EZINE:
In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
CASE STUDY:
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
EZINE:
An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
BOOK:
Download this free chapter from ITF+ CompTIA IT Fundamentals to learn how to work with and decipher the command line interface, demonstrate fundamental commands and more.
EZINE:
In this month's ezine, we provide a guide to the main areas of focus for the channel in the year ahead and look at what makes a good partner incentive programme.
EZINE:
In this week's Computer Weekly, we talk to Merlin Entertainments – operator of Legoland and Alton Towers – about how digital saved the company when Covid shut its theme parks. We find out how data analytics can help to track greenhouse gas emissions. And Southern Water explains how data supports vulnerable customers. Read the issue now.
EZINE:
Most of Iceland's cheap, sustainable energy is used by aluminium smelters, but the country's Landsvirkjun power company is now promoting other uses for it, including high-performance computing. Also read in this issue how IoT collaboration in Norway is reaching beyond industries such as mining and shipping to include fish farming.
EZINE:
Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.
EZINE:
In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
EGUIDE:
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.