means that compa-nies are looking to intelligent investment at the right price, which
January 2013 ARABIAN COMPUTER NEWS 51
/2013 PREDICTIONS
should lead to a marginal improvement in the best pricing.Ramachandran said that the drive to push value from IT solu-
tions will focus both on traditional cost reduction such as out-sourcing, and implementing new technology as well as streamlin-ing existing processes and systems. IT is also likely to be asked to help create new revenue, she said.
“IT’s role in providing revenue growth through innovation has often been downplayed in the region. In 2013 C-level executives are expected to be tasking their IT leaders to help provide new services and products, or come up with other areas of expanding revenue streams,” she said.
Ghoul also sees a shift in the agenda: “We are seeing new trends starting to appear in the market which are driven more by corporate CEOs , rather than by CIOs, in which the aim is to transform the business using IT. This is surely a new era for IT as the function of IT is changing from being a business enabler into becoming a business changer.”
Budget pressure will in part drive strong growth across the services sector in the region, while increasing market maturity and the emergence of larger players will see services including managed security, cloud, IT-as-a-service in various flavours, hosting for backup and recovery come to the fore. Frost & Sullivan predicts managed services to grow by 18.8% CAGR from 2011 to 2018. The leaders of the market are still emerging as global cloud players, local systems integrators and the local telcos all look to build strategic alliances to capture the market.
“It’s an area in which competition has been heating up, with local Telco players, global giants such as Google and Amazon, as well as system integrators, all targeting this segment,” Ardill commented. “To support business growth, larger organisations will also tap into hosted services that will allow them to trial new applications at a lower risk and cost.”
While these new services will take some of the load off of the region’s IT departments, the emergence of new technologies will add to the persistent problem of skills shortages among local organisations, IDC’s Rajan predicts.
“The skills challenge will continue. It has always been a big challenge in the Gulf, but I think the challenge will modify a bit, and it will worsen, with the requirements of the Third Platform,” he said. “The Third Platform technologies will require a different set of skills, and while IT departments will try and adopt these Third Platform technologies because of pressure from business, they will not be able to accelerate or rapidly deploy some of these technologies because of skills challenges.”
SECURITY PREDICTIONS“As a result of the high-profile security breaches over the past six to twelve months and before, security is no longer an IT discussion topic, security has been elevated to a C-level, even a boardroom topic,” said Ranjit Rajan of IDC. “The overall discussion will obviously move up a couple of gears, CEOs will start talking more about risk, business continuity, governance, and this is going to be critical, it is going to be a shift for security, and it is going to create tremendous opportunities for the security industry in terms of consulting and technology solutions.”
The BYOD trend is going to drive demand for mobile device management solutions, according to Haritha Ramachandran while convergence is also changing the security landscape: “Technology convergence is driving demand for advanced security intelligence. Security vendors are expected to focus on Next Generation Firewalls (NGFWs) and eXtensible Threat Management (XTM) that will feature added functionalities in one device. These new technologies and services are pushing IT leaders to adapt and integrate what they have with what is new, enabling enterprises to facilitate safer and more productive working environments for their employees.”
Big data will also have an influence on security. Shirley O’Sullivan, vice president of marketing for EMEA at Blue Coat Systems said security companies are looking to improve threat intelligence through greater analysis.
“Security and networking solutions all generate logs – significant amounts of information that tell you about user behaviours, traffic on the network and more. Mining this data to find discernible patterns in risky behaviour, threats and anomalies on the network as well as correlations between behaviour and risk will allow the industry to build new defences that can help users make safer default choices.”
Mobility and the proliferation of devices will create more emphasis on identity authentication and content-based security, as traditional security perimeters become obsolete, according to George Khouri, of CA MENA.
“Strongly authenticated identity is the new perimeter. This places emphasis on reducing risk at the authentication point, signalling the end of the password as we know it today. We will see more risk-based authentication coming into play based on the device, transaction, location and more. We will see industry move towards more intelligent methods of authentication such as pattern creation, image recognition, mobile phone-based authentication, audio and biometrics, and we will see more content-driven security based on what the data is, or how it’s classified, and that information, plus user identity and role, will be used to guide access rights,” he said.
“IT DEPARTMENTS WILL BE UNDER A LOT OF PRESSURE TO ALLOW BYOD, AND IT IS FACING SIGNIFICANT CHALLENGES ON HOW TO MANAGE IT.”
January 2013 ARABIAN COMPUTER NEWS 53
/CRM SOLUTIONS/CRM SOLUTIONS
THE MARKET FOR CUSTOMER RELATIONSHIP MANAGEMENT (CRM) SOLUTIONS WAS CHILLED BY THE ECONOMIC DOWNTURN, BUT COMPANIES ARE BEGINNING TO RETURN TO THE NEW GENERATION OF CRM SOLUTIONS AS THEY LOOK TO BUILD BETTER COMMUNICATIONS, AND BETTER UNDERSTAND CUSTOMER BEHAVIOUR
BY KERI ALLAN
CUSTOMER MANAGEMENT SYSTEMS EVOLVING
CRM applications are evolving to include
new channels of communications with customers,
such as social media, and much greater
depth and analyis of customer data.
/CRM SOLUTIONS
54 ARABIAN COMPUTER NEWS January 2013
doption of customer relationship management (CRM) solutions in the Middle East continues to rise as businesses look for solutions that will ensure customer satisfaction whilst simultaneously cutting costs and increasing productivity.
“CRM software adoption in the Middle East has exceeded the 20% annual growth mark according to the Annual Middle East Call Centre/CRM Conference,” says Karim Tal-houk, Microsoft Business Solutions lead, Microsoft Gulf.
“[Plus] the Middle East contact centre market is currently witness-ing a 30% growth rate in the number of agent positions,” adds Mina Nagy, product manager, BSolutions.
Arnold Gutmann, practice lead CRM, Business Solutions, GBM highlights that CRM initiatives really started in the region around four to five years ago, and after a lull, interest is up again.
“The economic boom surprisingly slowed down CRM efforts and the following economic downturn has stopped them altogether due to a lack of readiness to invest in business software,” Gutmann comments. “The new confidence in the market has reignited the search for more efficient marketing, customer retention and growth strategies especially in the retail and services sectors. CRM is back — with a strong focus on business intel-ligence and analytics.”
Vendors are highlighting that uptake comes from across the board: both SMEs and larger organisations are noticing the possible return on investment (ROI) and benefits a CRM solution can offer.
“In my opinion, ROI for CRM applica-tions can potentially be easy to attain,” says Shaheen Haque, territory manager, Middle East and Turkey, Interactive Intelligence. “The potential areas that can lead to impressive ROI for CRM technolo-gies and provide business benefit include administration/operational efficiencies, better customer brand and product aware-
ness, improved business intelligence, increased customer satisfac-tion and loyalty, and improved sales conversion rates.”
Not only are vendors being approached by new companies, but businesses that introduced traditional systems a few years ago are returning as they’re now interested in investing in more powerful and capable CRM solutions.
Different trends are appearing, such as the move towards more mobile-enabled solutions.
CASE STUDY: COBONE AND SALESFORCE
Cobone, a company that provides daily deals across the Middle East, has a CRM solution from Salesforce. Lead developer Muhammad Minhaj Mehmood believes the company has benefited hugely from its implementation.
“Cobone is an extreme high growth company with double-digit growth month-on-month. We therefore have an enormous need for streamlining, automation of processes and live data for our decision-making,” he says. “For Cobone, the ROI of our CRM is enormous as this finally allowed us to do this effectively. We now have automated business processes and streamlined data flow and dashboards, along with reports providing insights about Cobone’s working.
“The result we have seen in our sales department is an increased ROI of 20% per employee within three months.”
Talhouk: CRM uptake is on the rise in the Middle East, while
solution capabilities continue to provide
new functionality.
Haque: CRM solutions can deliver
considerable business benefi ts across a range of different
operational areas.
January 2013 ARABIAN COMPUTER NEWS 55
/CRM SOLUTIONS
“A hot trend in the CRM industry revolves around mobile,” says Nagy. “With the fast-growing smartphone market, CRM has currently gone mobile and is easily accessible almost anywhere. This new trend is fast gaining ground as the need for easy access is fundamental to any executive.”
“Mobility has moved from being a nice-to-have feature to a necessity,” agrees Haque. “The use of smartphones, iPads, netbooks, tablets and other mobile devices will be used to support customer-facing workers like sales and relationship management employees. Most customers are demanding availability and interaction via this media. The CRM vendors are falling over themselves to provide apps for the popular OS brands. That being said, a cross-platform interface is also an important factor. Customers demand familiarity whether they are using a Mac, PC or tablet.”
Business intelligence is also a keyword right now.“As business intelligence is becoming a built-in function for
most applications, CRM is becoming more analytical with vendors putting more effort into providing analytical tools to help their customers in newer versions of CRM applications,” says Ali Hyder, CEO, Focus Softnet.
Then there’s cloud. Vendors have seen a significant shift, espe-cially from customers with a large install base, migrating to cloud-based CRM applications, as on-premises solutions run into mobility and scalability limitations.
“CRM is one of the first applications that has been accepted as a cloud application. Since most CRM users are on the move, compa-nies expect CRM to be available over the Internet,” notes Hyder.
“There’s no question that cloud-based CRM has taken off in the Middle East and is growing in momentum,” continues Haque. “Cloud CRM and the cloud application offerings from the major vendors such as Salesforce and Microsoft are, we believe, proving most popular.
“Cloud-based CRM applications are especially attractive to cus-tomer experience-focused businesses, be they commercial or public sector,” he adds.
Cloud is very much a growing area, however Salesforce partner NSI Technology is keen to highlight that there are still some issues to overcome.
“Regulation and data privacy laws within the region currently hinder significant uptake,” business development manager Michael Ovens notes.
Social media is also becoming an important part of any CRM solution. Vendors continue to include social connectivity in their so-lutions, allowing businesses to understand social trends and analyse
THE WEAKEST LINKS
Customer relationships are based on good customer experiences, therefore one bad experience can destroy any relationship you’ve built, leading to customer churn and a negative brand reputation. We asked vendors what the weakest links in the customer relationship process are so you can focus on what you need to strengthen.
For Salesforce partner NSI Technology, a weakness is creating unnecessary delays for customers.
“When a complaint is logged, being placed on hold for long periods of time [can be a problem],” says business development manager Michael Ovens. “[Plus] getting through to the wrong department and receiving little or no assistance on how to progress or who to talk to.”
Ali Hyder, CEO of Focus Softnet believes it’s important for top-level management to be fully behind a CRM implementation.
“Most of the CRM projects fail to get implemented or are partially implemented due to the lack of enforcement from the top management. Users, being the weakest link, resist CRM applications, unless they are pushed hard by their top management. Hence the number of enterprises using fully-fledged CRM in the region would remain low,” he notes.
“THE NEW CONFIDENCE IN THE MARKET HAS REIGNITED THE SEARCH FOR MORE EFFICIENT MARKETING, CUSTOMER RETENTION AND GROWTH STRATEGIES, ESPECIALLY IN THE RETAIL AND SERVICES SECTORS.”
their sales and marketing efforts across social media. Of course, in this day and age, organisations that ignore social media are in threat of alienating a huge number of prospects and customers.
“In order to be effective in 2013 and beyond, companies will seek to know more about their customers and use that insight to talk, engage and interact with them more often and more meaning-fully in existing and new innovative ways. For example, dynamic content, blogs and social networking,” Gutmann notes. “This requires CRM solutions to cater for quick and easy personalisa-tion and customisation without losing sight of proven international models and past local experiences.”
There are many different ways social media is being integrated into CRM solutions.
“Complaints and suggestions can be made through Facebook and fed through to Salesforce, with notifications and cases created. Marketing campaigns can also be orchestrated via social media,” highlights Ovens.
/CRM SOLUTIONS
56 ARABIAN COMPUTER NEWS January 2013
Microsoft Dynamics has integrated solutions powered by Yammer and Skype into its CRM offering. “Using Yammer, users can collaborate with colleagues inside their organisation or with customers, partners and other stakeholders. Yammer fosters sim-pler information sharing around customers, business processes and key business documents - all through social networking capabili-ties. It also marks a significant step forward in providing customers with the ability to project CRM information, activities and insights across their organisation,” says Talhouk.
“Skype capabilities connected to Microsoft Dynamics CRM ad-dress an organisation’s need for direct interactions with customers and partners to drive new levels of productivity. With Skype, users can now initiate voice and video communications directly from Microsoft Dynamics CRM, enabling businesses to open communi-cation channels and connect with individuals inside or outside of their organisation,” he adds.
Finally there’s integration. Key integrations to other business systems are critical in today’s business.
“CRM vendors are fostering relationships with ERP and contact centre vendors like Interactive Intelligence,” Haque notes. “Busi-nesses need to consider tight integration points, where it allows the different vendor offerings to operate seamlessly as a single business
CRM is becoming more analytical, with vendors putting more analytics tools into their product offerings, says Hyder.
solution rather than different technology islands,” he notes.“Like it or not, it is essential to integrate CRM with [all other
enterprise applications, such as ERP],” says Gutmann. “Only the hardly achieved concept of a 360° customer view as the core of all business processes within an organisation guarantees success and protects investments. New-generation CRM solutions cater for most common data touchpoints between these applications such as the master data record, financial customer data information, order/in-voice/complaints status, customer product portfolio, credit scoring, risk assessment and productivity/sales efficiency.
“As mentioned above, the ‘Datarati’ will win the race for market share, growth, customer satisfaction and profitability,” he contin-ues. “To be able to become one, all data sources need to be inte-grated and consolidated, and CRM is the place for that. Technically, integration via APIs, Web services, ready-made connectors etc. depends on the IT environment in place/targeted, but the challenge lies with the business process management and the ability to extract actionable meaningful information from the vast amount of data available,” he concludes.
“BUSINESSES NEED TO CONSIDER TIGHT INTEGRATION POINTS, WHERE IT ALLOWS THE DIFFERENT VENDOR OFFERINGS TO OPERATE SEAMLESSLY AS A SINGLE BUSINESS SOLUTION RATHER THAN AS DIFFERENT TECHNOLOGY ISLANDS.”
With Siemoncreating space in your
Data Centre...
...doesn’t have to be difficult
High density, versatile data centre cabinet solution
August 2012 ARABIAN COMPUTER NEWS 59
/SECURITY
January 2013 ARABIAN COMPUTER NEWS 59
WHILE IT ORGANISATIONS ARE MORE COMMONLY CONCERNED WITH VIRTUAL DATA SECURITY, PHYSICAL SECURITY SOLUTIONS SUCH AS ACCESS CONTROL, BIOMETRIC AUTHENTICATION AND IP-BASED SURVEILLANCE ARE INCREASINGLY MOVING INTO THE IT DEPARTMENT’S DOMAIN
BY KERI ALLAN
Physical security solutions are
coming to fore as part of authentication
processes to reduce the issue
of poor practice by end users.
SECURITY SOLUTIONS GET PHYSICAL
/SECURITY
60 ARABIAN COMPUTER NEWS January 2013
n this day and age we’re regularly reminded about our virtual security and keeping passwords secure etc., but it’s just as important not to overlook physical security, which can be as much, if not more, of a threat to busi-nesses.
Physical security solutions such as biometrics, access control and IP-based security are seeing a rise in uptake in the Middle East as leading companies in-crease their focus on security. There is a growing end user awareness of the ROI that security systems offer, and the region continues to see investment across a wide number of sectors including airports, logistics, government, oil and gas, and transport.
“There is growing demand for faster, more ac-curate and more user-friendly identification and verification technologies for a wide range of applica-tions, from border control and aviation security to law enforcement, healthcare, humanitarian aid and dis-aster relief,” says Joseph Pritikin, director of Product
Marketing, Identity Solutions, AOptix. “In the future, ecommerce and mobile banking will be enhanced by these technologies as well,” he adds.
Even so, some experts believe that many companies are still too laid back about physical security.
“On the whole our experience is that organisations in the Mid-dle East do not perceive physical security as a big risk – tending to rely on ‘traditional’ methods like security guards, which lags behind business in the West, and in fact around the world,” says Peter Chadra, chief executive and founder of DrPete Inc, an independent strategic technology advisor.
It cannot be denied, however, that the region is taking more of an interest in physical security solutions, and certain trends are appearing. For example an increasing number of companies are adopting IP-based solutions.
“The reasons are obvious: lowered costs, more responsive, better security,” notes Richard Jenkins, VP of Marketing, RF Code. “ Now, however, IP-based secu-rity is going one step further: it’s merging with other innovative technology solu-tions to provide a consolidated security
“THE PRIMARY REASONS BIO-METRIC SECURITY IS BECOMING MORE POPULAR GLOBALLY ARE INCREASING CONCERNS ABOUT THE STRENGTH OF NATIONAL SECURITY, AND INCREASINGOCCURRENCES OF IDENTITY-THEFT RELATED FRAUD.”
platform. This trend - converged security - brings together physi-cal and asset security to provide a unified approach to protecting a company and its physical assets.”
“Today we see a convergence between physical and network (IP) security to provide services that promote flexibility while keeping basic authentication principles in place. For example, to log onto a company intranet, users may need to do two-way factoring
Zaidi: Companies are adding physical security measures
to the their corporate networks to enhance security procedures.
IT and facilities management
departments need to collaborate on physical security,
says Coughlin.
January 2013 ARABIAN COMPUTER NEWS 61
/SECURITY
or biometric, retina or pin codes authentication. This eliminates the possibility of illegitimate access,” notes Asfar Zaidi, senior consult-ant, Security Solutions, Huawei Enterprise Middle East.
“As networks become more open the need to provide end us-ers with the flexibility to work at any time, any place and on any device while maintaining network security also increases. This can only be done through creating strong controls and a strong security framework for access authentication and authorisation,” he adds.
“The integration of biometric technology with security systems is on the increase, as more system administrators and data centre managers look to leverage off innovation within identification infra-structure in order to improve access control,” says James Coughlin, director of new business, Cannon Technologies Middle East.
“As data centre and facilities management (FM) departments continue to cross paths, the same trend is happening in the secu-rity market. To date, information security typically sits with the IT department and physical/traditional security sits with the FM or real estate departments. However, as physical and information technology security policies, technology and people converge, it is vital that FMs learn about the opportunities and challenges their individual organisation will face. The convergence of data and telecommunications over (IP)-based networks now brings FM and
Chadra: Organisations in the Middle East have tended to overlook technology solutions for security, prefering traditional solutions like guards.
NEW TECHNOLOGIESAs protection of IT assets rise on the security agenda, new physical security solutions are emerging. For example, RF Code’s Proximity Locator solution fully automates the correlation of people and events, correlating what moved, with who moved it.
“Such information helps to identify a limitless range of unauthorised activity, from who’s using what particular piece of equipment that someone else may need to determining the presence of unauthorised personnel in ‘off limit’ areas to discovering the presence of someone sneaking into a facility behind a ‘badged’ employee,” notes Richard Jenkins, VP of Marketing, RF Code.
According to Ian Lowe, senior enterprise solution manager, HID Identity Assurance, a new technology set to shape the market is embedding ID credentials within mobile devices: “This is blurring the lines between IT and physical access control,” he notes. “There are a number of industry initiatives to drive this forward, including TEE, Intel IPT and TPM that has gained a new lease of life with Windows 8.”
James Coughlin, Cannon Technologies Middle East says that Iris on the Move technology is emerging to provide fast and unobtrusive biometric verification: “Unlike other options that require people to stop or to position their eyes close to a camera, ‘Iris on the Move’ can verify an individual’s identity from a quick glance at the system from a comfortable distance.”
“Smart Mobile Identity, featuring multi-modial biometrics built on popular smartphone platforms will go to market in 2013 and start to gain adoption in markets such as law enforcement, border control and national ID management,” adds Joseph Pritikin, director of Product Marketing, Identity Solutions, AOptix.
IPv6 also has implications for physical security, says Peter Chadra of DrPete Inc: “Because IPv6 address scope is massive it can eliminate the requirement to NAT behind router addresses. This means that it becomes much easier to trace devices on the global Internet. This is important as we move towards an ‘Internet of things’.”
IT closer than ever and security forms a key element of this. “CCTV surveillance systems are a great example of this and
have been relying on transmission over IP networks for many years. The access control market has been slower to adopt this approach over the years, however, today’s access control systems are increasingly IP-based and as a result, are becoming more advanced, easier to integrate with existing systems and more cost-effective,” Coughlin adds.
“The primary reasons biometric security is becoming more popular globally are increasing concerns about the strength of na-tional security, and increasing occurrences of identity-theft related
/SECURITY
62 ARABIAN COMPUTER NEWS January 2013
“THERE IS GROWING DEMAND FOR FASTER, MORE ACCURATE AND MORE USER-FRIENDLY IDENTIFICATION AND VERIFICA-TION TECHNOLOGIES FOR A WIDE RANGE OF APPLICATIONS.”
fraud. While North America and Europe have previously dominated the global biometric market, Asia Pacific, the Middle East and Africa are emerging as viable, growing territories for biometrics.”
Integration and convergence seem to be key themes, for example there is a general movement of manufacturers, installers and end clients to the physical security information management (PSIM) model – having a single command and control interface to monitor and control information from various security subsys-tems including CCTV, access control, In-trusion etc. A PSIM system also provides information to operators to select the most optimum response to deal with any given situation.
“The above is in fact part of a larger emerging phenom-enon. The concept of a master system integrator (MSI) will gain significance over time,” says Venkat Raghavan, general manager, Al-Futtaim Technologies.
“The MSI will be capable not only of offering a solution that will encompass the complete range of low current and ICT systems, but also manage integration of various systems to enable seamless exchange of intelligence within the eco-system leading to empowered administration, secure community and unique user experience,” Raghavan adds.
But who are the customers? Businesses that offer e-services
look to be at the forefront of driving these technologies, as are companies that focus strongly on security solutions, such as the oil and gas industry. However experts are finding interest building across many verticals.
“Financial services, hi-tech, pharmaceuticals, government and healthcare remain the primary verticals deploying this type of technology for physical access control purposes,” notes Ian Lowe, senior enterprise solution manager, HID Identity Assurance.
“Biometric technologies are still primarily used at immigration and border control. There are some enterprises that use biometric readers for staff time and attendance systems as well as high secu-rity areas such as cash handling and storage areas with high value IT infrastructure such as server rooms,” highlights Raghavan.
“Hospitals and other areas where sanitisation is of primary importance have moved from the contact based keypad or finger-print readers to a non-contact based proximity palm vein based solutions,” he adds.
“Hotels, shopping malls and other large commercial properties with multiple control systems have moved to a more integrated approach for their security and control systems allowing for the operator to have a single interface to monitor and control the vari-ous sub-systems within that network.”
As criminals get wiser, it’s more important than ever for busi-nesses to put security high on the agenda and use the latest tech-nologies to secure their assets. From what the experts see and say, it’s clear that the region’s enterprises are rising to the challenge and are embracing the best physical security solutions available to them. And with new technologies continuing to hit the market, security looks set to be stronger than ever.
Biometric solutions are deployed in areas like border control, cash
handling and storage areas and server rooms,
says Raghavan.
SMARTER DOCUMENT IMAGING WITH KODA
Make a change for the better. Kodak.com/go/
TRANSFORM DOCUMENTINTO BUSINESS INSIGH
Kodak’s portfolio of solutions empowers organizatioof all sizes to transform paper and electronic documen
into business insight. Award-winning scanners and captusoftware. Industry-leading service and support. A growi
array of professional services. It all adds up to having tsolutions that make your insight take fl ight.
SCANNERS SOFTWARE SOLUTIONS SERVICE & SUPPORT PROFESSIONAL SERVI
YELLOW CHANGES EVERYTHI
For inquiries : Tel: +9714 3444910E-mail: [email protected]
/AFTER HOURS
64 ARABIAN COMPUTER NEWS January 2013
THIS MONTH: JOHN ROBERT PEARSONSENIOR PROJECT MANAGER, STME
Arabian Computer News delves below the corporate strategy to
understand what really makes the region’s IT leaders tick.
How did you end up in yourcurrent business role?I started in the IT industry with IBM as a customer engineer in 1977 in the UK, before progress-ing into large systems with IBM, both hardware and software. An opportunity arose in 1996 to move to Saudi Business Machines, where I was the account coordi-nator for large customers. I was based initially in Damman.
STME came along in 1999 and offered me a job as services man-ager in Riyadh, where I supported EMC storage and STK Tape Tech-nologies. I then moved to Kuwait in 2003 with STME, to become the services manager for Kuwait, where I stayed until 2007 when I moved to Qatar as service manager.
In 2008, STME asked me to move to Dubai as a project manager, and this year I was asked by the CEO to set up a Project Management Office for STME.
What is your management philosophy?I am a great believer in team work. It is crucial, especially in Project Management, where one single person cannot do it all alone and has to rely on his colleagues to work as a team to ensure a successful completion of the project at hand.
What was your first computer?It was a Sinclair ZX81 in 1981.
What is your greatest achievement?To gain the trust of the new CEO of STME, Ayman Al Bayaa, to have the confidence in asking me to set up the PMO for the company.
What is your biggest mistake?Everyone makes mistakes, some are small but on occasions they tend to become a bigger issue. The main thing is that you have to accept these mistakes and learn from them especially as an engineer where your mistakes can have a major impact on the customers systems.
What is your fondest memory of working in the IT industry in the Middle East?Being in the Middle East for the last sixteen years, I have seen major changes within the region. Not only seeing the growth in the industry, but also
within the working culture. The Middle East in general is such a multicultural re-gion, that it is interesting in understand-ing cultural differences and seeing them all working together.
What emerging technology do youthink will have the biggest impact on the market in 2012?Cloud technology, it is the global hot topic and it gives everyone the opportunity to access data from where ever they are.It is extremely cost effective and gives busi-nesses more flexibility in the services they offer their end users.
What’s the best way to deal with stress?Being a sports fan, I unwind watching football and golf.
GETTING PERSONAL
Nationality: BritishNumber of years in the industry: 35Favourite food: CurryHoliday destination: ThailandMusic:Music from 60’s, 70’s and 80’sDream car: JaguarGadget:Samsung S3 Piece of advice: Think of others!
The World’s Most Important Gathering of CIOs and Senior IT Executives
ocus. Connect. Lead.ruptive technologies like cloud, social, mobile and information
revolutionizing business. The opportunity to leverage information
ovation is right before us.
ced with fundamental changes to the enterprise ecosystem, IT
ders must acquire a new ability to Focus on the issues that matter,
nnect people and ideas, and Lead with creativity and confidence.
rtner Symposium/ITxpo is the world’s most important gathering
CIOs and senior IT executives in the Middle East. Our 2013 agenda
ers analyst sessions, workshops, roundtables and mastermind
ynotes across three full days. With role-based and industry tracks,
agenda targets your specific title responsibilities and ways to adapt
w ideas and strategy to your industry, along with insight on what’s
xt in IT.
w the most comprehensive IT agenda for 2013 at
rtner.com/me/symposium
mposium/ITxpo is for IT industry leaders, including:
CIOs
CTOs
Senior IT Leaders
Technology and Business Strategy Executives
nstitutional Investors & Venture Capitalists
Technology and Service Providers
ave the Date and register your place now at artner.com/me/symposium
arly B
SAVE $50
when you register no