ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Gartner computer weeklystart=10start=20start=20start=20"

  • Converged infrastructure: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide, we take a deep-dive into the benefits of converged infrastructure and find out why this is an area of hardware spend CIOs are increasingly turning their attention to, with a view to investing more of their IT budgets in.

  • Designing Customer Conversations: Best Practices

    Sponsored by: Talkdesk

    To design customer conversations, it’s crucial to consider the user experiences and not just the artificial intelligence that’s behind the processes. However, to do this, companies need to know the dos and don’ts for successful virtual agents, as well as the basics for creating proper customer conversations. Access the guide to learn more.

  • Top 10 ASEAN IT stories of 2020

    Sponsored by: TechTarget ComputerWeekly.com

    The booming digital economies of Southeast Asia showed much resilience in 2020, from tapping open source, data analytics and DevOps, to fending off cyber criminals who came knocking on their doors, all in the midst of an unprecedented pandemic. Here are Computer Weekly's top 10 ASEAN IT stories of 2020:

  • CW APAC – Tech career guide: Software development

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at what it takes to land a career and thrive in the fast-moving world of software development

  • Transforming Revenue Cycle Management with Intelligent Automation

    Sponsored by: AGS Health

    To find out how intelligent automation can transform revenue cycle management (RCM) for healthcare organizations, tap into this e-book.

  • Anatomy Of Identity Based Attacks

    Sponsored by: Okta

    74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.

  • How TDCX is building a people-centric business

    Sponsored by: TechTarget ComputerWeekly.com

    Every digital tool deployed by TDCX is aimed at augmenting the performance and experience of its employees. In an interview with CW, Byron Fernandez, group CIO of TDCX, talks up the company's approach in ensuring its technology investments enhance employee experience, as well as the cyber security challenges in its human capital intensive business.

  • Oracle EBS Customizations Are No Longer Showstoppers for GES

    Sponsored by: Rimini Street

    GES, a global trade show provider, used Rimini Support for their Oracle EBS to innovate and manage staff changes. This partnership let GES reallocate resources and maintain exceptional customer support. Discover more in the full case study.

  • AI-powered robot starts sorting Melbourne's recyclables

    Sponsored by: TechTarget ComputerWeekly.com

    Melbourne's APR Kerbside has been using an AI-powered robot to pick up used Tetra Pak beverage cartons that can be turned into poly-coated boards. Read how this initiative is improving efficiency, increasing the volume of items that can be recycled, and enabling the circular economy.

  • Expansion and Excellence at Banyan Health

    Sponsored by: Kipu Health

    Banyan Treatment Centers has rapidly expanded to nearly 20 facilities by focusing on quality, efficiency, and scalable technology. Learn how they overcame challenges like community resistance and staffing to drive innovation and deliver compassionate behavioral health care. Read the full case study.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.