EGUIDE:
In this e-guide, Computer Weekly sits down with with senior IT managers from a number of multi-national companies to discuss the latest trends and newest developments in the world of software-defined networks.
EZINE:
Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.
EZINE:
According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.
EZINE:
GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.
EZINE:
In this month's ezine, we provide a guide to the main areas of focus for the channel in the year ahead and look at what makes a good partner incentive programme.
EZINE:
Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
EZINE:
In this week's Computer Weekly, we talk to the Chancellor of the Exchequer about his plans to support innovation and growth in the UK tech sector. Composable IT is the latest trend in building software to support business change. And Halfords built its own service management software – and now is selling it to other retailers. Read the issue now.
EZINE:
Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.