
Supply chain leaders are grappling with mounting returns, unsynced omnichannel data, and manual reconciliations that erode margins and customer loyalty. The upcoming Softeon‑hosted LinkedIn Live on April 2 will address these pain points by showing how to eliminate data silos across boardrooms and warehouse floors. Speakers Sarah Barnes‑Humphrey, Softeon CEO Jim Hoefflin, and IFS CRO Lance Olmsted will demonstrate AI‑driven visibility, robotics, and multi‑site orchestration to tame fulfillment complexity. Attendees will leave with a roadmap to scale technology without compounding inefficiencies.

ServiceNow’s president of global customer operations, Paul Fipps, walked viewers through the company’s $10 billion go‑to‑market engine, a platform that has driven more than 20% annual growth for five straight years. The firm expects its customers to run roughly $80 billion in workflows...

The video tackles a core dilemma for ERP buyers: how much functionality should reside inside the ERP platform versus external extensions, focusing on Microsoft Dynamics 365 (D365) and SAP S/4HANA. It frames the discussion as a trade‑off between built‑in capabilities...

The RevOps AF podcast episode tackles the "CRM identity crisis" – how flawed entity records in CRMs cripple AI‑driven revenue operations and data enrichment. Host Matthew Vaughn and Kernel CEO Anders Cone explain that the root problem lies not in missing...

The Black Hat talk detailed a multi-year, state-linked campaign by Chinese threat actors aimed at compromising perimeter firewalls and the networks they protect. Presenter Andrew Brandt, a principal threat researcher formerly at Sophos, walked through the evolution of the operation,...

At Manifest 2026, OMP’s Andrew Driscoll discussed the shift from AI hype to tangible supply‑chain execution. He highlighted how integrated planning platforms, digital twins, and connected data ecosystems are accelerating decision‑making and disruption response. The conversation underscored the critical challenge...

The video argues that most CRM implementations collapse because users abandon the system once they fall behind, opting for fresh prospecting instead of leveraging existing records. It highlights that dormant contacts often represent higher lifetime value than newly sourced leads, and...

The video introduces LSEG World-Check Verify, a cloud‑native name‑screening API designed to embed directly into payment and onboarding pipelines. Built on Amazon Web Services, the solution promises real‑time, privacy‑first checks that keep compliance from slowing down instant‑payment ecosystems. Key features highlighted...

The episode spotlights SH Test’s testing‑automation platform and its deployment at Northeast Georgia Health System (NGHS), a 1,000‑bed, multi‑hospital network running Epic across acute, long‑term and rehab care. The discussion centers on how automated regression testing reshapes the traditionally labor‑intensive...

The conversation weaves together a Hollywood‑style intrigue about leaked texts with a deep dive into sales ethics and a high‑profile ERP disaster. Host Eric and his guest use the Zimmer Biomet saga—where a $172 million SAP S/4HANA rollout was sold as...

Profile Software, a publicly listed Greek fintech firm, is positioning itself as a catalyst for banks’ digital transformation. The company focuses on two growth pillars—API‑driven core banking modernization and embedded finance—helping institutions replace legacy systems with modular, cloud‑ready platforms...

The discussion centers on three pillars of effective change management—vision, communication, and leadership—while also probing the strategic risks of emerging technologies like SAP’s AI‑enhanced master data governance. Speakers argue that a clear, purpose‑driven vision aligns teams, but without two‑way dialogue...

At Black Hat USA 2025, David Brockle III of NCC Group opened his briefing by framing AI security as a modern parallel to the early web’s reliance on firewalls. He argued that today’s AI guardrails function like statistical heuristics—useful but...

Dererick Martin clarifies a common misconception about vertical‑slice architecture: it does not mandate absolute code isolation, but rather the selective sharing of appropriate concerns. He distinguishes between technical plumbing—error handling, logging, outbox/event‑bus utilities—and domain data, which each slice owns. The slice...

The webcast, led by Peter Sleven, senior information‑security manager at Bank of Ireland, examined how enterprises can safeguard data as AI adoption accelerates. Sleven framed data security as a prerequisite for successful AI projects and outlined a roadmap that spans...

The video features ThreatLocker’s CEO previewing an upcoming product reveal, internally dubbed “Project Elephant.” The initiative follows the company’s recent success with zero‑trust endpoint protection, which now operates without generating alerts unless left in monitor mode. Key insights include the realization...

The CIO Talk Network episode focuses on how the U.S. Department of Energy’s CIO, Ann Duncan, is rethinking government IT to deliver higher value in less time. She frames the challenge as an “infinite game” where public expectations now mirror...

In this episode, João Moura (Joe Mora), founder and CEO of Crew AI, discusses the company’s mission to deliver end‑to‑end multi‑agent workflows for large enterprises. He explains how the startup grew from an open‑source library into a platform that handles everything...

The video spotlights the cloud security engineer track, emphasizing its distinct importance amid soaring demand for cloud expertise. Host Joe South outlines three career tiers—junior, senior, and lead—each with escalating responsibilities within an organization’s cloud defense posture. Junior engineers primarily monitor...

The new free course offers an end‑to‑end deep dive into MLflow, the industry‑standard platform for managing the full machine‑learning lifecycle. It guides learners through experiment tracking, model versioning, prompt management, and systematic evaluation, then demonstrates professional integration with Databricks and...

The presentation examined Palo Alto’s GlobalProtect remote‑access solution, focusing on its split‑tunnel feature that lets administrators whitelist domains such as *.zoom.us to bypass the VPN. The speaker, a security engineer with pentesting background, demonstrated how the feature intertwines DNS resolution...

At Black Hat USA 2025, Noam Moshe of Claroty Team82 exposed a critical flaw in Axis Communications’ Access Remoting protocol, the encrypted channel used by enterprises to manage fleets of IP cameras remotely. The protocol, built on MTLS and NLMSSP authentication,...

Cloud Field Day 25, held March 11‑12, focuses on cloud strategy, future infrastructure, and AI, featuring live sessions streamed on LinkedIn, YouTube, and partner sites. The agenda includes Hammerspace’s demonstration of a global namespace and policy‑based data management for AI workloads,...

Sam Jenkins, managing partner at Punchcard Systems, discusses how organizations can turn raw data into decision‑making products that drive better business outcomes. His upcoming talk focuses on building high‑performing digital enterprises by treating data strategically, designing tools around specific decision...

João Moura, reflecting on building CREI, argued that startups often must build complete systems in-house because partial solutions fail to reach production—teams expose the wrong data, lack deployment and monitoring, and ultimately don’t trust their models. He advised first-time AI...

Eric Helmer of Rimini Street discusses third‑party maintenance for legacy enterprise systems such as SAP ECC, JD Edwards, Salesforce, and VMware. He explains how TPM can slash support fees, keep stable platforms running longer, and sidestep mandatory cloud migrations. The...

Minder, an OpenSSF initiative, provides continuous policy enforcement for software supply chains, monitoring repositories, releases and pull requests to maintain security compliance with minimal friction. The service defines policies, uses webhooks to detect drift, and automatically remediates violations via patches, comments...

The Black Hat USA 2025 presentation warned that account‑recovery mechanisms—intended as a safety net for forgotten passwords—are rapidly becoming the most exploitable entry point in a passwordless ecosystem. Speakers Sidra, Gabby, and their research team outlined how recovery flows...

The webcast, hosted by veteran SANS instructor James Troll, introduces the 2025 edition of the Cybersecurity Standards Scorecard – an annual research effort that catalogues and evaluates the growing universe of cyber‑security frameworks. Troll notes that the SANS database now...

RBC Capital Markets is re‑engineering its client onboarding to position it as a competitive advantage rather than a mere compliance exercise. Lori Messer, global head of business and client services, emphasizes that a frictionless onboarding experience showcases the bank’s service...

A new eight‑month field study of over 20,000 employees reveals that conventional phishing awareness training fails to meaningfully reduce click rates. The research, presented at Black Hat USA 2025, shows that the success of phishing lures is erratic, with some...

Coinbase engineering leader Chintan Turakhia says the company has successfully scaled AI across a 1,000+ engineer organization to boost velocity and rebuild a major consumer-facing app under an aggressive six- to nine-month timeline. Adoption succeeded after leadership became hands-on with...

MCPTotal CTO Ariel Shiftan warned that MCP (Model Connector Protocol) servers—tools that let LLMs access private APIs and data—pose serious enterprise security risks. His team has discovered zero-day vulnerabilities in widely used MCP servers and routinely finds malicious or highly...

The CIO Talk Network episode dives into how organizations can construct a Voice of the Customer (VoC) playbook that turns raw feedback into actionable insight. Host Sanjal interviews Dwayne Lion of Vivele Data Solutions, who clarifies that VoC focuses on...

Omphile Matheolane’s presentation at DDD Europe centered on applying domain‑driven design to large‑scale financial applications. He argued that the first step is to delineate clear bounded contexts—such as accounts and loans—so each domain owns its data and logic without over‑reaching...

The video introduces the Supervisor Consumer pattern, a scalability technique that lets a single service handle fluctuating loads by automatically spawning and retiring consumer threads. Mark Richards explains that a dedicated supervisor component continuously polls an event queue, assesses the...

SAP announced a strategic partnership with NVIDIA to speed up its artificial‑intelligence initiatives. The collaboration gives SAP access to NVIDIA's GPU and software stack while hinting at a longer‑term goal of developing proprietary AI technology. Executives compare this move to...

Enterprises are discovering that traditional Web Application Firewalls (WAFs) no longer provide sufficient protection against today’s complex threat landscape. The video explains that a WAF, originally designed to filter malicious HTTP traffic, is an outdated term as application security now...

The session at Black Hat USA 2025 introduced a surprisingly simple technique—term‑frequency inverse‑document‑frequency (TF‑IDF)—as a powerful tool for spotting fraudsters, positioning it as an alternative to the sophisticated AI browsers and agents that dominate today’s web search. Speakers argued that generative...

The Coding Agents Conference on March 3 will feature Jiquan Ngiam discussing the rapid enterprise adoption of agents and Model Context Protocols (MCPs). Over 80 % of professional developers now use AI tools daily, and agentic coding platforms such as Claude Code...

Techstrong TV featured Nikquille Hondigal, co‑founder and Chief AI Officer of Forward Networks, to discuss the company’s evolution from a software‑defined networking (SDN) startup to an AI‑enabled network operations provider. Founded twelve years ago by Stanford PhDs, Forward Networks has...

The episode centers on a high‑stakes standoff between Anthropic and the U.S. Department of Defense over a $200 million contract to supply the Claude model. The Pentagon seeks fewer guardrails, while Anthropic insists on a strict human‑in‑the‑loop policy for any weaponized...

The video walks viewers through building an AI‑driven, agentic workflow in n8n, starting with a live demo that automates a repetitive competitor‑monitoring task. Max Tkacz emphasizes a disciplined triage process—evaluating potential automations on time saved, feasibility, risk of damage, and...

The Black Hat presentation explored how large language models (LLMs) can be fused with traditional static analysis tools to create a new generation of vulnerability scanners. The speaker outlined three integration patterns—AI‑enhanced, where a static scanner filters LLM output; AI‑explorer,...

Acting CIO Debbie Stephens of the U.S. Patent and Trademark Office joined Scoop News Group’s Billy Mitchell at a GDIT Emerge session to discuss modernizing legacy systems. She emphasized moving beyond mere technology deployment to achieve genuine adoption, highlighting artificial...

The video outlines how Finastra is reshaping the operating model for trade finance amid sweeping regulatory reforms that now recognize electronic documents as legally equivalent to paper. Banks across Europe, the United States, the Middle East and Southeast Asia...

The CIO Talk Network interview spotlights the growing complexity of eDiscovery within the U.S. Department of Justice’s Civil Division. Host Sanjok speaks with Allison Stanton, the newly created Director of eDiscovery, to explore how the federal government tackles both affirmative...

The Platform Engineering meetup highlighted a shift in AI strategy: success hinges on continuous learning rather than sheer output volume. Speakers warned that the industry’s rush to “move at AI speed” must be tempered by robust safety and security practices,...

The live discussion centered on the anatomy of ERP failures, with Eric Kimberling of Third Stage Consulting introducing Fred Hler, director of the firm’s expert‑witness practice. The conversation highlighted that ERP implementations fail at alarming rates—often quoted above 80%—and that...

Komed Health, a Swiss startup led by CEO Louisa Dober, has built an orchestration “coordination execution” layer that links hospitals’ EMRs and clinical systems to a WhatsApp-like mobile interface for clinicians. Deployed in 29 hospitals across Switzerland and Germany with...