EZINE:
Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.
EBOOK:
In this automation architect’s guiding e-book, discover a walkthrough map of the steps required to lead your organization beyond task-centric automation toward an enterprise-wide strategy.
EZINE:
In this week's Computer Weekly, we announce this year's list of the 50 most influential women in UK technology. We talk to Suki Fuller, who topped the list, about her journey in IT and the importance of diversity and inclusion. And we meet our rising stars – the women on a trajectory to influence the UK tech community. Read the issue now.
EZINE:
As Estonia finalises the initial version of its government services digital assistant for launch, the man heading the project describes the birth of Bürokratt and beyond. Also read about Helsinki's role in a pan-EU project to introduce drone technology into emergency medical services.
EZINE:
A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.
EBOOK:
Read this e-book to learn how to overcome practical barriers to holistic automation adoption within your organization. Coverage includes automation goal setting, common myths, how to unite teams and training, and scaling automation across the business.
EZINE:
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
EZINE:
In this week's Computer Weekly, Windows is still the most-used operating system in enterprises – we look at where Microsoft aims to take it next. We examine some of the key questions for CIOs for their 2021 IT strategy. And we analyse the best practice in preventing distributed denial of service (DDoS) attacks. Read the issue now.
EGUIDE:
Read this expert guide from ComputerWeekly.com to learn how to maintain a firm grip on your technical asset management and to resolve any lack of visibility before it becomes a business issue.