EZINE:
In this week's Computer Weekly, we check out the digital transformation at Defra, and see how the government department is preparing for Brexit. The new technology chief for the NHS explains how he's going to bring the health service into the digital age. And we examine how to make a success of enterprise social media platforms. Read the issue now.
EGUIDE:
In this case study, learn how Singapore's National University Health System deployed RPA bots to automate patient registration during Covid-19 swab tests as part of broader efforts to improve efficiency.
EGUIDE:
President Biden's executive order focuses on the importance of secure and reliable Artificial Intelligence (AI) in various sectors, including healthcare.
EGUIDE:
DirectTrust is looking to improve the usability of the Direct standard for use cases such as closed-loop referrals and ADT notifications to drive health data interoperability.
EZINE:
In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
EGUIDE:
Download this e-guide to learn why technology isn't infallible for patients and healthcare organizations and has the potential to change the healthcare industry for the better.
EGUIDE:
With the increasing trend of cryptojacking, organizations must take action against attackers looking to take advantage of their environment. Discover which appropriate steps you can take to fight cybercrime today.
EBOOK:
SAP Cloud Platform is the key technology in SAP's plan to drive digital transformation by linking legacy applications and data with next-generation technology.
EGUIDE:
One of the greatest healthcare security threats comes from users within an organization. In this expert handbook, John Nye shares recommendations for technologies that healthcare organizations can use to fight against insider security threats.