Connect with us

Tech Features

Tech’s Big Bang in 2025: AI is the Spark Igniting a New Era

Published

on

Dell

By John Roese, Global Chief Technology Officer and Chief AI Officer – Dell Technologies

The year is 2025, and we’re witnessing the technological equivalent of the “big bang” with AI at the epicenter of how we live, work and play. Just as the universe expanded rapidly after its inception, technology is exploding into new realms, redefining industries and reshaping our future. Whether you’re a tech enthusiast, business professional, innovator or student, understanding these shifts is vital to navigating this brave new world.

The Rise of Agentic AI Architecture

“Agentic” will be the word of the year in 2025. The birth of agentic AI architecture marks a new chapter in human-AI interaction. Generative AI (GenAI) tools are evolving to enable AI agents, which are poised to revolutionize how we engage with AI systems.

In the consumer world, we’ve seen early agent approaches with virtual assistants, chatbots and navigation apps. In 2025, a new, more advanced set of agents will emerge. These agents will operate autonomously, communicate in natural language and interact with the world around them, including working in teams of other agents and humans. They will also be fine-tuned and optimized to perform assigned, specific skills, like coding, code review, infrastructure administration, business planning and cybersecurity.

AI agent systems will feature diverse cognitive, orchestration, and distribution architectures tailored to specific tasks. As complexity grows, multi-agent systems will emerge, requiring the rapid evolution of tech stacks to support agentic systems effectively.

To realize AI’s full potential and the rise of agentic architecture, enterprises must upgrade infrastructure – everything from data centers to AI PCs. This distributed infrastructure optimized for agentic AI can address security, sustainability and capacity considerations by distributing the AI workload across the entire IT infrastructure (cloud, data center, edge, and device).

Scaling Enterprise AI From Concept to Reality

Enterprises are poised to take AI from ideation to scale. Enterprise AI is simply the application of AI technology to a company’s most impactful processes in its most important areas to improve the productivity of the organization. It requires customers to answer two important questions:

  • First, what problem am I trying to solve? Developing a framework to prioritize AI efforts to the most important, impactful areas is critical.
  • Secondly, how do I solve that problem? AI solutions implemented as random projects on random tools do not scale. Instead, enterprises must determine the minimum set of AI systems needed to build a reusable and scalable AI foundation. This allows them to solve the first set of critical AI problems, and then leverage that investment to solve all future AI problems.

At Dell, for instance, our priority areas are our global supply chain, our services capability, our sales engine and our R&D capacity. Any impact on these areas results in significant ROI over other areas like HR, finance and facilities.

Next, enterprises should look at specific processes in its priority areas. For example, if process analysis uncovers an opportunity not in how salespeople interact with customers, but in how much time they spend gathering content for the customer meeting, that’s a clear AI project. GenAI can be used to automate and accelerate content discovery and creation work. In this case, the ROI is clear: shift sellers’ time back to customer-facing activities and increase revenue.

To execute prioritized projects, enterprises today have multiple off-the-shelf tools from which to choose. So, in 2025 the preferred path is to buy and implement AI tools in their private infrastructure. They can also buy tools that accelerate data modernization (data meshes, for example), and with the Dell AI Factory advancements over the past year, the infrastructure is now simple to adopt and implement.

In 2025, we have clear, repeatable approaches for prioritization and more turnkey and well-defined AI platforms and AI infrastructure options. 2025 is a year when it simply becomes easier to know what to do and how to do it when adopting AI in the enterprise space.

Sovereign AI Accelerates Global Adoption

Sovereign AI efforts are accelerating AI adoption worldwide. This concept revolves around a nation’s ability to create AI value and differentiation using its own infrastructure and data, designing an ecosystem aligned with local culture, language and intellectual property. In an era where data security is paramount, countries are opting for sovereign AI strategies and solutions, often with strong collaboration between the public and private sectors.

Instead of AI systems exclusive to governments, some countries are developing national AI resources to serve both government and local private industry, providing access to compute power and data capacity. Others are implementing a coherent national strategy where governments do not necessarily build new infrastructure but instead proactively and collaboratively co-design and encourage private industry to modernize and lead AI ecosystems.

Sovereign AI empowers nations to increase accessibility, protect critical infrastructure, drive economic growth, and enhance global competitiveness. By fostering the development of AI, it accelerates its adoption. We’re seeing growing investments directed toward infrastructure, data management, talent cultivation, and ecosystem development – and we fully expect to see this trend continue in the years ahead.

AI and the Fusion of Emerging Technologies

AI’s true potential lies in its connections with other emerging technologies. While AI itself is transformative, its impact multiplies when combined with quantum computing, intelligent edge, Zero Trust security, 6G technologies and digital twins, to name a few. This fusion creates a dynamic environment ripe for innovation and addressing existing challenges.

For instance, quantum computing in collaboration with AI will significantly impact most industries by providing the computing capability needed to scale AI to domains where classical computing struggles – likecomplex material science, drug discovery and complex optimization problems.

AI and telecom are already coming together to transform how cellular networks operate and how fundamental elements of these systems, like spectrum optimization, work. Even the future of the PC is influenced by AI, as we now see the AI PC not just as a client device but part of the end-to-end AI infrastructure. With agentic architectures, we expect to shift agents out of the data center and onto the edge or to the AI PC.  

Zero trust security and AI also are intersecting. Zero trust architectures are the best path to a better, more secure world and implementing zero trust in brownfield legacy IT is hard. In contrast, AI infrastructure is new and greenfield. We expect customers to adopt zero trust by default in new AI factories for optimal security. Given the criticality of AI, that is a good thing for all of us.

AI Becomes an Essential Skill for Everyone

AI will become an indispensable tool across professions and industries. Much like past technological advancements, AI is poised to transform the job market. Routine, task-oriented roles may diminish, but new opportunities will arise, such as software composers, AI content editors and prompt engineers.

Recent surveys reveal 72% of IT leaders identify AI skills as a critical gap requiring immediate attention. Organizations must invest in developing their workforce’s AI fluency. AI skill development will be focused on defining the AI/human relationship where AI completes more of the tasks, but people define what needs to be done. This allows professionals to focus on higher-level tasks, critical thinking and complex problem-solving.

With AI, it’s not just about the work that goes away, it’s about the new roles humans play in shaping, directing and leading AI work. AI-enabled businesses can use the evolution of the human-machine relationship to accomplish tasks in different ways and expand the art of the possible.

AI is Tech’s Grand Evolution

Just as the Big Bang set the stage for the development of galaxies, stars and planets, the rapid growth of AI is creating new opportunities, industries and ways of living and working.

As we approach 2025, we predict enterprise AI adoption will accelerate dramatically in the coming year. We’re seeing better processes, better tools and a stronger ecosystem. At Dell, our initial AI projects have scaled successfully and demonstrated the potential for ROI is real. We predict the rest of the enterprise ecosystem will quickly follow suit.

For CIOs, staying informed and adaptable will be essential. Organizations must prioritize AI fluency, invest in talent development and explore innovative solutions to remain at the forefront of this tech revolution.

The future belongs to those who can harness the power of AI. Whether you’re a business executive, tech enthusiast, or innovator, the time to act is now. The impact will be profound.

Cover Story

Why Tech Brands Need to Rethink Influencer Strategy in the Middle East

Published

on





The Middle East’s consumer technology market is in the middle of a remarkable run.
Smartphone shipments across the region grew 13 percent in 2025, marking a third consecutive year of growth. Ramadan alone now accounts for 15 percent of annual technology and durables sales across MENA. By any measure, the opportunity is significant.

But headline growth can hide an uncomfortable truth. The way consumers in this region evaluate and choose a technology brand has fundamentally changed. Brands still running the old playbook, buying reach from celebrity and mega influencers, measuring success in gross impressions, and treating the GCC as a single audience, are leaving both conversion and credibility on the table.

Mariam Abouzeid
PR & Influencer Marketing Manager, MEA, Nothing Technology

Having managed PR ecosystems generating billions of impressions across the UAE, Saudi Arabia, and beyond, I have seen this shift unfold in real time.

The data is clear. The market has moved. Many marketing strategies have not.

In today’s GCC market, attention is easy. Credibility is rare.

Beyond the Bigger-is-Better Logic

For most of the last decade, the dominant logic in technology marketing across the region was simple. Bigger reach meant better results. Secure the highest-reach influencers, maximize impressions, and sales will follow.

That logic made sense when social media behaved like a broadcast channel. Today it does not.

The UAE and Saudi Arabia are now among the most digitally saturated markets in the world. Social media penetration in the UAE has reached 111 percent of the population, while Saudi Arabia counts 34.1 million social media identities for a population of 34.7 million.

In markets this connected, audiences are no longer passive viewers. They are sophisticated, fast-moving, and deeply skeptical of content that does not feel earned.

Reach alone is no longer influence.

The Power of the Micro-Influencer By the Numbers

The consequences for influencer marketing are measurable. Macro influencers typically achieve engagement rates of around 1.7 percent. Nano influencers, those with between 1,000 and 10,000 followers, consistently deliver engagement rates of 6 to 8 percent in the UAE market.

When cost per engagement is considered, micro-influencer campaigns cost roughly $0.20 per interaction compared with $0.33 for macro campaigns. More importantly, they routinely deliver 5 to 8 times the return on investment, compared with the 3 to 5 times range typical of macro campaigns. The conclusion is simple.

Reach creates visibility. Trust creates action.

The Shift from Search to Social Feed

To understand why community-driven marketing works, it is important to understand how the modern GCC consumer actually makes a purchase decision.

It rarely begins with a search engine. It begins in the feed.

Nearly half of UAE users, 48.1 percent, and 60 percent of Saudi users now use social networks as their primary tool for researching brands and products. Before a consumer clicks add to cart, they have already passed through a quiet community validation process. They have watched unboxing videos from creators they follow and seen devices appear in the rhythm of everyday life.

Celebrity endorsements signal aspiration. Micro creators signal authenticity.

In consumer electronics, authenticity wins.

The Tiered Ecosystem: A Multi-Dimensional Strategy

The most effective technology marketing campaigns in the region now operate through a deliberate multi-tier structure.

Macro influencers are used sparingly to create cultural moments and announce major launches. Mid-tier creators establish niche authority and technical credibility. Micro-influencers carry the critical work of storytelling and product validation. The final layer, the nano tier, drives conversion through peer trust and cultural familiarity.

This distinction matters.

When consumers see a mega-influencer holding a new smartphone, they recognize an advertisement. When they see someone from their own community using the same device in everyday life, they recognize a recommendation.

That difference shapes behavior.

The GCC creator economy has grown 74 percent over the last two years and now includes more than 263,000 active influencers. Technology has become the fastest-growing vertical within that ecosystem. The pool of credible creators available to brands has never been deeper.

The Regional Calendar Geography Is Not a Strategy

One factor global marketing teams often underestimate is cultural timing.

The GCC is not simply a geography. It operates like a calendar.

Consumer spending in the UAE, Saudi Arabia, and Egypt increases by more than 53 percent during Ramadan. Campaigns that might perform modestly in a typical month can deliver outsized impact when creative work reflects the values and rituals of the season.

That kind of resonance can only be achieved by collaborating with creators who understand the culture from the inside.

Moving From Output to Outcomes

There is an uncomfortable truth at the center of the influencer marketing industry in this region.

Many brands are still measuring the wrong things.

Total impressions and cost per mile remain dominant metrics because they are easy to present in reports. But the shift required is from output metrics to outcome metrics.

The questions that matter are different.

What was the depth of engagement?
How many saves and shares did the content generate?
How much earned advocacy emerged from creators who chose to talk about the product because they genuinely valued it
?

Organic enthusiasm cannot be purchased. It can only be earned.

The GCC influencer marketing market is valued at $315.5 million in 2025 and is projected to reach $771.6 million by 2032.

The brands that will lead the next phase of this market will not simply be those with the largest budgets. They will be the brands that understand how their consumers actually make decisions, build disciplined influencer ecosystems, and measure the signals that truly drive behavior.

The Middle East tech consumer is one of the most digitally engaged and brand-aware audiences in the world. They expect strategies that reflect that sophistication.

Continue Reading

Tech Features

THE STRATEGIC PARADOX: HOW FRONTIER TECHNOLOGIES BOTH CREATE AND SOLVE GEOPOLITICAL RISK

Published

on

two different technology images placed side by side

EDITORIAL NOTE: This article is a jointly commissioned work of original analysis, co-authored by Subrato Basu and Srijith KN, and published by Integrator Media as part of its Technology Leadership Series. It does not constitute legal, regulatory, investment, or security advice, and does not represent the official policy position of Integrator Media, Oxford50, or The Executive Board beyond the views expressed herein. No specific government, organisation, or individual is alleged to have engaged in any unlawful activity. Published March 2026.

If geopolitical volatility has become a structural input into enterprise technology strategy, the next question for boards and technology leaders is unavoidable: how should organisations respond?

The answer lies in a paradox that receives far less attention than it deserves. The frontier technologies most exposed to geopolitical disruption, artificial intelligence, sovereign cloud infrastructure, quantum-resilient cryptography, and agentic automation, are simultaneously the most powerful tools available for building organisational resilience against that disruption. Leaders who focus exclusively on the exposure side of this equation miss the more strategically consequential point.

Consider artificial intelligence. AI deployments built on infrastructure subject to extended regulatory jurisdiction carry real compliance exposure, as described above. Yet AI is also the most powerful accelerant available for threat detection, compliance monitoring, scenario modelling, and operational automation, precisely the capabilities that strengthen an organisation’s ability to absorb and recover from geopolitical shocks. The organisations that will navigate this environment most effectively are not those that slow AI adoption in response to geopolitical uncertainty. They are those that architect their AI infrastructure with data sovereignty and workload portability as foundational design requirements from the outset, converting a potential liability into a structural advantage.

Sovereign cloud infrastructure, whether delivered through major hyperscaler in-country residency programmes or through emerging local and regional alternatives — provides a meaningful and structurally durable buffer against vendor-level geopolitical exposure. Organisations that made this architectural decision early, as a matter of governance principle rather than in response to a specific threat event, are today in a materially stronger position than those who deferred it.

Quantum-resilient cryptography is perhaps the most time-sensitive imperative in this landscape. Advisories from government security agencies across multiple jurisdictions indicate that adversarial state actors are running long-horizon data collection programmes, systematically harvesting encrypted data today for potential decryption as quantum computing capabilities mature. For financial services enterprises, critical infrastructure operators, and government-adjacent organisations, beginning a structured transition to post-quantum cryptographic standards is a present-day governance obligation. The window to act before exposure becomes irreversible is finite.

Agentic AI and intelligent automation reduce structural dependence on specialist talent pools that may be disrupted by geopolitically driven mobility constraints. Investment in operational automation is, simultaneously, investment in organisational resilience against workforce uncertainty.

What Well-Governed Organisations Are Doing Differently

We are deliberately wary of presenting action checklists as a substitute for genuine governance change. Checklists become compliance theatre, items filed, boxes ticked, actual posture unchanged. What follows is a description of what genuinely well-governed organisations are doing differently, drawn from patterns visible in board governance practice and publicly available reporting.

They Have Made Geopolitical Risk Structural, Not Episodic

The most consequential governance shift is a reclassification, not a new process. Well-governed organisations treat geopolitical technology risk as a standing monitored variable, with an owner, a defined monitoring cadence, and a clear escalation threshold, rather than a topic that receives board attention only when a crisis forces it onto the agenda.

 In practice: the CIO and CISO present a jointly owned, geopolitically aware technology resilience posture to the board at least twice annually, with scenarios explicitly modelled and stress-tested. Geopolitical technology risk appears in the enterprise risk register as a named, measured, and actively managed exposure.

They Have Mapped Their Exposure Before Needing the Map

A geopolitical technology risk assessment that maps the organisation’s most critical technology dependencies against regulatory jurisdiction exposure, relevant cyber threat vectors, and supply chain concentration risk is not a trivial exercise. But the organisations that have completed it, and kept it current through changing conditions,  hold a decisive governance advantage. They know where they are exposed. They have already made architectural decisions that reduce that exposure. They are not discovering their vulnerabilities now they are least able to address them.

They Have Built Infrastructure for Portability and Sovereignty

The infrastructure decisions that matter most in a geopolitically volatile environment are not made under crisis conditions. They are made two or three years before a crisis, when there is no immediate operational pressure to make them. Migrating sensitive and mission-critical workloads to locally hosted or sovereign cloud infrastructure, dual-qualifying strategic hardware suppliers across non-concentrated supply lines and implementing zero-trust security architecture are decisions that appear cautious or unnecessary in stable conditions. They appear prescient when conditions change. The organisations in the strongest position today are those that made these decisions as a matter of strategic principle, not reactive necessity.

They Have Tested Their Continuity Assumptions Against Realistic Scenarios

Business continuity plans that have never been tested against simultaneous, compounding geopolitical stress scenarios, vendor service disruption, connectivity constraints, talent mobility restrictions, and elevated cyber incident risk converging rather than arriving sequentially, are not fit for purpose in the current environment. The organisations we consider genuinely well-prepared have run structured tabletop exercises against these compound scenarios, found their gaps in controlled conditions, and closed them before an actual event demanded it.

BOARD READINESS: SIX QUESTIONS TO ASK THIS WEEK Can your organisation operate critical systems for 72 hours without dependency on infrastructure subject to potential extended-jurisdiction service suspension?Do you maintain offline backups of all critical data with regularly tested, documented, and rehearsed recovery procedures?Is your incident response retainer pre-authorised, contractually current, and explicitly scoped to include geopolitically-motivated threat scenarios?Have you documented manual fallback procedures for all AI-dependent and automated workflows?Is your supply chain inventory and vendor flexibility sufficient to sustain operations through a procurement constraint window of 60–90 days?Are your key technology vendors contractually required to provide advance notice before material service changes — and have you rehearsed your internal response to receiving such notice?

A Final Word: Preparedness Is the New Competitive Advantage

There is an argument we consistently find under-made in this space, because it tends to be buried beneath the risk and compliance framing that dominates most discussions of geopolitical technology governance. We want to make it plainly.

Organisations that embed geopolitical technology risk into their governance frameworks, that build sovereign infrastructure, harden their security posture, develop resilient local talent pipelines, and rehearse continuity scenarios against compound stress events, are not simply managing downside exposure. They are building a form of operational resilience and institutional credibility that becomes a genuine, durable competitive advantage at precisely the moments when the advantage is most valuable. When conditions deteriorate, prepared organisations keep operating. They hold the trust of customers and regulators. They are positioned to capture ground from competitors who were not ready.

The structural forces generating geopolitical volatility across the global technology landscape, the intensification of great-power competition, the normalisation of technology restrictions and counter-measures as instruments of statecraft, and the sustained deployment of cyber capabilities as tools of strategic leverage, are not resolving on any near-term horizon. For enterprises operating in or near the fault lines these forces create, a ‘wait and see’ governance posture is not a neutral position. It is a choice to carry exposure that is available to be reduced.

What this moment calls for is a board and CXO community willing to apply to geopolitical technology risk the same intellectual discipline, analytical rigour, and governance seriousness it applies to financial risk: modelling it explicitly, monitoring it continuously, stress-testing it regularly, and managing it actively rather than observing it passively. The organisations that do this work now will not merely survive the next escalation cycle. They will emerge from it operationally stronger, commercially more resilient, and holding the trust and confidence that defines long-term enterprise value.

Technology leadership has always required navigating a world more complex than the tools designed to govern it. The nature of that complexity has simply changed. The discipline required to meet it has not.

In a fractured world, operational resilience is not a risk management outcome. It is a competitive strategy. The organisations that understand this distinction will define the next generation of technology leadership.
SUBRATO BASU CEO, Oxford50  |  Global Managing Partner, The Executive Board Subrato Basu advises boards and senior technology leaders across industries on governance, risk, and enterprise strategy. He brings a practitioner perspective shaped by engagements across the Asia-Pacific region and beyond, with particular focus on technology governance, go-to-market strategy, and organisational resilience in complex operating environments.SRIJITH KN Senior Editor, Integrator Media Srijith KN is Senior Editor at Integrator Media, covering enterprise technology, cybersecurity, and digital transformation across the Middle East and Asia. He brings an editorial perspective drawn from tracking technology leadership decisions across markets in periods of rapid change, and a sustained focus on how organisations translate strategic risk into governance action.
Continue Reading

Tech Features

WHY SECURITY MUST EVOLVE FOR THE HYBRID HUMAN-AI WORKFORCE

Published

on

By Javvad Malik, Lead CISO Advisor at KnowBe4

There is a specific moment in every security professional’s career when they realise the traditional rulebook hasn’t just been ignored—it’s been torn to pieces. Mine arrived last week while watching a colleague engage in a debate with an AI agent over expense policy, while simultaneously being phished by what was almost certainly another AI posing as IT support.

For decades, the cybersecurity industry has clung to a comfortable, binary premise: humans work inside the walls, threats exist outside, and our job is to keep the two apart. It was a tidy worldview that made for excellent spreadsheets, even if we knew it was fiction.

Then, AI walked into the office without knocking. It’s a reboot of the classic 2010 iPad launch, where executives demanded connection to the corporate network, heralding the age of “Bring Your Own Disaster”.

The Multi-Species Workforce

The most uncomfortable truth facing modern organizations is that they no longer employ just humans.

Your current headcount includes Peter from Accounts Payable, his three AI assistants (two sanctioned, one very much ‘shadow’), a recruitment algorithm, and whatever experimental automation Marketing has hooked up to Slack to bypass a slow internal process.

They are all making decisions. And they are all sharing data.

When Peter’s AI hallucinates a rogue clause into a vendor agreement, or a chatbot leaks PII because a prompt-engineer asked nicely, where does the buck stop? Traditional security loves clean lines—User vs. Admin, Internal vs. External. But we are now operating in a world that has gone full analogue. We have created a workforce that is part human and part silicon, yet the risk remains entirely ours to manage.

The Futility of Punitive Security

Historically, we have managed security like a digital Alcatraz. If a user clicks a phishing link, we chastise them. If they use unapproved software, we discipline them.

But punishing people for being human is like shouting at water for being wet. It provides a few seconds of emotional release for the security team, but it doesn’t change the outcome. You cannot discipline your way to a secure culture, and you certainly cannot punish an AI agent into making safer choices.

So, what happens when your workforce is 60% human, 40% AI, and rising?

Navigating the Shadow AI Explosion

Shadow AI isn’t born from malice; it’s born from friction. Employees use unsanctioned tools because the approved versions are often slow, restrictive, and designed by people who think ‘user-friendly’ as a type of malware.

If your IT ticket for an AI request won’t be resolved until Q3 2027 but the free version of ChatGPT is open in a browser tab right now, the choice for a busy employee is a foregone conclusion.

To manage this hybrid reality, we need to view the workforce as a single, unified, complex adaptive system. Here is the framework for securing the blur:

  • Govern the Decision, Not the Entity: We need governance frameworks that apply to the action, regardless of whether the actor is carbon-based or cloud-hosted. If a human isn’t allowed to export customer data to a personal drive, their AI assistant shouldn’t be able to either.
  • Design for Invisible Perimeters: Assume you will never have 100% visibility again. Security must shift toward real-time behavioral monitoring and anomaly detection that tracks patterns across both human and machine activity.
  • Build Intuitive Culture, Not Just Compliance: You teach a child to cross the road by explaining traffic lights, not by screaming at them every time a car passes. The same applies here. You cannot train culture into an AI model, but you can design systems where humans and AI operate within a framework that makes security intuitive.
  • Treat Shadow AI as a Signal: If half your workforce is using unsanctioned AI, that isn’t a compliance failure—it’s a sign your current tools are failing your people.

The question is no longer if your workforce will become a hybrid of human and machine. It already is.

The real question is whether our security models will evolve to meet this reality, or if we will keep building expensive walls around a perimeter that vanished years ago. The workplace has changed; our job is to design security that works with human nature, rather than against it.

Continue Reading

Trending

Copyright © 2023 | The Integrator