Automation
Cloud
Outsourcing
3D Outsourcing
Cyber
100

Software configured to process manual rule-based work in the same way a human would perform the activity.

What is Robotic Process Automation (RPA) ?

100

Public cloud, community cloud, private cloud, hybrid cloud.

What are the different cloud deployment models ?

100

The transfer of business or IT processes to companies in a nearby country, often sharing a border with your own country.

What is Nearshore outsourcing ?

100

Mobile Web Developer, Data Scientist, and Cloud Architecture.

What are the jobs that didn’t exist 15 years ago?

100

An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.

What is Malware ?

200

The technique, method, or system of operating or controlling a process by highly automatic means, as by electronic devices, reducing human intervention to a minimum.

What is Automation ?

200

An architecture in which a single instance of a software application serves multiple customers. Each customer is called a tenant.

What is multi-tenancy ?

200

A type of Outsourcing that involves sharing tasks to a distributed group of people.

What is Crowdsourcing ?

200

Solution Development for an RFP.

Which process would the providers in this room like to reinvent or detonate ?

200

A technique used by hackers to obtain sensitive information such as using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.

What is Phishing ?

300

Software that singles out letters and symbols in PDFs files, images, and paper documents that enables users to edit the content of the documents digitally.

What is Optical Character Recognition (OCR) ?

300

A cloud-computing environment that blends on-premises, private cloud and public cloud services.

What is Hybrid cloud ?

300

Pricing model where the client pays for the business results rather than the effort spent.

What is the Outcome-based pricing model ?

300

Set of habits and rules that shape widely held “conventional wisdom” over time.

What are Orthodoxies ?

300

The aspect of information technology (IT) that deals with the ability of an organization or individual to determine what data in a computer system can be shared with third parties.

What is Information/Data Privacy ?

400

Advanced automation that can work on semi-structured and structured data alike.

What is Cognitive Automation ?

400

A distributed system consisting of servers in discrete physical locations, configured in a way that clients can access the server closest to them on the network, thereby improving speeds.

What is a Content Delivery Network(CDN) ?

400

Offshore companies set up by organizations to provide internal services and in some cases to sell those same services to clients.

What are Captive Centers ?

400

0.5%

What percent of data is ever used?

400

A flaw or weakness that can be used to attack a system or organization.

What is a vulnerability ?

500

A pattern-based processing method that is a type of machine learning.

What is Deep learning ?

500

A tool that sits between an organization's on-premises infrastructure and a cloud provider to act as a gatekeeper, allowing the organization to extend their policies beyond their own infrastructure.

What is a CASB (Cloud Access Security Broker) ?

500

Outsourcing Model where a firm contracts with an offshore partner to build a shared services or offshore development center and operate it for a fixed interim period.

What is the Build-Operate-Transfer model of outsourcing ?

500

8x more likely to achieve better business outcomes

What are the benefits of an inclusive culture?

500

Process in which network information is aggregated, sorted and correlated to detect suspicious activities.

What is Security information and event management (SIEM) ?

M
e
n
u