NAB’s UBank is experimenting with new interfaces for its online RoboChat service, with Facebook Messenger, Amazon’s Alexa and Google Home all considered potential front-ends for the chatbot, according to Jeremy Hubbard, the bank’s head of digital and technology.
Case studies - News, Features, and Slideshows
Having streamlined the on-boarding and off-boarding of its internal workforce, life insurer TAL is now preparing to use its identity access management platform to help proactively address compliance requirements across the organisation.
A focus on customer service outcomes at GWMWater — the Grampians Wimmera Mallee Water Corporation — has been underpinned by the organisation’s investment in a unified enterprise software suite that can deliver a single source of truth for key data, as well as an emphasis on eliminating manual processes at the utility.
Rolling out a cloud-based human capital management (HCM) system has made it easier for managers at Dexus to access personnel data while also giving HR staff at the property management company more time to focus on the business’ strategic priorities.
When Australian construction company Built adopted Dropbox to enable the sharing of large files between its offices, construction sites and partners the wide usage of the file sharing software by individuals helped accelerate uptake.
Whitepapers about Case studies
This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
- Business transforms when it comes together | Unite your IT , Ops, and Applications teams with shared solutions. Get Ready - Red Hat Cloud
- Upskill your Team. Transition your Career. Cyber Security Foundation & Practitioner™ instructor-led course, for anyone needing a solid understanding of Cyber Security.