EGUIDE:
In this e-guide, Computer Weekly sits down with with senior IT managers from a number of multi-national companies to discuss the latest trends and newest developments in the world of software-defined networks.
EGUIDE:
Inside this report, read more about the findings from the 2022 TechTarget/Computer Weekly's IT priorities study, as well as insights on how Indian enterprises are directing their IT investments and what are the main observations and trends for India in 2022.
EZINE:
Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada's top-down approach.
EZINE:
Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.
EZINE:
The IT skills gap in the Netherlands could be about to narrow as more women take up jobs in the sector. Figures from last year revealed that the number of female ICT professionals grew by 6.5%, while the number of male ICT professionals increased by only 1.7%. Read more about it in this issue.
EGUIDE:
Inside this report, read more about the findings from the 2022 TechTarget/Computer Weekly's IT priorities study, as well as insights on how ASEAN enterprises are directing their IT investments and what are the main observations and trends for ASEAN in 2022.
EZINE:
In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
EGUIDE:
In this e-guide we take a look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at a pace. This e-guide features an article about each.
EGUIDE:
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.