EZINE:
Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
EZINE:
Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada's top-down approach.
BOOK:
Download this free chapter from ITF+ CompTIA IT Fundamentals to learn how to work with and decipher the command line interface, demonstrate fundamental commands and more.
EZINE:
In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
EZINE:
According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.
EZINE:
In this week's Computer Weekly, we talk to the Chancellor of the Exchequer about his plans to support innovation and growth in the UK tech sector. Composable IT is the latest trend in building software to support business change. And Halfords built its own service management software – and now is selling it to other retailers. Read the issue now.
EZINE:
Norway is becoming a centre of IoT innovation as tech developers tackle some of the country's unique challenges, in areas such as fish farming, power distribution and monitoring of boats.
EZINE:
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
EGUIDE:
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.