Latest Advisory

Implementing Values-Driven AI: CEnet’s CEChat Allows Schools to Create & Deploy Safe AI Agents at Scale
CEnet’s ‘cechat’ platform scales values-driven AI through a subsidiarity-based architecture, balancing national safety guardrails with local pedagogical autonomy for schools.

Implementing Values-Driven AI: CEnet’s CEChat Allows Schools to Create & Deploy Safe AI Agents at Scale
CEnet’s ‘cechat’ platform scales values-driven AI through a subsidiarity-based architecture, balancing national safety guardrails with local pedagogical autonomy for schools.

SAP Data Workflow Orchestration Corrals Data Archiving Licensing
SAP S/4 HANA performance suffers when data archiving is overlooked, but using Control-M’s flexible orchestration features can quickly protect data whilst optimising system performance, data licensing and resource management.

Disaster Recovery Strategy for the Cloud – Webinar and Presentation Kit
The Cloud may have high-availability, and play a role in most organisations’ business continuity plans, but it also demands its own disaster recovery strategy.

Accenture Leverages Google’s Technology to Help Solar Power Consumers
Accenture and Google have partnered to develop a solution to make it easier for energy retailers to identify potential costs for consumers of solar power. IBRS looks into how AI can continue to improve operational efficiencies and reduce operations costs for both vendors and consumers.

CIO Handbook – Part 4
The CIO handbook is designed to assist new CIOs in understanding their role, and experienced CIOs to consider whether they could do things differently.

Developing Cloud Maturity: Facilitating a Smooth Transition (Part 2 of 4)
Enterprises adopting the Cloud need to employ best practices to optimise benefits. Transitioning to Cloud maturity effectively requires a careful strategy to successfully adopt the Cloud for business operations.

Defending Against Enterprise Ransomware Without Breaking the Bank
Rather than just buying into the latest cyber security tools, many organisations can enhance their defensive posture against ransomware by adopting a few manageable operational activities