Insight Search

Sort by:
  • Whitepaper

    March 28, 2022
    As governments across the globe, including the EU, US, Canada, UK, Japan, Singapore and more, have imposed sanctions on Russia, with promises of additional action if Russia persists with its war on Ukraine, financial institutions and their customers are forced to review their trade and commodities transactions involving Russia to assess their legal and reputation risk. These reviews are…
  • Podcast

    March 23, 2022
    Quantum machine learning, or QML, is one of the three major application categories for quantum computing, along with optimisation and simulation. As we’re working with customers at Protiviti to find advantageous use cases in QML, we rely daily on a tool called PennyLane from Xanadu. Join host Konstantinos Karagiannis, and special cohost Emily Stamm, for a chat with Nathan Killoran from Xanadu to…
  • Podcast

    March 9, 2022
    Quantum volume. Algorithmic qubits. Qubit counts in general. What do they really tell us about the usability and power of a quantum computer? As we learned from classical computing, only benchmark software can really compare how systems perform different tasks. Super.tech is back to discuss their SupermarQ benchmark suite that gives us real performance data for quantum hardware. Guests: Pranav…
  • Podcast

    January 24, 2023
    In this episode, we focus on ESG from a legal perspective. Alyse Mauro Mason, an Associate Director with the Business Performance Improvement solution and ESG practice at Protiviti, interviews Dennis Kerrigan, Executive Vice President and General Counsel for the Hanover Insurance Group, and Rich Cohen, a Managing Director with the Legal Consulting practice at Protiviti.
  • Podcast

    July 18, 2022
    In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in…
  • Client Story

    February 26, 2021
    A successful organisation is one that can deftly coordinate its many moving parts, but, sometimes, even the best organisations can get out of sync. That was the case with an aerospace company and its inventory. The organisation knew it was operating with too much stock and was even holding millions of units after they had been written off the books. The company made numerous attempts to optimise…
  • Video

    June 2, 2020
    There are capabilities that are used today to evaluate external customers that should be applied internally. So take the voice of the customers and the learnings you have and apply them internally to ensure that the CFO's and Finance organisations are providing the best in class servicing to their internal customers.
  • Podcast Transcript

    November 16, 2021
    D-Wave has been making quantum computers for over a decade, and their annealers excel at optimisation. If you look at the use cases the company has been helping customers with – saving time, money or both - it almost feels like quantum advantage is here. During this podcast, we discuss the power of annealers from D-Wave and how organisations can take advantage of the benefits today. Guest…
  • Flash Report

    November 9, 2021
    On November 4, 2021, the U.S. Department of Defense (DoD or Department) published a proposed update to its Cybersecurity Maturity Model Certification (CMMC) and defined a path forward that has Defense Industrial Base (DIB) contractors eager to understand impacts to their business and anticipated next steps in the evolution of the CMMC programme. In addition to simplifying and consolidating the…
  • Flash Report

    June 3, 2022
    Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and…
Loading...