ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • Transforming Revenue Cycle Management with Intelligent Automation

    Sponsored by: AGS Health

    To find out how intelligent automation can transform revenue cycle management (RCM) for healthcare organizations, tap into this e-book.

  • How to Develop Your EPM Strategy

    Sponsored by: US Analytics

    While developing an enterprise performance management (EPM) strategy seems straightforward enough, it’s critical to consider the many processes, people, and systems involved before choosing which path to take. Browse this guide to learn more.

  • Computer Weekly Buyer's Guide to services for digitisation and IoT

    Sponsored by: TechTarget ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looksat the use of mid-sized nearshore IT service providers, choosing a cloud-based platform, and how to manage the huge volume of IoT data.

  • The use of gene and cell therapy to advance medicine

    Sponsored by: XtelligentMedia Healthcare

    Cell and gene therapy is transforming medicine by offering potential cures for untreatable diseases, but navigating scientific and regulatory hurdles remains challenging.

  • Email security: Never more important

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • Customer Case Study: Crocs, Inc.

    Sponsored by: Alation

    To maximize their data assets, Crocs needed to put a higher priority on governing the data they rely on for insights and decision-making. Tap into this case study to learn why Crocs chose Alation as its data catalog to address its data governance needs and enable benefits such as speed change management, aligned data definitions and more.

  • The State of Software Supply Chain Security 2024

    Sponsored by: ReversingLabs

    Over the last 3 years, supply chain attacks rose 1300%. This report is designed to give readers a map with which they can navigate the landscape of software supply chain security, exploring some of the high-level trends in software supply chain threats and how recent attacks provide insight into what’s to come. Read on to learn more.

  • Pay It Forward: Attracting and Retaining Top Agents in South Africa CX Delivery Centres

    Sponsored by: Hinduja Global Solutions

    South Africa is a top offshore customer experience delivery destination, offering a large talent pool, cultural compatibility, and lower costs. Learn how HGS is attracting and retaining top agents in its new South Africa delivery centre. Read the full white paper.

  • The CISO Guide to Ransomware Prevention

    Sponsored by: Checkpoint Software Technologies

    Over the last 5 years, ransomware attacks have increased by 13%, with the average cost exceeding $1.8 million per incident. This white paper presents a CISO’s guide to ransomware prevention, including insights from Check Point VP Security Engineering, Jeff Schwartz. Read on to learn more.

  • A Strategic Approach To Maintaining PCI DSS 4.0 Compliance

    Sponsored by: Cloudflare

    As PCI DSS 4.0 brings new compliance requirements, organizations need a streamlined approach to address them. This whitepaper outlines how Cloudflare's connectivity cloud can help you meet PCI DSS 4.0 with security, visibility, and automation. Read the full whitepaper to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.