EGUIDE:
After 17 years Dutch university TU Delft realized its learning management system, was no longer up to scratch it decided in the light of trends such as digital examination. Read about the project to replace one of its core legacy systems here.
EZINE:
Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada's top-down approach.
EZINE:
In this week's Computer Weekly, we look into Apple's controversial plans to build a huge datacentre in a small town in the west of Ireland, and the local arguments it has caused. We find out how the Met Office is managing its vast quantities of weather data. And we examine Google plans to bring AI to the recruitment market. Read the issue now.
EGUIDE:
When Computer Weekly's IT priorities survey was carried out Covid-19 was not something IT leaders would consider when planning ahead. The results of the survey must be considered with this in mind. Discover here the results of Computer Weekly's IT priorities survey for 2020 in Middle East.
EZINE:
In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
WHITE PAPER:
When opting for an outsourcing program, CIOs should check the reliability, financial stability and reputation of service providers, advices Shailesh Joshi, head of corporate IT at Godrej Industries. Get further outsourcing insights in this resource.
EGUIDE:
In this e-guide, brought to you by SearchBusinessAnalytics, learn how your peers met success via a range of outsourcing solutions including ITaaS, SaaS, and more.
CASE STUDY:
This brief case study takes a look at how the Hay Group, a global management consulting firm, teamed up with a third party to integrate its fleet management and service desk initiatives. Read now to learn how they addressed the needs of three key areas of their IT environment – endpoint management and security, data protection, and helpdesk.