ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=10start=10start=20"

  • Celestica decreases time-to-hire through remarkable efficiency plays

    Sponsored by: GEM

    Celestica, a leader in design and manufacturing, struggled with brand awareness and sourcing niche engineering roles. By using Gem, they saw a dramatic decrease in time-to-fill, an 87% offer-accept rate, and improved visibility into their recruiting process. Read the full case study to learn how Gem empowered Celestica's recruiting team.

  • 7 leading generative AI use cases

    Sponsored by: AWS

    In this eBook, AWS has outlined 7 leading generative AI use cases where organizations across industries have successfully applied generative AI to solve business problems and achieve fast, efficient, and measurable results. Follow their examples and learn how you can strengthen your generative AI business case or expand your current strategy.

  • IR35 reforms: Confusion over who pays employers' NI leaves IT contractors out of pocket

    Sponsored by: TechTarget ComputerWeekly.com

    Litigators are circling as thousands of contractors realise that the 2017 roll-out of IR35 reforms to the public sector may have resulted in unlawful tax deductions – and the private sector could be next.

  • Computer Weekly – 16 April 2019: Digital transformation at the Crown Prosecution Service

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine how the Crown Prosecution Service is helping to digitally transform the UK justice system. We report from Google's cloud conference on the firm's plans to expand its presence in enterprise IT. And we look at the opportunities and challenges of using AI in the education sector. Read the issue now.

  • Manchester United praised for swift response to cyber attack

    Sponsored by: TechTarget ComputerWeekly.com

    The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.

  • CeBIT: 26-30 March 2015

    Sponsored by: CeBIT

    Be our guest at CeBIT 2015 - Visit the world's leading IT trade show and conference for professionals.

  • Assess & Manage Commercial Software Risk

    Sponsored by: ReversingLabs

    How do you know the commercial software you bring into your organization is safe? With Industry analysts seeing a 300% to 1000% increase in attacks targeting the commercial software businesses, it represents the largest under-addressed attack surface. Download this White Paper to learn more.

  • Assess & Manage Commercial Software Risk

    Sponsored by: ReversingLabs

    Enterprises face growing risks and regulatory demands to secure third-party software. Spectra Assure's white paper details how its binary analysis identifies threats like malware and vulnerabilities in commercial software without source code. Discover risk management strategies by reading the full paper.

  • Empower your Workforce to Embrace AI and be a Force for Growth

    Sponsored by: HPI and Intel

    In this infographic, you'll discover how AI can help your workforce overcome common challenges and boost productivity. It explores obstacles to AI adoption and how to empower your team to embrace AI as a strategic tool. Read on now to learn how you can empower your workforce.

  • Effortlessly Accelerate Your AI Applications And Workflows On Red Hat OpenShift Container Platform With 4th Gen Intel® Xeon® Scalable Processors

    Sponsored by: Red Hat and Intel

    This white paper by Intel details how 4th generation Intel Xeon Scalable processors can accelerate AI applications and workflows on Red Hat OpenShift Container Platform. Read the white paper.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.