Month: June 2015


DIFC – Campaign going LIVE.

Zooxel is currently going live with the Dubai International Financial Centre 10 year anniversary content hub. Following creatives can be found on

Modern Family:





Super Highway:



Rise of RMB:




Islamic Finance:



How the Cloud Will Transform Business by 2020 ?

Companies that don’t take advantage of cloud computing will be in the minority in less than six years. Here’s why.

The cloud can save you time and money, but it also has the potential to change the way you do business.

The percentage of small businesses using cloud computing is expected to more than double during the next six years, from 37 percent to nearly 80 percent, according to a study from consulting firm Emergent Research and financial software company Intuit.

While use of the cloud today is generally associated with the ability to reduce costs and improve efficiency, widespread adoption of this technology is projected to have a transformative effect on small businesses, but also on large companies and government organisations.

Here are four examples of small businesses that have fully adapted to the cloud:

Plug-In Players

These are businesses that plug into cloud-based service providers.


Hives refer to businesses that operate with employees working in different locations and companies that have increasingly flexible staff levels.


These are small businesses that are competing with major firms for business, a growing trend in the U.S., thanks in part to the cloud, according to the Emergent report. Airbnb is one example, but the same trend is taking place with small financial advisory firms.


Portfoloists are freelancers that rely on multiple income streams and use the cloud to manage these streams efficiently. Today, 30 percent of small business owners with less than 20 employees have at least one second job, according to Emergent. “We’re seeing more and more examples of this across the economy,” King says.

The Coming of Global Cyber War?

Experts say looming IT attacks could be catastrophic for global business and even cost lives.

Dawn of the cyber war. It sounds sensational, doesn’t it? A ripping title for the next zombie blockbuster.

But according to Russian IT whiz kid and anti-virus founder Eugene Kaspersky, the cyber aliens are already here. And soon they will be visibly monstrous.

Accordingly to Kaspersky, it’s not a question of when there will be a global cyber catastrophe, but ‘when’ and ‘how bad’.

Hundreds of industry experts gathered at the 2013 Kaspersky Cyber-Security Summit in New York City to discuss the future of cyber warfare and how the world can prepare itself against assault.

“Every industry can be a victim of an attack, from power companies and telecommunications to banks, transportation and the military,” said Kaspersky, founder and CEO of Kaspersky Lab.

“Some enterprises are facing thousands of attacks a day, while others wonder if they are going to be hacked or not. This will occur across all industries and infrastructures, and we have to think and accept that as a reality. We live in a dangerous world.”

Last week’s conference was timely amid US firms, including The New York Times, The Wall Street Journal and the Washington Post, falling victim to Chinese hackers.

The New York Times revealed its computer systems were infiltrated over a period of four months, during which time its reporters were investigating the personal fortune of Chinese premier Wen Jibao – a claim denied by the Chinese government.

Millions of Twitter and LinkedIn passwords have also been stolen by anonymous sources in the past few weeks.

China has been accused of mounting a widespread cyber-spying campaign for several years, and trying to steal classified information and corporate secrets.

According to experts, China, in particular, has become increasingly adept at disguising ‘bots’ and re-routing them through America to camouflage their origins.


Today, the level of entry for cyber warriors is much lower than traditional military warfare, but the consequences could be equally catastrophic

“Cyber weapons can easily be tampered with and used against innocent victims, especially because our infrastructures have been developed over 30 years ago and they haven’t been updated,” said Costin Raiu, director of global research and analysis at Kaspersky Labs.

“You can be sure that this will happen. And no one will take responsibility because cyber weapons are anonymous.”

Panellist Howard Schmidt, former cyber-security coordinator of the Obama Administration, pointed out that even the smallest blackout, say, of a routine ticketing machine at an airport, could lead to a domino-effect standstill as flights are delayed and chaos descends on the aviation industry. And this is just a relatively benign example.

Previously, hacking was largely the domain of criminals who would sell information to other criminals, but today it’s likely that that organised criminals are selling information to nation states, or that nation states themselves are perpetrating the hacking. Cyber hacking lends states and individuals a powerful economic and political edge.


Experts said the three dangers of cyber war are:

– Ideas from cyber weapons can be repurposed and copied

– Companies become collateral victims in the war between superpowers

– Cyber criminals start using weapons gleaned from governments and nation states.

To stem the coming cyber war, experts agreed that more IT security modules must be included in business education curricula.

The days of using ‘default’ or first names for passwords must end, said experts in a mounting cry against the lax consumer approach to security.

In a wider polemic, Kaspersky warned that global leaders must meet to sign an international treaty against cyber weapons. “There should be the same treaty as there is for nuclear and biological weapons, and a focus on finding the culprits,” he said.

But until the nation states have their own weapons used against them, there is little chance of the treaty being signed, said experts.

It will take Cyber World War I to make that happen.

High-Definition CCTV Cameras – The Future?

Quality surveillance is on the rise globally

Recent manufacturers figures show that by the end of 2012 the UK will have around 129,299 HD CCTV Cameras.

The HDCCTV Alliance has predicted that number would rise to over 3.7 million by 2016.

A shift from the use of analogue to digital equipment is also helping drive the quality of the images, the cameras capture.

Defenders of the technology note that it helps discourage crime and has helped law enforcement officers identify offenders.

An earlier report by the Integrated CCTV news site said that evidence gathered by surveillance cameras had helped secure some of the convictions that followed 2011’s London riots.

Manufactures are now using a range of techniques to improve image quality. For example a leading manufacturers product records images using the HDR (high dynamic range) dual-exposure process to capture more detail in an images’s shadows.

It allows owners to save up to 30 frames per second in 1080p quality video and uses an infrared filter to improve its performance at night.

The Local Government Association, which represents councils in England and Wales, highlighted the technology’s benefits.

‘Whether its tracking down a thug who brutally mugged an old lady, a vandal who trashed a war memorial or searching for a missing child, CCTV plays a crucial role in tackling crime and making people safer,’ said Mehboob Khan, chairman of the association’s Safer and Stronger Communities Board.

Campaign group Big Brother Watch reported in February that the local councils had spent £515m over the previous four years on CCTV operations and controlled at least 51,600 standard and high definition cameras.

The UK is far from being the only country to utilise the technology.

A study by RNCOS suggests the global CCTV market will be worth a staggering $23.5bn (£14bn) a year by the end of 2014.

It said that Asia and the Middle East would soon account for about one quarter of that market, with a large growing demand for the products in India and China.

It added the adoption of Internet-connected cameras meant that more footage was being stored of-site for longer periods of time, and that gigapixel camera technology would mean even higher quality images in the future.

Are biometrics the future for mobile phone ID?

Fingerprint scanners like Apple’s TouchID add another security layer to business devices

Past attempts to introduce biometrics into business have proved futile. When laptops featured fingerprint scanners years ago, one expert was able to bypass security using a gummy bear.

But now, improved and more accurate touch scanners are bringing biometrics back into the security domain. The convenience of Apple’s iPhone TouchID technology has appealed to the mass market, making it increasingly likely to appear in a corporate setting.

The idea of fingerprint scanners is also backed by vendors including Microsoft as an improvement to static passwords. As such, Windows 8.1 gives users the option to switch accounts and to pay for apps using this method. Meanwhile, Fujitsu is using fingerprint scanners on some of its laptops in Japan.

In the smartphone space, a wide range of devices – such as those made by HTC and Samsung – are likely to introduce scanners in the near future, while Google’s Android has already dipped its toes into biometric authentication.

Some businesses will look into multimodal biometrics, which features multiple methods of identifying the user, bringing down the potential for error. Devices such as the Xbox One are already doing this by combining elements including voice and facial recognition.

Mobile devices are thought to be the next big driver for biometrics, so it’s not surprising that authentication based on behaviour is another growing area. This type of biometrics can be based on elements such as typing behaviour, Thomas Bostrom Jorgensen, CEO of security vendor Encap, says: “The way you type can be used to build a profile and the device can then recognise the user.”