In this week's Computer Weekly, we look at Gartner's call to innovate – and innovation across retail, the circular economy and the automotive sector. We talk to Verastar's CTO about customer engagement in its small business services. And we examine how poor data quality is frustrating corporate desires to be data-driven. Read the issue now.
This e-guide features some of our coverage of AI: showing it realised for business benefit, interacting with the containerisation trend and cyber-security and cogitated upon with scholarly seriousness.
In this week's Computer Weekly, our latest buyer's guide looks at the future of robotic process automation (RPA). Google's legal victory against Oracle over the use of Java APIs has huge significance for software developers. And we find out how expectations of IT have grown as firms prepare for the post-Covid workplace. Read the issue now.
In this e-guide, we take a look at how smart living and working are shaping up to be two of the most important and beneficial aspects of the digital transformations happening in Benelux today. We discover how Dutch towns are planning on using IT to automate human and business activity and how the Port of Rotterdam is preparing for autonomous ships.
Business is wielding automation in increasingly innovative ways. In this 14-page buyer's guide, Computer Weekly looks at artificial intelligence in procurement, how machines are becoming customers, and FinOps teams' use of work-load management. Read the guide now. Download the guide to find out more.
Social collaboration technology is a hot topic in the business applications space today -- but what about the hard numbers? Many companies are wary and want concrete proof of ROI and payback. Fortunately, this informative resource offers just that.
In this expert e-guide, explore 4 best practices for avoiding setbacks over the course of BPM projects, including: ensure resources are aligned with reality and business priorities, manage expectations for change early and often, and 2 more. Additionally, find out how BPM drivers—including cloud, mobile, and social— shouldn't impact processes.
Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.