EZINE:
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.
EZINE:
Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.
EGUIDE:
Litigators are circling as thousands of contractors realise that the 2017 roll-out of IR35 reforms to the public sector may have resulted in unlawful tax deductions – and the private sector could be next.
EZINE:
In this issue of CW Middle East, read how the UAE and the Abu Dhabi National Oil Company have recognised that things will change as oil and gas resources dwindle. Digital technology, such as artificial intelligence, has been identified as a key driver for future industries.
EZINE:
In this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.
EZINE:
The UAE, like the rest of the world, continues to be heavily impacted by the fallout of the Covid-19 pandemic – and technology is helping to lead the fight.
EZINE:
Norway is becoming a centre of IoT innovation as tech developers tackle some of the country's unique challenges, in areas such as fish farming, power distribution and monitoring of boats.
EZINE:
Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
EGUIDE:
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.