EZINE:
In a country like Sweden which has embraced IT to transform life and work and where concepts like cashless society are welcomed by many, the proliferation of artificial intelligence is inevitable.
EZINE:
What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.
EZINE:
Norway is becoming a centre of IoT innovation as tech developers tackle some of the country's unique challenges, in areas such as fish farming, power distribution and monitoring of boats.
EGUIDE:
In this e-guide, Computer Weekly sits down with with senior IT managers from a number of multi-national companies to discuss the latest trends and newest developments in the world of software-defined networks.
EGUIDE:
Tech startups, investors, major suppliers and even leading-edge companies are already placing a bet on the future of quantum computing. In this e-guide, we hear from experts in the tech sector, business consultancies and international corporations as they examine the potential of quantum computing.
EZINE:
In this week's Computer Weekly, we find out how brewing giant Heineken is building a data ecosystem to share insights and tap into AI capabilities. The UK is conducting an investigation into cloud supplier dominance – what will it mean for users? And we examine how generative AI could be used to improve customer experience. Read the issue now.
EGUIDE:
In this infographic, we take a look at what IT departments are investing in, how IT departments will evolve over the next 12 months and which sectors will see the biggest budget increases. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
EGUIDE:
The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.