Asynchronous Digital Subscriber Lines Reports

CW Benelux ezine February 2019
sponsored by TechTarget ComputerWeekly.com
EZINE: Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 31 Jan 2019 | Published: 07 Feb 2019

TechTarget ComputerWeekly.com

CW Europe - September-November 2021: Dutch researchers build security software to mimic human immune system
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Europe, find out how researchers in the Netherlands are attempting to help IT systems fight certain cyber attacks in a similar way to the human immune system works. Also find out about the so-called "Klarna academy" in Stockholm, which has created the next set of Nordic fintech entrepreneurs.
Posted: 31 Aug 2021 | Published: 09 Sep 2021

TechTarget ComputerWeekly.com

CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
sponsored by TechTarget ComputerWeekly.com
EZINE: Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
Posted: 05 Aug 2020 | Published: 13 Aug 2020

TechTarget ComputerWeekly.com

2021 UKI Salary Survey Analysis Video
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We take a look at our 2021 Salary Survey results from over 300 respondents who work in the UKI IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in in 2021 and the current diversity landscape residing in the UK tech sector.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

TechTarget ComputerWeekly.com

Computer Weekly - 19 November 2019: Is facial recognition happening too fast?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

2021 APAC Media Consumption: Engaging prospect to accelerate the buy cycle
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: In this infographic based on the results of our 2021 Media Consumption Survey, find out what are the most successful approaches to capturing a buyer's attention and the best ways to engage with users in the Asia-Pacific region.
Posted: 14 Dec 2021 | Published: 14 Dec 2021

TechTarget ComputerWeekly.com

CW Benelux February 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

TechTarget ComputerWeekly.com

CW Europe - March-May 2020: Experts examine Dutch government's IT problems
sponsored by TechTarget ComputerWeekly.com
EZINE: Technology experts discuss the challenges and potential solutions to the Netherlands government's IT problems.
Posted: 02 Mar 2020 | Published: 12 Mar 2020

TechTarget ComputerWeekly.com

CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients
sponsored by TechTarget ComputerWeekly.com
EZINE: An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
Posted: 23 Oct 2020 | Published: 12 Nov 2020

TechTarget ComputerWeekly.com

Working with the Kubernetes Configuration to Deploy Containers
sponsored by Diamanti
EGUIDE: In this expert guide, Alan Earls, contributor to SearchITOperations.com, walks you through using the Kubernetes configuration for container deployment. Inside, you'll find expert instruction on properly applying Kubernetes' nodes, pods, schedulers, and volumes to bypass orchestration challenges, and more.
Posted: 27 Feb 2018 | Published: 19 Feb 2018

Diamanti