Real-world use cases for agentic AI
While genAI chatbots are mostly deployed as assistants or copilots, agentic AI allows companies to automate entire business processes and fundamentally transform operations. Here’s how…
How companies are putting embedded genAI to good use
Enterprise software vendors of all stripes are beginning to add generative AI features to their applications. Here’s how Stream Financial, NFP, and Thomson Reuters are…
GenAI in productivity apps: What could possibly go wrong?
In addition to controlling the use of ChatGPT and other standalone tools, companies now have to grapple with generative AI being built into the productivity…
9 of 10 directors support regulator action on cybersecurity
In a study released this morning, nine out of 10 corporate board members said that regulators should hold businesses liable for breaches if they haven’t…
Don’t overdo biometrics, expert warns
Biometric data such as fingerprint scans is being collected too widely and too casually, according to security company Protegrity USA.”Today, many of the major banks…
‘Legitimate’ rooting apps paving way for malware
Companies that create tools for “rooting” Android phones may be within the law, but they may be inadvertently paving the way for malware developers.According to…
Too many healthcare employees complacent about security
Non-technical health care employees are too complacent about the possibility of a data breach, and few are aware that it has happened to their organizations,…
Advertising network takes on malvertisers
In the war between malvertisers and legitimate advertising networks, the bad guys seems to be winning. Attackers use real-time bidding platforms to place malicious ads…
Application attacks against clouds up 45%
Application attacks against clouds jumped 45 percent last year, according to a new report from Houston-based cloud security firm Alert Logic, Inc.The report was based…
Quarter of firms can’t tell how hackers get in
The majority of large companies have experienced a breach over the past twelve months, but almost a quarter, 23 percent, of firms do not know…
Average business spends $15 million battling cybercrime
The average U.S. company of 1,000 employees or more spends $15 million a year battling cybercrime, up 20 percent compared to last year, according to…
Top 4 gamification apps
NETWORK WORLD–Companies should not attempt to jump into gamification all at once. Here are four specific applications that are excellent places to start your gamification…
Why Linux is a desktop flop
It’s free, easier to use than ever, IT staffers know it and love it, and it has fewer viruses and Trojans than  Windows. It’s already…
Banking on IT in China
SHANGHAI — In the first 10 months of 2006, Chinese regulators uncovered 776 banking crimes, Â including 205 cases involving more than 1 million yuan ($125,000…
Creative Recruiting
Four years ago, CEO John Cestar took a novel approach to increasing the skill levels at Freeborders, a small outsourcing provider that operates in China.…
Outsourcing in China
About two years ago, Kevin Miller needed a little help supporting legacy applications and developing new software for large automotive manufacturers. He decided to conduct…
Bridging the Chinese Skills Gap
Originally published in Computerworld. Hankscraft Inc. has been making industrial motors and mechanized pumps for more than 50 years in Reedsburg, Wis. The company came…
Language Barriers
Originally published in Computerworld. Among the various sourcing peculiarities and problems specific to China is regionalism, says Pieter Tsiknas, director of SearchBank’s Beijing office. Read…
Saving face in China
Originally published in Computerworld. In the West, companies want to put on a good face for customers, even if it means having to admit mistakes.…
Outsourcing: Russia and Eastern Europe
Compared with some of the big-league outsourcing players, Russia is a rookie. The country’s current revenue from IT outsourcing is $150 million to $200 million…
Russia and Eastern Europe
There’s a treasure trove of scientific talent — and lots of government bureaucracy.
Piecing It All Together
A year after Steve Kaufman and his staff at Goshen, Ind.-based health care insurer Mennonite Mutual Aid Association (MMAA) launched a massive enterprise application integration…
Cost Savings and Collaboration Drive B2B E-Payments
But competing systems work to snarl the flow of transactions.
Web Services
Web services are applications that use a universal language to send data and instructions to one another, with no translation required.
Tech revolutionizes Russia’s Central Bank
As recently as a decade ago, the Russian banking sector was an antique monstrosity, a huge system of paper-based transactions inherited from the former Soviet…
Citigroup Opens Online Brokerage
It joins a crowded marketplace.
Out-of-bounds perks?
When you go out on a limb in asking for new job benefits, it helps if you know just how far is too far
TV Tower Fire Sparks Net Use in Russia
When a broadcast tower fire threw several Moscow TV stations off the air last week, many would-be TV viewers turned to the Internet. In some…
Structured Financing
Structured financing is a way of borrowing money against an asset or a projected asset without consideration of the creditworthiness of the borrower.
J. P. Morgan IT Exec Loosens Grip on Services
Will turn over firm’s back-office operations to Bank of New York