About BI-ME

FEATURED REPORT...
Posted: 13-01-2006
Knowledge Management: “Identifying knowledge assets within an organisation and methods for developing and distributing knowledge through technology.” Peter Drucker once said: "The best way to predict the future is to create it."  Not many of us would disagree with this statement.  The question really is, rather, How?  How we can create our future? Sun Tze, a military scholar in China at around 400 BC, in his book The Art of War, identified two factors for success in military warfare: readiness (preparation) and knowledge. Armed with these factors, he wrote th
Posted: August 21, 2016
Posted: August 21, 2016
Posted: February 28, 2014
Posted: August 1, 2011
Posted: October 1, 2010
Posted: January 8, 2007
Here we provide a brief description of how to drill down to over 200 market reports online at BI-ME (11 industries and 16 countries plus consumer backgrounder or economic profile reports). All this is available at one click for BI-ME subscribers.
Posted: August 7, 2005
At BusinessIntelligence-Middle East we are committed to protecting your security/confidentiality.
Posted: February 23, 2005
BusinessIntelligence-Middle East (BI-ME) takes the privacy of its users seriously. We are committed to safeguarding the privacy of our users whilst providing a personalised and valuable service.
Posted: February 23, 2005

MIDDLE EAST BUSINESS COMMENT & ANALYSIS

date:Posted: September 23, 2017
INTERNATIONAL. IEA; Banning Uber, and clamping down on the Gig Economy more generally, is a restriction upon freedom of choice.
date:Posted: September 20, 2017
UAE. The latest BNC Network report shows 543 hospitality projects are active in the UAE - reflecting the vibrancy of the leisure, tourism and the entertainment sectors.
date:Posted: September 18, 2017
SAUDI ARABIA. A new report by executive search firm Metin Mitchell & Co highlights the confidence that Saudi women feel about their working futures and what needs to be done to increase the number of women in the workplace.
UAE. Cisco's security research organization Talos says once this ransomware enters your system, it uses three ways to spread automatically around a network, one of which is the known Eternal Blue vulnerability.
dhgate