EZINE:
In this issue of Computer Weekly, we investigate HMRC's loan charge policy, a retrospective tax grab that has left thousands of IT contractors facing financial ruin. We compare the cloud storage offerings from AWS, Microsoft and Google. And we find out how retailers are turning to tech to deal with a new generation of shoppers.
EZINE:
In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.
WHITE PAPER:
Read this paper to garner the value of a transformational—not transactional—healthcare supply chain approach, 4 ways to achieve long-term supplier value, and top supply chain trends.
EZINE:
In this week's Computer Weekly, we look at the technologies needed to support deep learning and AI applications in your organisation. We hear about Southern Water's data management overhaul and the benefits achieved from centralising its data team. And we examine best practice in managing large-scale Docker implementations. Read the issue now.
EZINE:
In this week's Computer Weekly, we look at the lessons learned from the ransomware attack on Travelex and how other firms can avoid the same fate. As Microsoft ends support for Windows 7, we examine the issues for the many remaining users of the operating system. And healthcare CIOs explain the tech challenges facing the NHS. Read the issue now.
EGUIDE:
AI driven by healthcare's rich data, coupled with streams of user-specific data gathered by IoT, can enable better predictive analytics, enhanced outcomes, faster detection of illness and heightened patient self-awareness. Download a copy of this E-Guide to learn more about IoT use cases in healthcare.
EGUIDE:
Ransomware is one of the most common attacks used to hold data hostage, especially in healthcare, and that helped increase the use of digital currencies like Bitcoin. In this e-guide, learn how to defend against threats like ransomware and cryptojacking and how deception technology can help.