Search Results for "Gartner computer weeklystart=10start=20start=20start=20"
-
Transforming Revenue Cycle Management with Intelligent Automation
Sponsored by: AGS HealthTo find out how intelligent automation can transform revenue cycle management (RCM) for healthcare organizations, tap into this e-book.
-
Anatomy Of Identity Based Attacks
Sponsored by: Okta74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.
-
Oracle EBS Customizations Are No Longer Showstoppers for GES
Sponsored by: Rimini StreetGES, a global trade show provider, used Rimini Support for their Oracle EBS to innovate and manage staff changes. This partnership let GES reallocate resources and maintain exceptional customer support. Discover more in the full case study.
-
How TDCX is building a people-centric business
Sponsored by: TechTarget ComputerWeekly.comEvery digital tool deployed by TDCX is aimed at augmenting the performance and experience of its employees. In an interview with CW, Byron Fernandez, group CIO of TDCX, talks up the company's approach in ensuring its technology investments enhance employee experience, as well as the cyber security challenges in its human capital intensive business.
-
AI-powered robot starts sorting Melbourne's recyclables
Sponsored by: TechTarget ComputerWeekly.comMelbourne's APR Kerbside has been using an AI-powered robot to pick up used Tetra Pak beverage cartons that can be turned into poly-coated boards. Read how this initiative is improving efficiency, increasing the volume of items that can be recycled, and enabling the circular economy.
-
Expansion and Excellence at Banyan Health
Sponsored by: Kipu HealthBanyan Treatment Centers has rapidly expanded to nearly 20 facilities by focusing on quality, efficiency, and scalable technology. Learn how they overcame challenges like community resistance and staffing to drive innovation and deliver compassionate behavioral health care. Read the full case study.
-
10 realistic business use cases for ChatGPT
Sponsored by: TechTarget ComputerWeekly.comIn the rapidly evolving landscape of AI and natural language processing, ChatGPT has emerged as a powerful tool with myriad potential applications. In a corporate context, it's crucial to determine the most pragmatic and pertinent applications for specific business needs. Consider these 10 business use cases.
-
SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
Sponsored by: Veracode, Inc.If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
-
Top trends shaping APAC's tech landscape in 2024
Sponsored by: TechTarget ComputerWeekly.comWhile GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.
-
Proving ownership of IPv6 addresses
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.