VELOCITY - DATA AND ANALYTICS SUMMIT

Data

Is Sustainable Software Within Grasp for the UAE’s IT Sector?

Is Sustainable Software Within Grasp for the UAE’s IT Sector?

The UAE IT sector strives for sustainable software practices. Explores the role of software in reducing the ICT sector's environmental impact. Highlights the importance...
Black-Friday-Shopping-Deals-Leave-Security-Risks-for-Organisations-to-Deal-With

Black Friday: Shopping Deals Leave Security Risks for Organisations to Deal...

As Black Friday unfolds with enticing sales and special offers, it's crucial to recognise that cybercriminals are also capitalising on the chaos. This poses...
Technology Underpins the Success of the GCC’s ESG Ambitions

Technology Underpins the Success of the GCC’s ESG Ambitions

The GCC Exchanges Committee's recent release of a formal framework is emblematic of the region’s prioritisation of ESG; Low code platforms that enable all...
How to Provide a Seamless Digital Experience While Balancing Rising IT Costs

How to Provide a Seamless Digital Experience While Balancing Rising IT...

Salman Ali, Senior Manager of Solutions Engineering at Riverbed Technology, shares insights on optimising hardware, cutting unused software, tackling network bottlenecks, managing cloud spend,...
Black Friday 2023 in MENA: What to Expect and How to Maximise Sales

Black Friday 2023 in MENA: What to Expect and How to...

Discover ecommerce trends, shopper behaviours, and strategies for brands to capitalise on the hottest period of the year. With just a couple of weeks to...
5 Steps to Strengthen Security Workflow in the Middle East

5 Steps to Strengthen Security Workflow in the Middle East

How Middle East security chiefs can bolster their remediation workflows in the face of an escalating threat landscape. Explore expert insights from Hadi Jaafarawi,...
Is it Possible to Lower Cyber Insurance Costs – Without Compromising on Policy Quality

Is it Possible to Lower Cyber Insurance Costs – Without Compromising...

How to strategically lower cyber insurance costs without compromising policy quality. Explore key steps to improve your cybersecurity posture, from risk identification to incident...
Embracing-Zero-Trust-Network-Access-A-Safer-Alternative-to-VPNs

Embracing Zero Trust Network Access: A Safer Alternative to VPNs

Explore the shift from VPNs to Zero Trust Network Access (ZTNA) for enhanced cybersecurity. Learn how ZTNA ensures secure access with the principle of...
Strategies for Ensuring Flexibility and Control in the Hybrid Cloud Era

Strategies for Ensuring Flexibility and Control in the Hybrid Cloud Era

Discover strategies to ensure flexibility and control, including embracing hybrid and multi-cloud environments, implementing abstraction layers, and prioritising cloud agnosticism. Navigate the complexities of...
Seven Phases of a Successful Analytics Project

Seven Phases of a Successful Analytics Project

Learn the seven crucial phases for a successful analytics project, whether integrating Generative AI or not. From data-gathering techniques to effective visualisation and predictive...

Latest Posts