EZINE:
In this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.
EZINE:
An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
EZINE:
The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.
EZINE:
Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada's top-down approach.
EZINE:
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
EZINE:
German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.
EZINE:
In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
EGUIDE:
In this e-guide, discover how cloud computing continues to change the IT outsourcing industry, how Indian staff are making up a larger proportion of the workforces at large western companies, and find out how IT is disrupting the legal firms that support the outsourcing industry.
EZINE:
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.