Results for

  • Blog
    January 17, 2024
    Workday’s object-oriented architecture and robust reporting engine enables financial and human capital data management and analysis within a single platform, unlocking possibilities for powerful new insights. To a new user, the complexity can feel daunting—so where to start? Let’s take a closer look at how to quickly get up to speed, access some of the most valuable standard (out-of-the-box)…
  • Blog
    October 13, 2015
    It really takes convincing and in-depth stakeholder understanding to get buy in for new IT projects. It is equally difficult to get time from business users for any IT implementation, let alone a simple SAP upgrade, that seemingly has little return from a business perspective. This explains the reason many corporations are not upgrading their SAP system or even leveraging the existing SAP BI…
  • Blog
    January 16, 2024
    The quantum threat to cryptography has kept the field of cryptography in a state of suspense for decades. In May 2022, a seismic event happened that most didn’t notice at first, but we’re about to feel the shakes. The White House published the National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems, also…
  • Blog
    January 9, 2024
    DevOps is dead – or so the story goes. This statement is echoed more and more these days, much to the dismay of the DevOps faithful, however technologists need to be careful to read between the lines. DevOps is most certainly NOT dead. DevOps is more alive than ever, although the connotation of the term DevOps continues to evolve. The key point remains: as software development teams move past…
  • Blog
    January 10, 2024
    These turbulent times of evolving threats and rising personal responsibility considerations for cybersecurity leaders make the CISO role a challenging but rewarding position. The CISO must contend with an increasing sophistication of attacks, potential geopolitical adversaries and the material impact cybersecurity can have on organizational value. Whether it’s a new CISO or a seasoned…
  • Blog
    January 9, 2024
    Over the past year, our leading experts came together to address some of the hot topics in the SAP space. Here are Protiviti’s most popular SAP insights from 2023 as we kick off the new year. We anticipate these topics will remain important for your success in 2024. #1. Lessons Learned: Shell Conversion to SAP BW Bridge for SAP Datasphere By: Jacintha Anandaraj In the modern digital era,…
  • Blog
    January 8, 2024
    The big picture: The shift to new in-office, work-from-home and hybrid working models is leading many organizations to reexamine their compensation and benefits strategies to support cultural objectives and attract talent. Between the lines: The need to realign rewards packages with new working models is part of a longer-term push by HR leaders to develop more detailed and nuanced…
  • Blog
    December 20, 2023
    The big picture: The SEC has released new rules around the timing and filing of Form 8-K for reporting material cybersecurity incidents that could pose a substantial risk to national security or public safety. Why it matters: The new rules require organizations registered with the SEC to provide required cybersecurity incident disclosure within four days of the determination that the incident is…
  • Survey
    December 20, 2023
    The economy, talent and cyber threats drive concerns for manufacturing and distribution leaders beyond supply chainIn an ever-evolving and rapidly changing business landscape for manufacturing and distribution organisations, executives and boards are challenged to navigate myriad risks, particularly as their businesses continue to play catch-up on numerous fronts in areas such as innovation and…
  • Blog
    November 3, 2015
    One great use of SAP Predictive Analytics Expert Analytics R Custom Components is to create an easily-run process for a particular calculation, chart, or visualization that you want to perform often. One example of this is correlation analysis, which is a step that many data scientists perform as a pre-processing and inspection step when building a predictive model. Expert Analytics does have…
Loading...