ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=10"

  • A Short Guide to Aligning Video Content to the Buyer’s Journey

    Sponsored by: BrightTALK by TechTarget

    Despite the new engagement features and detailed campaign analytics now at marketers' fingertips, true insight into audiences is still hard to come by. Pair that with how the buyer's journey is changing, and it's clear that mapping out the right content strategy and promotional plan remains challenging. Access this e-book to learn more.

  • Optimize Transfer Center Practices to Improve Patient Acquisition

    Sponsored by: Conduit

    Centralized patient transfer centers can help hospitals streamline admission processes, reduce ED boarding, and improve patient outcomes. Learn how to optimize your transfer center practices and enhance patient acquisition through data-driven strategies. Read the full white paper.

  • ServiceOps 2024: Automation and (gen)AI-powered IT service and operations

    Sponsored by: ServiceNow

    ServiceOps just makes sense. It is practical and makes everyone’s job easier… but how can you adopt without requiring major disruption in day-to-day realities? Find out in this research report.

  • The Future of Financial Services: Part 2

    Sponsored by: TechTarget ComputerWeekly.com

    In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.

  • Gamma International: The Macedonia files

    Sponsored by: TechTarget ComputerWeekly.com

    This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.

  • 10 Steps to Microsoft 365 Cyber Resilience

    Sponsored by: Veeam Software

    Protecting Microsoft 365 data is essential to any modern cybersecurity strategy, since the suite’s applications are so commonly used in businesses of all sizes and industries. Read this e-book for 10 steps you can take to build a more proactive approach to security.

  • CW ASEAN: European data law - be aware and prepare

    Sponsored by: TechTarget ComputerWeekly.com

    Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.

  • Best Practices In Cloud Spend Management

    Sponsored by: ServiceNow

    FinOps teams need to align tech efforts with budget limits. ServiceNow Cloud Cost Management offers a unified platform to monitor hybrid cloud expenses, budget effectively, optimize resources, and deactivate unused services. Discover how to enhance your cloud efficiency and expenditure by reading the full content.

  • Paper free – are we there yet?

    Sponsored by: TechTarget ComputerWeekly.com

    In this comprehensive report, AIIM Market Intelligence takes an in-depth look at the amount of paper in the office, the impediments to removing it, the take up of digital mailrooms and multi-channel capture, and the increasing exploitation of mobile and cloud.

  • Informing Strategic Decision-Making in Pharma: What Role Does AI Play?

    Sponsored by: Intelligencia AI

    Over several months and numerous conferences, Intelligencia AI polled PPM professionals across the U.S. and Europe to better understand challenges and opportunities related to data and artificial intelligence (AI).

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.