CSRHub CTO and Co-Founder, Bahar Gidwani, will be speaking at the 2021 BattleFin Ensemble & Discovery Days event, happening virtually on March 9th and 10th.
The conference will explore relevant topics around sustainable investing and the use of alternative and ESG data for capital market participants, starting from introductory “state of affairs” level and venturing into how AI/ ML bring clarity into responsible investing decisions.
New RBA-Online Platform and Director of Data Science Support Members' Research Needs
ALEXANDRIA, Va., February 25, 2020 /3BL Media/ - The Responsible Business Alliance (RBA) today announced it is greatly enhancing its data analytics capabilities with the pending launch of its newly upgraded RBA-Online platform in March and the recent addition of a data scientist on staff. These resources will support members of the RBA and its Initiatives as they seek to better understand and use key data to improve labor and environmental conditions in their global supply chains.
Smarter infrastructure, with data at its core, will be key to overcoming threats to our water supply
The taps are flowing more freely in Cape Town, one of the world's premier tourist destinations and a cultural center of South Africa. In 2018, Cape Town residents stared down "Day Zero," the moment when the water system – jeopardized by the combination of population growth, drought cycles, aging infrastructure and deferred system improvements – was predicted to literally run dry.
New Strategic Directions Report reflects critical role of data and planning in water infrastructure systems
OVERLAND PARK, Kan., 4 June 4, 2019 /3BL Media/ – Smarter infrastructure, with data at its core, will play a crucial role in overcoming varied threats to our water supply. From precise reads of consumption rates and customer engagement to improved leak detection and climate change planning, a new culture of data science can extend our supply to drive sustainability and resilience. The accelerating move to embrace digital water by service providers and industry leaders will also better inform the asset management and planning programs necessary to overcome continued funding challenges.
From government spending figures to public health statistics to geospatial imagery, the federal government is gathering, storing, and sharing more data than ever. Agencies have started consolidating this information into big data platforms for analysis and decision-making. But often such a “data lake” threatens to become a “data swamp” that slows agencies’ growth and progress.
‘Our promised digital utopia has minefields’ – Sen. John Neely Kennedy at the Facebook Senate hearing.
June 20, 2018 /3BL Media/ - Ethical Corporation is taking an ambitious role this November 13-14 in San Diego in leading the movement to solve how companies can drive at what it means to be ethical in today’s digital world – at the Responsible Business Summit West
Ethics and responsibility in digital business impacts everything from ensuring the proper use of data and being a privacy conscious company to social inclusion, freedom of speech and climate leadership.
Big data has become ubiquitous in recent years. Whether it is data-driven marketing, sports analytics, political campaigns, or national security threats, data has become central to any type of informed analysis and plan of action. Consequently, the arrival of Big data has also spawned a data industry and the emergence of data professions – data analysts, data architects, data scientists, and chief data officers. Against this backdrop, governmental and social service organizations are following suit and initiating efforts to apply sound data practices to a range of societal challenges. T
At 11:08 a.m. on August 15, 2012, every security professional’s nightmare came true for Saudi Aramco, the world’s largest oil company. A piece of malware known as W32.Disttrack, or, more familiarly, Shamoon, crippled more than 35,000 of its PCs and servers, replacing the files they stored with an image of a burning American flag.
Shamoon was engineered to spread undetected through a network, infect as many computers as possible, and, upon command, overwrite their master boot records, destroying the computers’ information and leaving them incapable of being restarted.