Results for

Sort by:
  • Flash Report
    November 16, 2023
    The results from the recent ASIC cyber security survey, ‘REP 776 Spotlight on cyber: Findings and insights from the cyber pulse survey 2023,’ released on 13 November 2023, have once again highlighted the security posture of corporate Australia’s management of cyber security. While there were some encouraging trends in specific security capabilities around identity and access management,…
  • Blog
    November 13, 2023
    Driving the news: The U.S. Securities and Exchange Commission (SEC) has charged SolarWinds and its CISO for fraud and internal control failures relating to cybersecurity risks. Why it matters: These charges highlight the importance of implementing strong controls and disclosing known concerns to investors. In its complaint, the SEC alleges that SolarWinds and its CISO misled investors…
  • Blog
    February 8, 2017
    Starting with SAP HANA 2.0 we can now partition a single table between in-memory storage and SAP HANA Extended Storage (AKA.. Dynamic Tiring). This is an excellent feature because it simplifies the… Source: Multistore Table Partitions in SAP HANA 2.0
  • Blog
    November 14, 2023
    While the various forms of artificial intelligence (AI) have captured the imagination of nearly everyone in the business world, generative AI (GenAI) is rapidly becoming the hottest new kid on the block. We’ve seen the terms AI and GenAI being used synonymously but there are many types of AI. GenAI is the latest one and represents the ability of a model to create novel output. GenAI is a big…
  • Blog
    November 15, 2023
    This post is the third and final in an occasional series about diversity in cybersecurity. Our first post discussed achieving diversity’s benefits in cybersecurity; the second explored the high cost of gender bias in cybersecurity. Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in…
  • Blog
    November 3, 2023
    Amid a highly uncertain current and future business climate, 2024 is shaping up to be a doozy, particularly for CFOs and finance leaders as they plan and budget for the coming year. A complex global landscape: The ripple effects of wars, upcoming elections, inflation, central bank policies, trade wars and other disruptions are further complicating planning and budgeting activities. What you…
  • Blog
    November 7, 2023
    The big picture: The retail industry faces a labor crisis as workers leave for better work-life balance and incentives. Data shows high quit rates and a need for industry-experienced talent in management roles. Why it matters: The industry’s struggle to attract and retain talent is hindering growth and competition. This trend will only worsen in the coming months as competition for seasonal…
  • Podcast
    November 29, 2023
    We’ve done plenty of episodes where there is a piece of software or cloud platform users can try, usually for the purposes of making coding or algorithmic development easier. Coding naturally seems to be the quickest way to get involved in quantum computing, but we’ve never discussed actually building quantum hardware at home! Find out how to start learning the engineering side of quantum…
  • Blog
    September 9, 2016
    I was reading Vincent Granville's recent blog post and thought I might add a few of the problems I've addressed in my career. While these are not all data science they do fall within advanced analytics. Estimating hybrid yields and crop characteristics across multiple geographies, soil types, climates, and ecosystems based on performance of limited field trials. Estimating the same for…
  • Blog
    November 28, 2023
    The big picture: Whenever we write about cybersecurity, news of the day ensures we are never scrambling for examples of cyber attacks, data breaches and other events that create major problems for organizations. The points of vulnerability are many, including, for manufacturing organizations, IoT-connected devices. For these companies, it is critical to secure these devices. Because…
Loading...