EGUIDE:
In this case study, learn how Singapore's National University Health System deployed RPA bots to automate patient registration during Covid-19 swab tests as part of broader efforts to improve efficiency.
EZINE:
In this week's Computer Weekly, we examine the role of green tech in helping businesses contribute to the government's 2050 net-zero targets. We also talk to Spotify about the importance of open source for the music streaming service and how hybrid working is evolving as the post-pandemic workplace continues to change. Read the issue now.
EZINE:
In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
EGUIDE:
Researchers have developed a machine learning (ML) tool capable of using electrocardiogram (ECG) readings to detect and classify heart attacks more quickly and accurately than standard approaches. The model was able to accurately reclassify 1 in 3 patients with chest pain based on heart attack risk. Download the article to read more.
EZINE:
In this issue of Computer Weekly, we investigate HMRC's loan charge policy, a retrospective tax grab that has left thousands of IT contractors facing financial ruin. We compare the cloud storage offerings from AWS, Microsoft and Google. And we find out how retailers are turning to tech to deal with a new generation of shoppers.
EZINE:
In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
EGUIDE:
Learn how your organization can meet compliance obligations while maintaining an optimal security strategy that detects and responds to advanced security threats.