Connect with us

Tech Features

The Role of Edge Computing and Spatial Data in Urban Development in the Middle East

Published

on

heriot watt

Dr. Fadi Alhaddadin, Assistant Professor, Mathematical and Computer Sciences, Heriot-Watt University Dubai.

As urbanisation accelerates in the Middle East, cities are evolving into hubs of innovation to address population growth, manage limited resources, and enhance quality of life. Smart cities are central to the region’s digital transformation, with the integration of spatial data and edge computing revolutionising urban planning. These technologies allow for distributed data processing at the network’s edge, reshaping the management of infrastructure, resources, and citizens. In this article, Dr. Fadi Alhaddadin explores the impact of edge computing and spatial data on the transformation of Middle Eastern cities, offering recent statistics and regional examples.

The Rise of Smart Cities in the Middle East

The smart city concept appeals to many countries in the Middle East as they work towards a better future reliant on technological innovations. Nations such as the UAE and Saudi Arabia have taken a leading role in these strategies by applying modern technologies in their cities’ administration, providing services, and maintaining living conditions.

This transformation has been accelerated by a key factor: edge computing. Edge computing refers to a computing architecture that processes data at its source, rather than relying exclusively on centralised cloud systems. By minimising latency and improving the quality of real-time outcomes, edge computing meets the demands of smart cities. It enables the integration of spatial data—information about the location of objects or events—into urban planning, infrastructure development, and the provision of public services.

Augmenting Infrastructure through Edge Computing

Infrastructure forms the foundation of any smart initiative, and the Middle East is increasingly leveraging edge computing to optimise the management of its critical systems. For roads, bridges, water, and energy grids, edge computing enables real-time monitoring and predictive maintenance, reducing operational costs and enhancing efficiency.

In Dubai, as part of the Smart Dubai program, edge computing has been integrated into the city’s urban infrastructure to manage traffic and promote public transport use. Sensors and IoT devices across the city enable real-time data collection, allowing traffic control systems to adjust signals, re-route vehicles, and swiftly reduce delays.

Moreover, NEOM, a smart city under construction in Saudi Arabia, is utilising edge computing to manage its transportation networks, nuclear facilities, and renewable energy grids. With a focus on real-time data analysis, NEOM aims to reduce energy consumption and create a fully sustainable urban ecosystem. Projections suggest that by 2030, this smart city could contribute up to $48 billion to Saudi Arabia’s GDP, showcasing the economic potential of embracing advanced technologies.

Optimising Resource Management

The third crucial aspect of urbanisation is efficient resource management, which, in the Middle East, largely involves handling limited natural resources like water and energy. The integration of edge computing and spatial data presents significant opportunities to optimise the use of these essential resources.

Adopting these technologies also supports the growth of the region’s renewable energy sector. Masdar City in the UAE, recognised as one of the world’s most sustainable urban areas, utilises edge computing to monitor and manage its solar power systems. By applying geospatial data on solar irradiance and weather conditions, Masdar City ensures its solar panels operate at peak efficiency. This reliance on renewable energy has enabled the city to reduce its dependence on conventional energy sources, with most of its power coming from sustainable resources.

Enhancing Citizen Engagement

One notable impact of smart city technologies is the improvement of citizen engagement. By leveraging edge computing to integrate spatial data, cities can better tailor their services to meet residents’ needs, enhancing overall efficiency. This fosters active participation and greater satisfaction among citizens, who can play a role in managing the urban environment.

Challenges and Opportunities

While the integration of edge computing and spatial data holds significant potential, it also presents certain challenges. The primary concern is data security and privacy, as the increased generation of data at the network’s edge raises the risk of cyber threats. To ensure the success of smart cities, robust cybersecurity measures must be put in place to safeguard the core systems.

Additionally, these technologies often require substantial investment in infrastructure, such as 5G networks and IoT devices. Achieving scalability and sustainability in smart city initiatives would demand collaboration between government and private sector stakeholders.

Despite these challenges, the opportunities far outweigh the risks. With the growing adoption of edge computing and spatial data, Middle Eastern cities are well-positioned to develop sustainable, resilient urban centers that prioritise citizens while driving economic growth.

Conclusion

The integration of edge computing and spatial data is fundamental to the Middle East’s vision for smart cities. These technologies are reshaping urban environments by improving infrastructure, optimising resource management, and boosting citizen engagement. Cities such as Abu Dhabi, Dubai, and Riyadh are leading the way, demonstrating how technology can create smarter, greener cities for the future. Although this transformation is still in its early stages, the region has the potential to become a trailblazer in the smart city revolution.

Cover Story

Why Tech Brands Need to Rethink Influencer Strategy in the Middle East

Published

on





The Middle East’s consumer technology market is in the middle of a remarkable run.
Smartphone shipments across the region grew 13 percent in 2025, marking a third consecutive year of growth. Ramadan alone now accounts for 15 percent of annual technology and durables sales across MENA. By any measure, the opportunity is significant.

But headline growth can hide an uncomfortable truth. The way consumers in this region evaluate and choose a technology brand has fundamentally changed. Brands still running the old playbook, buying reach from celebrity and mega influencers, measuring success in gross impressions, and treating the GCC as a single audience, are leaving both conversion and credibility on the table.

Mariam Abouzeid
PR & Influencer Marketing Manager, MEA, Nothing Technology

Having managed PR ecosystems generating billions of impressions across the UAE, Saudi Arabia, and beyond, I have seen this shift unfold in real time.

The data is clear. The market has moved. Many marketing strategies have not.

In today’s GCC market, attention is easy. Credibility is rare.

Beyond the Bigger-is-Better Logic

For most of the last decade, the dominant logic in technology marketing across the region was simple. Bigger reach meant better results. Secure the highest-reach influencers, maximize impressions, and sales will follow.

That logic made sense when social media behaved like a broadcast channel. Today it does not.

The UAE and Saudi Arabia are now among the most digitally saturated markets in the world. Social media penetration in the UAE has reached 111 percent of the population, while Saudi Arabia counts 34.1 million social media identities for a population of 34.7 million.

In markets this connected, audiences are no longer passive viewers. They are sophisticated, fast-moving, and deeply skeptical of content that does not feel earned.

Reach alone is no longer influence.

The Power of the Micro-Influencer By the Numbers

The consequences for influencer marketing are measurable. Macro influencers typically achieve engagement rates of around 1.7 percent. Nano influencers, those with between 1,000 and 10,000 followers, consistently deliver engagement rates of 6 to 8 percent in the UAE market.

When cost per engagement is considered, micro-influencer campaigns cost roughly $0.20 per interaction compared with $0.33 for macro campaigns. More importantly, they routinely deliver 5 to 8 times the return on investment, compared with the 3 to 5 times range typical of macro campaigns. The conclusion is simple.

Reach creates visibility. Trust creates action.

The Shift from Search to Social Feed

To understand why community-driven marketing works, it is important to understand how the modern GCC consumer actually makes a purchase decision.

It rarely begins with a search engine. It begins in the feed.

Nearly half of UAE users, 48.1 percent, and 60 percent of Saudi users now use social networks as their primary tool for researching brands and products. Before a consumer clicks add to cart, they have already passed through a quiet community validation process. They have watched unboxing videos from creators they follow and seen devices appear in the rhythm of everyday life.

Celebrity endorsements signal aspiration. Micro creators signal authenticity.

In consumer electronics, authenticity wins.

The Tiered Ecosystem: A Multi-Dimensional Strategy

The most effective technology marketing campaigns in the region now operate through a deliberate multi-tier structure.

Macro influencers are used sparingly to create cultural moments and announce major launches. Mid-tier creators establish niche authority and technical credibility. Micro-influencers carry the critical work of storytelling and product validation. The final layer, the nano tier, drives conversion through peer trust and cultural familiarity.

This distinction matters.

When consumers see a mega-influencer holding a new smartphone, they recognize an advertisement. When they see someone from their own community using the same device in everyday life, they recognize a recommendation.

That difference shapes behavior.

The GCC creator economy has grown 74 percent over the last two years and now includes more than 263,000 active influencers. Technology has become the fastest-growing vertical within that ecosystem. The pool of credible creators available to brands has never been deeper.

The Regional Calendar Geography Is Not a Strategy

One factor global marketing teams often underestimate is cultural timing.

The GCC is not simply a geography. It operates like a calendar.

Consumer spending in the UAE, Saudi Arabia, and Egypt increases by more than 53 percent during Ramadan. Campaigns that might perform modestly in a typical month can deliver outsized impact when creative work reflects the values and rituals of the season.

That kind of resonance can only be achieved by collaborating with creators who understand the culture from the inside.

Moving From Output to Outcomes

There is an uncomfortable truth at the center of the influencer marketing industry in this region.

Many brands are still measuring the wrong things.

Total impressions and cost per mile remain dominant metrics because they are easy to present in reports. But the shift required is from output metrics to outcome metrics.

The questions that matter are different.

What was the depth of engagement?
How many saves and shares did the content generate?
How much earned advocacy emerged from creators who chose to talk about the product because they genuinely valued it
?

Organic enthusiasm cannot be purchased. It can only be earned.

The GCC influencer marketing market is valued at $315.5 million in 2025 and is projected to reach $771.6 million by 2032.

The brands that will lead the next phase of this market will not simply be those with the largest budgets. They will be the brands that understand how their consumers actually make decisions, build disciplined influencer ecosystems, and measure the signals that truly drive behavior.

The Middle East tech consumer is one of the most digitally engaged and brand-aware audiences in the world. They expect strategies that reflect that sophistication.

Continue Reading

Tech Features

THE STRATEGIC PARADOX: HOW FRONTIER TECHNOLOGIES BOTH CREATE AND SOLVE GEOPOLITICAL RISK

Published

on

two different technology images placed side by side

EDITORIAL NOTE: This article is a jointly commissioned work of original analysis, co-authored by Subrato Basu and Srijith KN, and published by Integrator Media as part of its Technology Leadership Series. It does not constitute legal, regulatory, investment, or security advice, and does not represent the official policy position of Integrator Media, Oxford50, or The Executive Board beyond the views expressed herein. No specific government, organisation, or individual is alleged to have engaged in any unlawful activity. Published March 2026.

If geopolitical volatility has become a structural input into enterprise technology strategy, the next question for boards and technology leaders is unavoidable: how should organisations respond?

The answer lies in a paradox that receives far less attention than it deserves. The frontier technologies most exposed to geopolitical disruption, artificial intelligence, sovereign cloud infrastructure, quantum-resilient cryptography, and agentic automation, are simultaneously the most powerful tools available for building organisational resilience against that disruption. Leaders who focus exclusively on the exposure side of this equation miss the more strategically consequential point.

Consider artificial intelligence. AI deployments built on infrastructure subject to extended regulatory jurisdiction carry real compliance exposure, as described above. Yet AI is also the most powerful accelerant available for threat detection, compliance monitoring, scenario modelling, and operational automation, precisely the capabilities that strengthen an organisation’s ability to absorb and recover from geopolitical shocks. The organisations that will navigate this environment most effectively are not those that slow AI adoption in response to geopolitical uncertainty. They are those that architect their AI infrastructure with data sovereignty and workload portability as foundational design requirements from the outset, converting a potential liability into a structural advantage.

Sovereign cloud infrastructure, whether delivered through major hyperscaler in-country residency programmes or through emerging local and regional alternatives — provides a meaningful and structurally durable buffer against vendor-level geopolitical exposure. Organisations that made this architectural decision early, as a matter of governance principle rather than in response to a specific threat event, are today in a materially stronger position than those who deferred it.

Quantum-resilient cryptography is perhaps the most time-sensitive imperative in this landscape. Advisories from government security agencies across multiple jurisdictions indicate that adversarial state actors are running long-horizon data collection programmes, systematically harvesting encrypted data today for potential decryption as quantum computing capabilities mature. For financial services enterprises, critical infrastructure operators, and government-adjacent organisations, beginning a structured transition to post-quantum cryptographic standards is a present-day governance obligation. The window to act before exposure becomes irreversible is finite.

Agentic AI and intelligent automation reduce structural dependence on specialist talent pools that may be disrupted by geopolitically driven mobility constraints. Investment in operational automation is, simultaneously, investment in organisational resilience against workforce uncertainty.

What Well-Governed Organisations Are Doing Differently

We are deliberately wary of presenting action checklists as a substitute for genuine governance change. Checklists become compliance theatre, items filed, boxes ticked, actual posture unchanged. What follows is a description of what genuinely well-governed organisations are doing differently, drawn from patterns visible in board governance practice and publicly available reporting.

They Have Made Geopolitical Risk Structural, Not Episodic

The most consequential governance shift is a reclassification, not a new process. Well-governed organisations treat geopolitical technology risk as a standing monitored variable, with an owner, a defined monitoring cadence, and a clear escalation threshold, rather than a topic that receives board attention only when a crisis forces it onto the agenda.

 In practice: the CIO and CISO present a jointly owned, geopolitically aware technology resilience posture to the board at least twice annually, with scenarios explicitly modelled and stress-tested. Geopolitical technology risk appears in the enterprise risk register as a named, measured, and actively managed exposure.

They Have Mapped Their Exposure Before Needing the Map

A geopolitical technology risk assessment that maps the organisation’s most critical technology dependencies against regulatory jurisdiction exposure, relevant cyber threat vectors, and supply chain concentration risk is not a trivial exercise. But the organisations that have completed it, and kept it current through changing conditions,  hold a decisive governance advantage. They know where they are exposed. They have already made architectural decisions that reduce that exposure. They are not discovering their vulnerabilities now they are least able to address them.

They Have Built Infrastructure for Portability and Sovereignty

The infrastructure decisions that matter most in a geopolitically volatile environment are not made under crisis conditions. They are made two or three years before a crisis, when there is no immediate operational pressure to make them. Migrating sensitive and mission-critical workloads to locally hosted or sovereign cloud infrastructure, dual-qualifying strategic hardware suppliers across non-concentrated supply lines and implementing zero-trust security architecture are decisions that appear cautious or unnecessary in stable conditions. They appear prescient when conditions change. The organisations in the strongest position today are those that made these decisions as a matter of strategic principle, not reactive necessity.

They Have Tested Their Continuity Assumptions Against Realistic Scenarios

Business continuity plans that have never been tested against simultaneous, compounding geopolitical stress scenarios, vendor service disruption, connectivity constraints, talent mobility restrictions, and elevated cyber incident risk converging rather than arriving sequentially, are not fit for purpose in the current environment. The organisations we consider genuinely well-prepared have run structured tabletop exercises against these compound scenarios, found their gaps in controlled conditions, and closed them before an actual event demanded it.

BOARD READINESS: SIX QUESTIONS TO ASK THIS WEEK Can your organisation operate critical systems for 72 hours without dependency on infrastructure subject to potential extended-jurisdiction service suspension?Do you maintain offline backups of all critical data with regularly tested, documented, and rehearsed recovery procedures?Is your incident response retainer pre-authorised, contractually current, and explicitly scoped to include geopolitically-motivated threat scenarios?Have you documented manual fallback procedures for all AI-dependent and automated workflows?Is your supply chain inventory and vendor flexibility sufficient to sustain operations through a procurement constraint window of 60–90 days?Are your key technology vendors contractually required to provide advance notice before material service changes — and have you rehearsed your internal response to receiving such notice?

A Final Word: Preparedness Is the New Competitive Advantage

There is an argument we consistently find under-made in this space, because it tends to be buried beneath the risk and compliance framing that dominates most discussions of geopolitical technology governance. We want to make it plainly.

Organisations that embed geopolitical technology risk into their governance frameworks, that build sovereign infrastructure, harden their security posture, develop resilient local talent pipelines, and rehearse continuity scenarios against compound stress events, are not simply managing downside exposure. They are building a form of operational resilience and institutional credibility that becomes a genuine, durable competitive advantage at precisely the moments when the advantage is most valuable. When conditions deteriorate, prepared organisations keep operating. They hold the trust of customers and regulators. They are positioned to capture ground from competitors who were not ready.

The structural forces generating geopolitical volatility across the global technology landscape, the intensification of great-power competition, the normalisation of technology restrictions and counter-measures as instruments of statecraft, and the sustained deployment of cyber capabilities as tools of strategic leverage, are not resolving on any near-term horizon. For enterprises operating in or near the fault lines these forces create, a ‘wait and see’ governance posture is not a neutral position. It is a choice to carry exposure that is available to be reduced.

What this moment calls for is a board and CXO community willing to apply to geopolitical technology risk the same intellectual discipline, analytical rigour, and governance seriousness it applies to financial risk: modelling it explicitly, monitoring it continuously, stress-testing it regularly, and managing it actively rather than observing it passively. The organisations that do this work now will not merely survive the next escalation cycle. They will emerge from it operationally stronger, commercially more resilient, and holding the trust and confidence that defines long-term enterprise value.

Technology leadership has always required navigating a world more complex than the tools designed to govern it. The nature of that complexity has simply changed. The discipline required to meet it has not.

In a fractured world, operational resilience is not a risk management outcome. It is a competitive strategy. The organisations that understand this distinction will define the next generation of technology leadership.
SUBRATO BASU CEO, Oxford50  |  Global Managing Partner, The Executive Board Subrato Basu advises boards and senior technology leaders across industries on governance, risk, and enterprise strategy. He brings a practitioner perspective shaped by engagements across the Asia-Pacific region and beyond, with particular focus on technology governance, go-to-market strategy, and organisational resilience in complex operating environments.SRIJITH KN Senior Editor, Integrator Media Srijith KN is Senior Editor at Integrator Media, covering enterprise technology, cybersecurity, and digital transformation across the Middle East and Asia. He brings an editorial perspective drawn from tracking technology leadership decisions across markets in periods of rapid change, and a sustained focus on how organisations translate strategic risk into governance action.
Continue Reading

Tech Features

WHY SECURITY MUST EVOLVE FOR THE HYBRID HUMAN-AI WORKFORCE

Published

on

By Javvad Malik, Lead CISO Advisor at KnowBe4

There is a specific moment in every security professional’s career when they realise the traditional rulebook hasn’t just been ignored—it’s been torn to pieces. Mine arrived last week while watching a colleague engage in a debate with an AI agent over expense policy, while simultaneously being phished by what was almost certainly another AI posing as IT support.

For decades, the cybersecurity industry has clung to a comfortable, binary premise: humans work inside the walls, threats exist outside, and our job is to keep the two apart. It was a tidy worldview that made for excellent spreadsheets, even if we knew it was fiction.

Then, AI walked into the office without knocking. It’s a reboot of the classic 2010 iPad launch, where executives demanded connection to the corporate network, heralding the age of “Bring Your Own Disaster”.

The Multi-Species Workforce

The most uncomfortable truth facing modern organizations is that they no longer employ just humans.

Your current headcount includes Peter from Accounts Payable, his three AI assistants (two sanctioned, one very much ‘shadow’), a recruitment algorithm, and whatever experimental automation Marketing has hooked up to Slack to bypass a slow internal process.

They are all making decisions. And they are all sharing data.

When Peter’s AI hallucinates a rogue clause into a vendor agreement, or a chatbot leaks PII because a prompt-engineer asked nicely, where does the buck stop? Traditional security loves clean lines—User vs. Admin, Internal vs. External. But we are now operating in a world that has gone full analogue. We have created a workforce that is part human and part silicon, yet the risk remains entirely ours to manage.

The Futility of Punitive Security

Historically, we have managed security like a digital Alcatraz. If a user clicks a phishing link, we chastise them. If they use unapproved software, we discipline them.

But punishing people for being human is like shouting at water for being wet. It provides a few seconds of emotional release for the security team, but it doesn’t change the outcome. You cannot discipline your way to a secure culture, and you certainly cannot punish an AI agent into making safer choices.

So, what happens when your workforce is 60% human, 40% AI, and rising?

Navigating the Shadow AI Explosion

Shadow AI isn’t born from malice; it’s born from friction. Employees use unsanctioned tools because the approved versions are often slow, restrictive, and designed by people who think ‘user-friendly’ as a type of malware.

If your IT ticket for an AI request won’t be resolved until Q3 2027 but the free version of ChatGPT is open in a browser tab right now, the choice for a busy employee is a foregone conclusion.

To manage this hybrid reality, we need to view the workforce as a single, unified, complex adaptive system. Here is the framework for securing the blur:

  • Govern the Decision, Not the Entity: We need governance frameworks that apply to the action, regardless of whether the actor is carbon-based or cloud-hosted. If a human isn’t allowed to export customer data to a personal drive, their AI assistant shouldn’t be able to either.
  • Design for Invisible Perimeters: Assume you will never have 100% visibility again. Security must shift toward real-time behavioral monitoring and anomaly detection that tracks patterns across both human and machine activity.
  • Build Intuitive Culture, Not Just Compliance: You teach a child to cross the road by explaining traffic lights, not by screaming at them every time a car passes. The same applies here. You cannot train culture into an AI model, but you can design systems where humans and AI operate within a framework that makes security intuitive.
  • Treat Shadow AI as a Signal: If half your workforce is using unsanctioned AI, that isn’t a compliance failure—it’s a sign your current tools are failing your people.

The question is no longer if your workforce will become a hybrid of human and machine. It already is.

The real question is whether our security models will evolve to meet this reality, or if we will keep building expensive walls around a perimeter that vanished years ago. The workplace has changed; our job is to design security that works with human nature, rather than against it.

Continue Reading

Trending

Copyright © 2023 | The Integrator