Why Accenture Bought a Digital Ad Agency

Posted by & filed under Careers.

Never has the notion of swimming outside one’s lane been so exciting. Accenture, the spawn of Arthur Andersen turned consultant turned marketing guru, is buying Droga5, a buzzy advertising agency. Odd fit? Maybe. But consultants increasingly have been veering into the business of marketing. Clients that need IT strategies need marketing strategies that happen to… Read more »

Samsung warns its profits will drop 60% as smartphone demand slumps

Posted by & filed under smartphones.

Samsung is feeling the chill from cooling global demand for smartphones.The South Korean technology giant said Friday that it expects operating profit for the first quarter to plunge by 60% compared to the same period year ago.Samsung (SSNLF) warned last week that its earnings would be hit by slowing demand for memory chips and display panels, a sign that… Read more »

Let the 5G battle commence

Posted by & filed under 5G.

South Korea was long expected to be first with 5G. It is a technological powerhouse with ultra-fast broadband, home to giant firms such as Samsung and a government that sees leading the world in connectivity as a matter of national pride. Three networks were due to launch commercial 5G services on Friday when news emerged… Read more »

Look beyond RPA hype

Posted by & filed under Automation, Robotic Process Automation (RPA).

Despite talk that RPA is over hyped, Sarah Burnett, a guru on automation technologies, says that it can cut process costs by 30%, but there is another benefit, not so obvious, and it lies with creating data we can trust. Source: Information Age Date: March 27th, 2019 Link: https://www.information-age.com/look-beyond-rpa-hype-123481025/ Discussion 1) What is Robotic Process Automation? 2) How… Read more »

Phishing Attacks and Spear Phishing: What They are, Why They are Effective, and How to Prevent Them

Posted by & filed under Cybersecurity.

Phishing attacks have been a way for malicious actors to compromise organizations at alarming rates over the years. In fact, a recent survey found that 83% of respondents experienced a phishing attack in 2018, and that a successful attack costs a mid-size enterprise organization $1.6 million. Unfortunately, most industry experts agree that phishing will also be one of the… Read more »

The Imminent Evolution of ‘Augmentation’ in Accounting and Finance

Posted by & filed under Automation, Careers, Future of Work.

Late last month, I was the keynote speaker at the Tax Executive Institute in San Mateo, CA. This was a gathering of global tax leaders from accounting firms and public companies coming together to discuss the impact of technology in tax and accounting professions. I asked several folks a simple question — how much of your time… Read more »

Today’s Google Doodle uses AI to let you write music in the style of Bach

Posted by & filed under Careers, Emerging Technologies, Google.

Ever wanted to write music like Johann Sebastian Bach? In honour of the composer’s 334th birthday, today’s Google Doodle uses artificial intelligence to turn a simple melody into a four-part chorale arrangement. The machine-learning model that powers the Doodle, Coconet, was developed by Anna Huang. She’s an AI resident at Google and worked on the project while… Read more »

How microwave-sized satellites can pinpoint oilsands emissions

Posted by & filed under business models, Careers, Emerging Technologies.

For years, space agencies around the world have used satellites to track greenhouse gas emissions from individual countries, but now a Canadian startup is able to focus more precisely on facilities such as power plants, refineries and landfills. The oilsands industry in northern Alberta is already using the technology as the sector tries to gather better information… Read more »

Beefing up security

Posted by & filed under Cybersecurity.

MANY OF US have little more than a weak, reused password standing between our financial assets and a remote attacker—one armed with powerful tools and a database of passwords from security breaches. This is a losing battle. It’s the most likely way for weak computer security to put our finances at risk. Think this can’t happen… Read more »