Insight Search

Sort by:
  • Podcast

    March 8, 2022
    ESG reporting is garnering a growing amount of attention today, particularly among board members seeking to understand and possibly comply with specific requirements in their country or their industry. But when it comes to ESG reporting, there are a lot of questions. Who specifically is required to issue these ESG reports? Who is issuing them voluntarily? And more importantly, what do…
  • Podcast Transcript

    March 8, 2022
    ESG reporting is garnering a growing amount of attention today, particularly among board members seeking to understand and possibly comply with specific requirements in their country or their industry. But when it comes to ESG reporting, there are a lot of questions. Who specifically is required to issue these ESG reports? Who is issuing them voluntarily? And more importantly, what do…
  • Client Story

    January 6, 2023
    d2i is a cloud-based healthcare analytics solutions firm that’s on the move. The company provides an unparalleled data analytics application that aggregates, harmonizes and enriches diverse data sources to some of the largest hospital emergency departments (ED) in the United States. The company currently extracts Electronic Health Record (EHR) data into their environment for over 240 hospitals.…
  • Whitepaper

    August 31, 2023
    By Sharon Lindstrom - Global Leader, Manufacturing and Distribution Industry Practice, ProtivitiBy the numbers: Overall, organisations today spend an average of 30% of their IT budgets on and invest a fifth of their IT human resources in technical debt management.This research, based on a global survey of more than 1,000 CIOs, CTOs and other technology leaders, underscores the burden created by…
  • Podcast Transcript

    July 14, 2023
    Quantum Information Science just might have commercial impact before quantum computing achieves error correction. All sorts of vertical industries will be able to take advantage of quantum clocks and sensors, enabling better navigation and even “seeing” through miles of solid Earth. Join Host Konstantinos Karagiannis for a chat about these amazing devices and what we can expect from cold atom…
  • Podcast Transcript

    May 4, 2022
    The fear of a quantum cryptographic apocalypse has been with us since the 90s and has launched quite a few careers and companies. Post-Quantum, no relation to this show, has been developing end-to-end solutions for quantum-secure communications since 2009, and they recently participated in a year-long proof of concept with NATO. Join host Konstantinos Karagiannis for a chat on practical solutions…
  • Podcast

    May 4, 2022
    The fear of a quantum cryptographic apocalypse has been with us since the 90s and has launched quite a few careers and companies. Post-Quantum, no relation to this show, has been developing end-to-end solutions for quantum-secure communications since 2009, and they recently participated in a year-long proof of concept with NATO. Join host Konstantinos Karagiannis for a chat on practical solutions…
  • Video

    December 11, 2020
    We often get asked, what is the difference between business continuity management (BCM) and operational resilience? Rather than look at the differences, we believe the best way to answer this question is to look at the relationship between these two programmes.
  • Podcast

    June 28, 2023
    Quantum Information Science just might have commercial impact before quantum computing achieves error correction. All sorts of vertical industries will be able to take advantage of quantum clocks and sensors, enabling better navigation and even “seeing” through miles of solid Earth. Join Host Konstantinos Karagiannis for a chat about these amazing devices and what we can expect from cold atom…
  • In Focus

    August 28, 2024
    Earlier this month, the National Institute of Standards and Technology (NIST) approved three post-quantum cryptography (PQC) standards that constitute the first significant steps towards protecting critical services from quantum computers being used to break the encryption of sensitive and classified information for both business and government.
Loading...