Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Podcast Transcript September 8, 2021 Transcript | A 100-Qubit Quantum Computer Arrives Classical computing cannot simulate more than about 50 qubits. What does it mean that we now have a quantum computer with, gasp, 100 qubits? ColdQuanta found a way to beat giants like IBM to this amazing feat, and they did it with a new approach that may lead to smaller quantum computing systems that could be rack-mountable one day. Like a reverse microwave, the new Hilbert computer uses lasers… Podcast Transcript August 26, 2021 TRANSCRIPT | PRIVACY & CONSENT WITH KATIE STEVENS Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Podcast Transcript September 22, 2021 Transcript | Quantum Computing Interconnect, Memory, and Other Engineering Advances Engineering challenges abound in quantum computing. Technologies like interconnect and improved memory for repeaters will enable these machines to accelerate and power connectivity in the future. Q-NEXT is one of five quantum information science research centers funded by the DOE to help develop these technologies in addition to strengthening the nation’s leadership position in the quantum arms… Whitepaper July 28, 2022 Maximising OT Security and Resiliency Through a Risk-Based Framework The past 18 months have seen a significant increase in threats targeting critical infrastructure and operational technology (OT) networks. These environments are prime targets due to their age, complexity and importance to organisations. OT is the driver behind the largest corporations in the world – whether it is mixing the secret recipe for Coca-Cola, generating power for millions of customers… Blogs April 4, 2022 Creating a More Flexible and Resilient Supply Chain Starts With Identifying Key Risk Exposures No matter what they make or sell — computers, pet food, cosmetics, textiles — companies around the world are grappling with significant supply chain issues. It’s easy to blame the global health crisis for these problems, especially the labor, material and shipping container shortages. Certainly, the pandemic has played its part in exposing the global supply chain’s brittleness and exacerbating… Blogs April 29, 2022 How A Technology-Ready Workforce Can Accelerate Business Transformation As corporations are trying to return to some semblance of “normal,” whatever that definition may look like now, and are concurrently dealing with the lingering impacts of a global pandemic and implementing digital transformation, many challenges face the C-suite. Putting people and culture and how to adapt to the significant changes that have taken place in the workforce since 2020 may very well… Blogs May 13, 2022 Why Consolidated Security Will Help Meet Cyber Challenges Companies face multiple threats as the security landscape continues to evolve. But how can they get to grips with the cyber risks they face and a record number of data breaches? Taken together, all areas of risk and security are essential in modern businesses: from IT and physical systems to cybersecurity and personal protection. But if they aren’t implemented correctly, they all have the… Blogs May 15, 2022 Database Logging With Microsoft Dynamics 365 Microsoft Dynamics 365 Finance & Operations provides a database logging feature that can be used to track insert, update, delete, and rename key operation changes made to tables and fields in the application. Database logging is a valuable feature of Microsoft Dynamics 365 used to provide a chronological record of changes that occur within the application. Each record contains details of the… Podcast Transcript June 30, 2021 Transcript | Shortcuts to Coding Quantum with Amazon Braket and QCI Qatalyst Quantum computing is easy to access thanks to services like Amazon Braket. But how long does it take to apply one of these systems to a real-world use case? Sometimes months. Amazon partner Quantum Computing, Inc. (QCI) has launched Qatalyst API to shorten development time on some types of quantum coding … to under a week! Listen in to hear how Amazon is preparing for the future of high-… Blogs May 16, 2022 Quantitative Cyber Risk Management 101: Baselining and Baseline Cycling Cyber risk is a growing threat to organisations of all shapes and sizes. Cyber risk quantification allows organisations to better understand the financial impact that these risks pose; however, setting the scope of quantification activities and clearly articulating their outputs can be a challenge. Recently, Protiviti teamed up with the FAIR Institute to review how organisations can implement key… Load More