ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • Transforming Revenue Cycle Management with Intelligent Automation

    Sponsored by: AGS Health

    To find out how intelligent automation can transform revenue cycle management (RCM) for healthcare organizations, tap into this e-book.

  • Anatomy Of Identity Based Attacks

    Sponsored by: Okta

    74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.

  • Oracle EBS Customizations Are No Longer Showstoppers for GES

    Sponsored by: Rimini Street

    GES, a global trade show provider, used Rimini Support for their Oracle EBS to innovate and manage staff changes. This partnership let GES reallocate resources and maintain exceptional customer support. Discover more in the full case study.

  • How TDCX is building a people-centric business

    Sponsored by: TechTarget ComputerWeekly.com

    Every digital tool deployed by TDCX is aimed at augmenting the performance and experience of its employees. In an interview with CW, Byron Fernandez, group CIO of TDCX, talks up the company's approach in ensuring its technology investments enhance employee experience, as well as the cyber security challenges in its human capital intensive business.

  • AI-powered robot starts sorting Melbourne's recyclables

    Sponsored by: TechTarget ComputerWeekly.com

    Melbourne's APR Kerbside has been using an AI-powered robot to pick up used Tetra Pak beverage cartons that can be turned into poly-coated boards. Read how this initiative is improving efficiency, increasing the volume of items that can be recycled, and enabling the circular economy.

  • Expansion and Excellence at Banyan Health

    Sponsored by: Kipu Health

    Banyan Treatment Centers has rapidly expanded to nearly 20 facilities by focusing on quality, efficiency, and scalable technology. Learn how they overcame challenges like community resistance and staffing to drive innovation and deliver compassionate behavioral health care. Read the full case study.

  • 10 realistic business use cases for ChatGPT

    Sponsored by: TechTarget ComputerWeekly.com

    In the rapidly evolving landscape of AI and natural language processing, ChatGPT has emerged as a powerful tool with myriad potential applications. In a corporate context, it's crucial to determine the most pragmatic and pertinent applications for specific business needs. Consider these 10 business use cases.

  • SAST vs. DAST: What Are the Differencesand Why Are They Both Important?

    Sponsored by: Veracode, Inc.

    If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.

  • Top trends shaping APAC's tech landscape in 2024

    Sponsored by: TechTarget ComputerWeekly.com

    While GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.

  • Proving ownership of IPv6 addresses

    Sponsored by: TechTarget ComputerWeekly.com

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.