EZINE:
In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
EZINE:
GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.
EZINE:
A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.
EBOOK:
Read this e-book to learn how to overcome practical barriers to holistic automation adoption within your organization. Coverage includes automation goal setting, common myths, how to unite teams and training, and scaling automation across the business.
EZINE:
Most of Iceland's cheap, sustainable energy is used by aluminium smelters, but the country's Landsvirkjun power company is now promoting other uses for it, including high-performance computing. Also read in this issue how IoT collaboration in Norway is reaching beyond industries such as mining and shipping to include fish farming.
EZINE:
As Estonia finalises the initial version of its government services digital assistant for launch, the man heading the project describes the birth of Bürokratt and beyond. Also read about Helsinki's role in a pan-EU project to introduce drone technology into emergency medical services.
EZINE:
In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
EBOOK:
In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
EGUIDE:
In this infographic based on the results of our 2020 Media Consumption Survey, find out why sales reps with data-driven intent get the best response and what subject line gets the open?