All Posts
If you’re building AI solutions today, you already know the stakes: faster decisions, trusted results and the ability to scale without blowing up your compute budget. What you may not always see is what’s happening under the hood to make that possible. That’s where strong technology partnerships matter. For more
Digital twin technology generates diverse, accurately labeled synthetic datasets in virtual environments, enabling faster, safer, and more reliable AI model development for PPE detection.
I had the privilege of joining the Dean’s Speaker Series at UNC Kenan-Flagler Business School, hosted in partnership with the Kenan Institute of Private Enterprise. My sincere thanks to Dean Mary Margaret Frank, the Kenan Institute team and all who made this event possible. It was an honor to share
No one is immune to identity theft – I know this firsthand. I was targeted while working at a financial institution where I was also a credit card customer. One day at work, I received an internal call from the bank’s customer contact center. I was informed that someone impersonating
Managing workloads in modern analytics environments is not keeping systems running, it’s about making sure the right jobs get the right resources at the right time. As organizations move analytics to the cloud, powered by Kubernetes, balancing workloads across computer resources becomes a critical challenge.
If you’re looking for a way to simplify your weeknight dinners and make meal prepping a breeze, shredded chicken is your secret weapon. With just a batch of tender, flavorful chicken, you can whip up a variety of quick and easy meals.
The rise of AI-powered fraud has supercharged criminals’ abilities to exploit systemic weaknesses and fool the most careful among us. Fortunately, as indicated by recent research from SAS and Coleman Parkes, the next few years will see major AI investments by government fraud fighters, giving hope that they will turn
Across government programs worldwide, the stakes for managing fraud, waste and abuse (FWA) have never been higher. Every dollar lost to fraud is a dollar that could have been used to fund public health, education, or infrastructure. In a previous blog, I discussed the movement toward increasing public sector productivity
A previous article shows how to convert a positive integer from base 10 to any other arbitrary base. For example, 15 (base 10) = 120 (base 3) because 15 = 1*32 + 2*31 + 0*30. Representing integers is probably familiar to many readers. But did you know that you can
Health care is entering a new era, one that moves closer to where people live. By 2026, the traditional model of care, centered around hospitals and clinics, is giving way to a more decentralized, patient-centric approach. This shift is driven by three converging forces: rising costs, evolving patient expectations and
Hackers have a major milestone to celebrate this year as the phishing attack turns 30 years old. Phishing attacks can be traced back to the 90s, coinciding with the popularity of America Online (AOL). For those too young to remember, AOL was an early internet service provider that revolutionized the
With the rapid evolution of regulatory environments, the pressure on financial institutions (FIs) to effectively detect and prevent money laundering while staying compliant with the changing pace of regulatory requirements is greater than ever. However, with the right tools and strategies, this pressure can be effectively managed. Regulatory scrutiny is
Imagine being dropped into a vast mountain range, such as the Adirondacks and being tasked with finding a specific lake. You are told that the lake is located at the lowest part of the mountain range and the only tools you are given are a compass and a method for
SAS' new approach to MRM streamlines your compliance and review process by delivering real-time model reporting and statistical outputs.
The term “Internet of Things” has been around for over a decade, but the conversation between SAS Vice President of IoT Jason Mann and Quasar CEO Edouard Alligand shows that the real transformation is only just beginning. The two explored how IoT is moving beyond reactive monitoring toward predictive analytics