Advance AI Data Security and Collaboration in Healthcare
By: Intel View more from Intel >>
Download this next:
Pioneering GenAI for Product Development at Vodafone
By: Atlassian
Type: Case Study
In 2024, three organizations – Vodafone, Accenture and Atlassian – embarked on the first trial of Atlassian Intelligence and Rovo.
This webcast explores how Vodafone used the generative AI technology to improve its product development lifecycle, including through portfolio backlog refinement.
Additionally, in the webcast Head of Portfolio Strategy & Funding at Vodafone, Fiona Chalk, and Business Agility Senior Manager & Atlassian Advisor at Accenture, Rekha Priyesh, consider:
- Three capabilities that set GenAI apart from other AI technology
- The extent to which generative AI can automate and augment working hours
- The outcomes of Vodafone’s GenAI adoption
Watch now to access the complete presentation.
These are also closely related to: "Advance AI Data Security and Collaboration in Healthcare"
-
Computer Weekly – 25 July 2023: Getting comfortable with data
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, we talk to “Data Bob” – the head of IT at furniture retailer DFS – about building trust in data. The vulnerabilities in MOVEit software continue to attract new victims – we assess the impact of the widespread breaches. And we find out how online investigators are trawling social media to gather evidence of war crimes. Read the issue now.
-
America's Amphetamine Problem, Beyond the Pharmaceutical Supply Chain
By: XtelligentMedia Healthcare
Type: eGuide
Drugs used to treat ADHD have been lacking for months now, leading to problems with access to prescription amphetamines and creating questions about the cause of the massive shortage.
Download the article to know more.
Find more content like what you just read:
-
CW ANZ, November 2018: Exploring blockchain
By: TechTarget ComputerWeekly.com
Type: Ezine
Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
-
How third-party support can enhance your operations
By: Spinnaker Support
Type: White Paper
As companies look to leverage third-party support providers for solutions like Oracle, agreeing that they can help restore higher quality service (including reducing the cost of maintenance fees by at least 50%), many can be unsure of what provider is best fit for them. Access this white paper to learn more.
-
Examining the Healthcare Industry's Potential for Confidential Computing
By: XtelligentMedia Healthcare
Type: eGuide
Confidential computing will become key to protecting patient data as healthcare organizations seek to leverage cloud computing environments.
-
CW Middle East Oct to Dec 2016
By: TechTarget ComputerWeekly.com
Type: Ezine
In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.
-
Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.
-
Computer Weekly – 7 June 2022: Using technology to reinvent shopping
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, after the pandemic led to a boom in e-commerce, we look at how retailers are turning to tech to revitalise their stores. We examine the issues around using algorithmic automation to manage employees. And we find out how data science is supporting drug discovery at Novartis. Read the issue now.
-
Computer Weekly - 2 February 2021: Business intelligence helps ambulance service's pandemic response
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how one ambulance service is using business intelligence tools to join up datasets to improve its response to the Covid-19 pandemic. Our latest buyer's guide examines video conferencing and collaboration. And we look at the benefits of real-time streaming data analytics. Read the issue now.
-
CW Nordics November 2016
By: TechTarget ComputerWeekly.com
Type: Ezine
This quarter, we look at the impact of Nokia layoffs on Finland, and in particular the city of Espoo which is home to both Nokia and Microsoft's Finnish headquarters. We also look at how Denmark's Bang & Olufsen is taking control of sales data with cloud-based software.
-
The Cycle of Healthcare Data: Creation, Gathering, and Handling
By: XtelligentMedia Healthcare
Type: eGuide
Understanding data generation, collection, and processing can guide stakeholders looking to tackle various data analytics projects in healthcare.
-
Unlock greater life sciences innovation by removing 5 barriers
By: AWS Marketplace
Type: eBook
Leading life sciences organizations like Moderna, AstraZeneca, and Thermo Fisher Scientific leverage AWS to remove the undifferentiated heavy lifting to focus more time and resources on bringing new and differentiated treatments to market. Read this eBook to learn how you can do the same.
-
AI is for everyone: Democratizing AI
By: Dell Technologies & AMD
Type: White Paper
This white paper explores how Dell and AMD are democratizing AI by making it more accessible to enterprises. It highlights how their solutions can enable real-time AI workflows, ensure data security, and scale cost-effectively. Read the full paper now to learn how you can leverage AI to transform your business.
-
Computer Weekly – 18 July 2023: Soaring ahead with data at Rolls-Royce
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how aerospace giant Rolls-Royce uses data to improve its competitive advantage. We examine the benefits and best practices in software-defined storage. And we analyse calls for a review of laws around the use of computer evidence prompted by the Post Office IT scandal. Read the issue now.
-
Computer Weekly – 12 November 2024: Innovating with weather data at the Met Office
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how the Met Office is using its vast stores of weather data to create innovative new products. Our latest buyer's guide looks into identity and access management systems. And we examine the geopolitical threats that could curb the openness of open source. Read the issue now.
-
CW EMEA: Investing in the future
By: TechTarget ComputerWeekly.com
Type: Ezine
There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.
-
Dell PowerEdge Cyber Resilient Infrastructure for a Zero Trust world
By: Dell Technologies and Intel
Type: White Paper
As data is accessed across devices, on-premises and in the cloud, high-impact data breaches continue to mount. To maintain a more secure environment, businesses must be more comprehensive in their approach. Access this white paper now to learn how.
-
Navigating Social Media Threats: A Digital Risk Protection Playbook
By: Fortra
Type: White Paper
Social media threats are surging, with businesses facing a two-fold increase in attacks. This white paper explores the threat landscape, common attack types, and best practices to protect your organization. Read the full white paper to learn how to turn social media data into actionable intelligence and effectively take down threats.
-
Digital transformation and IT priorities in 2024: key insights
By: Insight
Type: Analyst Report
This Analyst Report explores how enterprise IT leaders are leveraging technologies like AI, cloud, and platform engineering to drive digital transformation. It also examines the impact of ESG concerns on IT investments. Read the full report to gain insights into the state of enterprise technology strategies.
-
Innovation Awards APAC 2023 - Healthcare: Zuellig Pharma
By: TechTarget ComputerWeekly.com
Type: eGuide
Zuellig Pharma saw the lack of advanced analytics and trusted data platforms in the healthcare sector and built an offering to plug the gaps and help pharmaceutical companies enhance customer engagement. The platform has already helped one organisation better understand user behaviour and gain customer loyalty.
-
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
By: TechTarget ComputerWeekly.com
Type: Research Content
Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
-
Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.
-
Explore a Closed Loop Patient and Provider Experience
By: NextGen
Type: White Paper
Discover how the NextGen® Ambient Assist solution can help your practice achieve better work/life balance, reduce cognitive load, and improve patient interactions. Learn more in this white paper.
-
Jargon Buster Guide to Post Quantum Cryptography
By: TechTarget ComputerWeekly.com
Type: eGuide
This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
-
3 principles for equitable AI use in healthcare
By: The Advisory Board
Type: eBook
This market insights report examines 3 principles for the equitable use of AI in healthcare: avoiding bias in model design, emphasizing equitable access and trust in deployment, and embedding affordability in model financing. Read the full report to learn how healthcare organizations and vendors can promote health equity with AI.
-
Unlocking enterprise AI: A global study of 1,100 technologists — plus interviews with 28 CIOs
By: DataBricks
Type: Research Content
Companies have been quick to adopt GenAI, but they’re still struggling to productionize and scale. That’s one of the findings in this Economist Impact study from a global survey of 1,100 technical executives, data engineers, data scientists and architects. Access the full report now to unlock more insights.
-
Explore the top coding trends shaping healthcare in 2024
By: AKASA
Type: Research Content
Staying ahead of medical coding trends allows revenue cycle leaders to gain a fresh perspective, leverage the expertise of their peers, and understand what's on the horizon. Download this research report to view 7 top coding trends revenue cycle leaders should be aware of and learn how they will impact your organization.
-
How AI is Impacting Healthcare
By: XtelligentMedia Healthcare
Type: eGuide
President Biden's executive order focuses on the importance of secure and reliable Artificial Intelligence (AI) in various sectors, including healthcare.
-
Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
-
What edge computing looks like in 2024
By: Red Hat and Intel
Type: White Paper
This paper describes how Red Hat and Intel combine leading microprocessor hardware and open source software to address edge computing challenges. Read the paper here.
-
Computer Weekly – 28 June 2022: Why collaboration – not competition – is the key to IT sustainability
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as sustainability rises up the corporate agenda, IT leaders say more collaboration is needed to meet climate goals. Microsoft faces further calls for greater transparency over software tools used to monitor employees. And the cyber security industry warns over an increasing loss of talent. Read the issue now.
-
Computer Weekly - 26 April 2022: The latest salary trends for IT professionals
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the results of our annual salary survey show pay returning to pre-pandemic levels and work-life balance a growing consideration. As sustainability becomes a critical issue, we look at how datacentres can meet emissions targets. And we find out how IT leaders can help protect children online. Read the issue now.
-
Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.
-
Understanding FedRAMP cloud security requirements and options
By: Cisco
Type: Gartner Research Report
SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.
-
FStech & Red Hat Research Report AI In Financial Services: Trends, Strategies And Challenges
By: Red Hat
Type: Research Content
AI is transforming financial services, with applications in areas like trading, cybersecurity, and risk analysis. This research report explores AI adoption trends, challenges, and use cases. Read on now to learn how your organization can leverage AI to drive innovation and sustainability.
-
The Ethical AI Manifesto
By: Kipu Health
Type: eBook
As AI transforms healthcare, ethical considerations are critical to ensure patient privacy, fairness, transparency, and appropriate usage. This e-book explores a framework for implementing ethical AI in behavioral health, covering key principles and best practices. Read the full e-book to learn how to harness the power of AI responsibly.
-
Security Incidents: How Can You Minimize Their Impact?
By: ARG, Inc.
Type: Analyst Report
Inside ARG’s “Cybersecurity Market Insights & Decision Guide,” you can discover three goals on which to focus in order to minimize the impact of a cybersecurity incident.
-
Computer Weekly – 3 December 2024: Curing cancer with computers
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we go behind the scenes at the Francis Crick Institute to find out how data science and AI support its groundbreaking medical research. As courts on both sides of the Atlantic target Google, we analyse the legal threats for Big Tech. And our latest buyer's guide examines cloud and object storage. Read the issue now.
-
Cloud computing storage key management
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
-
Security leader’s guide to device security
By: JAMF
Type: White Paper
A cyberattack or an accidental malware download can mean the difference between a productive day and all work grinding to a halt. At the heart of these security concerns is the employee device, and this white paper outlines a guide to Apple Device Security for beginners so that you can prevent a security incident. Read on to learn more.
-
CW Europe – December 2017
By: TechTarget ComputerWeekly.com
Type: Ezine
In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
-
Quantified benefits of an AI-driven UM platform
By: XSOLIS
Type: White Paper
There is a black hole of administrative spending and waste in utilization management (UM) that should be improved, but for which traditional solutions have not proven to be effective. It’s time for healthcare organizations to try a new strategy. Read on to learn about the quantified benefits of an AI-driven UM platform.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
By: TechTarget ComputerWeekly.com
Type: eGuide
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
The Ultimate Guide to Using Cybersecurity AI
By: Adlumin
Type: eGuide
This e-guide explores how AI enhances cybersecurity by quickly analyzing data, detecting anomalies, and automating processes. Learn how AI can improve threat detection, triage, investigation, and response to strengthen your security posture. Read the full e-guide to discover the benefits of AI-powered cybersecurity.
-
Computer Weekly - 14 December 2021: The rules for a safer internet
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
-
CW Europe - March-May 2020: Experts examine Dutch government’s IT problems
By: TechTarget ComputerWeekly.com
Type: Ezine
Technology experts discuss the challenges and potential solutions to the Netherlands government's IT problems.
-
How to get the best value from Office 365
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.
-
The fast-changing, symbiotic evolution of HPC and AI
By: Dell Technologies and Intel
Type: Research Content
Enterprises are at a crossroads—a juncture where High Performance Computing (HPC) and Artificial Intelligence (AI) intersect. This convergence isn’t mere happenstance; it’s a strategic imperative. Access this research content now to learn why.
-
CISSP Exam Guide: Chapter 1: Security and Risk Management
By: McGraw Hill
Type: White Paper
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.