Wednesday,26 February, 2025

Subscribe to Newsletter

HOME
  NEWS
  Knowledge Center
 
News

ITIDA Joins Forces With IDC To Boost IT Links Between Egypt And Gulf

Published May 17, 2010

Egypt's Information Technology Industry Development Agency (ITIDA), the executive IT arm of the country's Ministry of Communications and Information Technology, is delighted to announce details of its upcoming 'Business Without Barriers' conferences to be held later this month in Riyadh and Dubai.

Held in conjunction with International Data Corporation (IDC), the premier global market intelligence and advisory firm for the information technology and telecommunications markets, the conferences aim to support the growth and development of Egypt's IT Industry through the facilitation of mutually beneficial relationships between Egyptian and Gulf-based IT companies.

Egypt is among the world's fastest-growing locations for global outsourcing and offshoring, and the country offers a world-class, cost-effective alternative to organizations looking to adopt the outsourcing model. Together with IDC, ITIDA has been working on a research-led go-to-market program called 'Go-to-GCC' that is aimed at partnering Egyptian IT organizations with leading systems integrators and channel partners from the Gulf region.

"ITIDA is very pleased to have IDC as a partner in this important project," says Dr. Hazem Y. Abdelazim, CEO of ITIDA. "We are anticipating great success for the events because of all the efforts exerted over the past six months. Communicating our partnership message in the Gulf is key to creating new business opportunities for Egyptian IT companies and their counterparts in the GCC region. Our companies are looking forward to attending the two events and are sure of a positive outcome that will further solidify our business relations with our partners in the Gulf."

Most forums for business networking tend to have a very low success rate as insufficient time is spent on researching and identifying viable business opportunities. However, the 'Business Without Barriers' conferences mark the culmination of six months of intense research by IDC's most senior consultants and analysts as they have sought firstly to identify skills, products, and solutions within select Egyptian IT companies that are in demand in the Gulf region, and then match them with relevant systems integrators and channel partners from the GCC nations.

These two highly structured and targeted go-to-market gatherings will host an ICT trade delegation from Egypt in order to aid the development of invaluable long-term business partnerships between Egyptian and Gulf-based companies. As well as facilitating unrivalled intelligent networking opportunities at the event itself, IDC will also act as a facilitator in the six-month period following the conferences, providing support for both Egyptian and Gulf-based organizations as they seek to develop and sustain viable business partnerships.

The Dubai event will take place at the Madinat Jumeirah on Monday, May 24, while the Riyadh event will take place at the city's Four Seasons Hotel on Wednesday, May 26.



Rate This:

Posted by VMD - [Virtual Marketing Department]


Poll
What is your favourite search engine?
Google
Yahoo
Bing

Most Viewed
  Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

  Credence Security to Address Growing Market for GRC Solutions in Middle East Through Partnership with Rsam

  New Mimecast Archive Cloud Capability Streamlines GDPR Management for Email

  Planning and Scheduling Software–Helping Manufacturers Keep Their Customers Happy

  Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains

  Fujitsu Launches High-Security Biometric Authentication Solution for Active Directory IT Environments

  Rackspace Wins 2017 Red Hat Innovator of the Year Award

  ServiceNow Survey Shows 2018 as the Year of Automation for Routine Enterprise Work

  4 Tech Hacks to Faster Customer Onboarding

  New Mimecast Report Detects 400% Increase in Impersonation Attacks