Rainmaker MIAMI Summit—Time to Act!*
It’s our pleasure to invite you to join us at ...
It’s our pleasure to invite you to join us at ...
Recently my colleague Marco Chan shared an extraordinary story that puts a new slant on the public discussion about robotics, China, outsourcing and the future of jobs. According to this Bloomberg Business Week story, a Chinese manufacturer, Tianyuan Garments Co., is investing $20 million to open a plant in Little Rock that will utilize robots developed by a Georgia company, Software Automation, to manufacture T-Shirts at a cost of 33 cents per shirt. Each SEWBOT™ workline is capable of spitting out a T-Shirt every 26 seconds. Human workers don’t stand a chance against such competition, no matter how low a wage rate they are willing to accept.
Like the internet before it, the automation boom is gaining steam as costs come down and the technologies become more approachable for the average business. Here are just a few of the rapidly advancing technologies that have primed the coming explosion in automation.
The Artful Synergist, or How To Get More Value ...
With the economy on the rise again, an unlikely sector is reaping the benefits: Outpatient ambulatory surgery centers (ASC).
In this article, in addition to discussing biopharmaceutical developments of interest to the market, we will review some recent stroke rehabilitation strategies as well as the current definition of stroke symptoms and risk factors.
Leveraged buyout transactions (LBOs) provide good valuation guidelines for those ...
We recently interviewed Peter Lehrman, CEO of Axial, one of the most energetic and innovative companies providing advanced technology solutions to M&A and corporate finance professionals operating in the middle market. Speaking from the “Roosevelt Room” in Axial’s headquarters in the Flatiron District, Peter covers a good deal of ground and I highly recommend you listen.
Data masking, sometimes called de-identification, obfuscation, or redaction, is data security technology that is an ideal fit into an overall Governance, Risk Management, and Compliance (GRC) strategy. It’s an economical method for creating an inauthentic but structurally similar version of business data for use in user training or software testing, thus reducing risk. The data masked version of the data is a completely functional substitute for corporate data and protects live production data.