Computer News Middle East

Page 1

STRATEGIC ICT PARTNER

WHERE TECHNOLOGY MEANS BUSINESS

WWW.CNMEONLINE.COM ISSUE 246 |JULY 2012

PUBLICATION LICENSED BY IMPZ

INSIDE

TH IRD-PARTY TRAIN E R S | CL O UD SE CURIT Y | INF O R MAT IO N L IF E CY CL E M A N A G E M E N T


LAW# 1:

T&C apply

" # ! " " Business evolves and so does My BusinessPlan. It’s the only exible postpaid plan that gives you the freedom to switch between 4 attractive packages every month depending on your business requirement. With up to 2500 national minutes, 2GB data, 600 SMS, 700 minutes business group talk time and more, it’s simply the only postpaid plan that really knows your business. 4 packages | monthly bonus | monthly package switching | handset discounts Contact your Account Manager or call 800 5800 and we will gladly assist you etisalat.ae/mybusinessplan


Discussing the future

Sathya Mithra Ashok Senior Editor Talk to us: E-mail: sathya@cpidubai.com

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

, ' #( &#..& - *.# & ) ")1 ))!& ( *,)0# 1#- )' .) - , " +/ ,# -8 )1 0 ,5 ) &# 0 ." . && ) /- , )(-. (.&3 1),%#(! .) "#!" , -. ! ) %()1& ! 9*,) --#(!5 1"# " 1)/& 0 (./ &&3 &&)1 /- .) 1#- , )( (3 !#0 ( -/ $ .8

&-) &# 0 ." . 1" ( !,)/*- ) &#% 9'#( * )*& 5 - , "#(! ), ." - ' (-1 ,-5 ! . .)! ." ,5 ." 3 , &#% &3 .) )&& .#0 &3 ')0 &)(! ." ) -! -( 0", (& ,- +4 ' "' &(+ Q" " '- & '' +7 "#- #- 1"3 " - ( -* ," #(! , !#)( & 0 (.- )0 , ." & -. .1) 3 ,-8 - -/'' , 1(- )( /-5 #. " - &, 3 )( &/ 0 ,#)/- 0 (.-5 ( ." . ' #- ()1 /-3 1),%#(! )( ." 0 (.- ) ." & -. +/ ,. ,8

3 ')(! ." - #- &)/ )(!, -- GEFG ( "# 0 ' (. 1 , - GEFG8

( #.- - )( 3 ,5 &)/ )(!, -- 1#&& ,#(! .)! ." , , !#)( & ( 9 /- ,-5 0 ( ),- ( * ,.( ,- .) #- /-- ." -. . ) *,#0 . ( "3 ,# &)/ )*.#)( #( ." # & -.5 ( .) ,!/ ." " && (! - ." . -.#&& *& !/ ."#- - . ) . "()&)!# - #( ), , .) )&& .#0 &3 ')0 &)(! ." ' ./,#.3 /,0 8 A !#-. , ), ." 0 (. ( ! . '), . #&- 3 0#-#.#(! !

! $!

"# 0 ' (. 1 , -5 #( #.- ."#, 3 , ()15 1#&& ! #( - . ." -. ( , ), 1 , - /( .#)(- #( ." #( /-.,3 ) ." , !#)(8 1#&& , )!(#-#(! ." 1),% ) ),! (#- .#)(- ( #( #0# / &- ,)-- GE # , (. . !),# -5 ( ."#- 3 , )/, ) /- #- ')-. ,. #(&3 )( #(()0 .#)(8 3 "#!"&#!".#(! ." 1),% ) & ,- ,)-- ." , !#)(5 1 ")* ." . )." ,- 1#&& & .) . % & )/. ) ." #, ))%- ( 1),% )( #( , -#(! Q" " ' 2 "' -! "+ (0' (+ '", -"(',7 @ (&"' -"(', + '(0 () ' (+ -! 1 , -8 #-#. !

! ), . #&- )( . !),# - ( .) )1(&) ." ),'B8 ", (& ' %.,"/ ' " Q" .%- -( !" / 7 ", 0(+$"' -( )' -#'*& ( "/' & ( & , ), '), *,) --#)( &- #( ." # & -. #( /-.,3 .) ." 1#- , ? '/ " &#% ))!& #- ), - , "8 ,#. .) % ! 5 ( & . /- %()1 3)/, .")/!".- )( ")1 &- 1 ( ) " &*8

Publisher Dominic De Sousa Group COO Nadeem Hood Managing Director Richard Judd richard@cpidubai.com +971 4 4409126 EDITORIAL Senior Editor Sathya Mithra Ashok sathya@cpidubai.com +971 4 4409111 Senior Editor Jeevan Thankappan jeevan@cpidubai.com +971 4 4409109 Sub Editor Ben Rossi benr@cpidubai.com +971 4 4409114 ADVERTISING Commercial Director Rajashree R Kumar raj@cpidubai.com +971 4 4409131 CIRCULATION Database and Circulation Manager Rajeesh M rajeesh@cpidubai.com +971 4 4409147 PRODUCTION AND DESIGN Production Manager James P Tharian james@cpidubai.com +971 4 4409146 Art Director Kamil Roxas kamil@cpidubai.com +971 4 4409112 Designer Analou Balbero analou@cpidubai.com +971 4 4409104 Photographer Cris Mejorada cris@cpidubai.com +971 4 4409108

DIGITAL SERVICES Digital Services Manager Tristan Troy P Maagma Web Developers Erik Briones Jefferson de Joya Social Media Co-ordinator Jay Colina online@cpidubai.com +971 4 440 9100 Published by

1013 Centre Road, New Castle County, Wilmington, Delaware, USA Branch Office PO Box 13700 Dubai, UAE Tel: +971 4 440 9100 Fax: +971 4 447 2409 Printed by Atlas Printing Press Regional partner of

Š Copyright 2012 CPI All rights reserved While the publishers have made every effort to ensure the accuracy of all information in this magazine, they will not be held responsible for any errors therein.


Our events

The world is at

Jeevan Thankappan Senior Editor Talk to us: E-mail: jeevan@cpidubai.com

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

Our online platforms

STRATEGIC ICT PARTNER

WHERE TECHNOLOGY MEANS BUSINESS

WWW.CNMEONLINE.COM ISSUE 246 |JULY 2012

If you’d like to receive your own copy of CNME every month, log on and request a subscription: www.computernewsme.com

Our social media

facebook.com/computernewsme

twitter.com/computernewsme PUBLICATION LICENSED BY IMPZ

INSIDE

T H I R D - PA RT Y T R A I NE R S | C L OU D S E C U R I T Y | I NFOR M AT I ON L I FE C Y C L E M A NA GE M E NT

linkedin.com/in/computernewsme


www.emc.com/forum2012 12 September, 2012 The Ritz Carlton Hotel, Doha 2 October, 2012 The Four Seasons Hotel, Riyadh

EMC Forum is a unique opportunity to connect and network with your peers in the region. You’ll hear local and international insights from high calibre keynote speakers and presenters, and case studies featuring the latest integrated solutions from EMC and our partners. To complete the package, a handpicked selection of our partners will be exhibiting their products, and our VLab will offer technical training from EMC engineers.


Contents ISSUE 246 | JULY 2012

ANALYSIS Breaking free 8

10

12

14

16

18

( )0 ' , GEFF5 ' #/' .1),%- (()/( #.- #( * ( ( ,)' * , (. )'* (3 ) FH 3 ,-5 ).),)& )&/.#)(-8 , " ' 1 (5 , !#)( & #, .), . ' #/' .1),%-5 2*& #(- ." #-#)( ( ")1 #. " - !#0 ( ." )'* (3 ( 1 & - ) &# 8

The future of software &)/ )'*/.#(! ( &#0 ,3 #- ." #( 0#. & /./, ) -) .1 , ( , & 0 (. /- ) 1#&& . ,'#( ." ,#!". /- ! ) ." - -)&/.#)(- 1#."#( ( ),! (#- .#)( ? ." . 1 - ." )( &/-#)( ) -* % ,- . ) .1 , )(!, -- GEFG8

An efďŹ cient data centre * % ,- . ." )" & ! ) ." ) ' * - ,# - ) /- )( ." ' (+ (+ '", -"(', -( ."% Q" " '- - '-+ , ? +(,, ' + 2 /- ! 5 )'*/.#(! *)1 , /- ! ( ' ( ! ' (. ? #( ), , .) !,)1 -. , #( ." )'#(! 3 ,-8

Evolution a must " (., &#- /( .#)( ) )& #- /( , ., ' ( )/- *, --/, ,)' ., ( - -/ " - &)/ )'*/.#(!5 *,)&# , .#)( ) )(-/' ,9 ) /- ') #& 0# - #( ." (. ,*,#- ( #! . ( &3.# -8 ), #(! .) , *),. 3 " )()'#-.5 - ." - ., ( - ,) ." (., ( " -.,/ ./, 5 - ( ." #, . '- '/-. .. , &#!( ." '- &0 - 1#." .,"' ,, ' , (+ Q"' -! &, %/ , ).- (.- -( ) ,-.+ 7

An advanced region 0 3 .1),%#(! - (. #.- !&) & ' ( ! , ( /,! )( .) / # & -. ')(." - #. &))%- .) -. * /* #.- *, - ( #( ." # & -.8 /,! )( )/( " 1 - <*& - (.&3 -/,*,#- = 1#." ")1 0 ( ( .1),%#(! #- #( ." , !#)(8

Round-up

6

(0 + 2 )+"/ - %(. 4 .% "+4 -! )+"' ") % ++" + ( !+ "'4 " - ( & .) ., (- ),' #.- & #(.) 3( '# #,&#( ." . *,)0# - .. , - ,0# .) #.- * -- (! ,- 1"#& '#(#'#-#(! -"),.9. ,' ( &)(!9 . ,' #( , -.,/ ./, )-.-8

(. ,*,#- , "#. ./, A B #- -&)1&3 ! #(#(! *)*/& ,#.3 1#." & ,! , ),! (#- .#)(- #( ." # & -. - ( .#0 1 3 ) ./,(#(! /-#( -- -., . !3 #(.) 0 &/ & (. ,*,#- " (! 8 2 '#( - ")1 #. ( ) ." . ( 1" ." , #- ,#!". ), 3)/, )'* (38

26

46

.)), ). &- " - )' ." & . -. (. ,*,#- #( ." , !#)( .) 2*, -- #.- - .#- .#)( 1#." ')0 .) ." &)/ 8 /.-)/, #(! #.- ' #& ")-.#(! ( - /,#.3 .) ))!& **- " - /. #.- )-.- 3 JEN8

' ('"' 2(.+ " - ' -0(+$ (+ ,- '- +' - ('' -"(', ' , ' ! %) 2(. ,% ,! (,-,7 (0 / +4 "- #-(;. ), 0 ,3)( 8

The art of WAN governance **&# .#)( * , ),' ( #- ." % 3 !) & ) )*.#'#- .#)(8

STORAGE ADVISOR 52 Informed management

On Cloud 9

NETWORK WORLD 44 A plan for your WAN

SOLUTIONS WORLD 36 Gaining traction

,#(! 3)/ +/# % ,)/( 9/* ) #( /-.,3 ( 1-8

CASE STUDY 30 Jumbo savings

( ),' .#)( &# 3 & ' ( ! ' (. A B , ' #(- #( #.- #( ( 3 #( ." # & -.5 -*#. ." . ." . #. #- () ( 1 (., (. .) ." . "()&)!3 - ( 5 *& !/ - #. #- 3 0 ,#)/- " && (! -8

SECURITY ADVISOR 60 A new era

#." ." 0 (. ) ." *" ()' ()(5 ." ')/(. ) .", .- /-#( -- - " 0 '/&.#*&# )( ( /(*, (. - & 8 ( )--# &))%- . ")1 ." - ., ( - " 0 , *# &3 " (! ." (. ,*,#- - /,#.3 & ( - * ( 1" . ( )( .) -. 3 *,). . 8


Strategic ICT Partner

Strategic IT Transformation and Big Data Partner

Strategic IT Networking Partner

Strategic IT Storage Partner

Our Strategic Partners

TELECOMS WORLD 68 Strong signals

70

94

(. ,*,#- '.) &&- , -.#( .) *& 3 & ,! , ,)& - ') #& )* , .),- &))% ), ( 1 1 3- .) #'*,)0 ." -' ,. *")( 2* ,# ( #(-# ." (. ,*,#- 8

Small cells, big problems " ') #& #( /-.,3 #- )/,.#(! -' && , - -. .#)(-5 /. ' ,,# ! 1#&& ,#(! 1")& ( 1 - . ) " && (! -8

) ' % -' ,. , #-#)(- )/. ")1 .) - . /* 3)/, , & .#)(-"#* 1#." ( - ,0# *,)0# , #. #- #'*),. (. .) -.#' . ." )&& , 0 &/ ) ." ')-. #'*),. (. )''#.' (.-5 )*.#)(-5 #( (.#0 - ( & /- - #( ( )/.-)/, #(! )(., .8 , , -)' .3* - ) )(. . . ,'- ( ' .") - ), */..#(! *,# . ! )( ." '8

CAREERS ADVISOR 82 Adding value

- "& !"- !.+,- ", (&"' .) (' !", Q"/ 82 + ''"/ +, +2 . ." " &'8 ( , "#. "/,-.;- & ,-"#*5 .;- , 0 (/ " - +(0' +(& DJGH &"%%"(' "' "-, Q", % GEEM -( &(+ -! ' DF7F "%%"(' "' "-, Q", % GEFG4 0"-!(.- /" -"' +(& "-, (+ ,-+ - 2 ( () '8 -)/, #( , -.,/ ./, -) .1 , 8 ( ( #(. ,0# 1 . ." . /''#. )( , ( #( )-.)(5 "#. "/,-. -*)% )( 0 ,# .3 ) .)*# -8

PRODUCTS 96 ! .- )1( #( ." #,. 1#." ." & . -. ! ! .- ( *,) / .#0#.3 .))&-5 ( ,#(!- 3)/ ." 0 , # .8

INTEGRATION ADVISOR 74 Dollar value

Weighing in on strategy

&))%- . ."#, * ,.3 ., #( ,- ( ")1 ." 3 ( )(.,# /. .) ." 0 &)*' (. ) )." /(#0 ,-#.3 -./ (.- ( #(. ,( & -. 8

LAST WORD 98 &))% . 1" . ' $), 0 (.- 1 #. 3)/5 1" . 1 ;, , #(!5 ( -( % * % . ." )(. (.- ) ." ( 2. #--/ ) 8

INSIGHT 88 Real story of cloud security

&)/ - /,#.3 , " - , (;. ( -- ,#&3 " &#( ( 1-5 /. ." , ;- !)) , -)( ), ." .7 3 , ,#'#( &- )(;. &1 3- 0# 1 ." &)/ - ." . ,! . ) ( .. %5 /. ) . ( - , -)/, .) & /( " ( .. %8

INTERVIEW 92 DeďŹ ning the

new value

" - , (.&3 /(0 #& ( 1 *,) / . &#( ) #(. !, . - .- ) " , 1 , ( -) .1 , 5 %% .+ 2,- &,7 "& . &&#(!-5 ) &) & ,% .- #( 3-. '- 4 "()&)!3 ,)/*5 -*)% .) /- )/. 1" . ."#- ' 0 %"' ( )+ ('Q" .+ -3-. '- ' (- ), ." /-.)' ,-8

7


ANALYSIS Cambium Networks

Breaking free In November 2011, Cambium Networks announced its independence from parent company of 13 years, Motorola Solutions. Graham Owen, EMEA regional director at Cambium Networks, explains the decision and how it has given the company a new lease of life.

8

(3 * )*& " 0 )/ . ' #/' .1),%-> * #&#.3 .) -. ( &)( - ( #( * ( (. )'* (3 )&&)1#(! #.- -*&#. ,)' ).),)& 8 )1 0 ,6 , !#)( & #, .), , " ' 1 ( &# 0 - ." /./, #- ,#!". ), ." 1#, & -- ,) ( -)&/.#)(- )'* (38 ' #/';- *,) / . *),. )&#) ." . - . 1#."#( ).),)& 1 - )(&3 )/. HN ) #.- !&) & , 0 (/ 5 ( ."#- , -/&. #( & % ) #(0 -.' (. ,)' ." * , (. )'* (38 < , &#- 1 1 , " 0#(! #--/ - ! ..#(! 4 /( - ( 1 1 , ! ..#(! () '#( -" , )( !)9.)9' ,% . -., . !# - ( ")1 .) 0 &)* ." ,. #( *,) / . - .-5= 1 ( - 3-8


< " ( 3)/;, (). ! ..#(! (3 '#( ,! + "-;, / +2 " Q" .%- -( - + , + ! ( 0 &)*' (. )&& ,- .) 0 &)* ( 1 *,) / .- ( !) .) ' ,% . 1#." ( 1 . "()&)!# -5= " -8 #." ."#- & % ) /( - ( '#( -" , 5 1 ( - 3- #. 1 - &#% ' #/' .1),%- 1 - #(! <.",)..& = 3 ).),)& 5 ( ." . ." ')0 .) #( * ( ( !#0 - ." )'* (3 ." , )' #. , +/#, - .) !,)18 < 3 -. **#(! )/. ) ).),)& 5 1 ( ()1 &&) . ' ,% .#(! ( , - , " )&& ,- "'-( + , 0 %" / 0"%% ' Q"- ' +(0 ." ),! (#- .#)(8 3 )'#(! )/. )( )/, )1( 1 )/& )' ' -. , ) )/, )1( -.#(35= " - 3-8 #." ."#- ( 1 )/( , )'5 1 ( - 3- ." <-#2 '#&&#)( )&& , +/ -.#)(= ()1 #- 1" . #, .#)( .) . % ." )'* (3 #(8 < , &))%#(! . '/&.#*& ' ,% .- ( #(0 -.#! .#(! ( 1 0 ,.# &-8 , ,. #(&3 &))%#(! . ." - ,0# *,)0# , ( )* , .), -* 8 (. ,*,#- #- &-) 0 ,3 -.,)(! % 3 , ), /-8 /,#.3 #- % 3 , ( &-) ). %" , -2 ' -!"' , %"$ +( -+ Q" ')(#.),#(!8= " - 3-8 - ." . #( ." # & -. * ,.# /& ,&3 ' #/' #- 0 ,3 -.,)(! #( ." (/ +'& '- ' %,( ,) 7 < 1 &))% . )." , , - ,)-- ." , !#)( ? 1 ;, !,)1#(! ( .1),%- #( , + ( - && &). ) *,) / .- )/. ." , 8 ;, &-) 1),%#(! ! /"%2 0"-! ,(& $",- '" '-"-" , -( ! %) !,)1 -)' ) ." #, /-#( -- -5= " - 3-8 #." % 3 , -)( ), ' #/';- ')0 .) #( * ( ( #(! ." & % ) 4 /( - #. 1 - , #0#(! ,)' ).),)& 5 #. #- ()1 ** ,#(! 0 ,3 .#0 #( ." . , 8

- ! , + '-%2 "'/ ,- ," '"Q" '-%2 (' ( 4 (., #( /,)* ( #- ()1 ./,(#(! #.- .. (.#)( .) ." # & -.8 < " 0 ( )**),./(#.3 .) */. 4 ")/- /( , ." # & -. , !#)( ( , %(($"' - $",- '7 ! - ","(' ! ,';- '

Graham Owen, EMEA regional director at Cambium Networks

' 3 . /- . ." ')' (. )/, ) /- #- .) !,)1 ( 0 &)* )/, ( 1 *)#(.9.)9'/&.#*)#(. )% - (+&4 0!" ! ", -! IJE4= 0 ' , 2,7 < "#- *& . ),' 1#&& &&)1 /- .) " 0 '/&.#*& . "()&)!# - )(( . )( -#(!& - -. .#)(8 " . 1 % 3 , ) !,)1."5 ,) " %%2 0! ' 2(. %(($ - , -! - + &))%#(! .) !,)1 ." #, ( .1),%-5= " -8 !#)( ) *,)'#- ( ." -/ $ . ) ." # & -.5 ' #/' () ' ' ( Q" "' . " "' 24 0!" ! 0"%% . - #.- "/ ), ." , !#)(8 < " # & -. #- "/! &3 #'*),. (. .) )/, !&) & -., . !38 " )**),./(#.3 #- "/! /- # , (. ."#(!- , " ** (#(! ? * )*& , '), !!, --#0 ( ." 3;, &))%#(! ), ( 1 1 3- .) 2* ( )(( .#0#.3 ,)-- ." 1),& 5= 1 ( - 3-8 / # , # #- * ,.# /& , &) .#)( ) ) /- ), ' #/' !)#(! ),1 , 8 < ;, &1 3- &))%#(! .) #( , - )/, *, - ( #( ." , !#)(8 , $/-. 1),%#(! )( " )/(. ), / # , # /- ." .;- ()." , % 3 , ), /-8 ;, 2* ( #(! )/, #-.,# /.#)( " (( &- ( )/, , - && , - 5= 1 ( - 3-8

By stepping out of Motorola, we can now allocate marketing and research dollars into areas we believe will beneďŹ t and grow the organisation. By coming out on our own we could become master of our own destiny.â€?

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

9


EVENTS Software Congress

THE FUTURE OF SOFTWARE Cloud computing and delivery is the inevitable future of software and relevant use of SOA will determine the right usage of these solutions within an organisation – that was the conclusion of speakers at Software Congress 2012.

10


. ." ."#, ((/ & ) .1 , )(!, --6 0 ( ),- ( ( : /- ,- !). .)! ." , .) #- /-- ." " (!#(! ( ./, ) -) .1 , 6 ( ")1 ." &#0 ,3 * .. ,(- ) ." -)&/.#)(- ) )& , &#% &3 .) " (! #( ." ( , /./, 8 " * ( & #- /--#)(5 1"# " ,)/!". .)! ." , && ." -* % ,- ) ." 35 ' .) ." )( &/-#)( ." . ." , 1#&& #( , - )*.#)( ) &)/ )'*/.#(!5 -* # &&3 ')(! -' && ( ' #/' (. ,*,#- - A -B8 < &)/ #- ,. #(&3 ." 1 3 .) !) #( . ,'- ) /./, &#0 ,3 ) -) .1 , -)&/.#)(-8 . 1#&& -. )*. 3 - #( ." , !#)(5 1") & % (

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

( , (5 , !#)( & #, .), . *# ), 8

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

( )* , .#)( & -)/, -5 ( ( " ( & '/ " '), . 0)&/' -5= - # )38 - . &) - #( , - 5 ( ." .3* ) . ." . ( ),! (#- .#)( " - .) . %& " (! -5 )3 *)#(. )/. ." . ( &3.# *& . ),'- 1)/& &-) " 0 .) # , (.8 < ,! (#- .#)(- '/-. &-) " (! *,) -- - #( ), , .) . %& . ( &3.# -8 " 3 " 0 .) " (! ,)' &#( , -.,/ ./, 5 .) #'*& ' (.#(! . - # ( . '- .) "# 0 !#& ( &3.# - .) *,)0# ., (-* , (.5 , &9.#' )&& ), .#)( ,)-- . '- ." . , ( & .) 1),% ,)-- -.,/ ./, ( /(-.,/ ./, . 5= - # )38 )3 &-) & ), . )( ." , (*&/' -)&/.#)( ( 1" . #. ( ) ), ),! (#- .#)(-8

#&#.3 .) & 0 , ! 2#-.#(! #(0 -.' (.-8= 1 - )&&)1 )( -. ! 3 ' -"

,#-"( " ( ,#5 /-#( -- 0 &)*' (. -* # &#-. ), /-#( -- -)&/.#)(- . .#- & .5 1") -*)% . & (!." )( &)/ ( ")1 #. ( " &* ." ') ,( ) ." , !#)( .) /. )-.- ( !,)1 #( " (!#(! )()'# (0#,)(' (.8 < ! + + %(- ( ' Q"-, "' &(/"' .) ." &)/ 5 -)' ) 1"# " #( &/ ,- ' + ", -"('4 (,- + . -"(',4 Q% 1" "%"-24 * 39 -93)/9!)5 * 3 * , /- 5 (., &#- )(.,)&-5 ' #(. ( ( ( (" ( ' (.- ( , -#&# ( 38 )1 0 ,5 && &)/ #(0 -.' (.- " 0 .) *,)* ,&3 ( &3- ( /( ,-.)) ), ." ')0 #- '

There are a lot of beneďŹ ts in moving to the cloud, some of which include standardisation, cost reductions, exibility, pay-as-you-go, pay per use, centralised controls, maintenance and enhancements and resiliency. However, all cloud investments have to be properly analysed and understood before the move is made in order to ensure that organisations proďŹ t from it, rather than lose out to it.â€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

"' (+ + -( ',.+ -! - (+ '", -"(', )+(Q"- ,)' #.5 , ." , ." ( &)- )/. .) #.5= " - # 8

( , (5 - ." & -. -* % , . ) .1 , )(!, -- GEFG5 '*" -#- ." &)/ -.),35 1"#& &-) *)#(.#(! )/. ." . ),! (#- .#)(- -")/& &-) )(-# , - ,#)/- -"# . .) 8 < " -# !) &- ) , .) ' % ( **&# .#)( -#&3 --# & ), #0 ,- && ,- ( .) - !, ! . ." **&# .#)(;- * #&#.# - ,)' /-#( -- *,) -- -8 #! -. ,. - -#'*& ' .") )&)!3 .) */. '/&.#*& **&# .#)(- /( , -#(!&

/' , && , "#. ./, 8 #! #- )/. 1, **#(! && ) 3)/, (. ,*,#- **- #(-# ( )0 , , "#(! - . ) -) .1 , ( .))&- .) + - :,"' % ,2,- & /" 0;4= , " ' + '7 ) .1 , )(!, -- #- ( ((/ & 0 (. (+ '", 2 ' 7 ( -0 + )(!, -- GEFG 1 - -/**),. 3 .#- & .5 5 0 3 5 && ( *# ),8

11


EVENTS ICT Roadmap

An efďŹ cient data centre Speakers at the Doha leg of the ICT Roadmap series focused on the need for organisations to build efficient data centres- across energy usage, computing power usage and management – in order to grow faster in the coming years.

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

12

%". ,8 *)#(. )/. ." . '), ." ( JEN ) *)1 , !)#(! #(.) .3*# & . (., #- /- #( ." *)1 , ( ))&#(! -3-. '-5 (). #( ." &) -8 FN #'*,)0 ' (. #( - '-+ "' + ,-+. -.+ Q" " ' 2 @ " A ),, -*)( - .) **,)2#' . &3 GN , / .#)( #( & .,# & #&&-5 ( , %#(! ((/ & ( ,!3 ( , )( --#!(' (.- .) /- ,- #- )( ) ." ,. #( 1 3- .) ' % .. , /- ) ),! (#- .#)( & ( ,!35 " - # 8

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

&). ) )'*/.#(! #( )." 0#,./ &#- ( */ &# )( #." , -# 8 #." ." . #(! - # 5 .")/!"5 ." , 1#&& -.#&& ., #.#)( & 8 .;- (). - # ."#- #- !)#(! .) !) 1 38 ), - &)(! - 1 " 0 )'*/. 5 3)/;, !)#(! .) -.#&& " 0 * )*& 1") , 1),%#(! ( ." ., #.#)( & -* 5 ( ." , ;- !)#(! .) **&# .#)(- ." . 1)(;. ' % (3 - (- .) #." , 0#,./ &#- ), ')0 .) ." &)/ 5= " 8 - ." & -. -* % , )( -. ! 5 ,# " ,

2 ' +4 8)+( . - & ' & '- - ( ! (!#( #- /-- 0)&0#(! ., ( - ( " && (! - #( (. ,*,#- ' ( ! ' (.8 < " , #- #( , -#(! )'*& 2#.3 #( / .) ., (- ),' .#)( ( .1),% , "#. ./, -8 " ,#- ) 0#,./ &#- #( , -.,/ ./, ,#(!- #( 0#,./ & ' "#( -*, 1& ( #-.,# /. ' ( ! #&#.38 ( ."#- -#./ .#)(5 ." , ( - .) )/(. #&#.3 ( 0#-# #&#.3 #( ), , .) # (.# 3 *,) & '- ( ." ( -)&0 ." '8 " ,) ' * 0 (. #- -#!( .) !#0 0 &/ & #(-#!". #(.) ." & . -. #--/ -5 " && (! - ( -)&/.#)(- ,)/( . (., - ,)' ." .)* & ,- ( 2* ,.- #( ." #( /-.,38 " 0 (. 1 - " & #( / # ( #3 " ), ., 0 &&#(! .) )" 8

( & ) "' (! 0 , (+ '"3 2 ' 4 ' 0 , ,.))(+- 2 #- & .5 0 3 5 &&5 ( ! (!#( 5 )") ( "( # , & .,# 8


# # " ! # ! ! # ! # " # % ! #

$ #


ANALYSIS IT transformation

Evolution a must The centralised IT function of old is under tremendous pressure from trends such as cloud computing, proliferation of consumer-focused mobile devices in the enterprise and big data analytics. According to a report by The Economist, as these trends erode the entrenched IT structure, CIOs and their teams must better align themselves with business needs or ďŹ nd themselves put out to pasture.

), -6 /-#( -- " - &))% .) (., &#- /( .#)( .) )(.,)& . "()&)!3 #( , -.,/ ./, ( ) , - ,0# - .) /-#( -- /(#.- ( '*&)3 -8 )1 ( 1 . "()&)!# -? &)/ )'*/.#(!6 )(-/' ,: ) /- ') #& 0# - #( ." (. ,*,#- ( #! . ( &3.# -: , ,) #(! ." . -.,/ ./, 8 - ( ." /( .#)(- /( , ." ' '/-. *, * , ), ., (- ),' .#)( ), & . #( ." /-.8 ), #(! .) ( 1 , *),.5 < " 9-/#. " && (! - 7 1 2* . .#)(- ), /-#( -- &/ 5= 1,#.. ( 3 " )()'#-. (. &&#! ( (#. ( -*)(-), 3 && ,0# -5 9-/#. 2 /.#0 - &# 0 ." /( .#)( #- *)#- ), ' $), ., (- ),' .#)(7 JLN ) ." JHK 9-/#. 2 /.#0 - -/,0 3 2* . ." #, .' -"(' -( ! ' ," '"Q" '-%2 (/ + -! ' 1-

14

.", 3 ,- ( FGN *, # . < )'*& . )0 ," /&8= /&&3 IHN - 3 ." #, )'* (3 1#&& #( , -#(!&3 /- - )'') #.3 - ,0# ." . #- )/!". - ( 1" ( ( 8 " )()'#-. (. &&#! ( (#. , *),.- ." . ." " (! - ." - 2 /.#0 - - )( ." !(+"3(' ! / -! )(- '-" % -( -+ ', (+& '(- $/-. ." /( .#)( /. ." (.#, /-#( --5 , .#(! ( 1 )**),./(#.# - ), )'* (# - .) 0 &)* #(()0 .#0 *,) / .- ( - ,0# -5 )(( . 1#." /-.)' ,- #( ( 1 1 3- ( , ."#(% ., #.#)( & /-#( -- *,) -- -8 " - " (! - *, - (. )." (! , ( )**),./(#.3 .) - ( ." #, . '-8 < " ( 1 - )'#(! /*5 -.)) ), < , , #- )0 ,5= - 3- ), #*.)(5 1") - ,0 - ) ." 8 8 * ,.' (. ) ." (. ,#), ,)' GEEG .) GEEL ( #- ()1

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


/-#( -- -., . !3 , '/ " '), &#% &3 .) !" / Q"' ' " % ) + (+& ' ,.) +"(+ -( ." #, * ,-8 ." HLN ) , -*)( (.- 1") - # ." #, 1 - .#0 &3 #(0)&0 #( - ..#(! /-#( -- -., . !35 ILN - # ." #, )'* (3 Q"' ' " %%2 (.-) + (+& .,"' ,, ) +,7 ' -! Q%") ," 4 &(' -! GEO ( + ,)(' '-, 1") - # ." " () ,)& #( /-#( -- ,-+ - 24 ('%2 GMO , 2 -! 2 0 + ) + (+&"' .. , ." ( #( /-.,3 * ,-8 ! + ", ," '"Q" '- ())(+-.'"-2 (+ ),1 , 9."#(%#(! - ." . -* % ." & (!/ ! ) /-#( --8 1 , ." ( )( 9" & ) , -*)( (.- - 3 ." #, /- ) ,#0 - )'* .#.#0 0 (. ! ), ." #, )'* (38 !"% & '2 Q"+&, + ( ., (' .,"' -( .- (,-, @HMOA (+ -( "&)+(/ .,"' ,, Q" " ' 2 @IGOA4 -! Q"+&, ( ., (' /-#(! .) 0 &/ #( ( 1 1 3- ( !,)1 + / '. Q"' -! "+ .' -"(', + %"/ +"' '), .#0 &3 #( )." , , - - 1 &&8 ) ( ), ., ) .1 ( , / #(! )-.- ( ,#0#(! , 0 (/ < ( ,-. ( &35 )'* (# - ) /- )( ,#0#(! ( 1 , 0 (/ . ( .) '), .#0 ." ( ." #, * ,- . /-#(! .) , . ' 0 )+( . -, ' -( Q"' ' 0 .,-(& +,4= ." , *),. - 3-8 < " 3 &-) )/.* , ),' 1" ( #. )' - .) #'*,)0#(! ." , &# #&#.3 ) #( , -.,/ ./, ( &#!(#(! 1#." ." , -. ) ." /-#( --8 , '), -/,*,#-#(! #- ." . , -*)( (.- ,)' ." - , 0 (/ 9 ) /- )'* (# - " 0 '), *)-#.#0 0# 1 ) ." #, ),! (#- .#)(;- #&#.3 .) , / )-.- ." ( .")- , -*)( (.- 1") *,#' ,#&3 *,#),#.#- )-.9 /..#(!8= ), 2 '*& 5 . 0 .)( 5 ),' , ) )1 -5 (). - ." . ( . % ." . "()&)!3 " && (! - 3 #! )2 , . #& ,- &#% )1 - ( ./,( ." ' #(.) )**),./(#.38 " ( " .))% ." , #(- - #( GEEG5 ." *, 0 #&#(! -., . !3 1 - .) -. &#-" ( #( , -.,/ ./, #( " -.), ." . 1)/& &&)1 #. .) /* ( ,/((#(! () ' .. , 1" .5 0 ( # )''/(# .#)(- 1 , /.8 /. ." . -., . !3 , . -)' - ,#)/- " && (! -5 -* # &&3 ." )(-# , & , *& ' (. )-.- ) , /( (. #( , -.,/ ./, . " &) .#)(8 .)( 1 - & .) )(-)&# . )( (., & . (., 1"#& &-) ' %#(! ."

. 0 #& & .) ." /-#( -- )( '), .#' &3 -#-8 " .5 #( ./,(5 &&)1 ." /-#( -- .) !#( ,/( "#(! ." . . .) ) , ( 1 - ,0# -5 &#% )*.#'#-#(! ." -/**&3 " #( .) , / &#0 ,3 )-.- 1"#& ! ..#(! *,) / .- .) /-.)' ,- -. ,8 < ), ." ,# % ( '),. , , . #& ,- ()15 3)/ , &&3 ( .) & 0 , ! ." 1# , ( .1),% ( & ( )/. ." . "()&)!3 #( ." -.), .) ." *)#(. 3)/ )(;. ( .) , *& #. && -) , +/ (.&35= " - 3-8 .# - ), &#!(#(! 1#." /-#( - " , *),. ) ,- .", . .# - - ( */,-/ .) .. , *& ." '- &0 - #( ." )(. 2. ) ." /-#( --5 - )&&)1-7 .,! . -"' .+-! + (0' "'-( -! /-#( -- -) ." * )*& 1") * 3 ), ( , +/" + -!(, 0!( ' Q"- +(& "-7 !",

" , *),. &-) ) ,- 0# ." . /-#( -- - -")/& )(-# ,7 "#(% 1# &38 "()&)!3 #(()0 .#)( ( ., (- ),' '), ." ( $/-. ),*), . /( .#)(-5 #. ( /( ' (. &&3 " (! ." 1 3 ." /-#( -- )* , . -8 )(-# , ." #'* . ) #(()0 .#)( .) ." 1# , #, .#)( ) ." /-#( --5 (). $/-. .) ." /./, ) ."

/( .#)(8 '*)1 , 3)/, 8 #( , -.,/ ./, - )'') #.3 ' 3 &&)1 3)/ .) , / ." - & ( - )* ) ." /( .#)(5 /. , ." , ." ( &#'#.#(! ." ,)& ) ." #. -")/& &&)1 ." .) -1#. " ,)' ) /-#(! )( % *#(! ." &#!".- )( .) ) /-#(! )( #(! 0 &/ 8 )(>. ")& ." /( .#)( #( #-)& .#)(8 (3 ),! (#- .#)(- ." . " 0 *,)0 ( ." ')-. *. . *.#(! .) ." " (! - 1,)/!". 3 &)/ )'*/.#(!5 ') #&

While IT may be central to the business, the CIO and his team can be left behind if they can’t ďŹ nd a way to address the C-suite’s core needs in language that expresses the business value of technology investments. The report found that CIOs and C-suite executives don’t see eye-to-eye on the alignment issue: two-thirds of CIOs feel their function is wellaligned with the business, but fewer than one-half of C-suite executives feel the same way about their CIOs. ( " &* '#(#'#- )-.- ( .. , &#!( 1#." ." /-#( -- /- /-#( -- ' ( ! ,- , , &/ . (. .) * 3 ), - ,0# - ." 3 ) (). ( 8 . &-) ' (- ." . #(0 -.' (. #- '), &#% &3 .) *,)0# ( 1 - ,0# - ." . /-#( -- ' ( ! ,- ./ &&3 1 (.8 ( )/, ! ." /&./, & 2* . .#)( ." .

-. -")/& *& 3 ( .#0 ,)& #( !,)1#(! ." /-#( -- ( (). $/-. #&#. .#(! ." ),.- ) )." , '*&)3 -8 2* ,#' (. 1#." ." . 1#&& " &* 3)/ /#& %()1& ! ), -%#&&- ." . 1#&& * 3 ) & . ,5 0 ( # ." 2* ,#' (. .#)( #( , - - -"),.9. ,' . "()&)!3 )-.-8 " " ( .) 0 &)* . & (. " - 0 &/ ." . ( % * * 3#(! #0# ( -8

*,)&# , .#)( ( #! . ( &3.# - " 0 )( -) 3 ')0#(! & ,- )/. #(.) ." /-#( --5 1" , ." 3 ( &#!( '), &)- &3 1#." ." ( - ) /-#( -- /(#.-8 )(-# , ")1 ." )'* (3 -- -- - #(0 -.' (.-8 )(;. --/' ." .

#(0 -.' (.- ( -- ,#&3 ' ( ., 9) .1 ( /..#(! )-.- ( ,#0#(! , 0 (/ 8 " - 3-5 )'* (# - ( ) . ( "# 0 )."8 #-% #- -.#&& $/-. ,#-%8 ,! (#- .#)(- , -.#&& )( ,( )/. ." ,#-%- --) # . 1#." &)/ )'*/.#(!5 ') #& *,)&# , .#)( ( #! . ( &3.# -5 /. )(;. & . ." ,#-%- ) + %2, 2(.7 ! -!+ -, ' " '-"Q" 4 -- -- 5 ' ( ! ), 0)# 9$/-. &#% (3 )." , /-#( -- ,#-%8

15


ANALYSIS Avaya

An advanced region Avaya Networking sent its global general manager Jean Turgeon to Dubai last month as it looks to step up its presence in the Middle East. Turgeon found he was “pleasantly surprised� with how advanced networking is in the region.

" ( #. )' - .) ." . % :/* ) ( 1 (. ,*,#- . "()&)!# -6 ." # & -. . ( - #- ! ( , &&3 * , #0 .) -)' 1" . "#( #.- ),." ' ,# ( ( -. ,( /,)* ( )/(. ,* ,.-8 .- 0! ' ' .+ ('4 ' %( % . 0 3 .1),%#(!5 ' .) ." & -. ')(." " )/( ." . .) , '), ,)' ." - 1" ( #. )' - .) ( .1),%#(!8

16

< ;0 ./ &&3 )/( ." # & -. .) #( 0 ,3 -#'#& , *& .) '), 0 &)* ' ,% .- #( . ,'- ) ( .1),%#(!8 " 3;, Q"'"- %2 $ )"' .) 0"-! -! ) ? -! 2;+ /-#(! ." - ' . "()&)!# - ( " 0#(! ." - ' #- /--#)(-5= /,! )( - 3-8 < 1 - *& - (.&3 -/,*,#- 1#." ." *." ) ." #- /--#)(- ( ")1 . "9- 003 -)' ) ." * )*& , #( ." , !#)( .) * #0 #(.) ." 0 ,#)/- ,# - ( . "()&)!# -

." . , #(! *,)'). ? ' #(&3 ), ." . (., 5= " -8 0 3 " - # .) 2. ( #.- ,# ) ,#(! ,)-- ." 1")& (. ,*,#- .) ( /,! )( 1 - *& - 1#." ." , .#)( .) ."#- #( ." # & -.8 < )/ " 0 .) . "(# &&3 - 003 .) /( ,-. ( ."#- 0 &/ *,)*)-#.#)(8 ;0 " -)' 0 ,3 -/ -- /& ' .#(!- 1#." 0 ,#)/- /-.)' ,- ."#- 1 % ." . &# 0 1#&&


./,( #(.) -)' *, ..3 -/ -. (.# & ( , & )**),./(#.# -5= " - 3-8 - ." . 0 3 " - ) - ,0 ( #( , - #( 0#-# #&#.3 #( ." , !#)( ( &# 0 - #.- . "()&)!# - , 0 ,3 , & 0 (. ), ." ' ,% .8 < /, . "()&)!# - , && )/. .#' 9.)9 - ,0# 5 ." -#'*&# #.3 ) ." *&)3' (.5 , -#&# ( 35 /-#( -- )(.#(/#.3 ( #- -. , , )0 ,35 ( )(;. ."#(% ." , #- /-.)' , ;0 ' . " , ." . # (). -% +/ -.#)( )/. ." - ."#(!-5= /,! )( - 3-8

( , -#(! -/**),. 0 3 , ()1 )''#.. .) #( , -#(! #.- -/**),. #( ." , !#)( 3 !,)1#(! #.- ' ,% . -" , ( * . "5 ( )(.#(/#(! .) #(0 -.5 ), #(! .) /,! )(8 #."#( ." - .. '*.-5 #. #- * ,.# /& ,&3 ) /-#(! )( ." ")-*#. &#.3 ( (%#(! ' ,% .-8

< && )/, .", /-#( -- /(#.- , & 3 -!+ , '"(+ , + )(+-"' -( -! .' + )( /' , && ()1 %()1( - (. ,*,#- )&& ), .#)( -)&/.#)(- A B8 " .;- ." )( #! " (! 1 ;0 )( 5= /,! )( - 3-8 - ." . 0 3 #- &-) " (!#(! #.- '#( - . ,)' $/-. /#& #(! ( .1),%- ( !()"' ))%" -"(', +.' Q% 0% ,,%24 -( ( .,,"' )( ." , +/#, ' (.- ) ." **&# .#)( ( - ,0# #(! ." ' 0# ." ( .1),%8 " , -/&. ) ."#- #- ." &#0 , ( ) 0! - "- %%, :' -0(+$8 ,8 8, +/" ;4 0!" ! "- **&# - .) ." &)/ ') &8 < " 0 ( (. ,*,#- ( 9.)9 ( ,# ." . ( , &&3 & , . ." *&)3' (. ( ." .#' 9.)9- ,0# ) 0 ,#)/- **&# .#)(- ( - ,0# - -/ " - 5 0# ) )( , ( #(!5 0# ) )&& ), .#)(5 )(. . (., ( ." (.#, -/#. ." . 0 3 " -5= /,! )( - 3-8 #.#)( &&35 0 3 #- ) ,#(! .))&- ." . , #(. !, . #(.) #." , ." ( *)#(.- ),

I was pleasantly surprised with the depth of the discussions and how tech-savvy some of the people are in the region to deep dive into the various fabrics and technologies that are being promoted – mainly for the data centre.� < ;0 ( "#!"&3 -/ -- /& #( ." ")-*#. &#.3 ' ,% . #( ." , !#)( ( 1 ;, , &&3 -. ,.#(! .) (! ! #( 0 ,#)/- *, ..3 * #- /--#)(- 1#." -)' ) ." (%- , ! , #(! . (., )**),./(#.# - 9 ) 9 '*/- ( &)/ 5= /,! )( - 3-8 < 0 ,3 ) 3 #- &))%#(! . . (., /#& 9)/.5 , , -"5 , .#(! /-#( -- #- -. , , )0 ,35 /-#( -- )(.#(/#.35 /#& #(! ." #, *,#0 . &)/ ( & , .#(! .#' 9.)9- ,0# 8 ) ." .;- ." #(()0 .#)( 1 ;0 ,)/!". .) ' ,% . ." . #- "#!"&3 , & 0 (. .) -)&0 -)' ) ." - /-#( -- " && (! -5= " -8

( #.- .. '*.- .) -. ( )/. #( ." ' ,% .5 0 3 " - ' #(. ,( & " (! - .) ." ),! (#- .#)( .) , . '), ')' (./' ,)-- ." 0 ,#)/- /-#( -- /(#.-8

." -1#. " ( #( , -.,/ ./, #( ), , .) " &* /-.)' ,- .) .,)/ & -")). ( , &9.#' ')(#.), ." ( 9/- ,;- 2* ,# ( 8 < ")- , -)' ) ." ."#(!- 1 " 0 -" , 1#." -)' ) ." % 3 -., . !# /-.)' ,- ( * ,.( ,- #( ." , !#)( - .)5 :! + ;, -! +( & )4 ! + ;, 0! + 0 + " #(! ( " , ;- ")1 1 # , (.# . ,)' ." )'* .#.#)(5;= /,! )( - 3-8 /,(% 3 -)&/.#)( ()." , " , . ,#-.# ) ." # & -. ( .1),%#(! ' ,% . ." . 0 3 " - ) - ,0 #- ." -#, ), ./,(% 3 -)&/.#)(-5 ),( ,)' -! ," '"Q" '- '.& + ( % + '- +)+", , -( & ,! *&)3' (.- #( ." , !#)(8 < -* # &&3 #( ." ")-*#. &#.3 #( /-.,35

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

17


ROUND-UP Month in view

Zayed University and AccessData partner to promote cyber security

3 (#0 ,-#.3 ( -- . ,)/*6 1"# " *,)0# - #!#. & #(0 -.#! .#)(- ( &#.#! .#)( -/**),.6 " 0 (()/( $)#(. )&& ), .#)( #( ( ),. .) , #- , !#)( & 1 , ( -- ( ." -. ( , ) / .#)( #( ." , ) #!#. & ), (-# - ( 3 , - /,#.38 ) )'' '), . ." * ,.( ,-"#* ( #( , )!(#.#)( ) -- . >- -/**),. ), ." (#0 ,-#.3>- ! ! # ! / ' ! $

1 , 1#." *, -.#!#)/- = ,# ( ) & # !&+ ! / ! (

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

A third of consumers’ digital content will be in the cloud by 2016: Gartner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

18

( &3-. . ,.( ,8 < #." ." ' ,! ( ) ." * ,-)( & &)/ 5 ."#- -.9!,)1#(! )(-/' , #!#. & )(. (. 1#&& +/# %&3 ! . #- !!, ! . ,)' )(( . 0# -5= -" - # 8 ,.( , *, # .- ." . 1),& 1# )(-/' , #!#. & -.), ! ( - 1#&& !,)1 ,)' HGM 2 3. - AF 2 3. P F ELH LIF MGI " 2- ,A "' GEFF -( I7F 3 -- 2- , @F3 -- 2- P FEGI 1 2- ,A "' GEFK7 !", "' %. , " "- % ('- '- ,-(+ "' ,4 -' ,.*")( -5 . & .-5 " , 9 #-% ,#0 - A -B5 ( .1),% .. " -.), ! A B ( &)/ , *)-#.),# -8 " /&% ) ." &)/ -.), ! ( - ) )(-/' ,- #( ." ( , . ,' 1#&& ' . 3

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



ROUND-UP Month in view

Injazat inks two-year contract with ADFCA

($ 4 . . 3-. '- " - -#!( .1): 3 , /**),. ,0# - )(., . 1#." ." / " # )) )(.,)& /."),#.3 @ A .) (-/, ." . ." /."),#.3>-

)* , .#)(- ' . #.- ' ( . ) 0 &)*#(! - !,# /&./, ( )) - .), ), ." '#, . 8 ( , ." . ,'- ) ." !, ' (.6 ($ 4 . 1#&& *,)0# 1#." ): ) .#)(6 (. ,( . )-.#(!6 (. ,*,#- ,0 , ( ! ' (. ( .), ! , .1),% @ A .), ! - ,0# - 0# ." ($ 4 . , '# , . ! ' ! !+ / ! ) ! / ! ! ( ! & ( ! ,0# - .) #'*& ' (. 3

($ 4 . ), ." /."),#.3 #( &/ ,0# -%6 ),%*& # & /**),. ( 0 ,#)/- **&# .#)( ,0# -8 < /, !, ' (. 1#." #- & ( ' ,% "# 0 ' (. #( )/, ),.- .) " (( & )/, #( /-.,3 & ,-"#* .) 0 ( / " #;- 0 &)*' (. ! ( )0 , ."

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

)0 ,- - ." ( ), ' (. ) ,/& - ( , !/& .#)(- - 1 && - ." , .#)( ) )) - .3 1 , ( -- ')(! ." */ &# #( )), #( .#)( 1#." )( ,( !)0 ,(' (. ) # - ( *,#0 . - .), ),! (#- .#)(-8 . )'*,#- - ),*), . ,0# -5 )) .3 ' "/ ,-( $ %-!4 -+ - " % ''"' ' + (+& ' &"'",-+ -"('4 (%" " , ' 3-. '-5 0 &)*' (.5 !,# /&./, & #,-5 ( . ,#( ,3 )-*#. &- ( &#(# -8

Dell to hire for Wyse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

20

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


Protect your most Valuable asset: your data

That‘s where Dell can help. From removable disks and efficient tape backup to networked stroage devices, call Dell‘s expert storage consultants for advice on creating a powerful solution to protect your data.

Keep everything in its place Is your data secutely organised, stored and backed up? Lost or misplaced data can result in lost productivity and increased expense for businesses of any size. Consolidating your data into one centralised place makes it easier to manage, easier to access and easy to share.

PowerVault MD36OOi

Intel® Xeon® Processor DR4000

PowerVault MD3220

PowerVault NX35OO

PowerVault MD36OOf

For purchase or more information contact

Dell Authorized Sales, Services and Solution Providers Dubai: (04) 398 9999 Ext. 777, (04) 314 1484 Abu Dhabi: (02) 622 4442, E-mail: sales@kit.ae Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, and Xeon Inside are trademarks of Intel Corporation in the U.S. and/or other countries.


ROUND-UP Month in view

Cloud is not the future of IT: Forrester

&)/ )'*/.#(! #- (). ." /./, ) ( )'') #.#- .#)( #-6 - 3- ( &3-. ")/- ),, -. ,6 &.")/!" ." .1) -/**),. " )." ,8 ),, -. , - 3- ." . - , -/&. ) )'') #.#- .#)( ( ') ,(#- .#)(5 *),. )&#)- 1#&& 0)&0 )0 , .#' -) ." . ' (3 **&# .#)(- 1#&& )' -/#. & ), &)/ *&)3' (.5 /. ' (3 1#&& ().8

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

" % ." &)/ (. ,*,#- 3 , *),. - 3-7 < )(! . ,'5 (. ,*,#- - 1#&& " 0 "3 ,# *),. )&#) ) &)/ ( ()(9 &)/ 1),%&) *&)3' (.- ." . /- - ." - )*.#)(- .) )*.#'#- , -)/, ( !#&#.3 , +/#, ' (.-8=

. -7 < ( ."#- /./, -. . ." ' $),#.3 ) -3-. ' 1),%&) - 1#&& &)/ 9, -# (. 1"#& 3)/, )1( -3-. '- ) , ), 1#&& 0)&0 .) &)/ . -&)1 , /. &# , . * 8 " ( , -/&. 1#&& '#2 (0#,)(' (. ' ( ! .",)/!" #-#)( ., ( - ,# - ) 1),%&) /.)' .#)( -3-. '- ." . (-/, !)0 ,( ( ( , !/& .),3 )'*&# ( ,)-- ."#- *),. )&#)8= " , *),. &-) 1 ,(- ." . .")- )'* (# - ." . " 0 ")- ( *,#0 . &)/ , "#. ./, - ." #, ' #( &)/ -., . !3 1#&& (). , &#- ." - 0#(!- ." . ( ' .",)/!" */ &# &)/ - ,0# - ), .",)/!" ( , "#. ./, ." . )' #( - )." */ &# ( *,#0 . &)/ * #&#.# - ? /-/ &&3 %()1( - "3 ,# &)/ , "#. ./, 8

Strong growth in enterprise social software spending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

22

))%9&#% ( 1#.. ,9&#% ./, - ), 0(+$)% ., 4 "' %. "' &)%(2 )+(Q"% ,4 .#0#.3 -., '-5 '# ,) &)!!#(!5 #- /--#)( ),/'-5 1#%#-5 ( )(. (. . !!#(!5 , .#(! ( , 0# 1#(!8 /- ) ." #, *). (.# & ), -" ,* (#(! '*&)3 )''/(# .#)( ." 3;, )'#(! #'*),. (. .))&- ), < #-#)( -/**),.= ( *,) / .#0#.3 ,)-- ')-. #( /-.,3 0 ,.# &-5 ), #(! .) /- .. 8 ')(! ." !,)1." ,#0 ,- , */-" .) -) # & )&& ), .#)( * #&#.# - .) )." , (. ,*,#- **&# .#)(-5 ( ' ( ,)' '*&)3 - ), -) .1 , ." . , - ' & - ." )(-/' , **&# .#)(- ." 3 /- )/.-# 1),%8 )' .),- 1#&& 1),% .) -&)1 )1( ." ')' (./'5 ")1 0 ,5 #( &/ #(! )( ,(- )/. , ./,(9)(9#(0 -.' (.5 - /,#.35 , !/& .),3 )'*&# ( ( #(. && ./ & *,)* ,.3 *,). .#)(5 - 1 && - ." #(0)&0 ' (. ( ,)' * ,.' (.- .) *&)3 ( #(. !, . ."

-) .1 , 5 ), #(! .) 8

( # , (. -./ 35 < ),& 1# (. ,*,#- ) # & ) .1 , GEFF ( ), " , -5= , (% 0 ( ),- 3 ." #, GEFF , 0 (/ 8 " &#-. 1 - & 3 1#." DFEJ8I '#&&#)(5 )&&)1 3 #0 ) .1 , ADKJ8H '#&&#)(B5 )''/(#-* ADKE '#&&#)(B5 &&#! (. ADIG8L '#&&#)(B ( ) # &. 2. ADHI8J '#&&#)(B8 )/( #(! )/. -! -() FE 0 + 3"' 4 "-!".&4 && +4 1- .), ( 1 , 8

( -#!( ) ." !,)1#(! #'*),. ( ) ."#- .3* ) -) .1 , 5 # ,)-) . #- , *),. &3 #( . &%- .) +/#, '' , ), )/. DF #&&#)(5 1"# " & !- #( ."#- , 5 )/& #(-. (.&3 ))-. ." -) # & ./, - #( #.- )&& ), .#)( *,) / .-5 * ,.# /& ,&3 ! + ("'-4 " "- (. !- && +7 (( % ( Q" " %, ! / %,( ' , 2"' ), ')(."- ." . ." 3 , 0 &)*#(! 1),%*& 0 ,-#)( ) ." )'* (3;- ))!& O -) # & ( .1),%#(! -#. 5 1"# " )/& !#0 ))!& **- ( (. ,*,#- -) # & )'*)( (. #. /,, (.&3 & %-8



Find us online

www.cnmeonline.com

Analysis:

Insight:

CIOs in search of IT simplicity

Read more online

http://bit.ly/OQqfoG

BYOD security concerns: does IT protest too much Read more online

Read more online

http://bit.ly/OQqjob

http://bit.ly/QKOHX0

www.cnmeonline.com

Photo Gallery:

Blogs: Microsoft and Google want to be like Apple Jared Newman, blogger and journalist, games and tech Read more online

http://bit.ly/MfJUwi

data scientist Sathya Mithra Ashok, Senior Editor, CPI Technology

Read more online

http://bit.ly/JWdkkf

24

Six steps to improve BPM in a social-mediadriven world



CASE STUDY Habtoor Hotels

On cloud nine Habtoor Hotels has become the latest enterprise in the region to express its satisfaction with a move to the cloud. Outsourcing its email hosting and security to Google Apps has cut its costs by 50%.

26


.)), ). &- #- )( ) ." # & -.>- ")-*#. &#.3 0 . , (-8 * , .#(! #( ." , !#)( ), " .- & ' ! " + / ! # / # ! ! (

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

.- ' #( . ' #- #( / # 1#." FG '*&)3 -5 ( #. &-) " - ( . ' ) -#2 #( #,/. ( )/, #( / " , -.8

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

Mahmoud Kamal, group IT manager at Habtoor Hotels.

< &-) " 2 " (! - ,0 , ), * )*& 1#." & % ,,3;- .) -3( 1#." ." #, 0# -8

. 1 - , ." , 2* (-#0 8 #(. #(#(! $/-. ' M& -", % - %"' 0 , (,-"' ., +(.' DGEE5EEE ), '), 0 ,3 3 ,8 ) )-. /..#(! 1 - )( , -)( 1 1 (. .) " (! .) ))!& **-5= ' & - 3-8 -# - ,)' )-. /..#(!5 ." )." , ' $), , -)( ), )/.-)/, #(! .)),;- ' #& ")-.#(! ( - /,#.3 1 - /- ) ." 2 --#0 -* ' ( $/(% ' #& #. 2* ,# ( 8 < ! , & -- ) ")1 *)1 , /& 3)/, ( Q%"' ,) & ('-+(%% + ' Q"+ 0 %%, + ? -* '' ,- , 0 ,3 & 0 ,8 ) ' .. , ")1 & 0 , ." *)&# ' ( #- 9 ." ."# 1#&& &1 3- )( -. * " 8 0 ( #( )/, /-#( --5 && ." -* ' )(.,)& -3-. '- , *"3-# &&3 /* .#(! ." #, -) .1 , -3-. '- /. 3)/ )(;. ! . ." .,/ *)1 , ) )(&#( - ((#(!8

Regardless of how powerful your offline spam controller and ďŹ rewalls are – spammers are very clever. No matter how clever the policeman is the thief will always be one step ahead. Even in our business, all the spam control systems are physically updating their software systems but you don’t get the true power of online scanning.â€? - , -/&. ) ."#-5 " "). & *,)* ,.3 " - #.- )1( . (., 5 ( " )( #- )(( . .) ." - ,0 ,- #( .)),;- ' #( -#. #( / #5 1" , #. ,/(- - 0 , & (., &#- -3-. '-8 < ! / )+( % & 0"-! &2 $ ( Q" -3-. ' )(;. '#( 1 #.#(! )( ")/, ), ( ' "' + -( (& (0' ' Q"1 "- (+ & 7 .-

(;. ) ." . 1#." ." ,)(. ) )/, -3-. '8 ) #. " .) "3 ,# ? )' #( .#)( .1 ( &) & ( &)/ 5= ' & - 3-8

' #& ")-.#(! .)),;- ' #( #'*& ' (. .#)( , (.&3 " - ( ." )/.-)/, #(! ) #.- ' #& ")-.#(! ( - /,#.3 1#." ))!& **-8 " "). & " #( ),#!#)( &&3 /- )' #( .#)( .1 ( 3' (. ( &) & "'.1 H , +/ + ' !(,- -! 0!(% & "% , +/ + "' "-, ! ( Q" 7

" 3' (. -* ' )(.,)& /. #. 1 - (). )(&#( 5= ' & - 3-8 " #-#)( .)), " .) ' % 1 - 1" ." , .) !) ), &) & -* ' ( &) & -3-. ' ), .) !) ), &)/ #'*& ' (. .#)(5 #( 1"# " #. 0(.% ()- (+ (( % )), ' (,-"'"7 < ( ." ( #. 1 - -#'*& 8 3)/ " 0 .", ), )/, '#&&#)( /-#(! ( ' #& ), -* ' )(.,)& -3-. ' ( )/. ) ." - '#&&#)(- ) * )*& ." , , FEE 1") , *),. -* ' ,)' )( - ( , #( " & ( ")/,5 ."#- ' #& , -- 1#&& )' &) % ( & %&#-. #( ." - )( ")/, )( ." -3-. '8 " . ' (- ." " % , 1#&& )(&3 -/ 3 "/,.#(! .")- * )*& ( ." , -. 1)(;. & #.5= ' & - 3-8 < 0#(! *)1 , /& )(&#( -* ' )(.,)& -3-. ' 1 - ." )." , % 3 , -)( 1"3 1 1 (. 1#." ))!& **-8 /, /- ,- , #0 0 ,3 & ,! ')/(. ) -* ' #&3 ( ." .

27


CASE STUDY Habtoor Hotels

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

/ - - 0 , -!", ,. ,, 0"-! (,-"'" -! - 0 , ' $), .), #( .)),;- #-#)( .) )*. ), ))!& **-5 1"# " 1 - #'*& ' (. .",)/!" ))!& ;- /."),#- # & -. * ,.( ,5 8 3 , . , ." ))!& **- #'*& ' (. .#)(5 # ,)-) . && .)), 1#." ( ) , ), #.- %3 ,#0 - ,0# ." . /( , /. 1" . .)), 1 - * 3#(! ))!& 8 )1 0 ,5 -*#. ." " * , *,# 5

' & 1 - " **3 ()/!" 1#." ." , -/&.- .) -. 3 1#." ))!& **-8 < ( ) ." ' #( .),- #( )/, - & .#)( 1 - ." , */. .#)( ) ))!& 8 " 3 , & #(+ % + "' -!", Q" % ' 0 + (' ( -! Q"+,- )% 2 +, "' %(. & "% ' ,(%.-"(',7 &-)5 #.- #, . )'* .#.),5 # ,)-) .5 1 - (). , 3 . ." .#' 8 " 3 ' % ,)/(

)( 3 , & . , 1#." , / ) , 3 ,)/( FEN8 /. 1 - (). 1#&&#(! .) " (! 8 1 - " **3 1#." ))!& ( #. " *,)0 ( .) 0 ,3 , &# & ( .,/-.1),."35= ' & - 3-8

' & 1 - &-) 0 ,3 " **3 1#." ." '#(#' & %()1& ! ., (- , ( ., #(#(! #(0)&0 #( ." #'*& ' (. .#)(8 < " '#!, .#)( .) ))!& **- 1 - 0 ,3 -'))."8 " 1")& ., (-#.#)( 1 - )'*& . 1#."#( .1) 3- 3 ( #.- (!#( ,-5 1") ,# ( #(-.,/ . ." ' ( ! ,- ")1 .) - . #. /*5 *,)0# #(! -. * 3 -. * )(-/&. .#)(8 " 3 1 , ., #( )( ")1 .) 1),% )( ." '#(#-., .#0 )/(. ( ")1 .) ( 1 )/(.- ( #(-. && ." -3( .))& .1 ( /.&))% ( ))!& 5= ' & - 3-8 < . 1 - 0 ,3 -., #!". ),1 , *,) -- ( '3 . ' " - ( & .) ,,3 #. )( 3 ." '- &0 - #( && /(#.- ,)-- )/, )/, ' $), "). &- #( / #8 &-) " ( ' "' + +(& (( % (' -! Q"+,- 2 #.,- -( ',.+ / +2-!"' 0 , Q"' 4= ! ,7

Having a powerful online spam control system was the other key reason why we went with Google Apps. Our users received a very large amount of spam daily and that raised fears of us being hacked through illegal sources. We also had insufficient bandwidth to manage our email and communications despite having a leased line for our email server.�

28

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

' & ' #(. #(- #. #- ." -.,)(! ( ) /- -/**),. ) .)),;- ' ( ! ' (. .)

." . " - & .) ." "). & " #(;- -/ --8 < " 3 /( ,-. ( #.;- ( 1 , ( () ) 3 ( *"3-# &&3 2#-. 1#.")/. " 0#(! -.,)(! #( , -.,/ ./, 8 ;, " (!#(! )'*/. ,- )( , !/& , -#-5 1 ;, /-#(! & - ,0 ,- ( 0 ,3 ) 3 #- +/#** 1#." -' ,.*")( 8 " 1")& !,)/* #- 0 ,3 ) /- .)1 , - 8 #.")/. -. & )* , .#)( 3)/ (;. " 0 -/ -- /& +('- ( Q" 4 + , +/ -"(' () + -"(' (+ & ' -! !(- % ,. Q" " '-%24= ! (' %. ,7


Introducing Server Room in a Box

APC rackbased cooling draws in hot air from the rear, at its source, and then sends conditioned air out the front, ready to be used by adjoining racks.

APC integrated cooling future-proofs your IT room without breaking the bank Is your server room a barrier to adopting new technologies? Consolidation, virtualisation, network convergence, blade servers — these new technologies improve efficiency, cut costs, and allow you to ‘do more with less’. But they also bring high-density power, cooling, and management challenges that server rooms were never designed to handle. You’re relying on guesswork, depending on building air conditioning, or improvising remedies. So how can you increase the level of reliability and control in your server room without spending a fortune?

Introducing the APC by Schneider Electric total server room solution Now you can get power, cooling, monitoring, and management components that easily deploy together as a complete, integrated solution. Everything has been preengineered to work together and integrate seamlessly with your existing equipment. Just slide this proven, plug-and-play solution into most existing spaces — there’s no need for confusing cooling configurations or expensive mechanical re-engineering. The modular, ‘pay as you grow’ design lets you be 100 per cent confident that your server room will keep pace with ever-changing demands.

Future-proof your server room easily, cost-effectively APC™ by Schneider Electric™ takes the hassle out of configuring server rooms. Self-contained InRow™ cooling units, high-density NetShelter™ enclosures, and the APC rack air containment system combine to create a proper IT ecosystem in almost any surrounding. Rack-level monitoring sensors, intelligent controls built into the cooling unit, and integrated management software provide complete remote control and unprecedented visibility into the entire system. Simply add power protection (like undisputed best-in-class Smart-UPS™ or Symmetra™ units) and you have a total solution for today, tomorrow, and beyond.

If you have dedicated IT space. . . Get pre-validated, high-density cooling as a single offering APC InRow SC System combines an InRow SC precision cooling unit (up to 7 kW capacity), NetShelter SX rack enclosure, and rack air containment system, for a limited time, at a specially discounted price.*

If you don’t. . . Introducing the NetShelter Office CX: portable server cabinets, with extreme noise reduction, designed for office environments These solutions integrate power, cooling, and management in a secure, quiet, cooled enclosure that’s indistinguishable from other office furniture.

Download the White Paper, ‘Cooling Strategies for IT Wiring Closets and Small Rooms’, and stand a chance to WIN an iPad 2! Visit www.apc.com/promo Key Code 20277p Call +9714-7099690 (Arabic) / +9714-7099691 $ ) ' +97147099-650

Š2012 Schneider Electric. All Rights Reserved. Schneider Electric, APC, InRow, NetShelter, Smart-UPS, and Symmetra are trademarks owned by Schneider Electric Industries SAS or its affiliated companies. All other trademarks are property of their r)63)'7-9) 2:1)56 -((/) %67 2; = 8&%- !1-7)( 5%& 0-5%7)6 > # # 8// ()7%-/6 %5e available online.


CASE STUDY Gulf Air

Jumbo savings Powered by a private cloud, Gulf Air, the principal carrier of Bahrain, has been able to transform itself into a dynamic airline that provides better service to its passengers while minimising short-term and long-term IT infrastructure costs.

( .) 3>- 2., ' &3 )'* .#.#0 ' ,% .6 #,&#( - &#0 ( # 3 ." #,

-3-. '-8 " #, #( , -.,/ ./, '/-. )' #( * , ),' ( ( 0 #& #&#.3 1#." /( .#)( &#.3 ( / & , ! " ! % #- 0 ,3."#(!8 ( 1" ( 3)/ , )( ) ! $ + ! ! , /& #,: ." " && (! #- .) (-/, ."#- 2* ,# ( ,#(!- .)! ." , 0 ,# .3 ) *,) / .- - '& --&3 ( -.8 )1(.#' $/-. #-(>. ( )*.#)(8 /& #,5 1"# " " - ( #( /-#( -- (+ &(+ -! ' KG 2 +, ' Q%2 -( JH -.#( .#)(-5 -. ,. )'*/.#(! 1 3 % #(

30

." & . LE-8 " #,&#( " - ,)/( JEEE /- ,- #( &/ #(! *#&).-5 #( , 1 ( " - ( Q" , ,)+ +(,, ME (.'-+" ,7 #,&#( **&# .#)(- , .3*# &&3 0 ,3 )'*& 2 ( 2* (-#0 5 ( , +/#, & ,! #( , -.,/ ./, ( . ' ) 2* ,.-8 < /& #, " - ( )#(! )'*/.#(! ), IE *&/- 3 ,- ( 1 " .1) . (., -5 1"# " 1 , )(-)&# . #(.) )( 8 ( ."#- /-#( --5 /-.)' ,-; ( - , " (!#(! , *# &3 ( 1 , &1 3- 2*&),#(! ( 1 1 3- ) )#(! /-#( -- -' ,.&35= - 3- ,8 --#' $#5 #, .), ) 8 " #,&#( " - ,)/( FJE **&# .#)(- ,/((#(! )( #.- ( .1),%5 -)'

")-. ( -)' ' ( ! #(9")/- 8 " ')-. ,#.# & )( - #( &/ ." , - ,0 .#)( -3-. '- ,)' , 5 ,!) -3-. '-5 , & 9 /-#( -- -/#. ( , 0 (/ ' ( ! ' (. -3-. '-8 < " , & " && (! #- ! ..#(! .) #(. , ." - **&# .#)(- ( ! . ." ' .) . &% .) " )." ,8 0 , ." & -. 1 3 ,-5 1 " 0 )(.#(/)/-&3 , , -" && )/, **&# .#)(- 1#." -. ) , **,) "8 , ' %#(! -/, ." . #(-. ) #(! ( )* , .#)(- -/**),. (.#.3 1 , !)#(! .) 0)&0 - /-.)' ,9 (.,#

- ,0# *,)0# , ( +/#* )/, #(. ,( & /- ,- 1#." .))&- .) .. , - ,0 )/, /-.)' ,-5= - 3- $#8


1#." ." " && (! ) )'') .#(! & ! 3 -3-. '- 1#." ." ( 1&3 #(.,) / -3-. '- 1#.")/. )'*,)'#-#(! & 0 &- ) - ,0# -5 /& #, ' ,% )( #.- &)/ $)/,( 3 3 , ( " & %8 " ")# 1 - .1 ( *,#0 . ' ). %" %(. 4 ' #" 3 +( "' (' -! (+& + -( "&)+(/ .,"' ,, Q" " ' 2 ( &)1 , )-.- 1"#& #(.,) / #(! ( 1 - ,0# -8 < . %" %(. ", )+( %2 *." $ -)&/.#)(- /. #. #- (). , &&3 ( )*.#)( ), #!! , ),! (#- .#)(- &#% )/,- /- ) ." % % ' , .+"-2 ",,. ,7 +"/ - %(. 0 , ." ,#!". ")# ), /- - #. , -- - - /,#.3 )( ,(- ( '#!, .#)( .) */ &# &)/ 1)/& " 0 ( 0 ,3 " && (!#(!8 ()." , #--/ #- ." . ." */ &# - ,0# *,)0# , !, / &&3 . % - )0 , 3)/, #( , -.,/ ./, ( ." , #- () 1 3 3)/ ( ,)&& #. % #( # 3)/ 1 (. .) ) -) #. & . ,8 )/ , & . 1#." () *& . ),' .) ' #(. #( 3 3)/,- & 5 < - 3- $# 2*& #(#(! ." &)!# "#( ." #-#)( .) !) *,#0 . 8 /& #,;- &)/ $)/,( 3 -. ,. 1#." .1) 0#,./ &#- - ,0 , ,/((#(! ,)/( J9K **&# .#)(- " ( ()1 ." #,&#( " - "# 0 ,)/( ME * , (. 0#,./ &#- .#)( 1#." 0 ( '#--#)(9 ,#.# & **&# .#)(- ,/((#(! )( -8 &)/ )'*/.#(! *,)0 .) -/ -- /& -., . !3 ." . " &* /& #, )'*&#-" ' (3 "# 0 ' (.- )0 , ." & -. FM &('-!,7 , + ,.%-4 -! (&) '2 ! , ( & .) , / #.- *"3-# & - ,0 , )/(. 3 HJ * , (.5 -",#(%#(! ." (/' , ,)' FJE .) ()1 $/-. .1) , %- ) & - ,0 ,-5 +.''"' " + '- Q% /(.+, ( /"+-. %", -"('7 < )' ) )/, - ,0 ,- 1 , )'#(! .) ( ) &# ( ."#- 1)/& " 0 ' (. #(0 -.#(! #( '), - ,0 ,-8 #,./ &#- .#)( ( & /- .) 0)# ." . )-.5= - 3- $#8

Dr Jassim Haji, Director of IT, Gulf Air

/-. &#% 1#." **&# .#)(-5 $# " - )*. -. ) , **,) " .) 0#,./ &#- .#)( - 1 &&5 1#." 1 , /- ), - ,0 , 0#,./ &#- .#)(5 , & ), . - 0#,./ &#- .#)(5 ), -.), ! ( #.,#2 ), -%.)* 0#,./ &#- .#)(8 - 3- ." 0 , ! ! ) - ,0 , #( , -.,/ ./, " - ( , / 3 LE * , (. .) H 3 ,- 1#." 0#,./ &#- .#)( ( " - ( & ." , .#, ' (. ) )& *& . ),'-8 ,0 , /.#&#- .#)( & 0 &- " 0 &-) #( , - ," '"Q" '-%24 0!" ! 0 , !(/ +"' +(.' HE * , (. ( - , -/&. ) -.), ! 0#,./ &#- #.)(5 /& #, " - &-) ( & .) )*.#'#- #.- -.), ! #( , -.,/ ./, ( , /* &). ) . -.), ! -* 8 &)/ " -(;. ( $/-. )/. )-. - 0#(!- ), /& #,5 ( $# - 3- #. " - " &* "#- . ' .) ! . .. , 0#-# #&#.3 ( )(.,)& )

I’m basically transforming the whole IT infrastructure. By engaging someone like me who is going to have a different look at what the current infrastructure is, it’s just the start of what is being planned.�

." ( .1),%8 < ( ." )& 3-5 3)/ " .) * ( )( 2. ,( & - ,0# *,)0# ,- ), ."#(!- &#% , - ,0 .#)(8 < . )-. 3)/ &). ( 3)/ )/& (;. )(.,)& ")1 3)/ -- ." , - ,0 .#)( -3-. '8 ./,( #. ,)/( 3 /#& #(! *,#0 . ( .1),%5 1" , 1 ( ,#(! #( &#(% ,)' ." - ,0# *,)0# , .) ." &)/ ( ." ( 1 #-.,# /. #. .) 1" , 0 , 1 1 (.5= - 3- $#8 ()." , ) -")). ) &)/ ), /& #, " - ( 8 < , #( ." *,) -- ) - ..#(! /* -#. )(( . .",)/!" ." &)/ ." . 1#&& ( & /- .) " 0 , &9.#' , *&# .#)( ( %/*8 " 0 &, 3 - & . /( " ) **&# .#)(- ), ( 1 1#&& '), - 1 !) &)(!5< - 3- $#8 ) #&#.3 #- ()." , % 3 ." ' . /& #,8 " &)/ *& . ),' " - &&)1 #. ." Q% 1" "%"-2 -( ( + (+ , +/" , /" &( "% "' %. "' Q%" !- , + !4 ! $8"'4 ( + "' ) ,, , ' Q%" !- ,- -., '(-"Q" -"('7 .% "+4 , 2, #"4 ", (' ( -! Q"+,- "+%"' , "' ." 1),& .) )*. *,#0 . &)/ -., . !3 ( ." )'* (3 " - , * ,# " #0# ( -5 (). $/-. #( ." ),' ) , / *#. & 2* ( #./, /. &-) #.- #&#.3 .) *,)0# -/* ,#), - ,0# .) #.- /-.)' ,-5 , ! , & -- ) ." &) .#)(8

31


85

%

Low Priority

14 %

31 %

Middle Priority

of IT professionals are confident in cloud povider’s ability to provide a secure environment.

54 %

High Priority

More than half of IT executives list cloud computing security as a top priority for 2012

CLOUD?

HOW SECURE IS THE Moderate Usage

Low Usage

23%

Non Usage

19%

26 %

30 %

43 %

48 %

56 %

58 %

Data covered by regulations (e.g. HIPAA, PCI, SOX)

Customer contact inform f ation

property/company trade secrets

Credit card data

What companies aren’t willing to put in the Cloud

Heavy a Usage

13%

46%

MAJORITY OF US COMPANIES TRUST THE CLOUD ENOUGH TO USE IT.


13 %

users lack tools to audit existing and future cloud environment.

72 percent of

44 %

40% list failure of staff to get up to speed with new threats such as cloud computing as a cause of human error that contributes to security breaches and incidents.

THE HUMAN FACTOR

SOURCE: LogLogic Big Data a and Cloud Survey, January-February F 2012

29 %

37% report security incidents

14 %

iew w ev vie w R e e i o ev eR s rN rat o nd yR e v e e l d a p t He Mo Lit De

73% of users review cloud service provider’s security policies, procedures and capabilities.

No change / Less critical today

More critical today

Moderate concern

Serious concern

45%

42% 55%

51%

31%

—From the Editors of CIO.com

INFOGRAPHICS | JULY 2012

Assessing the current risks of the cloud

Difficulty in assessing and comparing the security of cloud service providers

Identifying / authenticating users

Malicious activity from insiders or privileged administrators at cloud providers

Shared technology vulnerabilities (e.g. multi-tenant environment)

Physical security of cloud service provider data centres

Concerns over encryption of data

Exposure or loss of date during file transfers to the cloud

System downtime / business interruption

6% 5%

6%

10%

21% 20%

End User Concerns Related to Cloud Security

Wrote my own automation tools

Open Source or custom tool

Commercial tool

Amazon security Group

We’re not securing our cloud servers

TOP

IT Pros say their biggest cloud security concern is a lack of perimeter defenses and/or network control.

percent

45 Manually, using a checklist

My provider does it for me

How IT Pros secure cloud servers



SolutionsWorld


SOLUTIONS WORLD Enterprise architecture (EA)

Gaining traction Enterprise architecture (EA) is slowly gaining popularity with larger organisations in the Middle East as an effective way of turning business strategy into valuable enterprise change. CNME examines how it can do that and whether EA is right for your company.

36


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

EA isn’t for everyone. However once a company reaches a certain size it becomes helpful in enabling companies to become more responsive and efficient. An investment in the correct EA solution gives businesses a competitive edge enabling them to reduce costs, drive innovation and respond faster to business needs.�

## $# ' $ $ # " %# #$ " $ $ " $+0 # )#, .# " $ $ " " # " $ $%" " $ # $ #$ "$ ' $ %#$ " ' " # , / # '# %# $ & #$ $ $ # % "#$ $ %#$ ".# $ & #+ $ "") %$ ## ## $ .# $ #+ $ %"" $ " ## $ $ # ' + " % $# $ " % , %# / # # 1 0 ' " # ' & % $ # $ %"" $ #$ $%# $ %#$ ".# 2 # + " ## " % $#+0 ) ## # )#,

37


SOLUTIONS WORLD Enterprise architecture (EA)

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

George DeBone, general manager MEA at Red Hat

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

In many organisations, there is a gap between the technology and business folks. No EA methodology can bridge this divide unless there is a genuine commitment to change. That commitment must come from the highest level of the organisation. Methodologies cannot solve people problems; they can only provide a framework in which those problems can be solved.�

38

Basil Ayass, enterprise product manager for commercial business at Dell Middle East

, ." , /- ." 3 , 1 &&9%()1( #( ." #, Q" % 4= ! ,7 " ( #. )' - .) #'*& ' (. .#)(5 )() , )'' ( - * ,.# /& , " * ( ,)/* , "#. ./, , ' 1),% A B5 1"# " *,)0# - )'*, " (-#0 **,) " .) ( (. ,*,#- #( ),' .#)( , "#. ./, 8 < ) 3 #( ." ' ,% . ." , , '/&.#*& 1 3- ) #'*& ' (.#(! ( && " 0 ." - ' ) $ .#0 - ( -#'#& , **,) " -8 " . 1 " 0 - ( 1# &3 *. ( #'*& ' (. #- 5 ( * ( ,)/* . ( , ." . #- *,)0 ( (. ,*,#- , "#. ./, ' .") )&)!3 ( , ' 1),% /- 3 ." 1),& ;- & #(! (+ '", -"(', -( "&)+(/ .,"' ,, Q" " ' 24= " - 3-8

. -")/& (). ),!).. ( ")1 0 ,5 ." . (. ,*,#- , "#. ./, #- (). ), 0 ,3)( 5 ( #. ) - )' 1#." #.- " && (! -8 ) & &# 0 - ." ' #( " && (! #- ." . ." , #- () )( ' .") )&)!3 ), , ' 1),% ), ( ),! (#- .#)( .) )&&)1 ? #( .5 ." , , - 0 , & ." . , )(-# , &3 # , (. #( ." #, !) &- ( **,) "8 !", "' + , , -! " Q" .%-24 ( % , 2,4 ), ' (3 ),! (#- .#)(- #( "))-#(! )( -#(!& (. ,*,#- 9 , "#. ./, & ' .") )&)!38 )1 0 ,5 #( ' (3 - - ." - ' .") )&)!# - ( )'*& ' (. " )." ,8


LAW# 4:

T&C apply

! Technology keeps you ahead and so does My BusinessPlan. It’s the only mobile postpaid plan that empowers your business with the latest tools, as well as offering you free or great discounts on business mobile phones. With up to 2500 national minutes, 2GB data, 600 SMS, 700 minutes business group talk time and more, it’s simply the only postpaid plan that really knows your business. 4 packages | monthly bonus | monthly package switching | handset discounts Contact your Account Manager or call 800 5800 and we will gladly assist you etisalat.ae/mybusinessplan


SOLUTIONS WORLD Enterprise architecture (EA)

& ( "#- , -/&.- #( ." -. ")# ), ' (3 ),! (#- .#)(- #(! & ( ) && ." ' .") )&)!# - #( 1 3 ." . 1),%- 1 && 1#."#( " ),! (#- .#)(;- )(-., #(.-5 1"# " #- )'*& 2 . -% .) "# 0 8 < ( ' (3 ),! (#- .#)(-5 ." , #- ! * .1 ( ." . "()&)!3 ( /-#( -- )&%-8 ) ' .") )&)!3 ( ,# ! ."#- #0# /(& -- ." , #- ! (/#( )''#.' (. .) " (! 8 " . )''#.' (. '/-. )' ,)' ." "#!" -. & 0 & ) ." ),! (#- .#)(8 .") )&)!# - ((). -)&0 * )*& *,) & '-6 ." 3 ( )(&3 *,)0# , ' 1),% #( 1"# " .")- *,) & '- ( -)&0 5= ) & - 3-8 < &# 0 ." . ." ( ./, & )'*& 2#.3 ) 5 ." & % ) ." ! (/#( "#!" & 0 & (&&"-& '- ' -! " Q" .%-%2 "' & ,.+"'

Hani Nofal, integrated networking and site services director at Gulf Business Machines

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

Measuring ROI of complex business components may be very complicated so we look for simple silver bullets where combinations of doing things better may be a better practice. Doing the right thing usually has positive unintended consequences. Usually, ROI is measured not in one single area but in a combination of areas which may improve the overall business capability to grow revenues and increase market share.�

40

)1 0 ,5 3 -- &# 0 - ." .5 1"#&-. #. ( " && (!#(!5 < 0)&0#(! . "()&)!3 ." . *,)0# - .. , #( , -.,/ ./, 3 /.#&#-#(! . "()&)!3 1#&& , -/&. #( '), *,) / .#0 , -/&.-8= ()." , " && (! 5 - 1#." ' (3 #'*& ' (. .#)(-5 #- *,)0#(! ( ' -/,#(! , ./,( )( #(0 -.' (.8 ) & &# 0 - ."#- "/, & #- % 3 , -)( 1"3 " -(;. - ( 1# )*.#)( #( ." , !#)(5 /. " ."#(% ( )0 , 3 - #(! - -)' ."#(! ." . &&)1- )'* (3 .) ) ."#(!- " * ,5 -. , ( -' ,. ,8 < -/,#(! ) )'*& 2 /-#( -- )'*)( (.- ' 3 0 ,3 )'*&# . -) 1 &))% ), -#'*& -#&0 , /&& .- 1" , )' #( .#)(- ) )#(! ."#(!- .. , ' 3 .. , *, .# 8 )#(! ." ,#!". ."#(! /-/ &&3 " - *)-#.#0 /(#(. ( )(- +/ ( -8 -/ &&35 #- ' -/, (). #( )( -#(!& , /. #( )' #( .#)( ) , - 1"# " ' 3 #'*,)0 ." )0 , && /-#( -- * #&#.3 .) !,)1 , 0 (/ - ( #( , - ' ,% . -" , 5= " - 3-8 < ' 3 ' -/, 3 #( , -#(! , 0 (/ 5 .#' .) ' ,% .5 )'* .#.#0 0 (. ! 5 /-.)' , , . (.#)( ( - .#- .#)(8 )1 0 ,5 #. " - ( 0 , ( -3 .) &#(% #, .&3 ." )(.,# /.#)( ) ." .) ." )0 8 ( ), -/, ." )'*& 2#.3 0 ,# - * ( #(! )( ." #( /-.,35= " )( &/ -8



% $

! ! $ $ " ! $ ! # $ ! $ $ $" ! $" " " " " $ ! $ " ! $ $ ! !

! $ !


NetworkWorld

STRAT A EGIC IT NETWORKING PARTNER


NETWORK WORLD WAN

A plan for your WAN Abandoning your dedicated MPLS network for fast Internet connections and IP VPNs can help you slash WAN costs. However, it isn’t for everyone.

), '), ." ( 6 : - - " 0 ( ." . "()&)!3 ) ")# ), *,#0 . )(( .#0#.3 - ,0# -6 ." (%- .) ." - /,#.3 ( !& !" ( ! / .) - #. ) , ( #(()0 .#0 1 3 .) )(( . ( .1),% - ,0# -6 )'* , .) &. ,( .#0 - -/ " - , ' & 38 ")/!" *&)3' (.- " 0 ( ' #(-., ' ), 1"#& ()16 ." . "()&)!3 -.#&& , ' #(- 2* (-#0 8 )1 0 ,5 ()1 #- ( 2 && (. .#' .) , 9 0 &/ .#(! 3)/, -., . !3 1#." ." 0 #& #&#.3 ) ( 1 . "()&)!# - -/ " - ." ,( . - ,0# - ), 0 ( *& #( )&

'- +' -7 )% "' 2(.+ 1) ',"/ *#* - 1#." ,,# , ." ,( . ), )'') #.3

(. ,( . ( ,#(! "/! - 0#(!-5 # 3)/ ( & 1#." ." )1(-# -8 < -5 ." , #- 0 &/ )-. - 0#(! #( &" + -"' +(& " - )+"/ - -)&/.#)( .) )'') #.3 (. ,( . - ,0# 8 , +/" , + -2)" %%2 ! + (' ,(&

Paulo Pereira, Systems Engineering Manager, Cisco

44

(+& ( & ' Q"1 ,, + "( ' -0(+$ <& -. '#& = )(( .#)( *&/- ." ! ( , & ,.))(+- ' , +/" (,-, +(.' -! ( .1),% - ,0# #.- & 8 )'') #.3 (. ,( . *,)0# - 3)/ 1#." ." #&#.3 .) "))- ,)' 0" + ++ 2 ( ('' -"(', 0!" ! %%(0 3)/ .) , . ( .1),%5 .3*# &&3 /-#(!

4= , 2, ' !"% (14 '"(+ (',.%- '-4

(. ,! ( 3-. '-8 .%( + "+ 4 2,- &, ' "' +"' ( ! ,5 #- )5 - 3- ." , , . "()&)!# - -! - %%(0 (&) '" , -( +.' (/ + ." (. ,( . ." . ) , *. & & 0 &- ) - /,#.3 ( )(( .#0#.35 /. ')-. &#% &3 ." '#--#(! )'*)( (. 1#&& ." & % ) ,0# 0 & !, ' (. ,)' ." ,0# +(/" +7 (+ ' '- +)+", 0!(, .,"' ,, * ( - )( ." )(( .#0#.3 .1 ( #.- -#. - , /& -- --' (. -")/& '

Hatem Bamatraf, Executive VP of Network Development and Operations, du

Replacing your expensive MPLS pipes with carrier Ethernet or commodity Internet can bring huge savings, if you can deal with the downsides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

- & & -+ 4 1 .-"/ ( .1),% 0 &)*' (. ( * , .#)(-5 .4 , 2, ", ,-"%% -! (&"' '- . "()&)!3 ( )(-.#./. - ' $), ' ( ,)' #.- )' -.# ( '/&.#9( .#)( & .,-(& +,7 < ", ()-"&", -( ,.))(+- + % -"& -+ Q" ' 0 (';- , '2 & #(+ ' Q"- +(& &" + -"' 0 2 +(& 7 *&)3#(! ." ,( . - ,0# - 1#&& -.#&& & ' -! - -! -+ Q" ! , -( ()-"&", .",)/!" ." ), 8 ")/!" ."#- - .) -)' #.#)( & )'*& 2#.35 /. #. #- -.#&& -#'*& , -! ' )%(2& '-,7 ( + %%24 "-;, ' .. , ) ")# 8= ")/!" ." , , ., 9) - #( . ,'- ) * , ),' ( ( ( 1# ."5 ." -"# .


,)' & ! 3 . "()&)!# - .) ." ,( . (

, ", )+"& +"%2 +"/ ' 2 (,-, "' 1),& 1" , / ! .- , )(.#(/ &&3 , -., #( 8 (3 ),! (#- .#)(- - % .) , / ." )-.- ) ." #, -)&/.#)(5 ( -) ." 3 ./,( .) ." ,( . - ,0# - 1"# " ( - '/ " - GJN " * , ." ( , ' , & 3 )*.#)(8 " ( )'* , 0"-! )+"/ - %"' , +/" ,4 -! (,- ' Q"- ." ,( . ) ,- #- 0 ( !, . ,5= - 3- "&(' ++24 ++" + -! +' - (',.%- '- . # ( 8 " &#'#. -/**&3 ) , # & ,,# ,- )/*& 1#." ." ,#-%9 0 ,- " 0#)/, ) (. ,*,#- ' ( ! ,- .) ." & % ) ) ( #'* , . , &# #&#.3 ( *, # . #&#.3 )0 , ." (. ,( . " - & .) *,#0 . - ,0# - -.#&& #(! ." *, ,, ")# ), )(( .#(! , ( " ( #-.,# /. &) .#)(-8 + "+ +(& ", ( 1)% "', 0!26 < " - ' 1 3 ( .1),% , "#. .- - !' (. & 3 , G ( .1),%- 1#." ,)/. ,- .) #( , - ." - & #&#.3 ) ( .1),%5 & ,! )&& .#)( ) -*)% -#. - #- .. , ) )(( . /-#(! & 3 , H . "()&)!3 , ." , ." ( & 3 , G . "()&)!38 " )(-# , .#)(- -")/& ,)/( ." (/' , ) -#. - #(! #(. , )(( . - 1 && - ." , +/#, ' (.- #( . ,'- ) -+ Q" ) -! & '").% -"('7 "' -((

Simon Parry, Carrier Ethernet consultant at Ciena

Samer Ismair, Systems Engineer at Brocade

*/ &# (. ,( . )(( .#0#.3 ), ." #, ),*), . (., ( .-8 < 0#,./ &#- .#)( &#0 ,- ," '"Q" '- (,- ' Q"-, "' -! - "- + -%2 , / - ." *,# * , #. ) ( 1# ." ), (. ,*,#- (., ( .8 3 , --#(! ." , &# #&#.3 ( * , ),' ( #--/ - --) # . 1#." */ &# #(. ,( .5 0#,./ &#- .#)( " &*- (. ,*,#- - , / ." #, #( , -.,/ ./, #(0 -.' (.- -* # &&3 #( -#./ .#)(- -/ " - )(( .#0#.3 .) , '). &) .#)(-5= - 3- ' , -' #,5 3-. '- (!#( , . ,) 8 - ." . ." 0 (. ! ) 0#,./ &#- .#)( #- ." . #. )' #( - '/&.#*& )(( .#)(- #( &/ #(! *,#0 . - 1 && - (. ,( . &#(%- &#% 5 & 5 Q" + 4 - 7 !", + -"(' ' % , &. ! '), ( 1# ." * , (. ,*,#- &) .#)(5

The emergence of WAN virtualisation is giving rise to the next-gen enterprise WAN architecture by solving the reliability and performance predictability issues associated with use public Internet transport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

/- ) #.- #&#.3 .) !!, ! . '/&.#*& 5 #-* , . &#(%- ( /- ." )' #( .#)( - # #. 1 , -#(!& )(( .#)(8 ")/!" 0#,./ &#- .#)( ")& - &). ) *,)'#- 5 , *& #(! 3)/, 2* (-#0 )(( .#)(- 1#." &. ,( .#0 - #-(;. - -#'*& - *# %#(! ( 1 0 ( ), ( " 0#(! ( 1 #, /#.- #(-. && 8 ( ),./( . &35 ." , #- &). '), .) #.8 )/ ( .) 1 .",)/!" ( ) ( ) )(., .- ( . ,'-5 Q"' 0!" ! / ' (+, , +/ %% 2(.+ %( -"(',4 ( , 3 .) ( 0#! . .",)/!" - ,0# *,)0# ,- *,)'#-#(! 3)/ 0 ,3."#(!5 )(&3 .) #- )0 , ." 3 &#0 , , .#)( ) 1" . ." 3 *,)'#- 8 " )& 1 3 #- *,)0 ( ( , &# & 8 /. #( ."#- )()'3 #( 1"# " 0 ,3)( " - .) /. ),( ,-5 3)/, #- () 2 *.#)( ( )*.#)(- , ()1 0 #& & .) /#& -)' ."#(! -#'#& , )( ." " *8 /-. -/, .) #(-#-. )( -)' %#( ) , /( ( 35 0 ( # #. #- )(&3 ), & ') '8

45


NETWORK WORLD WAN

The art of WAN governance Application performance is the key goal of WAN optimisation

- ." ' ./, -6 1#." 0 ( - #( ,) /-. **&# .#)(-6 &)/ &#0 ,3 ( )." , . "()&)!# -6 )*.#'#- .#)( .))&- " 0 " .) % * * 8 . #- () &)(! , $/-. )/. & --# )'*, --#)( ( *,).) )& & , .#)(8 " ( 1 ,)& #- )/. **&# .#)( * , ),' ( 6 &#0 ,#(! 0 ,3."#(! ,)' **&# .#)( 0#-# #&#.3 .)

46

+/ &#.3 ) - ,0# @ ) A )(.,)&8 ( -"),.6 ." ) /- #- )( .,/ !)0 ,( ( 8 " *,)&# , .#)( ) &)/ )'*/.#(! 1#&& " 0 ' $), #'* . )( ." ' 4 ,) "Q" %%24 (' -! ) + (+& ' ( /-#( --9 ,#.# & **&# .#)(- ." . ,)-- ." 8 . (., - ( )'* (# - &#% '/-. *, * , .) , -- ."#- -"# . -#( 5 1#." &)/ )'*/.#(!5 ."

-+ Q" & -+"1 (& , &. ! &(+ )'*&# . ( -., -- - ." ( .1),% &#% ( 0 , ), 5 , +/#,#(! ')0 ' (. ) ' --#0 ')/(.- ) . 8 ( ')/, 3 ." *,)'#- ) ." &)/ 5 ),! (#- .#)(- &))%#(! .) , / )-.- ( #'*,)0 - ,0# & 0 &- '/-. #,-. *, * , ." ( .1),% .) -/**),. -#!(# # (. #( , - - #( ( 1# ." /- !


Almost $139 million in server room research. Now yours is FREE! cture

rgy Ene ting entres n e C lem ta Imp ient Da Effic

e Archit proved An Im -Efficiency, h for Hig nsity e High-D ntres e Data C

ow The Advantages of Row oolingg and Rack-Oriented Coolin Architectures for Data Centres

Deploy ing Hig h-Dens Zones ity in Data C a Low-Densit entrree y

Pow Cap er and for acity M Coolin Dat a C anage g ent res ment

White Paper #130

Wh

ite

Pap e

r #1

‘Implementing Energy Efficient Data Centres’

‘An Improved Architecture for High-Efficiency, High-Density Data Centres’

White Paper #114

White Paper #126

65 FREE!

$

$

00

120 FREE! 00

‘The Advantages of Row and Rack-Oriented Cooling Architectures for Data Centres’ White Paper #130

85

$

00

FREE!

‘Deploying High-Density Zones in a Low-Density Data Centre’ White Paper #134

$

00

115 FREE!

50

‘Power and Cooling Capacity Management for Data Centres’ White Paper #150

22500 FREE!

$

Download FREE APC™ White Papers to avoid the most common mistakes in planning IT power and cooling Have a plan for your data centre We talked to thousands of customers from Baltimore to Beijing and saw the good, the bad, and the ugly measures customers took in their data centre planning. In many cases, turnover and budget cuts resulted in no plan at all.

Get the answers you need and avoid headaches tomorrow Do you and your staff know the top ten planning mistakes to avoid? The easiest way to improve cooling without spending a dime? Find the answers to these questions and more in our latest selection of white papers. Take advantage of our valuable research today and save yourself money and headaches tomorrow.

Download your white paper(s) within the next 30 days for FREE and stand a chance to WIN an iPad 2! Visit www.apc.com/promo Key Code 18600p Call +9714-7099690 (Arabic) / +9714-7099691 (English) Fax +97147099-650 Š2012 Schneider Electric. All Rights Reserved. Schneider Electric and APC are trademarks owned by Schneider Electric Industries SAS or its affiliated companies. ,, /4(%2 42!$%-!2+3 !2% 02/0%249 /& 4(%)2 2%30%#4)6% /7.%23 )$$,% !34 /8 5"!) .)4%$ 2!" -)2!4%3 : 8-1764_ME-GB_C


NETWORK WORLD WAN

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

!)0 ,( ( ,/ !)0 ,( ( #- )/. &#!(#(! /-#( -- *,#),#.# - ( *,#),#.# - )0 , 3)/, !&) & 8 . ' (- #(! & .) # (.# 3 /-#( --9 ,#.# & **&# .#)(- )( ." ( .1),% ( ." #, & 0 & ) * , ),' ( 8 ( - .) (-/, /- , *,) / .#0#.3 ( - .#- .#)( ( &-) *,)0# ." ' -/, ' (. ( , *),.#(! )( ./ & &#0 , **&# .#)( * , ),' ( 5 #( 1 3 ." . #- -3 .) /( ,-. ( 8 #." !)0 ,( ( 5 '- +)+", , ' Q"' %%2 & ' -! (,-> * , ),' ( ., ) - . ." & 0 & A#8 85 +" !-,"3"' 2(.+ ' -0(+$ (+ "' -( **&# .#)( * , ),' ( -B8 ), .) 3;- & ,! (. ,*,#- 5 1" .;- ')-. #'*),. (. #- .) " ( & ." **&# .#)( * , ),' ( *,) & ' -., . !# &&3 ( #(

True WAN governance is about aligning business priorities and IT priorities over your global WAN. It means being able to identify business-critical applications on the network and their level of performance.

7 ," ' -( % -( ,! + %"&"- 4 )((+8*. %"-2 + ,(.+ ,4 ", ,-+. -.+ -( , "3 / "% % ' 0" -!7 ! ' -! ( .1),% #- -.,/!!&#(! .) &#0 , , -)/, -5 0"%% , ', % 2, ' ,%(0 (0'4 , .#(! )(! -.#)( -#./ .#)(-8 .;- *,).) )& 1" , 0 ,3 . ., (- ,5 0 ,3 **&# .#)(5 1#&& .,3 .) . % - '/ " ( .1),% , -)/, - *)--# & 8 "#- ' (- '), ( 1# ."5 **&# #( #- ,#'#( . &35 #-(;. ." -)&/.#)(8 " -)&/.#)( &# - #( " 0#(! .))&- ." . &&)1 ( * ,.' (. .) )(.,)& ))%" -"(', , -! 2 Q%(0 +(,, -! ( .1),%8 #." !)0 ,( ( 5 * ,.' (.- ( - ")1 **&# .#)(- , ')0#(!5 1") #- /-#(! ." ' ( ), 1" . */,*)- 8 ( ." ( *,#),#.#- **&# .#)(- ), #(!&38

48

!&) & ' (( ,5 1#." -.,/ ./, **,) "5 (). )( -#. 9* ,9-#. ), *,) & '9* ,9 *,) & ' -#-5 #(0)&0#(! ." !&) & ( .1),% ( ." (.#, **&# .#)( *),. )&#)8 " /&.#' . ) $ .#0 - ) **&# .#)( * , ),' ( , .", )& 7 .) , -- ." #--/ ) *,) / .#0#.3 .",)/!" !/ , (. * , ),' ( ) /-#( --9 ,#.# & **&# .#)(-6 .) (-/, ( 9/- , - .#- .#)( ( , #( ), ." *)-#.#0 #' ! ) 1#."#( ." (. ,*,#- 6 ( .) '#(#'#- ), , / )-.- #( &#0 ,#(! **&# .#)( * , ),' ( .) ( /- ,-8 )*.#'#- .#)( #- )( ) ." . "(#+/ - ." . ( /- .) , " ." - ) $ .#0 -8 **&# .#)( &#0 ,3 - ,0# - , &-) ,#.# & ), -' && , )'* (# - ." . , , *# &3 )*.#(! &)/ 5 1"# " ' (- ." . -- .) ." ( .1),% #- 0#. & ), ." #, /-#( --8 . /(.#& , (.&35 ."

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

!)0 ,( ( ( **&# .#)( - )( , !/& , -#-8

. #- 0 ,3 ,#.# & ." . **&# .#)( * , ),' ( - ,0# - **&3 .) ." (.#, -/#. ) **&# .#)(-8 - '), ( '), ( 1# ." #(! /- 3 ( 1# ."9 "/(!,3 **&# .#)(- )' #( 1#." '#2 ) , , .#)( & ( /-#( -- **&# .#)(- )( ." ( .1),%8 .;- ,#.# & ), ( (. ,*,#- -( Q" " '-4 ' ))%" -"(' ) + (+& ' - ,0# - -")/& & .) *,)0# !&) & -+ Q" ('-+(% (/ + -! ' -0(+$7

( - !)) 0#-# #&#.3 .) 1" .;- !)#(! )( #( ." ( .1),%8 ( ' (3 - -5

' ( ! ,- #- )0 , **&# .#)(- )( ." #, ( .1),%- ." . ." 3 ( 0 , %( 1 2#-. 8 ./, - -/ " - * ,9/- , )(.,)& *,)0# 3( '# *,). .#)( ) **&# .#)( * , ),' ( ! #(-. /( 2* . " 0#),8 )' **&# .#)( 0 ( ),- " 0 &, 3 ' ),.- .) /#& #( !)0 ,( ( 8 /. (. ,*,#- - ((). -)&0 **&# .#)( * , ),' ( *,) & '- ,)' ." **&# .#)( *)#(. ) 0# 1 )(&35 /- ." 3 " 0 .) ! ' % (& "' -"(' ( %% Q%(0, "' 3( '# 1 38 ,/ !)0 ,( ( &# - (). 1#." **&# .#)( 0 ( ),-5 /. 1#." ),*), .

5 1"# " ( - ." 1")& *# ./, 8


Introducing OptiFiber ® Pro Built for the Enterprise with SmartPhone User Interface

Industry’s first datacenter fiber troubleshooting and certification tool s )NTUITIVE SMARTPHONE INTERFACE s 3HORTEST EVENT AND ATTENUATION DEAD ZONES s 4RADE UP BY 3EPTEMBER AND GET CASH REBATE UP TO

,EARN MORE AT www.flukenetworks.com/Opf-PRO-trade-in-emea


Give your IT the leading edge with Dell™ PowerEdge™ servers

Not all servers are the same Because Dell knows it’s possible to deploy virtualisation on a wide range of servers, it’s made sure that PowerEdge gives you more of what you need, and less of what you don’t. Designed to provide the best-performing virtualisation possible, PowerEdge servers are optimised across the entire portfolio to meet your density, flexibility and performance needs, without locking you in to proprietary infrastructures. The edge for all your business needs The PowerEdge range has a server to suit your specific business needs, from tower servers, ideal if you’re just starting to build your network to a rack server infrastructure that consolidates your hardware in one enclosure.

Do more with less Ŕ Tower servers For businesses looking to start and expand their server network, including connectivity and providing the ability to grow Ŕ Rack servers Ideal for customers with multiple servers or with limited storage space Ŕ Blade servers For customers seeking highestdensity form factors for their server environment Ŕ Rack Infrastructure Holds a wide range of IT equipment

Windows® 7 Professional and the Windows Server® 2008 family All PowerEdge servers run Windows Server to deliver rich, powerful features that help you complete

mind knowing that the data on your personal computers, network, and servers is highly protected. Together, a great way to get more out of your existing IT investments and deliver better service to your customers.

Contact your nearest Dell Authorized Distributors for further details: UAE: Aptec - Manojpk@aptecme.com, +9714 3697111, Mindware - Dell_sales@mindware.ae, +9714 4500600, Unatrac -Shamdy@mantracegypt.com, +97155 7204338 KSA: Aptec - Dell.sales@aptecsa.com, Riyadh (966 1) 4601950 Ext 1404, 06, 07, Jeddah (966 2) 2832365, Mindware - Dell_sales@mindware.ae, (966 1) 215 3126, Unatrac - AShabaan@mantracegypt.com, (966 5) 614 98556 Egypt: Aptec - Dell@aptec.com.eg, (202) 2648 1179, Mantrac - Ashabaan@mantrac.com.eg, (202) 3300 4178, Raya - Hesham_hassan@rayacorp.com, (202) 382 76000

Copyright © 2011 Dell Inc. All rights reserved. Dell Corporation Limited, Reg. No. 02081369, Dell House, The Boulevard, Cain Road, Bracknell, Berkshire RG12 1LF.


StorageAdvisor

STRAT A EGIC IT STORAGE PAR P TNER


STORAGE ADVISOR Information lifecycle management

Informed management Information lifecycle management (ILM) remains in its infancy in the Middle East, despite the fact that it is no new entrant to the technology scene, plagued as it is by various challenges.

" , #- ()."#(! , &&3 ( 1 )/. #( ),' .#)( &# 3 & ' ( ! ' (. @

A8

( ." -#'*& -. . ,'-5 #. #- ." 1),% ) ),! (#- .#)(- .) , . 5 -- -- ( ., % && ) #.- . #( ),' .#)( ,)' ." , & .) -! + / "' (+ + -( )+(Q"- -! &(,- +(& "-7

52

< # 3 & ' ( ! ' (. #- 0 ,3 #'*),. (. ), - 0 , & , -)(- #( &/ #(! )-. /..#(!8 - . )(.#(/ - .) & , . ( +(04 0 ' -( & ' "-, %" 7 +"& +2 ), - -.), ! #- 0 ,3 2* (-#0 .) /- .) -.), 3)/, . 8 )/ " 0 .) .# , 3)/, . .) Q"' (.- 0! - ", "&)(+- '- -( )% -! +" !-

. . ." ,#!". .#' . ." ,#!". )-.-5= - 3- -#& 3 --5 (. ,*,#- *,) / . ' ( ! , . && ;- )'' , # & /-#( --8 < (3 /-#( -- & ,- ,!/ ." . 1 &#0 #( #( ),' .#)( ( #!#. & )()'3 1" , . #- )'#(! ." (. , ) !, 0#.3 #( /-#( --8 /' ,)/- )'* (# -;


/-#( -- ') &- ( -/**&3 " #(- , /#&. ,)/( . 5 ( . #- , . 5 *./, 5 (',.& 4 -+ ', (+& ' ' %23 "' 0 ,3 *" - #( ." 0 &/ " #( #( , &9.#' 8

( .5 -)' )'* (# - " 0 () , & -- .- /. . ( ." 3 &#0 ( # 3 . 9 ."#(% ))%5 ."#(% &#(% #( ( -%3* 5 ( .) & -- , 2. ( #,&#( -5 (%#(!5 . & )'- ( )." , - 0 , & - .),-5= - 3- "' / '' ,5 . "()&)!3 )(-/&. (. ' ( ! , ), . 8 . 0 #& 35 , !#)( & )* , .#)(- #, .), . )'' /&. -. . -5 < ( ,-. ( #(! ( ' ( !#(! ." &# 3 & ) . #- 0 ,3 #'*),. (. ), /-.)' ,-8 ), ' (3 , -)(- 9 ." , . (.#)( ) . #( .) 3- 1),& #- )'#(! '), , & 0 (. .) ' (3 /-.)' ,- - 0 ,#)/- & !#-& .#0 ( &) & *)&# # - , ( ), #(! ." ' .) , . #( . ), &)(! ,8 )1 0 ,5 $/-. , . #(#(! . #- (). ." (-1 ,8 )/ ( .) ., . ." . **,)*,# . &3 * ( #(! )( #.- , & 0 ( .) ." ),! (#- .#)( . (3 )( .#' ( ."#- #- 1" , 5 . # 3 & ( ! ' (. A B )' - #(.) *& 38 ), 2 '*& 5 ."#(% ) ( ' #&8 " , #- , +/#, ' (. .) % * ." ' #& ), J 3 ,-8 ( 3 F ." ' #& #- 0 ,3 #'*),. (. ( * )*&

Ahmad Muammar, technology consultant manager for KSA at EMC

, ' %#(! #-#)(- - )( #. -) .))&- -/ " - ( *-").5 ( %/* , #(! /- .) *,). . #.8 )1 0 ,5 . , K ')(."- ) (). #(! -- 5 ." ' #& #- ) & -- , & 0 ( -) ( - .) , "#0 )(.) & -- 2* (-#0 /. -.#&& --# & -.), ! 8 "#- #- ( 2 '*& ) ")1 #- /- #( *, .# ( 1"3 #. #- #'*),. (. 1" ( ' ( !#(! ." !,)1." ) . 8= "#& () )( ( #-*/. ." #'*),. ( ) 5 ." (.#, *,) -- , +/#, - - 0 , & , /&&3 , !/& . -. ! -5 ." . ( *,)0 .) " && (! ), ." ')-. Q" " '- (+ '"3 -"(',7 ! Q"+,- ,- ) "' -!", ' ( #(! *,) -- #- % *#(! ., % ) ." , .#)( ) . #.- & 8 3 -- - 3-5 < . #- #'*)--# & .) *./, && . ." . #- , . -* # &&3 #( ." '/&.#9 0# 1),& 1 &#0 #(8 '*&)3 - , ,,3#(! '/&.#*& 0# - .) -- (

Steve Bailey, regional operations director at CommVault

Lifecycle management is very important for several reasons including cost cutting. As data continues to accelerate and grow, we need to manage its life. Primary or SANs storage is very expensive to use to store your data. You have to tier your data to ďŹ nd out what is important to place the right data at the right time at the right costs.â€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

53


STORAGE ADVISOR Information lifecycle management

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

54

*& 3- % 3 ,)& #( /( )0 ,#(! ." 0 &/ ) . .) --#!( #. ." ,#!". - ,0# & 0 &8= 3 -- &-) *)#(.- )/.5 < 3)/ -. ,. ." )+( ,, ( % ,,"Q" -"(' - + -"('4 -! ' + ( '"3"' -! ' ( -"& (& , -#'*& . -%8 ( ." )& , 3- 3)/ /- .) & .) -", * * ,- 3)/ )(;. ( 8 )1 ." /&% )- /-#( --;- . #- -.), #( & .,)(# ),' . )( " , #-% ,#0 - 1"# " )'*&# . - ." , .#, ' (. -. ! ) . &# 3 & ' ( ! ' (.8 && ) ,- ( )*.#)( .) )/, /-.)' , 1" ( ." 3 .) % * % * ." #, " , #-% ,#0 - . *,) / . , ./,( .) " &* &#!( 1#." ." #, &# 3 & *)&# # -8= !#)( & , .#)( 0 ( 1" ( ,)% ( )1( #( .) )(-#-. (. * ,.-5 ( /(.#(! . -% *& !/ 1#." 0 ,#)/- " && (! -8

Basil Ayass, enterprise product manager at Dell ME’s commercial business

If you start the process of classiďŹ cation at creation, then recognising the end of time becomes a simple task. In the older days you used to be able to shred papers you don’t need. Now the bulk os a business’s data is stored in electronic format on hard disk drives which complicates the retirement stage of data lifecycle management. Dell offers an option to our customer when they to keep keep their hard disk drives at product return to help align with their lifecycle policies.â€? 3 -- - 3-5 < ( ." * -.5 . &# 3 & ' ( ! ' (. 1 - " && (!#(! #- #. , &# )( 2* (-#0 . "()&)!3 ( ( 2. (-#0 ' (/ & #(. ,0 (.#)(8 "#- , +/#, *,) -- , 9 (!#( ,#(! ( , /& " (! ' ( ! ' (. *)&# # -8 ) 35 &&- Q%." ,(%.-"(', + % -( .-(& - -! *,) -- ) &# 3 & ' ( ! ' (.8 ) -! ! %% ' ,4 (+ '"3 -"(', ' -( )% ' ( /- -. *, .# - .) ! #( '*&)3 *. ( 8 '*&)3 /39#(5 ' ( ! ' (. -/**),.5 ( )&&)1 /* #- ,/ # & #- ,/ # & .) *,)$ .;- -/ --8= #& 3 -5 < " ' #( " && (! - "'/(%/ "' Q"'"' )+( ,, ",

(-/,#(! ." . )." ." /-#( -- )1( ,- (

* ,.' (. 1#."#( ." ),! (#- .#)( , *. %%2 "'/(%/ "' Q"'"' -! )+( ,,7 ( ((). 1),% 1#.")/. ." )." ,8 ." * ,.' (. 1),%- )( ." *,) -- 1#.")/. ! ..#(! #(*/. ,)' 1" . ." /-#( -- , +/#, -5 ." ( ." 3 1#&& ( /* 1#." ( #( .#0 *,) -- ." . ) - (). ' . ." ),! (#- .#)(;- , +/#, ' (.-8= / .) ." - " && (! -5 ( &-) *, 0 #&#(! '#( - . ." . #&- .) - ." #!! , *# ./, 5 , ' #(- )( ." % /,( , ) ')-. # & -. (. ,*,#- #(0 -.' (.-8 < ' &2 1) +" ' 4 - % ,,"Q" -"(' #- -.#&& #( #.- #( ( 3 #( ." # & -. #(


CLOUD TRANSFORMS I.T. Learn more at www.EMC.com.

EMC2, EMC, the EMC logo, and where information lives are registered trademarks or trademarks of EMC Corporation in the United States and other countries. Š Copyright 2011 EMC Corporation. All rights reserved.


STORAGE ADVISOR Information lifecycle management

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

56

. && , - #(! '), (. ,*,#- - #(0 -.#(! #( #. ,)-- ." , !#)(8 " .;- ,#0#(! ." )*.#)( #- ." . . "()&)!3 " - ' ./, .) !, 1" , #. #- "#!"&3 /.)' . ( ), & .) & ,! - . ) )/, /-.)' ,-8 - '), ( '), (. ,*,#- - . %#(! .#' .) & --# 3 ." #, . 8 , - #(! '), )*.#)( #( #( /-.,# - 1#." "#!"&3 - (-#.#0 "' (+& -"(' ,. ! , % %4 Q"' ' " % ' - % (7= 0 ,." & --5 1#." ." ,#- ) #! . 5 ( 1#." #( , -#(! *, --/, ,)' )(( . 1),& ." . ' ( - )'*&# ( ( - /,#.35 , !#)( & ),! (#- .#)(- , &#% &3 .) * 3 '), .. (.#)( .) 5 ( #.- 0 ,#)/- -* .- #( ." )'#(! 3 ,-8 < " 0 ( 1),%#(! 1#." ' (3 )'* (# - #( ." # & -. .",)/!" ." & -.

.) -#!( ( /#& ." #, #( ),' .#)( &# 3 & ' ( ! ' (. A B -., . !38 " 0 ( #(0 -.#(! #&&#)(- ) )&& ,- .) -., '&#( ' (3 -* .- ) ." 3 /#& #(! -. . ) ." ,. . "()&)!# - ,)-- )/, (.#, *),. )&#)8 ( .)* ) ." .5 1 " 0 /'/& . 0 -. )(-/&.#(! ( - ,0# - * #&#.# - .) " &* /-.)' ,- ! . ." -. )/. ) ." #, . 1#." ." '#(#'/' )-.5= - 3- / '' ,8 < ) ." -#'*& (-1 , #- & ,! (/' , ) )/, /-.)' ,- , )#(! 1 && .) 3 #( . ,'- ) 8 #." ." ,#- ) #! . ( #( ),' .#)( )0 ,&) 5 1 , 1),%#(! &)- &3 1#." ' (3 /-.)' ,- .) )0 , )' ." ( 1 " && (! ) -.),#(! . ( " &*#(! ." ' . **#(! )( ." )**),./(#.3 ) & --# 3#(! ( ( &3-#(! #.5= " )( &/ -8




SecurityAdvisor


SECURITY ADVISOR Endpoint security

A new era With the advent of the BYOD phenomenon, the amount of threats businesses face have multiplied on an unprecedented scale. Ben Rossi looks at how these trends have rapidly changed the enterprise security landscape and what can be done to stay protected.

60


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

-* ,-%3 5 - 3- )'* (# - ( .) ()1 *, * , ), && *)--# & - ( ,#)- #( ), , .) -. 3 *,). . ! #(-. ( 1 , - ) .", .-8 < " 3 -")/& )( / . ."),)/!" ,#-% -- --' (. ." . &))%- . && ." ,#-%- ." )'* (3 -5 ")1 ." #, - /,#.3 '#!". )'*,)'#- 5 ." )-. .) ." /-#( -- ) , " ( ")1 .#0 ." #, '#.#! .#)( -., . !3 #-5= '' - 3-8

David Emm, malware expert for the global research and analysis team at Kaspersky Lab

< " 3 ( .) &))% . ")1 ." /-#( -- /( .#)(-5 #( &/ #(! .),- -/ " - 1" , -. )* , . 5 1" . 0# - ." 3 /- .) )( / . /-#( -- ( 1" , ),*), . . #- -.), 8 " 3 -")/& &))% . - /,#.3 #( # (.- /,#(! ." & -. +/ ,. ,5 -#2 ')(."-5 ), 3 , ( 0 &/ . ." )-. .) ." /-#( -- ) " , " ), &) % .", .5= " -8 " , && "5 , !#)( & ' ( ! , . (.+ Q"+ 4 + , -! - -( 2;, (0#,)(' (. " (! - /(*, # . &3 ( .", .- , ')-.&3 /(%()1 & 8 < . !) - 1#.")/. - 3#(! ." . *&)3' (.- , )'*& 2 ( " ).# 8 )/. ." )(&3 ."#(! ." . ( *, # . #- ."#(!- + ("' -( ! ' 7 , (.+ Q"+ ! , , '4 ., #.#)( &5 -. .# - /,#.3 -)&/.#)(- , " 03 ( #( * & ) , -*)( #(! .) ." - " (! -5= && " - 3-8 < )(- +/ (.&35 ." 3 , () &)(! , * & ) &#0 ,#(! ( 9.)9 ( *,). .#)( ,)' .. %-8 .;- & , ." . - /,#.3 '/-. 0)&0 .) .. , . .5 *, 0 (. ( #(. &&#! (.&3 ( &3- ." - 3( '# .. %-8 ,! (#- .#)(- ((). &1 3- +/ . &3 *, * , ), /( ,. #(.38 )1 0 ,5 ." 3 ( !#& 5= " -8 1 , " ., #.#)( & < . .9 ( 9 &) %= . .# ),( ,)' (.#0#,/- -) .1 , #- () &)(! , ,. Q" " '- "',- -!", ' 0 + ( -!+ -,4 (+ "' -( (!' -3 +4 , '"(+ )+( . - ' ,% .#(! ' ( ! , . )*")-8 < ,! (#- .#)(- ( .) , / ." #, .. % -/, .) -. *,). . ." ( .1),%8 " ' $),#.3 ) -/ -- /& .. %- . ,! . %()1( 0/&( , #&#.# - ( ."/- /(* . " **&# .#)(- , ." ')-. . ,#-%8 -#(! *,) / . ." . (). )(&3 &) %- ' &1 , /. &-) "' '-"Q" , &",,"' ) - ! , 0"%% + . -! " ( ) ( .. % ! ..#(! .",)/!"5= " - 3-8 #." ' (3 & !#.#' . -#. - ()1 #( . 0"-! & %0 + 4 -3 + , -! - ,"&)% . !),#- , .) &) % #&& !#.#' . -#. - #- &-) () &)(! , ()/!"8 < (+ -! ' MJO ( "' -"(', ( .+ (' 1 -#. - ( ." )& ." ),3 ." . -. 3#(! 0 2 +(& (+ %( $"' : ; ,"- , 0"%% *,). . 3)/ ,)' ' &1 , #- () &)(! , .,/ 8 ,! (#- .#)(- -")/& &))% ), -)&/.#)(- ." .

STRIP AD HERE

Maher Jadallah, regional manager at SourceďŹ re MEA

, & .) # (.# 3 ' &1 , )( & !#.#' . ,"- , ' %( $ -!", ('- '-4= -3 + , 2,7 /,." ,'), 5 ),! (#- .#)(- -")/& / . '*&)3 - )( )'')( .. %- ( ." ' .") - /- 3 3 , ,#'#( &- -) ." . ." 3 ( 0#!#& (. ( *,). . ." ),! (#- .#)(5 " -8

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

61


SECURITY ADVISOR Endpoint security

( *)#(. ( ,/((#(! '/&.#*& ( *)#(.- 1#&& $/-. ( /* -&)1#(! )1( ." )* , .#(! -3-. ' ( #'* . /- , *,) / .#0#.3 #( 1),-. - 5= " -8 #-# #&#.3 #' , 5 . ' & , ), . "(# & 0 ( ( .1),%#(! ( #( ),' .#)( - /,#.3 . 5 - 3- ( *)#(. - /,#.3 -) .1 , -")/& !#0 )." 0#-# #&#.3 ( )(.,)& .) '#(8 < " 0 ( #'*& ' (.#(! &)/ 9 - 0 ( ' &1 , ( *)#(. )+(- -"(' ' > "'," -( &#'#( . (3 #(. ,( & ( 2. ,( & ! ( , . .", .- ( .. %-8 ( .)* ) ." . 1 #'*& ' (. )/, ( 2. ! ( , .#)( ( .1),% -- )(.,)& 1"# " *,)0# - 0#-# #&#.3 ( )(.,)& )0 , ( .1),% --5= , - 3-8 < "#- & 0 & ) )(.,)& #- - )( /- , , (.# &-5 )* , .#(! -3-. '-5 ( .1),% - !' (. ( 0# .3* 8 ) % * &)- 3 1 1, * && ."#- 3 #'*& ' (.#(! , & .#' ( .1),% * , ),' ( ')(#.),#(! -)&/.#)( 1"# " )''/(# . - 1#." Q"+ 0 %%4 > 4 ,0"- ! ,4 ' )("'- !(,-, ), (3 -/-*# #)( ), '#- " 0#)/, ) . 5 **&# .#)( ), /- ,5= " -8 (,- "' .,-+2 1) +-, *."33 + -! - )'* (# - ( .) .#!".&3 #(. !, . ( *)#(. - /,#.3 1#." )." , ( .1),%9 - - !/ , -8 < ." /-.)' , &, 3 " - ), #- *& ((#(! .) ,)&& )/. . "()&)!# - -/ " - ( .1),% -- )(.,)& ), /- , -

Nicolai Solling, director of technology services at help AG Middle East

62

Q"+ 0 %%"' "- ", ( (.+, "'- + ,-"' -( , ")1 -)&/.#)(- ( #(. !, . .)! ." ,8 / %#&3 ." ( *)#(. - /,#.3 #( /-.,3 " - - ( ." ( ) #(! )'*&# (. ( ." #&#.3 .) #(. !, . 1#." 2#-.#(! -)&/.#)(-5= )&&#(! - 3-8 < " , , ,. #( , ' 1),%- ), ")1 ( *)#(. - /,#.3 ( #(. !, . 1#."5 ), #(-. ( 5 ( .1),% -- -)&/.#)(8 ( ,-. ( #(! )'* .# #&#.3 ( 0 ( '), #'*),. (. #( )'* .# #&#.3 #- % 3 ), ' %#(! -/, ." . () 0 ( ),9&) %9#( ) /,- 1" ( - & .#(! ." ( *)#(. -)&/.#)(5= " -8 )(.#(/#.3 #- &-) ) "#!" #'*),. ( 5 (+ "' -( !"+ 2 !4 - ' ( ! ' (. ( . "()&)!3 )(-/&. ( 3 Q"+& ((3 %% ' &"%-('7

John Metzger, senior product marketing manager at Sophos

It’s clear that security must evolve to better detect, prevent and intelligently analyse these dynamic attacks. Organisations cannot always adequately prepare for uncertainty. However, they can be agile.�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

) #&#.3 " #!! -. ., ( .#(! (. ,*,#- - /,#.3 ."#- 3 , #- ." ,#- ) ') #& #( ." 1),% *& 8

-* ,-%3 - 3- #. ( &3- - ." - ' (/' , ) ') #& ' &1 , *,)!, '- #( GEFF ." ( ." 1")& * ,#) .1 ( GEEI ( GEEJ8

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


FOUNDATION OF

IT TRUST Learn more at www.EMC.com.

EMC2, EMC, the EMC logo, and where information lives are registered trademarks or trademarks of EMC Corporation in the United States and other countries. Š Copyright 2011 EMC Corporation. All rights reserved.


SECURITY ADVISOR Endpoint security

Nima Saraf, team leader for technical advanced networking and information security at FVC MEA

) /-#( -- - (). )(&3 ." !,)1#(! .", . ,)' ') #& ' &1 , 5 /. &-) ." ,#-% ) . & % ! 8 " % 3 *,) & ' ), /-#( -- - &# - #( ' ( !#(! - /,#.3 )( -' ,.*")( -8 " . #-5 #'*& ' (.#(! : (%%(08& , .+"-2; )(%" 2 (+ %% /" , #( ." (. ,*,#- 5 1" , 0 , ." 3 , ( ")1 0 , ." 3 , #(! /- 5= " -8 -3 + %,( + 0, -( -! ",,. ( , ! /"' " "'Q%. ' (' -! '- +)+", - /,#.3 & ( - * 8 < . '- , #(! -% .) &&)1 ) +,(' % " ,4 ' +(" , ' (-! + /" , .) " 0 -- .) ),*), . . ( ." 3 ( () &)(! , ./,( )1( ." - , +/ -.- ? (), -")/& ." 38 . ( ." , +/ -.- ,

Nick Black, senior technical manager at Trend Micro

62

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

STRIP AD HERE

Sebastien Pavie, regional sales director MEA at Safenet

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


& $"" # ' # $+'. &$ '' $# !

+$(" 1).+ $' "$( -$)( -) &$! 0$-# -# && $( )( )+%,- -$)( 2 ! -.+$(" -# *)0 +!.& (- &3 )(3 *+) ,,)+ , +$ , " (.$( $( )0,3 +)! ,,$)( & ( ,-.(($(" ' #$"# + ,)&.-$)( %&$- $,*& 1

- *+)! ,,$)( & "+ "+ *#$ , ( * +!)+' ( $( ,& -# - ' % , .,-)'$, -$)( ,( * 2 &$- + &&1

% ,* , /$(" ,$"(

# )+%,- -$)( ,( *, )* ( !)+ ,$'*& -))& !+

- $%,& ( +! (( & * !$%" #( $"% #, # $&" ( $# $#( # & # ' ') ( ($ # + ( $)( #$( #( ! ( #( ! !$ $ #( ! #' ( #( ! #' !$ $ $# # $# #' & (& " & ' $ #( ! $&%$& ( $# # ( # $( & $)#(& ' &$'$ ( # # $+' & (& " & ' $ ( &$'$ ( &$)% $ $"% # ' &' ($ $# ! " ')& " #( $ '%! ,

.,-)'$, -$)(



TelecomsWorld

IN ASSOCIATI A ON WITH


TELECOMS WORLD Femtocells

Strong signals Enterprise femtocells are destined to play a larger role as mobile operators look for new ways to improve the smart phone experience inside the enterprise

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

68

( #( , -#(! ')/(. ) . 8 '.) &&- ( " &* #( , - * #.3 ), )* , .),- /. *&)3#(! '.) &&- , +/#, - , #) , +/ ( 3 *& ((#(!8 .;- -# , ), )* , .),- .) *& ( '.) &&- #(.) ( 1 ( .1),%- ." ( #. #- .) ." ' .) ( 2#-.#(! ( .1),%8 < ( ." (. ,*,#- & 0 &5 '.) &&- ( /- 3 - ,0# *,)0# ,- .) ) , /(#+/ 5 * ,-)( &#- - ,0# - .) ." #, /-#( -- /-.)' ,-8 " . "()&)!3 ( #&#. . ( 1 , ) ') #& - ,0# ." . 2*&)#.- '.) &&-; #&#.3 .) . . *, - ( 5 )(( . ( #(. , . 1#." 2#-.#(! ( .1),%- )( ." (. ,*,#- 8 '.) &&- (5 ), 2 '*& 5 /.)' .# &&3 )(( . 3)/, ') #& )!(' -( 2(.+ ( Q" ' -0(+$ 0! ' "' -! - (0#,)(' (.5 &&)1#(! '*&)3 - .) - /, &3 ,, '- +)+", "' (+& -"('4 $8.) Q"% ,4 -., ' '/&.#' # )(. (. .) )." , 0# - (' -! ' -0(+$4 ' ('Q" .+ / +" -2 (

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

Turgut Erkul, Director of Mobile Broadband – Middle East, Ericsson

.3*# &&3 -/**),. () '), ." ( )/, .#0 /- ,-8 )1 0 ,5 3 #'*,)0#(! ." "#* . "()&)!3 '.) && ' % ,- " 0 ( & .) ) , !, . , -- ), ." (. ,*,#- & 0 &8 (. ,*,#- 9!, '.) &&- (5 ), 2 '*& 5 -/**),. /* .) FK .#0 /- ,- 1"#& &#0 ,#(! '), 2* (-#0 ! )!, *"# )0 , ! ." ( .")- .3*# &&3 , +/#, ), ." ")' 5= - 3- /8 '.) &&- /- )( ." (. ,*,#- & 0 & ( &-) *,)0# '), 0 ( & ' & '- ('Q" .+ -"(',4 , "' -! , ), & ,! (. ,*,#- - 1" , #(. ,9 '.) #(. , .#)(- , , +/#, .) - ,0 /*1 , - ) , / + % !.' + &)%(2 , "' ,"' % ( Q" 7 )1 0 ,5 ,# --)( &# 0 - " . ,)! ( )/- ( .1),%- )'*,#-#(! 0 ,# .3 ) ' ,) &&-5 *# ) &&- ( '.) &&- , ." 1 3 .) !) ), ') #& )* , .),- *& ((#(! ), .. , #(9 /#& #(! )0 , ! #( /./, ( .1),%-8 < " *&)3' (. ) -' && &&- ), #( )), -#. - ' % - #( , -.,/ ./, ( #(. , , ( #--/ - -# , .) ' ( ! 8 . ,)! ( )/- ( .1),%- ( &-) #(. !, . -'))."&3 1#." #9 #5 1"# " #- '), )-. .#0 -)&/.#)( ), #( )), ') #& ,) ( )0 , ! ), (. ,*,#- ( , -# (.# & /- ,- ." ( '.) &&-8 '.) &&- , )-.&3 ( )'*& 2 1 3 ) &#0 ,#(! )0 , ! .) ." , & .#0 &3 -' && * , (. ! ) ")' - & %#(! !)) ' ,) )0 , ! 8 - ." 3 , (). /&&3 #(. !, . 1#." ." ' ,) ( .1),%5 '.) &&- ." . , /- ' ,) ,,# , , +/ ( 3 ( , . #(. , , ( 5 1"# " .- /- , 2* ,# ( ,)-- ." (.#, ( .1),%5= - 3- ,%/&8 "#& '.) && . "()&)!3 *, - (.- ' (3 )**),./(#.# - ), - ,0# *,)0# , ( (. ,*,#- - &#% 5 )( ) ." ' #( )( ,(- .) 3 #- 1" ." , -/ - ,# ,- ." '- &0 - , *, * , .) /3 #(.) ." . "()&)!35 ), #(! .) /8 < /,, (.&3 - .1) **,) " - #(! . % ( 3 - ,0# *,)0# ,- .) , -- ."#- #--/ 8 #,-.5 *,)0# ,- "))- .) , && ,, )("'- @ A (,-, -( + - "' -! "+ &( "% /-.)' ,-@1"# " #( ." &)(! ,/( #- )-. .#0 8 &. ,( .#0 &35 - ,0# *,)0# ,- , %,( %%(0"' ,. , +" +, -( + '- (+ .2 , 0"-! +- "' ' Q"-, @.,. %%2 .' %

Leo Xu, VP of Huawei Middle East

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

69


TELECOMS WORLD Small cells

Small cells, big problems The mobile industry is courting smaller base stations, but marriage will bring a whole new set of challenges

" ! ) ')()&#."# &&:.)1 , ( .1),%- 1#." 1 #: # ").-*).- ( ")' '.) &&- -*,#(%& #( ' 3 )' .) ( ( -))(8 ) #& )* , .),- , &))%#(! . -' && , &&- ( #: # .) .. , )0 , #( )), -* - ( ,)1 , -6 1#." #: # ! / ! ! " ) ." ,,# ,>- - , &# (- -* .,/'8 1 . "()&)!3 #- ' ,!#(! ), ' ( !#(!

70

." - ( 1 .3* - ) #( , -.,/ ./, #( & ,! , ( .1),% ( ), -/ - ,# ,- .) -"# . .1 ( # , (. , #)- #(0#-# &38 /. 2 .&3 ")1 ,,# ,- 1#&& /- -' && , &&- ( #: # #- -.#&& ' ,!#(!8 '# !,)1#(! #(. , -. #( -' && &&-5 1# &3 - ( - ( #( 0#. & .))& ), ,,# ,- .) & 1#." ))'#(! ') #& . ' ( 5 ." , , ()1 -#!(- ." . #. ' 3 " , .) ,#0 ." 1) - ' Q"-, +(& -! & "' ,(& , ,7

' && &&- ' #! -*& -" . ) #& ),& )(!, -- ,&# , ."#- 3 ,8 -. ')(.";- #, & -- -")1 ./, & -- #( ." 1 3 ) -' &&9 && *,) / . ( 1-5 /. ,,# ,- ( 0 ( ),- &#% -*)% )/. )/. ." ' ,!#(! ( ), ." - . "()&)!# -8 . ." - ' .#' 5 -)' * ,.# #* (.- /.#)( ." . ." , , "/, & - )( ." 1 3 .) ." " . ,)! ( )/- ( .1),%- ) ." /./, 8


' && &&- ( )'* -- ,) ,, 3 ) , #)-5 #( &/ #(! #9 # -- *)#(.-5 ." . , -' && , ( & -- 2* (-#0 ." ( ." ., #.#)( & ' ,) &&- ." . )0 , 1")& ( #!" )/,")) -8 " 3 ( ' % '), Q" " '- ., ( 1",-"' + *. ' " , ' )0 , , -5 -/ " - #( )), -* -5 ." . , " , .) , " 1#." ' ,) &&-8 "#- '#--#)( 1#&& )' #( , -#(!&3 #'*),. (. - ' ( ), ( .1),% * #.3 !,)1- &)(! 1#." )(-/' , ( /-#( -- /- ) ') #& . 5 ., ( ." . -)' - 3 1#&& )(-., #( )(-/' ,-; ( 1),% ,-; ') #& 2* ,# ( 1#."#( 1 3 ,-8 "#& ,,# ,- . - # -' && &&- 1)/& * ,. ) ." #, -)&/.#)(- .) -* .,/' ,/( "5 #( /-.,3 2* ,.- 0) . '/&.#*,)(! **,) " .) ." *,) & ' ." . 1)/& #( &/ -' && &&-8 )1 0 ,5 - ..#(! /* ." - , #)- ( !& (#(! ." *,)'#- #'* . ,)' ." ' 1#&& " , , ." ( $/-. /3#(! +/#*' (. ' Q"' "' ,)(-, -! - ' &(+ ) "-24 ), #(! .) ,,# , ( 0 ( ), 2 /.#0 - ( )." ,- . ." -")18 . ( , #- .#)( #- -.#&& 1),% #( *,)!, --5 ." , ' 3 "# ( )-.- "#( ." , & .#0 &3 &)1 *,# - ) -' && %%, ' ++" +, & 2 ' .) Q" !-"' (/ + -*).- .) - . ." ' /*8 " ' && && ),/'5 ." #!! -. " ,& , ) ." . "()&)!# -5 , & - . -. , -/&.- ." . -")1 - ..#(! /* $/-. )( -' && && ( , ' ,) &&5 )." )( ." , & ! '' %,4 ' ( Q%( GE ) + '- ( -! %( % - -+ Q" -( -! ,& %% + + "(7 "-! (.+4 -! ( Q%( +(0, -( JK ) + '-4 -! !,)/* - # 8 ! - + )+ , '-, -! ,) -+ % Q" " ' 2 ! #(- ." . -' && &&- ( ) ,5 - # #')( /( ,-5 " #,' ( ) ." FHL9' ' , #( /-.,3 !,)/*8 /. .) *, 0 (. #(. , , ( 5

Hans Beijner, portfolio marketing manager for Product Area Radio at Ericsson

." ' ,) ( -' && &&- ( .) )), #( . 8 " ),/' 0) . - )'')( -. ( , - ." . 1)/& & . (3 0 ( ),;- &&- )''/(# . 1#." (3 )." ,;-5 1"# " )/& )-. , #(()0 .#)( 3 ( 1 , ' (/ ./, ,-8 )1 0 ,5 ." #!! -. ) ." -. &#-" #( , -.,/ ./, 0 ( ),- , #- )/ .- 1" ." , ." . **,) " 1#&& ,/& ." 38

( )." H ( I ( .1),%-5 ." , , *,)*,# . ,3 *,).) )&- ), )), #( .#)( ')(! &&- -' && ), & ,! 5 - # (- #$( ,5 )(+- (%"( & +$ -"' & ' + (+ +( . - , #) . ,# --)(8 -.- . ,# --)( /-#(! ." )'* (3;- )1( ! , .",)/!")/. ' -0(+$ "' " - &. ! + - + Q" " ' 2 ! #(- , *)--# & ." ( 1" . ." ),/' - ,# 5 #$( , - # 8 -% )/. 0 ( ),-; #( &#( .#)( .)1 , )+()+" - +2 ' -0(+$,4 ( 33"4 )+"'- 2. &;- - (#), 0# *, -# (. 9 .1),%5 - # - ,0# *,)0# ,- $/-. " 0 .) ), ." ' .) 1),% 1#." )." ,-8 ,,# ,- ( .) -. ,. 3

Small cells encompass a broad array of radios, including Wi-Fi access points, that are smaller and less expensive than the traditional macro cells that cover whole neighbourhoods.

' ( #(! -. ( , - )'*&# ( #( ." #, , +/ -.- ), *,)*)- &-5 " - # 8 < ( ." (5 1" . " ** (- #-5 ." 0 ( ),- &#0 , #.5 ( ." 3;, && # , (.5 ( ." ( 1 888 . -. ." '5 ( ." ( 1 ! . ." ' && .) Q"1 "- ,( "- 0(+$, -( -! +4= 33" , " 7 < ! ,- ' + , - 2(. ME (+ NE ) + '- ( -! 1 3 ." , 8= ." , #--/ - 1#." -' && &&- , '), )1( .) ,."8 ), )( ."#(!5 0 ( .")/!" ." &&- )-. '/ " & -- ." ( ' ,) +/#*' (.5 " -.#&& ( - .) #(-. && ( " 0 -. %" /& )(( .#)(5 1"# " #- /-/ &&3 1#, 8 ' && &&- ' ( '), &&- #( !#0 ( , 5 -) '), 1#, - ( ( 1# ." " ,! - ), ." ') #& ,,# ,8 < 3)/ % * )( #(! )( ." - -' && &&- .) ." ' ,% .5 3)/;, !)#(! .) 2*)( (.# &&3 !,)1 3)/, %" /& , +/#, ' (.-5= 0/' ( &3-. ,3& "))& , - # /,#(! - --#)( . ." -")18 < (). " ( & ,#!".5 #. )/& ./ &&3 *,) &3 -.,)3 (3 )()'# 0 &/ ( )* , .), #- !)#(! .) ! . )/. ) *&)3#(! -' && &&-8= ( &)(! 1#." ." )-. ) ." %" /& )' - ." -"& ' 1) ', ( --"' 3('"' ))+(/ % ), -' && &&8 < #( #(! -., . /,(#./, 3)/ ( ./ &&3 3(' "' -!", %" -"& ", 1-+ & %2 B! + C7 - 0"%% ,-. $ "' 3('"' (14 ,( 2(. ' / + ! . (3."#(! /#&.5= - # )"( 15 - (#), /" )+ ," '- ' !" - !'(%( 2 ( Q" + . & ,1#, 8 1 - # "#- )'* (3 " - *&)3 # 2 -' && &&- #( 1 &) .#)(- "' & #(+ "-" , 0! + "- ", / ' &(+ " Q" .%- -( Q"' ,"- , (+ & +( %%,7 )+"'-;, 33" )+ " - ,& %%8 %% ')/(.#(! &) .#)(- 1#&& )' - , )'') #.3 #( /-3 /, ( , -8 < ;, !)#(! .) && . , ." . -., . (+' +4= 33" , " 7 -! % , (' 0 %%8 -#./ . & '* *)-. ), #( *)*/& , ) ,!() ( , -( -! Q"+,- " + ' (-! + ++" +, + %( $ (.-4 -! - (.% ,-"Q% )'* .#.#)( ( #(()0 .#)( ( "/,. -/ - ,# ,-5 " - # 8 " -)&/.#)( '#!". ') & #( 1"# " && - ,0# *,)0# ,- -" , -#. -8 )1 0 ,5 #.;- (). 3 . & , ")1 -/ " ,2,- & &" !- , - .)4 33" , " 7

71



IntegrationAdvisor


INTEGRATION ADVISOR Contracts for sourcing

DOLLAR VALUE To make smarter decisions about how to set up your relationship with an IT service provider it is important to estimate the dollar value of the most important commitments, options, incentives and clauses in an IT outsourcing contract. Here are some types of contract terms and methods for putting a price tag on them.

74


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

Some believe that terms are a ‘soft’ beneďŹ t and, thus, impossible to value accurately. Also, procurements teams are often compensated based on ‘savings’ without regard to whether the contract will allow them to realise that savings.â€? &-)5 *,) /, ' (.- . '- , ) . ( (&) ', - , (' :, /"' ,; 0"-!(.- , ! , .) 1" ." , ." )(., . 1#&& &&)1 -! & -( + %"3 -! - , /"' ,7= .- 2(. ' - 3)/, - ,0# *,)0# , " - )&& , ')/(. --#!( .) 0 ,3 . ,' ." . '#!". ' % #. .) ." ( !).# .#(! . & 8

/-#( -- %!,)/( .) ,/( ." (/' ,-8 .- / %."' ('-+ - - +&, - 3 +( ' % -( -/,*,#- " ,! -5 & % ) )(.,)&5 #( #&#.3 .) 1"-4 (+ (&)%" ' "%.+ ,7 ' ( - +,(';, &# (.-5 ), 2 '*& 5 " *, 0#)/-&3 )*. ), 3 ,&3 -) .1 , &# (- - * ,. ) ( )/.-)/, #(! ,, (! ' (. #( ), , .) -%#,.

75


INTEGRATION ADVISOR Contracts for sourcing

." * ,* ./ & &# (- -8 1 3 ,- #(5 ." -) .1 , " )' /( ' (. & * ,. ) ." &# (.;- /-#( -- ( ." ((/ & $/'* GEN8 < " 3 -% /- 1" . ." 3 )/& ) ( 5 /- ." #, *,# &) % & -. )(&3 .", 3 ,-5 ." )(., . 1 - () " &*5= - +,(' , 2,7

. '#!". '#-. % .) #(0 -. ." & 0 & ) , -)/, - , +/#, .) ( #& )1( ( 2 . 0 &/ ), 0 ,3 . ,'5 /-.)' ,- ( ) /- )( ( !).# .#)(- 1" , ." , , & , ")# - .) ' % @&#% ." ")# .1 ( .1) *,)0# ,- ), .1 ( *,# /. ( .. , . ,'-8 < . ,. 1#." "#!"9& 0 & &))% . % 3 . ,'- ( ." ( /#& '), . #& 0# 15= , 2, - +,('7 < (. ' -( % ' -! / %. ) .. , , -/&.- 1#." ." )-. ) ( &3-#-8=

( ' (3 - -5 & ,- " 0 &, 3 ! ." , ), , . . - * ,. ) ' %#(! ." /-#( -- - ), )/.-)/, #(! ." . ( " &* 0 &/ . )(., . . ,'-8 ), 2 '*& 5 # ." 0 &/ ) ." -#, /-#( -- )/. )' #- -.#' . 5 ." . -.#' . ( /- .) */. (%% + Q" .+ (' '2 - +&, -! - -, -! -! *,) #&#.3 ) "# 0#(! ." . )/. )' 8

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

76

A SOLUTION FOR A PROBLEM The traditional request-for-proposal (RFP) process may be doing your IT outsourcing relationships a disservice. Enter request for solutions (or RFS), an open-ended, collaborative approach that’s better for IT environments.

If you’re looking for transformation or innovation from an outsourcing engagement, you might want to ditch the traditional request-for-proposal (RFP) process. That’s right—that decadesold, time-tested process used to gather bids from potential providers may be doing your IT outsourcing relationships a disservice, according to Tom Young, partner with outsourcing consultancy ISG. “RFPs by their very nature are prescriptive in their requirements,â€? Young says. “Prescription is almost antithetical to innovation.â€? The methods the RFP process employs to “normalizeâ€? the proposals of various vendors and create apples-to-apples comparisons virtually locks out any attempts by a provider to bring something creative to the table. The more detailed the buyer gets in the RFP, the less room there is for innovation or exibility—which outsourcing customers claim to want. And outsourcing customers often take an everythingbut-the-kitchen sink approach to their RFP

1118 (' )(&#( 8 )'

requirements, including not only need-to-have requirement, but nice-to-have services. Those optional add-ons add up. But they “don’t get revealed in the RFP process,â€? says Young. “It’s you did an RFP to buy a car, you might list a lot of options—moon roof, rear bumper camera, oor mats—and end up getting a much higher price than you expected. If you saw that the oor mats cost $1,000, you’d say, ‘Forget it.’ But they get priced in and it becomes invisible.â€? In response to a recent ISG survey, service providers said their pricing was at least 10 percent higher when responding to complex RFPs An alternative is what Young calls a request for solution (RFS). In contrast to a detailed, buyer-led RFP, the RFS is an open-ended, collaborative process. The customer describes its IT environment, objectives, concerns, and risk tolerance and the potential suppliers come back with unique solutions that meet those general requirements. “In buyer-led commerce—like an RFP or



INTEGRATION ADVISOR Contracts for sourcing

)(., . #( -- ( 2 " (! - &)(!9. ,' )''#.' (. ), FE N , / .#)( #( )-. )'* , .) -*). ' ,% . *,# -5 ." . FE N )/& ( -.#' . ) ." 0 &/ ) #&#(! .) - /, ." )''#.' (.8 *.#)( " - . ,'- &#0 , ")# - .) ." /-.)' , ( ( , / ." ')/(. ), &#% &#")) ) " (! 9, & . " ,! -8 2 '*& - #( &/ )*.#)(- .) ) . #( )/.9) 9- )* - ,0# - . , -)( & *,# -5 #(-)/, ), , -)/, 5 " (! . "(# & ), )* , .#)( & , +/#, ' (.-5 #'*)- , -)( & ,/& - ( , -.,# .#)(-5 , &) . /-.)' , #&#.# -5 " (! /-.)' , . "()&)!35 ), $/-. *,# - 0# ( "' ,%#(!8 ), -., #!". ),1 , )*.#)( 99 &#% . ,'#( .#)( ), )(0 (# ( 99 -#'*&3 & /& . ." *,) #&#.3 ) 2 , #-#(! ." )*.#)(- ( &.%-")%2 2 -! ('(&" ' Q"- ( ("' ,(7

." -/**&# , !, - ." . . ,'#( .#)(9 ),9 )(0 (# ( " ,! 1#&& , / 3 DG '#&&#)( # , & . .) " (! ) )(.,)& ( ." /-.)' , -.#' . - J N *,) #&#.3 ) ' %#(! ." . ")# 5 ." 0 &/ ) ." . *,)0#-#)( #- DFEE5EEE8 *.#)(- ." . *,)0# -) . , ' Q"-, 88 %"$ "%"-2 88 + " Q" .%- -( ,-"& - 1#." *, #-#)(8 /. < ( -.#' . - )( ." )&& . -. $/ !' (. ) 3)/, . ' 1#&& ,.) +"(+ -( " '(+"' -! "+ / %. 4= - +,(' , 2,7

( (.#0 " - . ,'- ( )/, ! ." -/**&# , .) . #( ." /-.)' ,;- -. #(. , -.8 2 '*& - #( &/ - ,0# 9& 0 & , #.-5 &#0 , & , #.-5 ")& %-5 ! #( -" ,#(!5 ) &#! .#)(- ), ." -/**&# , .) ),, . #.- ,,),- . #.- )-.5 ( #( '(#.# - ! #(-. " ,' /- 3 ." -/**&# ,8 / ., . ." )()'# 0 &/ 3)/ 2* . .) ,#0 1#.")/. ." #( (.#0 ,)' ." )()'# 0 &/ 3)/ 2* . .) ,#0 # 3)/ " 0 ." #( (.#0 .) . ,'#( #.- / %. 7 .-4 '(- , - +,('4 -! ,-+ ' -! ( ( #( (.#0 * ( - )( #.- 0 &/ , & .#0 .) ." -/**&# ,;- )-. ) "# 0#(! ." -#, , -/&.8 ), 0 ,3 )&& , ." . ." /-.)' , 1 (.- ." -/**&# , .) #(0 -. #( , / #(! ,#-% 3 F N5 ." -/**&# , -")/& " 0 . & -. DFEE . ,#-%8 (3."#(! -' && , */.- ." . ,' #( ." < )-. ) )#(! /-#( --= . !),3 + -! + -! ' ' "' '-"/ 4 - +,(' , 2,7

78

RFQ—the buyer dictates the terms and scope of the commerce. In seller-led commerce, the seller makes—often unsolicited—offers to the buyer on the seller terms,â€? says Young. “The RFS is meant to bridge these approaches—getting the best aspects of both.â€? Young likes to use a vacation-planning analogy. With a traditional RFP process, you’d ask a travel agent ďŹ nd the cheapest package for a family of four to y from New York to a hotel room within ďŹ ve miles of Disneyworld for ďŹ ve days in June. Taking the RFS approach, you’d say you want to take a family of four on a ďŹ ve night vacation and spend $4000 or less and then select from the variety of options the agent provides that meets those criteria—a cruise, a camping trip, a European tour, or Disney. When a buyer really wants to transform an IT environment, they may not know what they want even though a detailed RFP implies that they do. An RFS can reveal options an outsourcing customer may not have thought of, says Young. When Young ďŹ rst began offering the RFS option four years ago, only a few customers were willing to try it. Today, just under half of those he works take an RFS approach, at least for part of a deal. The option provides valuable getting-to-knowyou time. “An RFP is very formal. It’s doesn’t build trust,â€? says Young. With an RFS, “you’re jointly working together to solve the problem right from the start. And that time is better spent starting off the relationship on the right foot.â€? It can also shift the buyer’s focus from who has the lowest price to who they mesh with best. One consumer products retailer who recently issued an RFS with Young ultimately chose a service provider based on soft beneďŹ ts. “They liked them, they trusted them, they ďŹ t in culturally,â€? says Young. They shook hands and immediately began writing the statement of work and the contract exhibits. “But [the customer] also made it clear if [the provider] jerked them around, they’d put an RFP cover sheet on the solution and send it out for competitive bid,â€? says Young.â€? Ideally, that’s the way it works. One of the solutions lights the buyer’s fancy and they fast forward to contract negotiations, cutting the typical four to six month provider selection process in half.

1118 (' )(&#( 8 )'

But many still follow up with a traditional RFP, either because they think competitive bidding is the only way to get a good deal or because that’s the way they’ve always done it. “It’s a little disappointing. They just don’t seem to get the fact that the perfect can be the enemy of the good. A good deal managed well is great. A perfect deal managed poorly is terrible,â€? says Young. “They think if they can create a 1,000-page contract through a competitive RFP process, they will be protected. But the more buttoned down the RFP and contracting process is, the more that take their foot off the pedal during the management phase.â€? The kind of handshake agreement created by the RFS process actually encourages the parties to work out ambiguities early on and also leaves room for exibility as the business and IT environment inevitably changes, says Young. But it requires a leap of faith. Client and provider must communicate, collaborate, and be transparent. “The client has to trust the provider to deliver on requirements rather than micro-manage pricing and service delivery,â€? says Young. They also have to be willing to change their own processes and deal with internal constraints and complexities in order to drive the desired end state. An RFS approach requires the provider to shake up their traditional sales approach as well. Some of the big players who are doing just ďŹ ne with the RFP-led process won’t go for it, says Young. But others—particularly tier-two, offshore providers, and business consulting-focused providers— welcome the opportunity. An outsourcing provider can spend two or three million on a proposal for a $100 million-plus deal and wind up winning the business less than half the time. The RFS has a lower cost of entry. “It gives them at least one swing at the deal,â€? Young says. For customers trying an RFS for the ďŹ rst time, Young advises they start small. Pick a project where there’s a lack of consensus about to do—one faction arguing for offshoring, another for a cloud solution, and yet another for a reengineering effort. And RFP process can bring those options to life. “The RFS can bring clarity and the credibility of the commercial markets to help focus the point of view internally on the proper direction to take,â€? says Young.


MEEZA

IT Services & Solutions Provider Meetingg the market

demands across all industries Ranging from data centre services to innovative consulting services, MEEZA offers flexible and scalable IT services and solutions that deliver real advantage to our clients.

M-Vault 2 and M-Vault-3,

enthuse the ICT sector in Qatar and the region

Located cat on its own campus, 30km outside of Doha, M-VAULT MAU 2 is scheduled to begin operation at the beginning of the 3rd quarter of this year. It is designed aand b beginn built to Uptime Institute Tier III Standards, with 99.98% guaranteed availability. guara y. It is LEED platinum certi certifi fied ed, wher wheere re itt maximises m energy to increase i performance. The world-class wo world orl orld orl facility offers rs Business Continuity solutions for alll kke key Disaster Recoveryy requirements criteria through xperts. service delivery and IT exp serv

Protection of valuable IT assets a is critical to the successful management and a growth of business. From a single rack, k, to an entire Data Hall, the M-Vaults have thee security, availability and capacity to meett all market standards Data centree requirements. Provided by the he latest technology gy and expertise, ex rtis MEEZA infrasttructure services enable nable busine businesses sine sine to offload dayy-to-day IT responsibilities ies to MEEZA’s Datta centres.

M-VAUL 3 has begun oper M-VAULT eration this month. It is located at closed p proximity to MEEZA ZA’s original data centre at QSTP, and iss ta tailored towardss high density computing in particular p pa rticular for th the purposes of servicing s research, eengineering, ngineering, h n health, banking, pharmaceutical p and ttechnology eechnology hno n sectors. see It is LEED G Gold certified because of its ssustainable su ustainable and n environmentally environm meen y friendly design. men me

MEEZA reccognises the essential need for applicatio ons such as messaging ng and collaboration ion on for compa panies to run their businesses. inessse The port rtfolio of services provided d byy MEEZA M MEEZ ZA enables es us to create comprehensive nsive solutions to busineesses across all industries such as Disaster aster Recovvery or Business Continuity Solutions. luti Busi siness services and solutions available through rough a private, pr hybrid or public cloud gives MEEZA A clie ients access to a robust selection of instantly sccalable applications without the high costs of ownership and maintenance. o

Meet MEEZA Team MEEZA underwent market studies to identify entify the industries that will benefitt most from our services and solutions. The diverse erse targeted targ verticals tackle all the economic pillars that support the regional al grow growth. To accomplish the goals of meeting the IT requirements requ of the local organisations, MEEZA set forth in the strategic plan, an effort or to identify a list of industries with high demand of IT services. Several criteria were used in the identification of these industries. These industries are: Government

Financial, Insurance, Transportation p and Telecommunication

Oil & Gas and Healthcare

Real Estate, Business Services

Please contact our team of experts to discuss your business challenges and to explore the added value of our services and solutions to support your business objectives.

T +974 4405 1000 E info@meeza.net F +974 4405 2000 www.meeza.net



CareersAdvisor


CAREERS ADVISOR Third party training

Adding value CNME looks at third party trainers and how they can contribute to the development of both university students and internal IT staff.

82


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

Ali Alamadi, principal consultant at help AG Middle East

." ,#!". #(!, # (. ), ." ., #(#(! .) &#0 , 5= " - 3-8 / -.#./. "#, * ,.3 ., #(#(! ' 3 -)/, ) '/ " ' Q"-4 .- ' "- "' - - , ,. ,-"-.- ), /(#0 ,-#.3 !, : & ' # ."#(%- ().8 < , #(#(! )/,- - ((). -/ -.#./. '# !, - /. ( -/**),. ." '8

Training courses cannot substitute academic degrees but can support them. While universities provide detail theoretical information about the topic, training courses focus on hands on experiences.â€?

,' 1#." /(#0 ,-#.3 !, )( '#!". 6 /. ."#, * ,.3 ., #( ,- ( )( :) )/,- - ( -.#&& &). ) 0 &/ .) 0 ,3 -*#, (.6 , ! , & -- ) , (%8 &# & ' #5 *,#( #* & )(-/&. (. . " &* # & -.5 - 3- ."#, * ,.3 ., #(#(! (.+, , ' "' ' Q" " % " -! +" !- ., #(#(! *,)0# , #- ")- (8 < ." ,#!". ., #(#(! *,)0# , #- (). ")- (5 #. 1#&& 1 -. 2 , #- 8 0 (

0 ,3 #'*),. (. -* . ) ."#, * ,.3 ., #(#(!5 ,), - 3-5 #- .) - . ." 2* . .#)(- ) ." * ,.# #* (.- ,#!". ), ." ., #(#(!8 !", ,!(.% (' "' -! (+& ( ( &3-#-8 < ! ' %2,", -0 ' .++ '- -%#&& - .- & 0 & ( ." -#, -%#&& - . & 0 & 1#&& " &* )." * ,.# #* (. ( ." ."#, * ,.38 ), ." * ,.# #* (.-5 #. 1#&& - . ." ,#!". 2* . .#)( ,)' ." ., #(#(! ( ), -! -!"+ ) +-2 -+ "'"' )+(/" + -( Q"'

"#& /(#0 ,-#.# - *,)0# . #& ." ), .# & #( ),' .#)( )/. ." .)*# 5 ., #(#(! )/,- - ) /- )( " ( - )( 2* ,# ( -5= & ' # - 3-8 < ) ! #( /&& %()1& ! )/. ,. # -4 "- 0"%% &(,- ' Q" " % -( ! / )'*, " (-#0 *,)!, '' 1"# " #( &/ - ." -. ) , - ,)' '# ( ." #( /-.,38 (3 ."#, * ,.3 ., #( ,- &#% &* *,)0# ." )*.#)( ) 0 &)*#(! )'*, " (-#0 ., #(#(! *,)!, '' - ), #.-

83


CAREERS ADVISOR Third party training

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

Pawandeep Singh Arora, sales manager for learning services at Gulf Business Machines

/ , ,-. '-, ).+,. &(+ ,) "Q" + +

In today’s challenging working environment, the third party trainings give an edge to the participants, as they practically understand the subject from a real time perceptive. However the participant with good academic university background can maximise the beneďŹ t as they already have solid basics to build upon.â€? 82

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

-. 8


")'20 %:%1 75,1)55 )16)4 6+ <224 29

7&%, #1,6)( 4%& 0,4%6)5 ")/ %9

/%:% !64))6 23325,6) /%:% %// 1)96 62 %1. /-%;))4% 7,/(,1* 56 <224 29 256%/ 2() /%:% ,:%(+ ! ")/ %9

6+ /224 !6 )24*)5 )16)4 %,1 2%( 24'+ "%&)6 !,1 / ,/ ),476 )&%121 ")/ %9

!%0)+ %1(,/ 27164: 4)% %1%*)4 !%0)+$.%1(,/ 0,1(8%4) %)


CAREERS ADVISOR Third party training

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

82

In today’s challenging times, where the world economies are facing downfalls and companies are downsizing, it is very important to best equip your employees to maximise the company’s efficiency levels and raise productivity.�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


With great power comes great opportunity.

Transform your business with new 12th Generation Data Center solutions. Why leave your business’s success to chance? Enable IT as a competitive advantage with all-new Dell™ PowerEdge™ server solutions, powered by Intel® Xeon® processors, that deliver the efficiency, agility and reliability to solve your biggest challenges. They’re part of a wide portfolio of end-to-end data center solutions from Dell that’ll give your business everything it needs, and more.

Visit YourDellSolution.com/me ©2012 Dell Products. Dell, the Dell logo and PowerEdge are registered or unregistered trade marks of Dell Inc. in the United States and other countries. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries. Other trademarks or trade names may be used in this document to refer to third-party products (such as operating systems and software) included with the products offered by Dell and the entities claiming the marks and names of those products. Dell disclaims proprietary interest in the marks and names of others. Dell Corporation Ltd, Dell House, The Boulevard, Cain Road, Bracknell, Berkshire, RG12 1LF.


INSIGHT Cloud security ty

Real story of cloud security Cloud security breaches aren’t necessarily headline news, but there’s a good reason for that: Cybercriminals don’t always view the cloud as the target of an attack, but often as a resource to launch an attack.

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

88

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



INSIGHT Cloud security

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

One troubling trend uncovered in the Sony breach is that hackers view the cloud not necessarily as a target, but as a resource. Hackers used stolen credit cards to rent Amazon EC2 servers and launch the crippling attack on Sony.

90

TEN THINGS TO ASK CLOUD PROVIDERS When it’s time to evaluate cloud service providers, be sure to ask these ten security questions: 1. Were your services developed using a secure development lifecycle? 2. Can you prove it and provide, say, penetration testing overviews? 3. What data protection policies do you have in place? 4. What are your data privacy policies? 5. How do you enforce those various policies? 6. Is security covered in your SLAs? If not, why not? 7. How do you back up and recover data? 8. How do you encrypt data, both in motion and at rest? 9. How do you segregate my data from others? 10. What kind of visibility will I have into your logs?

( ),./( . &35 ." 3 ,)/!". ." ,)).%#. #( 1#." ." '5 #( .#(! ." #, (.#, ( .1),%8 < #,./ & ' "#( - ( - ,0 , - ,)$ ( "),- - # 3)/;, (). , /&5= 1 . - # 8 -/, .) - /, .")- % 3 " ')-. )'')( &)/ 1),,3 " , ,)' - /,#.3 *,) --#)( &-5 )( , * . )0 , ' (/ + "'4 0 , (.- $ 2,7 (,- (+ '", -"(', ., $ 2, -( ,, -! "+ &)/ - ,0# -5 ( ." 3 , *, - (. ." % 3- .) ." %#(! )'8 < $ 2, + !. ",,. 4= 0 - , " 7 <

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



INTERVIEW Jim Stallings

DEFINING THE NEW VALUE IBM has recently unveiled a new product line of integrated sets of hardware and software, called PureSystems. Jim Stallings, GM of Global Markets in IBM Systems & Technology Group, spoke to us about what this new line of preconďŹ gured systems means for the customers.

92


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

/-.)' ,- ( ./,( #. )(5 /-.)'#- #.5 ( ')0 ." 1),%&) - ,)' -#&)- .) ."#- )( *& . ),' 1#."#( 1 %-8 - - # ,&# ,5 ."#(!- ." . /- .) . % /* .) -#2 ')(."- .) *&)3 ( )( - &#..& - #( .1) 1 %-8 " 3 ( &#'#( . . -%- -/ " - - ..#(! /* . - ), !,)/* ) - ,0 ,- - &/-. , ), &#(%#(! ( **&# .#)( 1#." ." )'* (3;- * ,-)(( & #, .),3 ) *)--# & /- ,8 ()." , #'*),. (. .), #- ." . .+ 2,- &, ' ., -( ."% ). %" ), *,#0 . &)/ 5 ), /- .) & /( " ( 1 #(. ,( & **&# .#)(8 " . 3)/ , +/#, .) /#& )/. *,#0 . &)/ , .1) ."#(!-9 #( , -.,/ ./, ( **&# .#)(- -. %8 .+ 2,- &, %%(0, -( 2(. ! / )+"/ - %(. /* ( ,/((#(! #( 1 %-8

-# )'*/.#(! #( , -.,/ ./, 5 #( &/ #(! - ,0 ,-5 )* , .#(! -3-. '-5 0#,./ &#- .#)( (0#,)(' (. ( '# & 1 , 8 . )' - "' -!+ " + '- ,"3 , , 0 %% ? 1)+ ,,4 . ( , ( (. ,*,#- 8 " )." , * % ! 5 .+ ))%" -"(',4 )%(2 (' -() ( .+ % 14 *,)0# - ( (0#,)(' (. ) ")-.#(! (. ,*,#- 0 **&# .#)(-8 )1 )/. * .. ,(- ) 2* ,.#- < - #. ( /- ! ') &<

1#." #.- "#-.),3 " - ( & .) ! . #(.) -)' 0 ,3 -. (0#,)(' (.- ( & ,( 1" . , ." -. #( /-.,3 -)&/.#)(-5 0 #& #&#.3 ./, - ( ." -. . "(#+/ - )( *,)0#-#)(#(!5 . 8 " 0 ( & .) *./, - . ) -. *, .# -5 .-(& - -! & ' ."% "- "'-( .+ 2,- &,7

IBM has done most of the work in getting the internal componentry to work together in terms of applications, middleware, database, storage, I/O and ship a pre-built system based on patterns of expertise.

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

93


INTERVIEW Jim Whitehurst

WEIGHING IN ON STRATEGY Red Hat CEO Jim Whitehurst is coming up on his ďŹ ve-year anniversary at the helm, following his arrival in December 2007. Under Whitehurst’s leadership, Red Hat’s revenue has grown from US$523 million in its ďŹ scal 2008 to more than $1.1 billion in its ďŹ scal 2012, without deviating from its core strategy of open-source infrastructure software. In an interview at the Red Hat Summit conference in Boston, Whitehurst spoke on a variety of topics. Excerpts from the interview below.

."#(% #.;- ." . 1 %()1 ")1 .) & 0 , ! )* ( -)/, .) &#0 , 2 && (. (. ,*,#- -) .1 , 8 * ( -)/, ! ( , &&3 ) - 1 && 1" , ." , + +( 4 ,- ' + "3 ., , ,4 ,. ! , )* , .#(! -3-. '-8 - -))( - 3)/ ' , " /* #(.) **&# .#)( /( .#)( &#.35 ." .;- '), ,) " %"3 7 ."% "' +( (&&.'"-" , ( ., .) /#& -)' ."#(! #- , &&35 , &&3 " , 8

%()1 -)' * )*& , .,3#(!5 ." , #- )* (9-)/, ( -)' ) ." - )." , . !),# - )/. ." , 8 /. ."#(% /#& #(! )''/(#.3 .) )(.,# /. .) .)*9+/ &#.3 ))%" -"(', ", + %%2 " Q" .%-7 %,(4 (' ( -! -!"' , 0 ( ", %(' 8%" ,.))(+-4 +-"Q" ! + 0 + 4 +-"Q" ))%" -"(', +(.' (.+ #( , -.,/ ./, 8 && ) .")- ."#(!- " 0 0 &/ 8 - -))( - 3)/;, . ( **&# .#)( & 3 ,5 .")- ."#(!- " 0 &#..& #. & -- 0 &/ 8 /. &(,-%2 "-;, (.- -! " Q" .%-2 ( ."% "' )''/(#.3 ,)/( 0 ,.# & **&# .#)(-8

7 . , ' #(- )''#.. #( , -.,/ ./, 0 ( ),6 ." /-#( -- **&# .#)(- , -8 "3 " 0 3)/ -. 3 )/. ) < 7 ' '2 (&) '2 2(. ! / -( Q" .+ (.- 0! - 3)/, ), -)/, ) # , (.# .#)( #- ( 1

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

94

7 . , &# - )( )* (:-)/, . - - &#% 3 ), #.- *,) / . &#( /*6 /. ." )'* (3 ) -(>. " 0 #.- )1( ., #.#)( & , & .#)( & . - ) ,#(!8 "3 #- ." .< 7 .;- -)' ."#(! 1 ) 0#)/-&3 " 0 &))% . (/' , ) .#' -5 ( )(;. ."#(% ." , ;- -)' ."#(! ( -- ,#&3 1,)(! 1#." ." ), . - /-#( --8 " *,) & ' #- ." . - &&#(! )(&3 )( *,# #-(;. ()/!"8 ) !) #( ( - 3 1 " 0 . - &')-. - !)) - , & . . (." ) ." *,# #- -.#&& .)/!" - &&8 " , -)( #(/2 # 1 && #-(;. ." . #(/2 #- " * , ." ( 8 .;- -. ,8 #." )--5 #.;- '(- -! - "-;, ! ) + -! ' B C )! + (+ B + % C ( " 4 "- %,( + *."+ , &. ! -' && , )).*,#(.8 " , ), 5 3)/ ( )&& *- 1")& - . ) )'*/.#(! , -)/, - ( ' ( ! ' (. ,)/( ." .8 " *,) & ' )( ." . - -# #- , & " - , &&3 '( !)) . - 8 .;- (). ." . ." , , (;. , &&3 !)) )* (9-)/, . - - )/. ." , 5 /. . & -. #( ." ., #.#)( & 1),& 5 ." , ;- () )* (9-)/, . - ." . " - FE )." , ./, - ." . , & ) -(;. " 0 8 )15 )( ." ) -# 5 ."#(% -)' ) .")- )/& +/#. #(. , -.#(!8 .;- -)' ."#(! ." . 1 &))% .5 ."#(% ." !/3- . FE! ( , )#(! !, . $) 8 )' ) .")- )/& 0 ,35 0 ,3 #(. , -.#(!5 /. ." .#' ;- $/-. ( 0 , ( +" !- (+ ., -( Q"' -! +" !- Q"-7 B 6 +%" + -!", ')(."5 . , & - )-- . ,# K5 ( #(9' '),3 ) . -.), - )( ."

'Q"'",) ' () '8,(.+ )+(# -C7 7 . &-) , &# - " 0#&3 )( 0 6 1"# " #- )(.,)&& 3 3)/, )'* .#.),6 , & 8 " .>- 3)/, 0# 1 ) , & >- -. 1 , -"#* ) 0 < 7 + 0 - !"' B + % ;, ! ' %"' ( / C &)- &38 )(;. ."#(% (3."#(!;- " ** ( ."/- , ." . , &&3 )( ,(- /-5 /. 1 1 (. .) 1 . " #. , /&&38



PRODUCTS Mobility

Dell XPS 13

" && #- %8 " /( (# &3 ')/- , ( ( ' ." . 0 ( ,8 " & )( ))* , "#'- & )1( ), " !). "#- &# ( , ' "#( ; @ -6 $/-. ' #! (! " ),3 , , ( A8 && 1 - &#..& & . .) (. , ." &., ))% ., ( 1#." ."#- ( 1 0# 8 ) 3 0 ;+ %(($"' - -! FH - + & '2 )." , &., ))%- ,)' # , (. , ( - " 0 "#. ." ' ,% .8 ) 3 5 * (% "' -! 4 2(.;%% '(-" -! - "- %, %"$ 0 ,3 -./, 3 0# 5 #.;- ./ &&3 0 ,3 1 && /#&. 1#." 0 ,3."#(! * % ( .&3 #(.) )( -)&# * %8 " .)* )0 , #- ' (/ ./, )/. ) -& % *& . ) ' "#( &/'#(/'5 1"#& -! , ", & (.- ( + (' Q" +7 " 1 ! -" * -#(! " - & % + (' Q" + ' %.&"'.& ,"%/ + %"'"' (' ." -# 5 ( #- . * , ( .&3 0 ,3#(! #( -!" $' ,, -0 ' FM && - "-, -!" $ ,-4 -( - ."#( - K '' )( ." * &' , -. -# 8

(-# ."#- -./, 3 -" &&5 3)/;&& - )( ) ." ')-. /.# /&&3 -#!( % 3 ) , -8 #! % 3- 1#." -'))." ,)/( ! - ." . " 0 0 ,3 /./,#-.# &))%#(! &&9 *- )(.8 "

96

* &' , -.- , ' )/. ) ,% ' !( -#/' )0 , #( -) . .)/ " * #(.5 1"#& ." .)/ "* & ( - /.# /&&3 1#." && ) ."#-– ,#(!#(! -)' /- /& '/&.#.)/ " ./, - .) ." 0# 8 " FH8H #( " - , ( #- )0 , #( !),#&& % ,,4 ) $, FHKK 1 LKM )"1 %, ' ! , / +2 ,# " )&)/,-5 '/ " .. , ." ( 1" . 1 ;0 - ( )( )." , -#'#& , &., ))%-8 - #- ." - 1#." ' (3 )." , %-+ (($,4 -! ,!"), 0"-! ' '- % (+ #J ), #L *,) --),5 I ) 5 GJK )&# . . , ,#0 ( ( (. &C , *"# - HEEE !, *"# - "#*8 "#- 0# )' - 1#." .1) *)-.-5 )( G8E ( )( H8E5 " - . # $ ' &"'" ",)% 2 (+-7 - ! , F7H 1 ' ( .1) '# ,)*")( - /#& #(.) #.5 ( #( &/ - 3)/, -. ( , )(( .#0#.3 )*.#)(- &#% # #5 &/ .))." ( 3)/ ( 0 ( )(( . #. .) ( #.#)( & - , ( /-#(! ." /#&. #( (. & 1#, & -- #-*& 3 *.), A # #B8 ) .1 , ( * , ),' ( ! FH +.', "' (0, L !(& )+ &".& -'))."&3 ( )' - * % 1#." &).- ) -) .1 , ,)' ." ' (/ ./, , ), 0 ,#)/- -/**),.#0 ./, -8

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

" #

!

This review was done by Fahed Sabbagh – proud geek and passionate blogger. You can catch him wax poetic on all things geeky at www.nerdyface.com.


The storage dilemma

, >- ." /&.#' . +/ -.#)( )/. -.), ! 6 ) 1 . ( .) -.), &).- ) ,/ #-" /- 1 " 0 &) - ) '*.3 -.), ! -* < , ) 1 ( &) - ) -.), ! -* /- 1 " 0 &). )

This review was done by Fahed Sabbagh – proud geek and passionate blogger. You can catch him wax poetic on all things geeky at www.nerdyface.com.

,/ #-" .) -.), < !/ -- #. 1),%- )." 1 3-6 & 0#(! /- #( ( ( & -- &))* ) &1 3- ( #(! '), ( '), 3. -8 " .>- 1"3 ."#- ')(." 1 >, #(-* .#(! 1 ) ." 0 #& & -)&/.#)(- .) ."#- #& '' 8

KINGSTON WIDRIVE

WD PASSPORT

SEAGATE GOFLEX DESK

The Kingston WiDrive provides a temporary WiFi based solution to those who do not have the luxury of opting for an SD Card. In other words, this one’s mainly for all of you iPhone users out there! You bought your device probably thinking “Why would anyone need more than 8/16/32 GBs of storage on their phone?� Then a few songs or movies later, you regret ever having said that. Why is an SD Card considered luxury compared to the Kingston, one might ask. Well, to use the WiDrive, you’ll need to connect to it using the WiFi on your phone or tablet, and then use a special app (iOS or Android) to access your data. On the other hand, the WiDrive then connects to your WiFi network, allowing you to use the internet using a WiFi passthrough feature. Now that’s a long workaround for those few extra bytes, and you’ll notice that your internet speed will drop dramatically when using the WiFi passthrough. All in all, we don’t think the WiDrive is a very practical solution, but at the moment, there is no other option for those who can’t simply connect an SD-Card. You might want to factor that when buying you next phone.

If you like to move your data around where you go, if you pride yourself on that music or movie collection and show it off to everyone you meet, this once for you. Compared to the early models of WD hard drives, this one is incredibly compact. Not that long ago, the 1 TB drive took at least eight times more space on your desk than the 2 TB drive would take with the new model. It fashions a USB 3.0 interface which gives it an incredibly fast transfer rate. No longer will you see any of those “70 hours remainingâ€? messages that Windows likes to torture you with. Mac users however will still have to suffer since this one doesn’t have support for FireWire, so they’ll be stuck with USB 2.0. The WD My Passport comes with a bunch of useful software tools for backup, security and a few other utilities. And you can set the backup feature to work automatically when your computer goes into idle mode. The Passport comes in ďŹ ve colours, and with capacities varying between 500 GB and 2 TB. It might considered a bit too pricy, but it’s an investment you won’t regret if you like to keep your data safe and mobile.

So you’re one of those who need tons of storage at the workstation? This one’s for you. The GoFlex Desk comes with a very interesting docking station that you plug your hard drive into, giving it more interface connectivity options and makes swapping disks a breeze. Mac users will love this since it supports FireWire 800 as well as USB 3.0, you can also use eSATA for incredible transfer rates. It also comes with great backup and encryption software utilities for Windows, not much however when it comes to Mac software. Maybe Seagate didn’t want to second guess TimeMachine which is understandable, however, an encryption solution is still missing on the Mac. The GoFlex Desk comes with capacities up to 4TB, a fair amount of storage to add to your machine. However this option is not very portable, weighing a little over 1 kg, you’ll need to keep this one stationed at your desk for most of the time. While some may consider it a little pricy, the GoFlex actually offers great value for money, considering the extra TBs you’re getting. Let alone the comfort you get knowing that your data is stored safely.

97


Last word

Next issue Network World

August 2012

Video conferencing - 0# ) )( , ( #(! ! #(- ., .#)( #( (. ,*,#- -5 &&) .#(! ( 1# ." .) ' ( ! /" ( -+ Q" ", -() (' +'7 "-! /" ( -.#' . .) )(-/' " & ) ( .1),% -+ Q" ,(('4 %(($, - 0 2, -( - ,)/( -)' ) ." .)* )( ,(- #( &/ #(! /- , %()1& ! ( .))&- .) ')(#.), * , ),' ( 8

Solutions World IaaS and PaaS – Middle East reactions 0 ( - ." 3 , )*. ,)-- ." 1),& 5 (-! ' + & "' '('8)+"(+"-" , (+ ." 0 , ! # & -. (. ,*,#- 8 -%- 1"35 ( ( &3- - ." " && (! - ." . (+ '", -"(', 0"-! ' "' ), , .) *, # . ." ')0 ' (. ) ." ' ,% .8

Telecoms World IPTV

Storage Advisor SANs in the enterprise – have their day come - -.), ! . "()&)!# - !) .",)/!" ' --#0 " (! -5 .,# - .) /( ,-. ( ." ,)& ( , & 0 ( ) - #( # & -. ),! (#- .#)(- ( 1" ." , ." 3 .) !#0 /* )( ." ' #- /*)( /- 3 .8

Security Advisor Next-gen ďŹ rewalls 1-8 ' Q"+ 0 %%, + ';- 1 -%2 )%. 8 ' 8

What we’re reading

Testing your partner )/ " 0 , & .#)(-"#* 1#." 3)/, * ,.( , ." . #- 1),%#(! 1 && ), 3)/ ()18 )1 0 ,5 ")1 ) 3)/ (-/, ." . 3)/, * ,.( , % *- , -. ) " (!#(! . "()&)!# - ( ! .- -! +" !- +-"Q" -"(', "' )% 9 Q"' , -)' .#*- ( .,# %- ), 3)/8

! ,';- %"/ .) -( "-, )+(&", ( () '"' /* ( 1 , 0 (/ -., '- ( ." * ( ., .#)( & 0 &- , -.#&& 3-' &&3 &)1 #( ." , !#)(8 #(0 -.#! . - # ." , #- , &&3 .,"' ,, , (+ "' -! " % ,- (+ )* , .),-8

Careers University proďŹ le/IT programme )+(Q"% , % "' .'"/ +,"-2 (+ *,)!, '' 1#."#( /(#0 ,-#.3 ,)' ." # & -. , !#)(8

Online

Lessons in IT Transformation Larry Bonfante

Book Having a LinkedIn proďŹ le is practically a requirement nowadays, but are you getting what you want out of it? Do you know what you want? Are you seeking job offers, consulting gigs, requests to speak? Breitbarth says lacking a goal is one of the biggest mistakes people make when signing up for the professional networking service. “If you don’t know why you are there, how are you going to come up with a strategy?,â€? he asks. Once you decide why you are on LinkedIn, you can ďŹ nd details in the book on how to use the site’s many functions to get the most out of the service.

Integration Advisor

The Power Formula for LinkedIn Success: Kickstart your business, brand and job search (Green Leaf Book Group Press)

The power formula for LinkedIn success Wayne Breitbarth

98

*& 3 0# -8 ! . 3)/ 0# ,)' #( /-.,3 2* ,.- - .) ")1 .) "))- ." ,#!". 0# ( ! . ." ')-. )/. #.8

Book The most valuable advice comes from someone who’s been where you are. Bonfante, CIO of the US Tennis Association, lays out practical tips for CIOs and relates anecdotes from his own career on why certain strategies work and why having one is so important. Bonfante, who writes in an open and personable tone, covers both largescale issues, such as communicating IT’s worth to the business, and smaller-scale problems like how to deal with an employer’s mistake without being demoralising. Lessons in IT Transformation: Technology Expert to Business Leader (Wiley)

), ." & . -. #( ( 1-5 ( &3-#-5 ./, -5 - -./ # -5 ( &)! ,.# & - )( ., ( - ( #--/ - #( ." #( /-.,3 ,)-- ." !&) ( #( ." # & -.5 *& - 0#-#


Maximise the benefits of virtualisation with Dell™ PowerEdge™ servers and Dell EqualLogic™ storage

Not all virtualisation deployments are the same You can deploy virtualisation on any server, but that doesn’t mean all servers are equal. Dell’s PowerEdge servers provide the best-performance virtualisation possible. They’re optimised for virtualisation across the entire portfolio — not just on blades — to meet your density, flexibility and performance needs, without locking you in to proprietary infrastructures.

Designed for performanceintensive applications Dell makes it easy to find the perfect tower, rack or blade servers – PowerEdge increased memory capacity and I/O rates for intense applications in demanding environments.

Manageable, scalable and flexible Choose from a range of options with easy configuration, powerful open-standards systems management, scalable storage and flexible services.

Windows Server® All PowerEdge servers run Windows Server to deliver rich, powerful features that help you complete your work also gain peace of mind knowing that the data on your personal computers, network and servers are highly protected. Together, PowerEdge and to get more out of your existing IT investments and deliver better service to your customers.

Contact your nearest Dell Authorized Distributors for further details: UAE: Aptec - Manojpk@aptecme.com, +9714 3697111, Mindware - Dell_sales@mindware.ae, +9714 4500600, Unatrac -Shamdy@mantracegypt.com, +97155 7204338 KSA: Aptec - Dell.sales@aptecsa.com, Riyadh (966 1) 4601950 Ext 1404, 06, 07, Jeddah (966 2) 2832365, Mindware - Dell_sales@mindware.ae, (966 1) 215 3126, Unatrac - AShabaan@mantracegypt.com, (966 5) 614 98556 Egypt: Aptec - Dell@aptec.com.eg, (202) 2648 1179, Mantrac - Ashabaan@mantrac.com.eg, (202) 3300 4178, Raya - Hesham_hassan@rayacorp.com, (202) 382 76000

Copyright © 2011 Dell Inc. All rights reserved. Dell Corporation Limited, Reg. No. 02081369, Dell House, The Boulevard, Cain Road, Bracknell, Berkshire RG12 1LF.



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.