EZINE:
In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
EGUIDE:
he Computer Weekly 2016-2017 salary survey, which questioned 190 IT and business professionals in Benelux, found that, as expected, senior IT managers command the highest salaries, with an average annual income of €128,180.
EGUIDE:
Litigators are circling as thousands of contractors realise that the 2017 roll-out of IR35 reforms to the public sector may have resulted in unlawful tax deductions – and the private sector could be next.
EGUIDE:
In this infographic based on the results of our 2020 Media Consumption Survey, find out how buyers evaluate purchases, and what ranks important in getting shortlisted for a purchase.
EZINE:
Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada's top-down approach.
EGUIDE:
When Computer Weekly's IT priorities survey was carried out Covid-19 was not something IT leaders would consider when planning ahead. The results of the survey must be considered with this in mind. Discover here the results of Computer Weekly's IT priorities survey for 2020 in Middle East.
EGUIDE:
Western Australian aged care provider Juniper embarked on an aggressive strategy to completely transform its IT operations in just two years. This 1-page brief summarises how this overhaul has helped free up the resources needed to provide better quality of care for residents.
WHITE PAPER:
This whitepaper looks at the financial and man-power advantages of managed colocation in contrast to in-house server management, and traditional hardware colocation.
WEBCAST:
This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints