Overview
Explore
Careers
20 results found
A Brief History of NLP
NLP has substantially transformed our daily life. We dive into the history of NLP models to understand its past, present, and future, and how NLP can help businesses create value using text data.
Blog
• Feb 23, 2023
Measuring ROI for Agile Projects
Can return on investment (ROI) be measured for agile projects?
Blog
• Sep 9, 2022
AI Recipes for Quick Service Restaurant Success
A brief guide on leveraging data and analytics in the QSR/Retail space to address opportunities and threats in a fast-evolving industry.
Blog
• Jun 30, 2024
Vulnerability Assessment Versus Penetration Test: Which is Best for You?
Vulnerability assessments are often confused with penetration testing and used interchangeably, but they could not be more different.
Blog
• Feb 11, 2020
Application Rationalization Driving Financial Accountability
Banks are looking to strategically reduce IT operating costs with application rationalization, cloud migration, process automation and strategic vendor management.
Blog
• Jun 14, 2023
Innovative Regulatory Compliance Solutions for the Banking Industry
Banks must address an increasing volume of compliance directives from regulators. This blog post details WWT's multifaceted approach to mitigating regulatory risks through compliance automation, preventative risk management and continuous monitoring.
Blog
• Mar 25, 2024
When to Use a Utility-Based Consumption Model for On-Premise Solutions
Organizations today desire cloud-like billing mechanisms to help pay for on-premise solutions, and a number of options for consuming on-premise, cloud-like solutions exist.
Blog
• Sep 14, 2021
API Security Fundamentals: An Introduction (and What Does the Super Bowl Have to Do With It?)
Let's delve into all things API security, particularly aimed at global financial institutions. Here, I cover the basics and provide an overview of WWT's approach (with a Super Bowl-themed twist). Next, I'll cover API discovery; then API focused threat detection, prevention and response; and lastly, API security testing and validation.
Blog
• Jan 25, 2022
Mitigate Risk by Exposing Application Dependencies
Application dependency mapping is critical for maintaining secure and stable applications. Here are five ways it can enhance security, supportability and stability.
Blog
• Jun 15, 2023
The Case for Incremental pLTE Coverage: Top Considerations for Utilities
The business case for implementing private cellular is strong, yet going "all in" is not practical for all Utilities. This article explores how a more gradual approach could make private cellular feasible for more Utilities.
Blog
• Oct 7, 2022
Now is the Time to be Cyber Resilient
Even with the best cybersecurity tools available, there are no guarantees. With a proper cyber resilience strategy, you can bounce back safely, quickly and reliably should a hostile or disruptive attack occur. Here are some key considerations for maintaining a cyber resilient enterprise.
Blog
• May 16, 2022
Hackathon Event Advances AI in Medical Research
In a successful two-day hackathon, WWT and NVIDIA experts trained AI models to detect pancreatic tumors through 3D image segmentation, promising advancements in medical research.
Blog
• Mar 21, 2023