DATA SHEET:
Each year, Computer Weekly asks CIOs and senior IT decision makers what they will be investing in during the 12 months ahead. Access this infographic to find out the key spending priorities for 2017 in Benelux.
EZINE:
Norway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.
EGUIDE:
In this inforgraphic, we show the results of our 2020 Media Consumption Survey. Find out who is part of the buying team and what do we know about the "final decision maker".
EZINE:
In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
EZINE:
The Netherlands has for years attracted datacentre investment and has seen major construction projects. Amsterdam alone has 33 datacentres within a radius of 20km. So when the local authority in Amsterdam and Haarlemmermeer called an immediate halt to datacentre construction, it was a shock.
EZINE:
In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
DATA SHEET:
Each year, Computer Weekly asks CIOs and senior IT decision makers what they will be investing in during the 12 months ahead. Access this infographic to find out the key spending priorities for 2017 in the Middle East.
EGUIDE:
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.