article thumbnail

Data monetization: driving the new competitive edge in retail

CGI

Data monetization: driving the new competitive edge in retail. Retailers are fully aware that their future relies largely on their ability to use data efficiently. However, in today’s dynamic and highly competitive retail sector, retailers need to accelerate their plans and commit resolutely to the path of data monetization.

Retail 96
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

OneRep provides a consumer service that scrubs your personal information from Google and dozens of privacy-breaching websites. Adding to this will be very smart uses of generative AI – centered around wisely directing LLM capacities onto specific data lakes containing threat intelligence information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The time for government blockchain proofs of concept is now

CGI

For the past two years, CGI has seen an exponential uptick in commercial sector interest in blockchain beyond just the financial services industry. For example, the U.S. In bitcoin, for example, the consensus standard is “proof of work.” Many government agencies also have been wading deeper into the blockchain waters.

article thumbnail

Necessity drives innovation; innovation is a necessity

CGI

Today, inventors are taking purposeful actions to deliver innovations not only to make things better, faster and cheaper, but also to protect the environment, create new consumer services and continue to improve our day-to-day lives. Take for example CGI’s “Hidden City” approach to smart infrastructure management.

article thumbnail

Necessity drives innovation; innovation is a necessity

CGI

Today, inventors are taking purposeful actions to deliver innovations not only to make things better, faster and cheaper, but also to protect the environment, create new consumer services and continue to improve our day-to-day lives. Take for example CGI’s “Hidden City” approach to smart infrastructure management.

article thumbnail

What will be your decisive moment to secure your cloud applications in a Zero Trust world?

Thales Cloud Protection & Licensing

Massive amounts of data are constantly produced globally, shared and stored by a rapidly growing number of devices in an expanding cloud environment. Data is useless unless it can be accessed, so it must reside in a place that’s penetrable, but only by those who are authorized. Trusted access is the key to the digital kingdom.

Cloud 115
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

Every time this very blog loads Font Awesome from Cloudflare's CDN, for example, it's verified against the hash in the integrity attribute of the script tag (view source for yourself). In that SHA-1 example, the finite number is 16^40 as there are 16 possible values (0-9 and a-f) and 40 positions for them.

Passwords 123