
The live discussion centered on the anatomy of ERP failures, with Eric Kimberling of Third Stage Consulting introducing Fred Hler, director of the firm’s expert‑witness practice. The conversation highlighted that ERP implementations fail at alarming rates—often quoted above 80%—and that litigation around these failures is becoming a specialized niche. Key insights included the multi‑faceted nature of project collapse: inadequate governance, mismatched expectations, and fragmented accountability all converge to create a perfect storm. Fred explained that an expert witness’s job is to distill this technical chaos into clear, courtroom‑ready testimony, serving either plaintiff or defense while navigating the same data that caused the original disruption. Fred’s background—spanning IT roles since 1985 and consulting since the early ’90s—underscored his credibility. He noted, “It’s never just one thing; it’s usually a lot of things that have led to this unfortunate position,” and emphasized the advantage of stepping outside the project’s noise to conduct a calm, analytical review. The implications are clear for enterprises: neglecting robust project controls not only risks costly rollouts but also exposes firms to legal exposure. Companies that engage seasoned advisors early can mitigate failure risk, while those already in litigation benefit from witnesses who stay current through ongoing consulting work, ensuring the most relevant, up‑to‑date insights are presented in court.

Komed Health, a Swiss startup led by CEO Louisa Dober, has built an orchestration “coordination execution” layer that links hospitals’ EMRs and clinical systems to a WhatsApp-like mobile interface for clinicians. Deployed in 29 hospitals across Switzerland and Germany with...

Founder Peter Fuller of The Workflow Academy disclosed the AI stack powering his RevOps practice, promising a 20‑30% efficiency lift. The toolkit combines Cerebro Analytics for dashboards, Lovable for app development, Moon Knox as a ChatGPT wrapper, and Anthropic’s Claude...

Future Finance hosts Paul Barnhurst and Glenn Hopper discuss with Riya Grover, CEO of Sequence, how unifying Configure‑Price‑Quote (CPQ) and billing eliminates revenue leakage between CRM and ERP systems. The episode highlights that contract details often get lost when sales...

The IT spending landscape is rapidly shifting, with organizations allocating more budget to software solutions than to traditional consulting services. Automation and artificial intelligence are accelerating this transition, enabling enterprises to implement scalable tools without extensive human advisory. As AI-driven...

The EU Startups podcast features Enrico Giacomelli, founder of Italy’s digital‑trust specialist Namirial, which has grown into a €1.1 billion enterprise. Giacomelli walks through the company’s 30‑year journey from a modest paper‑selling venture in 1991 to a market‑leading platform for electronic...

The 229 Podcast episode convened senior clinicians from Jefferson Health, Geisinger and Northwell Health to map an enterprise‑wide AI governance playbook. Panelists described how their CEOs have elevated artificial intelligence to a strategic imperative, linking it to cost reduction,...

The Black Hat talk spotlights machine‑check exceptions (MCEs) – hardware‑level fault signals that fire when a CPU detects catastrophic errors such as cache corruption, thermal trips, or external interference. Christopher Domas demonstrates that, unlike ordinary interrupts, MCEs cannot be masked,...

A critical Chrome zero‑day vulnerability is being actively exploited in the wild, and Google has released an emergency patch. The flaw, a use‑after‑free bug in Chrome’s rendering engine, allows attackers to execute arbitrary code simply by getting a user to...

The video features an interview with Alex, a senior executive at Encompass, recorded at day four of CybOS Frankfurt 2025. He outlines how the Australian‑born fintech is reshaping corporate know‑your‑customer (KYC) processes and digital identity solutions for institutional clients. Encompass began...

Jamara, the GRC Engineering Model for Automated Risk Assessment, is an OpenSSF‑hosted open‑source project that defines a multi‑layer logical model for integrating governance, risk, and compliance (GRC) directly into software engineering pipelines. Its purpose is to replace fragmented, tool‑specific data...

Talking Health Tech’s latest episode spotlights Roland’s enterprise‑level Concentric Care platform, designed to streamline patient flow and boost operational efficiency across hospitals. Executive Director Steve Gomes explains how a 25‑person engineering team in Victoria has built a middleware layer that...

SmartStream CEO Ak Jaffa announced a strategic push to double down on artificial intelligence and customer‑success initiatives, positioning the firm’s brand to reflect a blend of AI and human intelligence delivering measurable value. The company will continue heavy R&D spending, rebranding...

David Wheeler, director of open‑source supply‑chain security at the OpenSSF, introduced the OpenSSF Best Practices Badge – a three‑tier (passing, silver, gold) certification that evaluates open‑source projects against a curated set of security‑focused criteria drawn from well‑run repositories. The badge...

In the latest 2 Cyber Chicks episode, Karla Reffold, Chief Insights Officer at Surefire Cyber, explains how threat intelligence can move from static data to actionable insight during high‑pressure incidents. She emphasizes the need for concise, context‑rich intel that aligns...

The CIO Talk Network episode reframes eDiscovery as a strategic data‑governance and risk‑management function rather than a purely reactive legal task. Vivian Tero of IDC and host Sanjog Aul discuss enterprise confidence gaps, the surge of AI‑driven automation, and the...

Executives routinely underestimate how consuming enterprise resource planning (ERP) implementations are, treating them like routine IT upgrades instead of operational overhauls that demand sustained senior and key-user engagement. Consultants say clients must participate deeply—defining requirements, testing, making rapid decisions and...

Sophos researchers presented a novel pipeline that pairs anomaly detection with large language models to harvest benign command‑line examples for supervised classification. Instead of relying on unsupervised anomaly detection to flag malicious inputs, the approach uses the detector to surface...

Episode 262 of the Transformation Ground Control podcast dives into three core topics: Microsoft’s ongoing bundling regulatory challenges, a discussion on the top system integrators in the market, and an overview of SAP’s RISE offering. Host Eric Kimberling and guest...

Google unveiled Facade, a self‑supervised AI system that detects insider threats by analyzing contextual patterns in corporate logs. Leveraging contrastive learning on exclusively benign data, Facade achieves unprecedented accuracy, reporting false‑positive rates below 0.01% and as low as 0.0003% for...

The Techstrong Gang dissected a new AI innovation pledge signed by 88 nations that emphasizes market expansion while omitting enforceable safety standards. The hosts debated how this signals a fragmented global governance landscape and reshapes competitive dynamics among superpowers. They...

AI agents expand the attack surface beyond traditional microservices by accessing models, memory, GPUs, and external tools, making conventional container isolation inadequate. Industry leaders discussed how lightweight VM‑based sandboxes, such as those built on Kata, can provide stronger isolation, limit...

Techstrong TV’s February 24 2026 episode spotlighted the rapid convergence of AI and enterprise infrastructure. RUCKUS President Bart Giordano explained how AI‑driven applications and edge workloads are forcing a rewrite of wireless performance, reliability, and security. Microsoft’s Tiffany Treacy and Keith Kirkpatrick...

The video introduces penetration testing as the offensive counterpart to defensive security roles, highlighting its focus on discovering and exploiting weaknesses across hardware, software, networks, policies, and people. Kean Evans explains that entry‑level testers start with automated scans, then progress to...

Red Hat is positioning open‑source technologies as the backbone of modern banking infrastructure, offering secure, compliant platforms for cloud‑native transformation. The company showcases its enterprise‑grade Red Hat Enterprise Linux and OpenShift solutions, which bridge community innovation with strict financial regulations....

Leaders from Skyward, Nationwide and veteran CIOs warned that while AI's potential is real, most pilots stall without C‑suite and board alignment, clear governance and a scalable operating model. Skyward’s CEO described moving from experimental proofs to enterprise deployment by...

The short‑form video stitches together a rapid‑fire commentary on the current state of SaaS growth, AI‑chip economics and Atlassian’s latest earnings, highlighting how profit and revenue stacks are being reshuffled amid the AI boom. Atlassian reported a 23 % year‑over‑year revenue increase...

IBM has repositioned itself as a software‑led, platform business centered on hybrid cloud, artificial intelligence and quantum computing. Over the past three years the pivot delivered roughly 1,000 basis points of operating‑margin expansion and about $5 billion of incremental free cash...

The video highlights how organizations routinely overlook a significant portion of devices on their networks, exposing a blind spot in cybersecurity defenses. Speakers reveal that roughly 10‑12% of assets are completely unknown, and among the known inventory, about 12% lack endpoint...

Researchers from Wiz uncovered a critical vulnerability in the NVIDIA Container Toolkit, the software that isolates AI workloads on NVIDIA hardware. The flaw permits a container escape to the host OS, potentially compromising entire Kubernetes clusters and exposing cross‑tenant data....

The segment’s focus is the widening gap between robust software earnings and mounting fears that generative‑AI agents could render traditional enterprise applications obsolete. A viral investment‑newsletter essay titled "The 2028 Global Intelligence Crisis" sparked the conversation, prompting analysts to compare...

HubSpot has introduced a Find and Replace Users tool that scans the entire CRM for references to a departing employee and swaps them with a new owner in just a few clicks. Previously, admins had to manually edit workflows, meeting...

Optimum Healthcare IT announced a major expansion of its managed‑services operation into Costa Rica, positioning the Central American nation as a new hub to alleviate the chronic staffing shortage plaguing U.S. healthcare IT departments. The company cites Costa Rica’s growing pool...

At Black Hat USA 2025, Google engineers unveiled an AI‑powered agent that autonomously performs digital forensic timeline analysis and threat hunting within Timesketch. The system ingests heterogeneous log streams, reconstructs attack chains, and surfaces compromise evidence without relying on pre‑written...

The video demonstrates how a customized OpenClaw AI instance can generate real revenue by automating outreach, resurrecting stalled deals, and surfacing better contacts from CRM and sales call data. The creator shows it drafting personalized re-engagement emails, finding alternative decision-makers...

The talk introduced Alfred, Loblaws’ production‑grade orchestration layer designed to power agentic commerce across its massive retail ecosystem. Built on Google Kubernetes Engine with a FastAPI gateway, Alfred abstracts LLM providers, leverages LangChain‑style execution graphs, and connects to over fifty...

RSAC’s Innovation Sandbox Contest showcased over $18.1 billion in follow‑on funding, more than 100 acquisitions, and AI‑centric finalists, backed by a $5 million Crosspoint grant and expanded early‑stage programs. OpenTelemetry’s growing adoption is prompting the creation of unified observability warehouses that combine...

Supply Chain Now’s ‘Now Generation’ episode spotlights Texas Christian University’s approach to preparing students for rapid entry into supply‑chain roles, featuring TCU adjunct Ryan Goodwin—senior director of supply chain technology at Trinity Industries and co‑founder of the Texas Tabletop Society—and...

The video warns that vendor lock‑in is a leading cause of digital‑transformation project failure, especially in large ERP rollouts. It stresses the need for modular, API‑first architectures and early negotiation of exit clauses. By applying rigorous vendor due diligence and...

The video offers practical closing advice for firms embarking on, or already deep into, an SAP S/4HANA transformation. The speaker emphasizes that the initiative must be business‑led, with clear ownership from the line side rather than being relegated solely to...

The Black Hat USA 2025 talk, titled “Vaulted Severance: Your Secrets Are Now Outies,” examined critical weaknesses in modern secret‑management systems, using HashiCorp Vault as a case study. The presenters, from SIATA, framed the discussion around how vaults serve as...

The Gartner ThinkCast preview warns that IT operations are ill‑prepared for the surge of AI agents and that CIOs are pressing for AI‑driven cost reductions. Speakers Autumn Stanish and Paul Delori cite that 52% of CIO priorities for 2026 are cost‑cutting,...

The video spotlights the rapid rise of the MCP (Model‑Centered Programming) standard since its November 2024 launch and the stark security lag that now threatens its expanding ecosystem. While major platforms are racing to support MCP, developers are left scrambling to...

The conversation centers on Cursor, an AI‑driven coding assistant, and how developers are adapting to a new paradigm where large language models act as pair programmers or autonomous agents. Ricky Doar and his guest discuss the rapid adoption of Cursor...

The video clarifies that not every state change qualifies as an event; creating a shipment is merely CRUD, while actions like order dispatched, shipment loaded, arrived, or delivered are true events. It argues that event sourcing can become over‑engineering if...

The video outlines Intel’s initiative to transform inbound service calls into revenue‑generating interactions by layering artificial intelligence onto traditional call‑center operations. By teaming with McKinsey and Google, Intel built a platform that automatically transcribes, categorizes, and analyzes calls, delivering real‑time insights...

The Black Hat USA 2025 presentation by Bitdefender researchers Yangabella and Yan Pedrian revealed how DNS traffic from smartphones can be weaponized to create persistent, cross‑network device fingerprints. By acting as a curious DNS resolver, they collected 985 million DNS events...

TechStrongTV’s February 20 episode spotlights Kevin Green, co‑founder and chief marketing officer of Hapix, a startup building AI‑driven solutions for community banks and credit unions. Green explains that beyond product features, controlling the narrative around AI adoption is critical in a...

Third Stage Consulting released a video highlighting a suite of free resources designed to help enterprises avoid costly mistakes and vendor traps during digital transformation initiatives. The offering includes the 2026 Digital Transformation Report, 2025 reports on AI strategy and...

Constellation HomeBuilder Systems executives Bob Swainhart and Chris Graham argue that real‑time data, integrated ERP platforms, and practical AI are no longer optional for homebuilders. They cite rising consumer hesitancy and rapidly shifting market conditions as catalysts for adopting these...