Insight Search

Sort by:
  • Podcast

    November 2, 2021
    Ever notice that giant tech companies seem to get press coverage for privacy concerns as often as they do for new product launches? How did we end up in this world of playing catch up with the ethical implications of technology? Quantum computing is still relatively new, but it will impact machine learning, encryption, and other areas that will have major repercussions on all our futures. During…
  • Podcast Transcript

    November 2, 2021
    Ever notice that giant tech companies seem to get press coverage for privacy concerns as often as they do for new product launches? How did we end up in this world of playing catch up with the ethical implications of technology? Quantum computing is still relatively new, but it will impact machine learning, encryption, and other areas that will have major repercussions on all our futures. During…
  • Podcast Transcript

    February 7, 2023
    We’re getting close to practical advantage with quantum computing when running optimisation algorithms. Companies interested in being leaders in their industry should already be considering how to harness this promised power with use cases that solve their business problems. But some companies want a better solution that’s advantageous today, even if it’s only quantum-inspired. Join host…
  • Podcast

    February 22, 2023
    As NISQ-era quantum computing improves, we’re on the cusp of practical advantage within a couple of years. But some companies want to see impressive performance today. That’s where quantum-inspired solutions can provide up to triple the power, all on classical hardware. Learning quantum-inspired programming could even help coders migrate to real quantum computers in the future. Could these…
  • Podcast Transcript

    March 10, 2023
    As NISQ-era quantum computing improves, we’re on the cusp of practical advantage within a couple of years. But some companies want to see impressive performance today. That’s where quantum-inspired solutions can provide up to triple the power, all on classical hardware. Learning quantum-inspired programming could even help coders migrate to real quantum computers in the future. Could these…
  • Whitepaper

    April 27, 2023
    Price transparency compliance continues to elude hospitals two years after its effective date on January 1, 2021. While the Hospital Price Transparency (HPT) rule was met with great debate within the industry, the Centers for Medicare and Medicaid Services (CMS) continues its initiatives for ensuring greater transparency in healthcare. An audit of price transparency can prompt further compliance…
  • Whitepaper

    May 1, 2015
    Con l’approvazione della Legge 15 dicembre 2014, n. 186, in vigore dal 1° gennaio 2015, è stato introdotto nell’ordinamento italiano il delitto di autoriciclaggio, annoverandolo inoltre fra i reati presupposto della responsabilità amministrativa degli Enti ex D.Lgs. 231/2001. A qualche mese dall’entrata in vigore della Legge, e in attesa della prima giurisprudenza, il presente Insight intende…
  • Newsletter

    March 31, 2020
    Quali sono i principali rischi che le aziende si trovano a dover affrontare in relazione alla tenuta della propria Supply Chain? Quali sono gli strumenti più utili a supportare il processo decisionale? Quali azioni devono intraprendere le imprese per minimizzare​ i costi, mantenere i margini e garantire al meglio la propria business continuity? Come abbiamo ampiamente evidenziato nel nostro…
  • Newsletter

    April 1, 2015
    L’organizzazione IT cambia veste e mission all’interno dell’azienda. Se fino a qualche anno fa supportava i processi aziendali per creare efficienza, adesso è sempre più impegnata nel dare il proprio contributo all’innovazione dei modelli di business. E’ il mercato stesso che impone questo cambiamento: sfruttando le infinite potenzialità della digitalizzazione, le aziende tendono a rinnovare…
  • Newsletter

    May 3, 2016
    A partire dal caso Snowden, il termine Data Leak è entrato nel vocabolario comune ad indicare il trasferimento non autorizzato - volontario o involontario - di informazioni riservate. Nonostante il continuo sviluppo delle tecnologie di sicurezza informatica e gli sforzi delle aziende volti a proteggere i propri dati, i casi di data leak sono sempre più frequenti e di dimensioni sempre più…
Loading...