ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=30start=10start=30start=30start=30"

  • Explore the CMS interoperability and prior authorization rule

    Sponsored by: ZeOmega

    The CMS Interoperability and Prior Authorization final rule is here, with new requirements for Medicare Advantage, Medicaid, and CHIP plans. Learn how ZeOmega's HealthUnity platform can help you comply and streamline payer-provider collaboration. Read the full details.

  • Retailers' tech response to consumers' increasingly online habits

    Sponsored by: TechTarget ComputerWeekly.com

    The past few years has seen an increase in online shopping as the pandemic shifted more consumers into the realm of e-commerce to purchase goods during lockdowns. In return, retailers have been investing in technology to meet the e-commerce demands of customers, and now as predictions suggest pandemic shopping habits are set continue.

  • A Computer Weekly buyer's guide to CIO leadership

    Sponsored by: TechTarget ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at how the age of the customer requires IT leaders to focus on both the business technology and IT agendas; why IT leaders need to use blogging and social media to raise their profile and build influence in their organisations.

  • Reinventing Backup and Recovery With AI and ML

    Sponsored by: Veeam Software

    To gain insight into these AI and ML trends, TechTarget’s Enterprise Strategy Group surveyed 375 IT and data professionals familiar with and/or responsible for data protection (including backup and recovery) decisions and data science for their organization. Read this exclusive ESG and Veeam eBook to find out more.

  • Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.

  • Fit for a Secure Future

    Sponsored by: Vodafone

    This cybersecurity report details how you can become a Fit for the Future (FFTF) business; organizations that take a very different approach to security challenges, resulting in increased revenue, ESG commitment, and reduced impact from cybersecurity attacks. Explore the report here.

  • CW Nordics ezine November 2018

    Sponsored by: TechTarget ComputerWeekly.com

    Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.

  • 2024 ANZ CX Intelligence Report

    Sponsored by: ServiceNow

    Australia and New Zealand have a customer service problem – the nations are stuck on hold. Wait times have increased for the third year running – with more than 107 million hours spent on hold, up 11% from last year. To make problems worse, customers' expectations have risen to an all-time high, making it even harder for organisations to keep up.

  • Data quality emerges from Covid-19 more critical than ever

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

  • Computer Weekly – 7 May 2019: Nurturing innovation at DWP

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the Department for Work and Pensions (DWP) is managing digital innovation. We look at Anthos, Google's new multicloud platform. And we report from the NCSC cyber security conference where experts discussed the lessons learned from recent high-profile attacks. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.