Gartner Identifies the Top 10 Strategic Technology Trends for 2019

The top 10 strategic technology trends for 2019 are:

Autonomous Things

Autonomous things, such as robots, drones and autonomous vehicles, use AI to automate functions previously performed by humans. Their automation goes beyond the automation provided by rigid programing models and they exploit AI to deliver advanced behaviors that interact more naturally with their surroundings and with people.

“As autonomous things proliferate, we expect a shift from stand-alone intelligent things to a swarm of collaborative intelligent things, with multiple devices working together, either independently of people or with human input,” said Mr. Cearley. “For example, if a drone examined a large field and found that it was ready for harvesting, it could dispatch an “autonomous harvester.” Or in the delivery market, the most effective solution may be to use an autonomous vehicle to move packages to the target area. Robots and drones on board the vehicle could then ensure final delivery of the package.”

Augmented Analytics

Augmented analytics focuses on a specific area of augmented intelligence, using machine learning (ML) to transform how analytics content is developed, consumed and shared. Augmented analytics capabilities will advance rapidly to mainstream adoption, as a key feature of data preparation, data management, modern analytics, business process management, process mining and data science platforms. Automated insights from augmented analytics will also be embedded in enterprise applications — for example, those of the HR, finance, sales, marketing, customer service, procurement and asset management departments — to optimize the decisions and actions of all employees within their context, not just those of analysts and data scientists. Augmented analytics automates the process of data preparation, insight generation and insight visualization, eliminating the need for professional data scientists in many situations.

“This will lead to citizen data science, an emerging set of capabilities and practices that enables users whose main job is outside the field of statistics and analytics to extract predictive and prescriptive insights from data,” said Mr. Cearley. “Through 2020, the number of citizen data scientists will grow five times faster than the number of expert data scientists. Organizations can use citizen data scientists to fill the data science and machine learning talent gap caused by the shortage and high cost of data scientists.”

AI-Driven Development

The market is rapidly shifting from an approach in which professional data scientists must partner with application developers to create most AI-enhanced solutions to a model in which the professional developer can operate alone using predefined models delivered as a service. This provides the developer with an ecosystem of AI algorithms and models, as well as development tools tailored to integrating AI capabilities and models into a solution. Another level of opportunity for professional application development arises as AI is applied to the development process itself to automate various data science, application development and testing functions. By 2022, at least 40 percent of new application development projects will have AI co-developers on their team.

“Ultimately, highly advanced AI-powered development environments automating both functional and nonfunctional aspects of applications will give rise to a new age of the ‘citizen application developer’ where nonprofessionals will be able to use AI-driven tools to automatically generate new solutions. Tools that enable nonprofessionals to generate applications without coding are not new, but we expect that AI-powered systems will drive a new level of flexibility,” said Mr. Cearley.

Digital Twins

A digital twin refers to the digital representation of a real-world entity or system. By 2020, Gartner estimates there will be more than 20 billion connected sensors and endpoints and digital twins will exist for potentially billions of things. Organizations will implement digital twins simply at first. They will evolve them over time, improving their ability to collect and visualize the right data, apply the right analytics and rules, and respond effectively to business objectives.

“One aspect of the digital twin evolution that moves beyond IoT will be enterprises implementing digital twins of their organizations (DTOs). A DTO is a dynamic software model that relies on operational or other data to understand how an organization operationalizes its business model, connects with its current state, deploys resources and responds to changes to deliver expected customer value,” said Mr. Cearley. “DTOs help drive efficiencies in business processes, as well as create more flexible, dynamic and responsive processes that can potentially react to changing conditions automatically.”

Empowered Edge

The edge refers to endpoint devices used by people or embedded in the world around us. Edge computing describes a computing topology in which information processing, and content collection and delivery, are placed closer to these endpoints. It tries to keep the traffic and processing local, with the goal being to reduce traffic and latency.

In the near term, edge is being driven by IoT and the need keep the processing close to the end rather than on a centralized cloud server. However, rather than create a new architecture, cloud computing and edge computing will evolve as complementary models with cloud services being managed as a centralized service executing, not only on centralized servers, but in distributed servers on-premises and on the edge devices themselves.

Over the next five years, specialized AI chips, along with greater processing power, storage and other advanced capabilities, will be added to a wider array of edge devices. The extreme heterogeneity of this embedded IoT world and the long life cycles of assets such as industrial systems will create significant management challenges. Longer term, as 5G matures, the expanding edge computing environment will have more robust communication back to centralized services. 5G provides lower latency, higher bandwidth, and (very importantly for edge) a dramatic increase in the number of nodes (edge endoints) per square km.

Immersive Experience

Conversational platforms are changing the way in which people interact with the digital world. Virtual reality (VR), augmented reality (AR) and mixed reality (MR) are changing the way in which people perceive the digital world. This combined shift in perception and interaction models leads to the future immersive user experience.

“Over time, we will shift from thinking about individual devices and fragmented user interface (UI) technologies to a multichannel and multimodal experience. The multimodal experience will connect people with the digital world across hundreds of edge devices that surround them, including traditional computing devices, wearables, automobiles, environmental sensors and consumer appliances,” said Mr. Cearley. “The multichannel experience will use all human senses as well as advanced computer senses (such as heat, humidity and radar) across these multimodal devices. This multiexperience environment will create an ambient experience in which the spaces that surround us define “the computer” rather than the individual devices. In effect, the environment is the computer.”

Blockchain

Blockchain, a type of distributed ledger, promises to reshape industries by enabling trust, providing transparency and reducing friction across business ecosystems potentially lowering costs, reducing transaction settlement times and improving cash flow. Today, trust is placed in banks, clearinghouses, governments and many other institutions as central authorities with the “single version of the truth” maintained securely in their databases. The centralized trust model adds delays and friction costs (commissions, fees and the time value of money) to transactions. Blockchain provides an alternative trust mode and removes the need for central authorities in arbitrating transactions.

”Current blockchain technologies and concepts are immature, poorly understood and unproven in mission-critical, at-scale business operations. This is particularly so with the complex elements that support more sophisticated scenarios,” said Mr. Cearley. “Despite the challenges, the significant potential for disruption means CIOs and IT leaders should begin evaluating blockchain, even if they don’t aggressively adopt the technologies in the next few years.”

Many blockchain initiatives today do not implement all of the attributes of blockchain — for example, a highly distributed database. These blockchain-inspired solutions are positioned as a means to achieve operational efficiency by automating business processes, or by digitizing records. They have the potential to enhance sharing of information among known entities, as well as improving opportunities for tracking and tracing physical and digital assets. However, these approaches miss the value of true blockchain disruption and may increase vendor lock-in. Organizations choosing this option should understand the limitations and be prepared to move to complete blockchain solutions over time and that the same outcomes may be achieved with more efficient and tuned use of existing nonblockchain technologies.

Smart Spaces

A smart space is a physical or digital environment in which humans and technology-enabled systems interact in increasingly open, connected, coordinated and intelligent ecosystems. Multiple elements — including people, processes, services and things — come together in a smart space to create a more immersive, interactive and automated experience for a target set of people and industry scenarios.

“This trend has been coalescing for some time around elements such as smart cities, digital workplaces, smart homes and connected factories. We believe the market is entering a period of accelerated delivery of robust smart spaces with technology becoming an integral part of our daily lives, whether as employees, customers, consumers, community members or citizens,” said Mr. Cearley.

Digital Ethics and Privacy

Digital ethics and privacy is a growing concern for individuals, organizations and governments. People are increasingly concerned about how their personal information is being used by organizations in both the public and private sector, and the backlash will only increase for organizations that are not proactively addressing these concerns.

“Any discussion on privacy must be grounded in the broader topic of digital ethics and the trust of your customers, constituents and employees. While privacy and security are foundational components in building trust, trust is actually about more than just these components,” said Mr. Cearley. “Trust is the acceptance of the truth of a statement without evidence or investigation. Ultimately an organization’s position on privacy must be driven by its broader position on ethics and trust. Shifting from privacy to ethics moves the conversation beyond ‘are we compliant’ toward ‘are we doing the right thing.’”

Quantum Computing

Quantum computing (QC) is a type of nonclassical computing that operates on the quantum state of subatomic particles (for example, electrons and ions) that represent information as elements denoted as quantum bits (qubits). The parallel execution and exponential scalability of quantum computers means they excel with problems too complex for a traditional approach or where a traditional algorithms would take too long to find a solution. Industries such as automotive, financial, insurance, pharmaceuticals, military and research organizations have the most to gain from the advancements in QC. In the pharmaceutical industry, for example, QC could be used to model molecular interactions at atomic levels to accelerate time to market for new cancer-treating drugs or QC could accelerate and more accurately predict the interaction of proteins leading to new pharmaceutical methodologies.

“CIOs and IT leaders should start planning for QC by increasing understanding and how it can apply to real-world business problems. Learn while the technology is still in the emerging state. Identify real-world problems where QC has potential and consider the possible impact on security,” said Mr. Cearley. “But don’t believe the hype that it will revolutionize things in the next few years. Most organizations should learn about and monitor QC through 2022 and perhaps exploit it from 2023 or 2025.”

See the full article: https://www.gartner.com/en/newsroom/press-releases/2018-10-15-gartner-identifies-the-top-10-strategic-technology-trends-for-2019

Source: by Gartner on October 15, 2018 

SETS and Huawei Sign a Strategic Partnership Agreement

SETS, a leading information technology company in the Middle East announced today the signature of a partnership agreement with Huawei a leading global information and communications technology (ICT) solutions provider.

Huawei is a leading global information and communications technology (ICT) solutions provider, with 180,000 employees, Huawei ICT solutions, products, and services are used in more than 170 countries and regions, serving over one-third of the world’s population. With continuous technologic innovation, Huawei Enterprise BG (Business Group) has been committed to fully leveraging the power of cloud computing, Software-Defined Networking (SDN), Big Data, and the Internet of Things (IoT) to build an open, flexible, resilient, and secure platform, and foster a collaborative and win-win ecosystem in which all players can thrive and prosper. Currently, a total of 197 of Fortune Globe 500, including 45 of the top 100, have chosen Huawei as their partner in digital transformation.

SETS has been appointed as the only Value Added Partner (VAP) in Lebanon with a focus to offer Huawei’s enterprise products portfolio and deliver professional services and support.

As part of this partnership, SETS will provide Huawei’s Data Centre Solutions, Networking Solutions and Unified Communications Solutions, offering its customers with a wide range of flexible and tailored solutions.

Commenting on this partnership, Mr. Maher Chahlawi, CEO at SETS said: “We are very pleased to be working with Huawei. This strategic partnership will offer new opportunities for our customers to benefit from leading technologies, a broaden portfolio along with an efficient TCO that will guarantee a confirmed ROI. We are committed to provide our customers with proven technologies that will enable them to deliver their key mission across all verticals.”

Mr. Hazem Bazan, VP of Channels & Commercial Sales, Huawei Middle East Region Enterprise Business Group commented: “It is an honor to collaborate with SETS, Huawei’s sole Value Added Partner (VAP) in Lebanon. This partnership is in line with Huawei’s strategy to empower local partners and build a collaborative ecosystem of partners to support the digital transformation in the region, and help build a Better Connected World.”

“Through our partnership, businesses and clients in the region will have access to our enterprise portfolio of innovative solutions, platforms and technologies that will enable them to thrive and achieve their strategic goals. As a leading global ICT solutions provider, Huawei is delivering on its long-term commitment to contribute to the digital agendas of the Middle East through partnering with leading information technology companies in the region.”

Digital Transformation took over Beirut as tech giants partnered together with SETS to discuss innovative solutions

SETS hosted the ‘Think Forward – Driving Digital Transformation’ event on February 7th, 2018 at the Kempinski Summerland Hotel, where Huawei, Commvault and Intel discussed innovative Tech solutions and introduced new strategies to achieve business Digital Transformation

The event closed with the Signing Ceremony for partnership between SETS and Huawei, and SETS and Commvault.

SETS Corporate Dinner

SETS celebrates the closing of a successful year and the beginning of a new prosperous one during a dinner ceremony held on January 6th 2018 at the Kempinski Summerland Hotel.

The event started with a word from the CEO, Mr. Maher Chahlawi and was followed by an entertaining dinner at the Pier 78 restaurant.

Looking forward for a promising and successful year!

Why are there so many myths circulating about cloud security?

Now’s the time to set the story straight and debunk the top cloud security myths once and for all.

There is a lot of nasty talk about cloud security solutions on the web. From calling them “inherently insecure” to branding them a as a source of imminent risk, the “folding arms gang,” or CISOs/CSOs in favour of maintaining legacy solutions and the on-premise model, have surely gone to town to cast a cloud over cloud security solutions. As a result, a number of myths about cloud security are spreading though the information security industry. Now’s the time to set the story straight and debunk the top cloud security myths once and for all.

Myth #1: “Cloud solutions are inherently insecure”

This is the most popular myth surrounding the cloud (and not just in enterprise), and mainly stems from the fact that cloud is a new infrastructure, can be public or hybrid, and has the qualities of being easily accessible and user-friendly. While employees love it, IT teams and network admins shiver a little when they think about the security implications cloud could have on their organisation.

However, beliefs aside, it is  clear that cloud solutions are safer than legacy solutions due to several factors. The first, and maybe the most important, is that the cloud removes the need for manual firmware updates, configuration changes, and penetration testing. When legacy systems are updated, this causes system downtime and creates a potential point of entry for hackers. Cloud solutions, on the other hand, are updated remotely by the service provider and there’s usually no down time during updates. With cloud security solutions, employees can keep up business as usual while hackers are blocked from accessing points of exploitable vulnerability. One survey found that 64 per cent of enterprises consider cloud infrastructure a more secure alternative to legacy systems.

Myth #2: “The cloud is too new to be trusted”

Similar to the sentiments of the first myth, fans of legacy systems are wary of cloud security solutions because they are still relatively new and “innovative.” According this this logic, cloud security solution providers are still working out the bugs, and when it comes to sensitive information and access credentials, it’s too risky to put a company’s “crown jewels” in their hands.

Despite these concerns, the rapid rate of cloud security solution adoption shows that many CISOs/CSOs are deciding otherwise. From healthcare to IT, enterprises small are large are deploying cloud-based security solutions for everything from human resource management to enforcing network security controls. Indeed, one survey found that 70 per cent of organisations (surveyed) have at least one application in the cloud. Another survey found that 90 per cent of businesses (surveyed) in the US use cloud infrastructure. With impressive numbers like these for cloud adoption, it seems that some of the folding arms gang’s arguments are outdated.

Myth #3: Productivity apps are one thing; security is another

Another common argument compares apples with oranges, or the role of cloud-based productivity apps with security solutions. The logic is that productivity apps have positive effects on organisational efficiency, their level of security vulnerability is low, while the same cannot be said of security appliances. Security appliances in the cloud put an organisation’s main value proposition at risk and in the hands of an external organisation that may do what they please with the information. So, while productivity apps like Salesforce and Google Cloud are welcomed tools, taking security appliances to the cloud is an entirely different story.

The major pitfall of this myth is essentially that this is an unfair comparison; productivity apps have one purpose while security appliances have another. Indeed, while the information and credentials stored on productivity apps might be of lesser “security” importance to the organisation, they still need effective security solutions to protect that information and currently, those solutions are also cloud-based. With a cloud-based network access control solution, for example, the organisation can control access to all endpoints, including BYOD, IoT, virtual and cloud applications. With complete visibility into what information is being shared and by who, deploying a cloud-based security solution may in fact be the only way for IT teams to protect information and prevent unauthorised access to assets.

Myth #4: IT teams need to be re-educated to deploy cloud

The idea here is that enough efforts are spent on educating employees about relevant cyber threats that taking the time to re-educate and shift IT teams’ security appliances into the cloud would be too much to handle. IT teams are already used to deploying, maintaining, upgrading and servicing legacy hardware/software systems that a shift to cloud-based security would throw the organisation off.

While no one is saying that all systems need to be moved to the cloud, there is no denying that on-premise appliances, and security appliances, in particular, take a good deal of time and resources to maintain. It’s estimated that each year, organisations devote up to 70 per cent of their IT budget to maintaining legacy software, and that’s just the maintenance. Transitioning to cloud solutions not only helps organisations cut costs, helping them move from capital expenditure on legacy systems to a more realistic model of operational expenditure based on use, but also creates notable benefits for IT teams. Instead of investing their efforts in maintenance, IT teams free up time to engage in more productive tasks that contribute directly to their organisation’s value proposition – such as creating cyber and social engineering education programs. The bottom line is that transitioning to cloud might seem like a pain in the neck at first, but in reality, it is helping organisations cut costs and devote time to more meaningful projects.

Myth #5: Cloud solutions can’t help with compliance

A major source of what is known as the “IT headache” is implementing compliance initiatives and protocols. Legacy systems have done their part in covering the compliance bases, but with their rigid architecture, it’s hard for CISOs/CSOs to keep up with rapidly evolving international and industry-wide standards. That said, fans of legacy solutions don’t believe that cloud solutions are the answer because they are a source of cyber vulnerability that stand in the way of organisations’ achieving their compliance goals.

Yet the opposite is very much true. Cloud solutions, from Google Cloud to Amazon Web Services to Azure, know how important an issue compliance has become and have integrated compliance enforcement and audits into their infrastructure. Of course, this doesn’t mean that organisations don’t have to remain aware of relevant compliance protocols, but it is making it a bit easier to compile reports and stay on track with initiatives. By choosing a cloud-based security solution, CISOs/CSOs are not only relieving a great deal of stress tied to the auditing process, but are doing their part to minimise critical digital business risks.

The (secure) cloud is here to stay

According to Gartner, “By 2020, a corporate ‘no-cloud’ policy will be as rare as a ‘no-Internet’ policy is today,” which is a statement to the progress already made in implementing cloud solutions. In the case of security solutions, in particular, it’s time for CISOs/CSOs to start thinking out-of-the-box (literally) about how they can best make their digital transition. And with cyber threats constantly evolving, comprehensive cloud-based security solutions for access control and risk monitoring are a great place to start.

Source: by Ofer Amitai on August 7, 2017 – http://www.itproportal.com/features/why-are-there-so-many-myths-circulating-about-cloud-security/

How to Clear Your Cache on Any Browser

 

Untitled3

What can you do to keep your past visits hidden? Delete it. Regularly. Or perhaps the smartest move of all: make sure it is never even stored. It may make your Web travels a little less convenient, but that’s the price of security. Here’s how to remove the history.

 

PC Browsers

Google Chrome
Go to the three-dot menu at the upper-right of Chrome to select Settings > Show advanced settings > Clear browsing data (or in the omnibar type “chrome://settings/clearBrowserData” without the quotation marks). This takes you directly to the dialog box to delete not only the history of your browsing, but also your download history (it won’t delete the actual downloaded files), all your cookies, cached images and files (which help load pages faster when you revisit), saved passwords and more. Better yet, you can delete only the info from the last hour, day, week, month, or all of it to “the beginning of time.”

531216-google-chrome-browser-data-delete

Chrome doesn’t give you the option to not collect your browser history, or set a window for how much it should hold. It just collects and collects until you go in and delete it.

What’s more, if you have a Google account and are signed into it with Chrome, your history is likely being synced to Google My Activity. While it should be secured behind your Google account (use a password manager and two-factor authentication for the best protection), if you truly wish to be rid of history, go here, select the hamburger/three-dot menu up top > Activity Controls to turn off the inclusion of Chrome browser activity (from desktops and handhelds), as well as delete any activity synced with the service.

Opera
Under the main menu in Opera, go to Settings > Privacy & Security. You’ll see a Clear browsing data button that offers almost identical settings as Chrome, right down to the “beginning of time” option. (You can also type “opera://settings/clearBrowserData” into the address bar.) It’s similar because Opera is built with the engine from the Chromium Project, the same that underlies Chrome. Opera offers a little extra to those who want to go around the Web safely however—a built-in VPN option courtesy of SurfEasy, also found in the Privacy & Security settings.

Microsoft Edge and Internet Explorer
Go to the three-dot menu in Microsoft Edge and select settings; in the fly-out menu, click the button under Clear browsing data that reads “Choose what to clear.” Get rid of browsing and download history, cookies, cached data, stored form data, and stored passwords; click Show more and you can delete things like sites you’ve given permission to show pop-ups.

You can’t delete just one chunk of data from a time period like a day or week, but there is the option to “Always clear this [data] when I close the browser.” That ensures you have no browser history stored, as long as you close the browser regularly. Pick more data types and you’ll have next to nothing stored—which is fine until you’re entering the same passwords and 2FA logins over and over (the price of freedom, people).

531553-edgebrowser-clear.jfif

Like Google, Microsoft is keeping some of your history online. Click Change what Microsoft Edge knows about me in the cloud to visit a page for your Microsoft account where you can delete that synced browsing history. You can also delete search history at Bing.com, stored location data showing where you’ve logged in, and stuff you’ve stored in Cortana’s notebook.

Still using Internet Explorer (IE)? You’re not alone. To wipe the history in IE11 and 10, go to the Gear icon at upper left and select Internet Options. On the General tab, you can check a box next to Delete browsing history on exit, or click the Delete button to instantly get rid of history, passwords, cookies, cached data (called Temporary Internet files and website files), and more. If you instead click Settings, you go to a History tab and ensure your history is only collected for a specific number of days, automatically deleting anything older.

You have the option to get rid of your browsing history using the Favorites Menu. Click the star on the top-right > History tab. There, you can see websites you visited on specific dates (Today, Last Week, 3 Weeks Ago, etc.) Right-click to delete everything from a specific time period, or click to view and delete specific websites. If you’re using an older version of IE, there are instructions online for deleting the history.

Safari

On macOS, Safari rules. Clearing your website visit history is simple: click Clear History in the main menu. Then in the pop-up, pick a timeframe for how far back you want to erase. This is doing a lot more than deleting the browser history, however—it also takes out your cookies and data cache.

531215-safari-history

You can instead click History > Show History to get a pop-up displaying every site you’ve visited, then take out sites individually, without losing the cookies and cache. You can zap cookies by going into Preferences > Privacy; delete your cache by going to the Develop menu and picking Empty Caches. If you don’t have a Develop menu in Safari, go to Preferences > Advanced and check Show Develop Menu in Menu Bar at bottom.

Mozilla Firefox
The latest version of Firefox likes to use sidebars for accessing preferences, much like Microsoft Edge. Access them at the hamburger menu (at upper right) and you can go right to History. It’ll show all your visited sites and a Clear Recent History option (or hit Ctrl+Shift+Del for the same effect). If you select Options in that sidebar, you can go into preference for either remember history, never remember, or do some custom settings, such as always go into private browsing mode, or never store history or cookies, or to clear the history when closing Firefox.

531222-firefox

Check the Sync tab while you’re in here—if you’ve signed on with a Mozilla Firefox account—your history (plus bookmarks, tabs, passwords, and preferences) may be synced with your other PCs and devices using Firefox, even on smartphones.

Bonus: CCleaner

Want to delete browser history on multiple browsers at once? Piriform’s CCleaner (which comes in a free version) deletes all sorts of stuff off a drive to give you back some storage space. It also erases select data in many programs—and that includes browser histories in Microsoft Edge, IE, Chrome, Firefox, and Opera. If you use CCleaner for Mac, it performs its magic on Safari. If you’re a multi-browser user on the desktop, it’s the fastest way to cover those tracks. Make it part of your routine of hard drive cleanliness.


Mobile Browsers

Safari

On the iPhone and iPad, Safari is the standard browser. To not record a browser history, you can just stay in Private mode while surfing. When you do have a history to delete, go to Settings > Safari > Clear History & Website Data. Doing this not only takes out the history, but also cookies and other stuff. Plus, if the phone is signed into iCloud, it clears the history on iCloud as well as on other devices hooked into that iCloud account.

531220-safari-mobile

If you want to only delete data for select sites, go back to Settings > Safari and scroll down to Advanced > Website Data. After it loads (it can take a while) you’ll see a listing of every website you’ve visited—and probably a lot you didn’t, because it also records the sites serving third-party cookies. Click edit > minus symbol next to each to delete, or just swipe left for the same function.

Chrome
Google’s Chrome browser is the standard with all Android phones, and is downloadable on iOS. In either, go to the three-dot (horizontal ellipsis) menu, select History, and you’re looking at the list of all sites you’ve visited while cognito (as opposed to Incognito)—and that includes history across all Chrome browsers signed into the same Google account.

With iOS, you have the option to either click Edit or Clear Browsing Data at the bottom. If you click the latter (which is the only option on Android phones and tablets), you’re sent to a dialog box (below) that allows the eradication of all browsing history, cookies, cached data, saved passwords, and autofill data—you pick which you want to delete. Android users get the added ability to limit deletion to an hour, a day, a week, a month, or the legendary “beginning of time.”

531218-chrome-mobile

Again, check My Activity later to see what may be stored online.

What’s more, on iOS, there is a completely separate Google app for searching (iOS, Android), with its own integrated browser. You can’t delete the history of surfing within that Google app, though you can close all the tabs by clicking the Tabs icon at upper right, swiping one floating window right to delete, then clicking CLEAR ALL. That app’s search history is stored at My Activity, of course.

Firefox
The Firefox browser is available for iOS or Android, free on both platforms. How you delete the browser history in each is a little different.

On iOS, tap the hamburger menu in the bottom center and select Settings. Scroll down to Clear Private Data, and on the next screen you can turn off collection of browser history (or data caching, cookies, and offline website data) entirely. Click the Clear Private Data link at the bottom to clear all of the above. Note in Settings there is also a toggle to Close Private Tabs, which shuts them all down when you leave the browser, should you be using such tabs o’ stealth.

On Android, Firefox is back to the three-dot menu at upper right. Select History to see the list, and click CLEAR BROWSER HISTORY at bottom to nix them all from existence. If you click the menu and go to Clear private data, you get a more granular way to delete browsing history, search history, downloads, form history, cookies, cache, and more. If you go to Privacy, you get the option to clear the private data of your choice whenever you quit the browser.

531554-firefox-mobile.jfif

Dolphin

A specialized browser for mobile use on iOS and Android, Dolphin has features like an built-in ad blocker, gestures controls, and add-on extensions. In Android, click the Dolphin icon in the toolbar and select Clear data. You’ll get a choice of deleting browser history, cached data, cookies, form data, passwords, and location info. If you click into Settings, you can scroll down and under Data, choose Always clear data when exiting, then set it up to delete history, cache, cookies or any combination of the three. On iOS, click the hamburger menu at the bottom. There is no direct Clear data link, but you can get to it in Settings.

531555-dolphin.jfif

If you never want to leave a trace or have a history, download Dolphin Zero Incognito Browser instead of the standard version.

Opera
It’s on iOS and Android, naturally. In fact, Opera for Android comes in two versions—a standard version and Opera Mini, which sends all websites and graphics through Opera servers to get compressed before you read them. Opera Mini is also on iPhone and even Windows Phone.

To clear history in Opera Mini on iPhone, swipe right from the Speed Dial menu to access browsing history and click the trash icon to delete it. On any version, click Opera’s O menu, select the gear icon; once in Settings, scroll to Clear Browsing data (or just Clear on iPhone). Select passwords, history, or cookies to delete instantly.

On Android, go to Advanced to turn off the collection of cookies and passwords, but not of browser history; cookies is the only option you can choose not to track on iOS. Stick to using private tabs if you’re visiting sites that you don’t want a history of.

You can do much the same in the standard Opera browser for Android (the one that doesn’t compress pages), by going to the hamburger menu and selecting Clear browsing data.

531223-opera-mobile

Source: by PC Mag ME Team on February 2, 2017 – http://me.pcmag.com/browsers/10272/feature/how-to-clear-your-cache-on-any-browser

SETS to Offer Innovative Biometric Devices through TBS

SETS, the leading provider of Human Resources Management System (HRMS), announced today the signature of a strategic partnership agreement with TBS, the Swiss specialist in access control and Time Attendance devices, through Allegion the Global Distributor of TBS worldwide.

Headquartered in Switzerland, Touchless Biometric Systems (TBS) offers flexible, reliable and functional access control and time recording devices. The fingerprint systems from TBS combine unparalleled identification performance with impeccable hygiene and user friendliness. This technology edge has its greatest impact when high levels of security or large user groups are the order of the day.

This strategic partnership will enable SETS to broaden its portfolio with a wide range of innovative security and control systems allowing its customers to select the solution that best meets their needs and benefit from the latest technologies in biometric devices. TBS products are manufactured in Switzerland guaranteeing quality and sustainability. Moreover, TBS has been recognized as one of the 20 fastest growing Access Control companies worldwide.

Commenting on this partnership, Alex Zarrabi, CEO at TBS said: “We are excited to penetrate the Lebanese market through SETS, a renowned HRMS leader in the region. With more than 25 years of experience in the biometric field, SETS has proved to be a major player in the market and the right partner to support TBS activities and expansion.”

Maher Chahlawi, CEO at SETS added: “We are always eager to introduce state-of-the-art technologies to our customers through partnering with pioneering international brands such as TBS. This partnership will enable our current and new customers to benefit from cutting-edge biometric devices made in Switzerland.”