EZINE:
GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.
BOOK:
Download this sample chapter from ITF+ CompTIA IT Fundamentals to learn how to approach IT problems using a standard troubleshooting method, how to troubleshoot common computer problems and more.
EZINE:
As Estonia finalises the initial version of its government services digital assistant for launch, the man heading the project describes the birth of Bürokratt and beyond. Also read about Helsinki's role in a pan-EU project to introduce drone technology into emergency medical services.
EBOOK:
High-speed internet connectivity has become an essential utility for much of the world's population. In this 16-page buyer's guide, Computer Weekly looks at what makes the industry largely recession-proof, the obstacles 5G's roll-out must overcome and how reductions in satellite costs have boosted space-borne projects and services' popularity.
BOOK:
Download this free chapter from ITF+ CompTIA IT Fundamentals to learn how to work with and decipher the command line interface, demonstrate fundamental commands and more.
EBOOK:
In this infographic, we take a look at the impact of the pandemic on IT purchasing in the UKI region and analyse the best marketing and sales approaches for prospect outreach on the new 'digital' normal.
EZINE:
The Middle East region is on a path, or even fast track, to becoming a global digital hub. But any country or region heading in this direction will have some fundamentals to get right.
EZINE:
Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada's top-down approach.
EGUIDE:
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.