All Posts
This is the fourth in a five-part blog post series that delves into modernizing marketing strategies through the integration of advanced marketing platforms. I had the pleasure of interviewing Shaun Memon of Munvo for this series, where we discuss a wide range of topics, from fragmented MarTech stacks, first-party data
One of the lesser talked-about issues large organizations face is the siloes that their various business units operate in. It’s a peculiar situation born from the specificity of tasks and objectives assigned to hyper-specialized teams within an enterprise. This separation of tasks inevitably leads to critical dependencies between teams. However,
It is difficult to evaluate high-dimensional integrals. One numerical technique that can be useful is quasi-Monte Carlo integration. In this article, I show how you can generate quasirandom points in SAS and use them to evaluate a definite integral on a compact region. For simplicity, the example in this article
If you’re building AI solutions today, you already know the stakes: faster decisions, trusted results and the ability to scale without blowing up your compute budget. What you may not always see is what’s happening under the hood to make that possible. That’s where strong technology partnerships matter. For more
Digital twin technology generates diverse, accurately labeled synthetic datasets in virtual environments, enabling faster, safer, and more reliable AI model development for PPE detection.
I had the privilege of joining the Dean’s Speaker Series at UNC Kenan-Flagler Business School, hosted in partnership with the Kenan Institute of Private Enterprise. My sincere thanks to Dean Mary Margaret Frank, the Kenan Institute team and all who made this event possible. It was an honor to share
No one is immune to identity theft – I know this firsthand. I was targeted while working at a financial institution where I was also a credit card customer. One day at work, I received an internal call from the bank’s customer contact center. I was informed that someone impersonating
Managing workloads in modern analytics environments is not keeping systems running, it’s about making sure the right jobs get the right resources at the right time. As organizations move analytics to the cloud, powered by Kubernetes, balancing workloads across computer resources becomes a critical challenge.
If you’re looking for a way to simplify your weeknight dinners and make meal prepping a breeze, shredded chicken is your secret weapon. With just a batch of tender, flavorful chicken, you can whip up a variety of quick and easy meals.
The rise of AI-powered fraud has supercharged criminals’ abilities to exploit systemic weaknesses and fool the most careful among us. Fortunately, as indicated by recent research from SAS and Coleman Parkes, the next few years will see major AI investments by government fraud fighters, giving hope that they will turn
Across government programs worldwide, the stakes for managing fraud, waste and abuse (FWA) have never been higher. Every dollar lost to fraud is a dollar that could have been used to fund public health, education, or infrastructure. In a previous blog, I discussed the movement toward increasing public sector productivity
A previous article shows how to convert a positive integer from base 10 to any other arbitrary base. For example, 15 (base 10) = 120 (base 3) because 15 = 1*32 + 2*31 + 0*30. Representing integers is probably familiar to many readers. But did you know that you can
Health care is entering a new era, one that moves closer to where people live. By 2026, the traditional model of care, centered around hospitals and clinics, is giving way to a more decentralized, patient-centric approach. This shift is driven by three converging forces: rising costs, evolving patient expectations and
Hackers have a major milestone to celebrate this year as the phishing attack turns 30 years old. Phishing attacks can be traced back to the 90s, coinciding with the popularity of America Online (AOL). For those too young to remember, AOL was an early internet service provider that revolutionized the
With the rapid evolution of regulatory environments, the pressure on financial institutions (FIs) to effectively detect and prevent money laundering while staying compliant with the changing pace of regulatory requirements is greater than ever. However, with the right tools and strategies, this pressure can be effectively managed. Regulatory scrutiny is