FEATURED BLOGS

SENIOR CONTRIBUTORS

Understanding Cybersecurity on Smartphones (UCS-Sph) Part 2

This second article of the Understanding Cybersecurity on Smartphones (UCS-Sph) series delves into Microsoft's Windows Phone, a mobile OS that has undergone significant changes...

Search ain’t what it used to be

Google’s incredible dominance in search may be decreasing in the age of generative AI and innovative competitors. In response to these threats, Google is...

4 reasons organizations should incorporate AI TRiSM into their AI models

Generative AI (GenAI) has opened the doors for new AI initiatives, making the need to implement robust AI trust, risk and security management (AI...

Is quantum computing reaching commercial viability?

Recent advances in quantum computing will lead to commercial viability soon. Given the dollars, talent, number of companies, and interest of various governments, the...

Understanding Cybersecurity on Smartphones (UCSph) Part 1

The smartphone is one of the most remarkable inventions in contemporary human history and is currently the most widely utilized electronic device globally. Its...

Canadian workers and businesses can guide the GenAI revolution

We have a rare opportunity right now. In what promises to be one of the most transformational moments in human history – akin to...

The business value of full-stack observability

I’ve discussed many technology domains over the years, during interviews with CIOs, CTOs and CDOs. One common trait is their ability to translate the...

5 Tech Trends Shaping Canada’s Business Landscape in 2024

While the generative AI market is poised to explode, and will become an increasingly essential part of IT spending, there are other tech trends...

Does your project sponsor need help?

Time-challenged executives who’ve been assigned to, or perhaps coerced to accept the project sponsor role need help. Too often, project sponsors: Do not understand...