ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=10start=10start=20"

  • Decentralising datacentres: The new challenges of security at the edge

    Sponsored by: TechTarget ComputerWeekly.com

    In September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.

  • Can AI take education to a new level?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how LLMs are being used to teach, support and assess students, enhancing education rather than impairing it. We look at how AI is impacting the semiconductor sector as big tech companies put off server upgrades. And we find out how GenAI is changing the way enterprise software works. Read the issue now.

  • AI in Fraud Management: Uses cases, benefits and challenges

    Sponsored by: TechTarget ComputerWeekly.com

    AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.

  • BARC Spotlight Genai In Business Intelligence And Analytics

    Sponsored by: IPC Global

    Generative AI is transforming business intelligence and analytics, enabling faster insights and enhanced user interaction. Access this research content now to explore the adoption status, benefits, risks, and best practices associated with GenAI.

  • How Hellenic Bank Transformed its Indirect Procurement Operations with GEP Software

    Sponsored by: GEP

    Hellenic Bank transformed its indirect procurement operations by deploying GEP's unified, AI-powered software platform. This case study highlights how the bank centralized and digitalized procurement, achieving benefits like cost reduction, faster cycle times, and strategic insights. Read the full case study to learn more.

  • Emerging Trends and New Developments in Software-Defined Networks

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, Computer Weekly sits down with with senior IT managers from a number of multi-national companies to discuss the latest trends and newest developments in the world of software-defined networks.

  • A Proactive Approach To Field Service 5 Priorities For Implementing Strong Service Foundations

    Sponsored by: ServiceNow

    This report explores transitioning from reactive to proactive field service model, highlighting 5 priorities. Read on to understand them and to see how ServiceNow enhances operations by connecting teams, streamlining tasks, and empowering customers with its platform and Field Service Management app.

  • Six Critical Capabilities of Saviynt’s Application Access Governance

    Sponsored by: Saviynt

    Moving to Zero Trust can improve security while enabling users with right-time, right-level access. The process requires moving from a mindset of implicit trust to the continuous re-evaluation of risk. Read this white paper to learn more about the three key aspects to a successful Zero Trust adoption.

  • Backup deduplication: a complete guide

    Sponsored by: TechTarget ComputerWeekly.com

    There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.

  • Celestica decreases time-to-hire through remarkable efficiency plays

    Sponsored by: GEM

    Celestica, a leader in design and manufacturing, struggled with brand awareness and sourcing niche engineering roles. By using Gem, they saw a dramatic decrease in time-to-fill, an 87% offer-accept rate, and improved visibility into their recruiting process. Read the full case study to learn how Gem empowered Celestica's recruiting team.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.