EZINE:
In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
EZINE:
The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
EZINE:
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
EZINE:
In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
EZINE:
Oil may be the main fuel to the economies of the Middle East, but the region is trying to break from its reliance on the black stuff. This ezine has already featured articles about the UAE and Saudi Arabia diversifying their economies, with particular interest in fintech.
EZINE:
In this handbook, Computer Weekly looks at the adoption of robotic process automation in APAC and where the technology fits in the wider automation landscape
EZINE:
The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.
sponsored by CipherSoft, Inc., A subsidiary of Unify Corp.
EBOOK:
Since Forms technology is widely in use in many Oracle environments, it's critical that developers and IT professionals understand Oracle's short and long term plans that could affect their strategies. Read more about the key trends that may affect how your organization uses Oracle Forms, a component of Oracle Fusion Middleware.
WEBCAST:
Altiris solutions and PCs with Intel® vPro technology allow IT organizations to perform faster, more automated, and more specifically defined configuration and management tasks in a network environment.