Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast September 22, 2021 Quantum Computing Interconnect, Memory, and Other Engineering Advances with Q-Next Engineering challenges abound in quantum computing. Technologies like interconnect and improved memory for repeaters will enable these machines to accelerate and power connectivity in the future. Q-NEXT is one of five quantum information science research centers funded by the DOE to help develop these technologies in addition to strengthening the nation’s leadership position in the quantum arms… Client Story January 21, 2025 Holistic Business Case, Power App Drive Revenue Growth and Margin Boost Learn how Protiviti's tailored logistics Power App and process optimisations fueled over 100% revenue growth and margin boost for a leading service provider. Blogs April 6, 2023 Migrating Security from Microsoft Dynamics 365 Finance and Supply Chain Management This blog post was authored by Julia Artzi - Consultant, Sarah Guthrie - Senior Consultant, Enterprise Application Solutions on The Technology Insights Blog. Microsoft Dynamics 365 Finance and Supply Chain Management (D365 F&SCM) publishes security changes with new code releases. These changes are automatically applied to out-of-the-box security roles,… Blogs March 8, 2024 Know the Business Continuity Risks and Solutions When Investing in SaaS We often hear our clients ask what steps to take to develop a Software as a Service (SaaS) strategy for IT environments. Both the CIO and business owners recognise the benefits of SaaS solutions, which are readily available and often focused on a particular business need. SaaS products are becoming more popular, and usage is expected to grow at a double-digit rate in the coming years, driven by… Blogs August 5, 2024 Why sales transformations fail and critical steps to avoid common pitfalls In today’s virtual selling environment, revenue-aligned organisations must adopt a different mindset to drive successful sales transformations. Technology alone is not enough for successful digital transformation in sales; practical considerations and change reinforcement are crucial. Client Story November 5, 2024 Navigating Security and GRC Optimisation during an SAP S/4HANA Conversion Master navigating security and GRC optimisation during an SAP S/4HANA conversion for enhanced system reliability and advanced data insights. Podcast October 3, 2024 Anglicare Sydney CEO on AI, housing and critical issues facing governments In this VISION by Protiviti interview, Simon Miller, CEO of Anglicare Sydney, a nonprofit organisation that offers services for seniors, families and individuals in need, from food and housing to mental health and family care, sits down with Protiviti’s Leslie Howatt, a managing director and the firm’s Technology Consulting solution lead in Australia, to discuss Miller’s work as the CEO of an NGO… Podcast September 27, 2023 Regulation, risk and reward with HSBC’s Chief Compliance Officer, Asia Pacific Some of the key things that I see will be around digitalisation, open banking, artificial intelligence and robotics, workforce transformation, cyber security, and as mentioned, sustainable banking as well as regulatory technology. We're also already seeing an increase in regulatory complexity, and banks will need to invest significantly more, in my opinion, around regtech solutions. These… Blogs June 30, 2023 A house divided: Key differences in cybersecurity implementation for IT and OT Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll Tide vs. War Eagle, The Egg Bowl, Bedlam, The Backyard Brawl, “The Game”). But we’re fundamentally not all that… Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Load More