Claude Gagne_

Systems / Cloud Architect. 88% of Canadian CEOs view IT as the primary growth tool to enhance the connected user experience and optimize internal and/or cloud IT infrastructure (17th Annual Global CEO Survey) My role is to: - help clients with their infrastructure and cloud projects - establish with them the IT scenarios most suited to their needs and respective ROI objectives - ensure the proper deployment of the project in coordination with the technical teams. And I am very enthusiastic to do so using the constantly renewed technologies at our disposal. I joined Present in September 2014, but have been working in systems architecture for over 20 years. I have several technical certifications and hold a Master of Economics.

Recent Posts

Cloud security: a shared responsibility

Posted by Claude Gagne_ on Feb 13, 2019 9:46:12 AM

A few days ago, I had a meeting with Mark, a client with whom over the years, a solid relationship of trust has developed. After a while, the conversation turned to the security of the public cloud.

Claude, as you know, our company understands the importance of using IT technology as a lever for growth. Among these technologies, the public cloud has undeniable advantages. But I ask myself questions about its security as the media is always echoing some sort of security issue.

What do you think?

Read More

Topics: Cloud, IT security

PowerAI: harness the full potential of deep learning

Posted by Claude Gagne_ on Jan 31, 2019 7:39:00 AM

 

What is one of the big differences between computers and humans?

Would you say that humans would learn from their experiences whereas computers would execute instructions that were explicitly programmed?

This is no longer the case with artificial or cognitive intelligence.

 

What is this so-called artificial intelligence?

You need to see it like a Russian doll. The biggest doll is artificial intelligence. You open it, and it contains machine learning. You open this second doll and it contains a third which is deep learning.

Read More

Topics: IT Innovation, IBM, Business intelligence (BI)

What is the link between IoT, Big Data and artificial intelligence?

Posted by Claude Gagne_ on Nov 7, 2018 7:42:00 AM

There is no doubt that our world excels at creating data, of all types and of all origins, in a context of datification, especially with the growth of connected objects.

Data is now the new oil for all companies, regardless of size.

  • Although this statement needs to be nuanced, if only because data is an inexhaustible resource, it is a good illustration of the fact that a company must be able to extract the value of its internal and/or external data, or risk putting themselves in danger in a context where their competitors are doing this. 
  • However, even if the data must be processed, the refining of this new black gold only makes sense because it answers a concrete business challenge. In other words, if we focus on data and not the business challenges that need addressing, how do we know we have the right data?
Read More

Topics: Big Data, Business intelligence (BI), IoT

3 myths about Business Intelligence and SMBs

Posted by Claude Gagne_ on Sep 18, 2018 7:50:00 AM

In today's economy, business leaders, and by extension all those who need to make important decisions, face a major challenge – having access to reliable information to act quickly and intelligently. 

Often, the difficulty lies not so much in the lack of data from within applications, databases and social media, as in the ability to overcome data silos and extract a unified view and ultimately usable information.  

This is precisely the whole purpose of business intelligence or BI. 

Read More

Topics: Business intelligence (BI)

Securing your customer data: 7 recommendations that every SMB should apply

Posted by Claude Gagne_ on Jul 12, 2018 7:57:36 AM

We generally associate IT security breaches with the loss and theft of information due to the intrusion of hackers. Just think of the massive hack at Ashley Madison in 2017, which forced the company to negotiate with hackers or risk seeing all their confidential data published. A story similar to that of Sony, in 2014. 

 

However, especially for SMBs, it is wrong to believe that threats mainly come from the outside. In fact, 85% of corporate espionage is done by employees, from within companies

 

Read More

Topics: IT security

SUSE Linux Enterprise Server for SAP Applications: the # 1 platform for SAP HANA

Posted by Claude Gagne_ on May 24, 2018 7:45:00 AM

Why SUSE Linux Enterprise Server for SAP Applications

SUSE Linux Enterprise Server for SAP Applications is an optimized operating system platform, validated and certified by SAP, for all SAP HANA solutions.

This outcome is the result of a close collaboration between SAP and SUSE, in order to optimize the performance, scalability and high availability of SAP HANA.

SUSE Linux Enterprise Server for SAP Applications is currently running thousands of SAP HANA installations, including at SAP itself.

Read More

Topics: IT infrastructure, SAP Hana

Bring your IT to the speed of your business with a software-defined data center

Posted by Claude Gagne_ on May 9, 2018 7:45:00 AM

As business strategies are now inextricably linked to technology solutions, companies need to rethink the role and spend of their IT in order for it to become a true growth engine.

It's not about the needs of IT, but about the needs of the business.

 

 

Read More

Topics: IT infrastructure

Why deploy cloud backup as a service with Azure Backup 

Posted by Claude Gagne_ on Feb 14, 2018 7:45:00 AM

In an economy with accelerated transformation, many organizations are investing considerable resources to increase their IT agility. They understand that better agility, provided for example by mobile applications and data analysis solutions, can help them better understand their customers, position themselves advantageously and quicker compared to their competitors and reduce their costs. 

Read More

The spectre of vulnerabilities at the CPU level is now hovering over IT infrastructures

Posted by Claude Gagne_ on Jan 9, 2018 11:45:00 AM

On January 3, 2018, two important security breaches named Meltdown and Spectre were publicly disclosed. These are two critical bugs located at the processor level.

Description of the vulnerabilities

Two flaws in processor design from leading chip makers could allow hackers to access sensitive information.

Read More

Krack: WI-FI defect threatens to expose your data

Posted by Claude Gagne_ on Oct 18, 2017 4:06:20 PM

A major vulnerability has been discovered in the WPA2 protocol of Wi-Fi networks. 

Read More

About this blog

The right use of technology addresses business challenges and drives business growth in all areas of an enterprise.  We hope this blog will offer insight into developing strategies and tactics to enable you to identify those key drivers of growth and keep pace with and anticipate the rapid technology change of today.

Subscribe to Blog Updates by email

Protecting your business assets: Lower your risks with a disaster recovery plan

Recent Posts