Results for

  • Infographic
    November 18, 2022
    Whether migrating to cloud-based applications or enhancing data security and privacy or managing workforce disruptions, chief financial officers at technology, media and telecommunications (TMT) organisations are resetting priorities and reimagining their long-term roles. Below are some of the key takeaways from the TMT results of Protiviti's latest Global Finance Trends Survey. Read full survey…
  • Blog
    January 19, 2018
    Corporate technology and security executives no doubt spend many a sleepless night anticipating what hackers might do next to attempt to gain access to valuable company assets. Keeping company and valuable customer data safe is Job One, as breaches can cost millions in lost assets, not to mention the reputational damage a corporation can suffer when an attack happens. Clearly, hackers can own the…
  • Blog
    March 7, 2018
    In a technology world where terms like Internet of Things (IoT), big data, augmented reality and bots are hot, a conversation about modems might seem painfully antiquated. But phone modems are still a surprisingly viable way for hackers to gain access to your organization’s valuable data. So today, we’re talking about the process for setting up an environment for interacting with modems, as well…
  • Landing Page
  • Podcast
    October 19, 2022
    Mathematics is one of the most intimidating barriers for those looking to get into quantum coding. Mention linear algebra the next time you want to grind a conversation to a halt. What if there was a resource to learn the necessary mathematics to best prepare for such a career? Join host Konstantinos Karagiannis for a chat with Leonard Woody, the author of an excellent new book, Essential…
  • Podcast
    October 5, 2022
    Using cardinality constraints for portfolio optimisation opens the doors to new applications for creating innovative portfolios and exchange-traded-funds (ETFs). All while providing better returns with less market risk.  Host Konstantinos Karagiannis recently co-authored a paper on portfolio optimisation with Sam Palmer from Multiverse Computing. Find out how the team was able to outperform…
  • Blog
    March 7, 2018
    The Server Message Block (SMB) is an integral part of any successful organization’s technology assets. In this blog post, we’ll take an easily digestible look at SMB, including its history, why and how it is used and what SMB is used for during penetration tests. SMB was first referenced as “IBM PC Network SMB Protocol” in a 1985 document by IBM, and in 1987 as “Microsoft Networks/OpenNet-FILE…
  • Podcast
    November 2, 2022
    Quantum computing requires quantum networking to reach its full potential. But there are engineering challenges to overcome. Learn about how repeaters that extend entanglement between qubits are really just application-specific quantum computers of their own. Also, learn how connecting these devices will pave the way for interconnect and other advances. Join host Konstantinos Karagiannis for a…
  • Client Story
    February 16, 2023
    Successware is an end-to-end business management solution for the home service industry that supports both independent and franchise owners of the three trades brands franchised by affiliates of its parent company, Authority Brands, Inc. Successware Classic is a legacy software system built with Citrix, VDI, and SQL server hosted in a data center. This solution has been in place since the 1990s,…
Loading...