About BI-ME

FEATURED REPORT...
Posted: 13-01-2006
Knowledge Management: “Identifying knowledge assets within an organisation and methods for developing and distributing knowledge through technology.” Peter Drucker once said: "The best way to predict the future is to create it."  Not many of us would disagree with this statement.  The question really is, rather, How?  How we can create our future? Sun Tze, a military scholar in China at around 400 BC, in his book The Art of War, identified two factors for success in military warfare: readiness (preparation) and knowledge. Armed with these factors, he wrote th
Posted: August 21, 2016
Posted: August 21, 2016
Posted: February 28, 2014
Posted: August 1, 2011
Posted: October 1, 2010
Posted: January 8, 2007
Here we provide a brief description of how to drill down to over 200 market reports online at BI-ME (11 industries and 16 countries plus consumer backgrounder or economic profile reports). All this is available at one click for BI-ME subscribers.
Posted: August 7, 2005
At BusinessIntelligence-Middle East we are committed to protecting your security/confidentiality.
Posted: February 23, 2005
BusinessIntelligence-Middle East (BI-ME) takes the privacy of its users seriously. We are committed to safeguarding the privacy of our users whilst providing a personalised and valuable service.
Posted: February 23, 2005

MIDDLE EAST BUSINESS COMMENT & ANALYSIS

date:Posted: August 17, 2017
UAE. Inaugural Global Interconnection Index finds interconnection becoming an essential building block of the global digital economy.
date:Posted: August 16, 2017
UAE. Jeff Youssef, Partner at Oliver Wyman and co-author of "Leveraging the Private Sector to Improve Airport Infrastructure", comments on airport privatisation in the region.
date:Posted: August 16, 2017
INTERNATIONAL. 2017 Emerging Technologies Hype Cycle garners insight from more than 2,000 technologies.
UAE. Cisco's security research organization Talos says once this ransomware enters your system, it uses three ways to spread automatically around a network, one of which is the known Eternal Blue vulnerability.
dhgate