2024 was characterized by cloud optimization and FinOps strategies to limit previously uncontrolled and excessive cloud consumption and cost. In the coming years, avoiding a similar trend in the AI space will be crucial. However, excessive consumption and related costs are not the only issues to deal with. The uncontrolled use of AI in a professional context can result in shadow AI, i.e., the non-transparent and uncontrolled use of external AI solutions by employees, which involves risks that are well-known from the shadow IT phenomenon, such as complexity, high costs, and security threats.
SHARE :
This short vendor profile provides a quick overview of the local portfolio and performance of Etteplan in Finland.
Event Date : June 10, 2025
This Excel document is part of the company profiles PAC publishes every year at local, regional and worldwide level.
Event Date : July 09, 2024
This document provides market volumes, growth rates and forecasts for the total IoT market (consolidated) for the 2021-2027 period.
Event Date : October 10, 2023
This Excel document lists M&A deals in the software & IT services industry in the UK since 2013.
Event Date : October 22, 2025
This document provides market volumes, growth rates and forecasts for the business intelligence (BI) market in France for the 2022-2028 period.
Event Date : February 25, 2025
Insurance - InBrief Analysis - Austria
Market Reports November 07, 2025
Software & IT Services - InSight Analysis - Denmark
Market Reports November 07, 2025
Seidor - Figures - Spain – FY 31-Dec-2024
Datamart November 06, 2025
Seidor - Vendor Profile - Spain
Vendor Profile November 06, 2025
TCS (Tata Consultancy Services) - Figures - Finland – FY 31-Mar-2025
Datamart November 06, 2025
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Unit4 Doubles-Down on Industries & Sets Out Growth Plan
Blog Post November 07, 2025
Key Takeaways from Google Cloud Day Romania 2025
Blog Post November 06, 2025
Blog Post November 05, 2025
Orange Business Is Transforming Its Business Model
Blog Post November 04, 2025
Part 6: From Blueprint to Reality – Implementing Core Controls for Data and Application Security
Blog Post November 04, 2025