Vendor Lock-In: Advanced Strategies to Protect Your Business TL;DR: Vendor lock-in leads to structural dependency on suppliers, with migration costs that can reach 40% of the annual IT budget in extreme cases 3 5 . Generative AI and proprietary cloud architectures exacerbate technology lock-in risks by making data extraction more complex 13 ...
France Launches "La Suite": A Digital Sovereignty Model That Could Inspire Quebec TL;DR: France is deploying "Docs", a sovereign collaborative text editor integrated into La Suite numerique. A 100% open source solution (MIT licence) hosted on certified SecNumCloud infrastructure. Co...
Information Silos: How to Identify and Break Them TL;DR: Information silos are isolated systems where information remains sequestered, preventing communication and collaboration between different departments of an organization ( 1 4 ) ...
"Can I bring my penguin to the office?": Linux at Work ⚡TL;DR The end of support for Windows 10 in October 2025 is accelerating Linux adoption in the enterprise ([Forbes] 11, [TechNewsWorld] 3). Linux distributions like Ubuntu and Fedora offer enhanced security re...
The GNU GPL Licence in Quebec: A Lever for Innovation and Digital Sovereignty TL;DR The GNU GPL protects users' freedoms and fosters collaboration (use, study, modification, sharing). 75% of Quebec SMBs use open source software, with 40% under GPL licence (CEFRIO, 2024)...
World Backup Day: Where Do You Stand? Why backup is essential? Digital data has become the heart of personal and professional activities. Yet, according to a Cybereco study, 40% of Quebec businesses lack a robust backup strategy...
Open Source Projects in Quebec: Motivations, Ethical Models and Opportunities for SMBs and NPOs TL;DR The motivations behind open source have evolved: technical control, resilience and collaborative innovation now take priority over cost alone (Ponemon Institute, 2025). Ethical monetization models...
Frequency of data breaches at Big Tech: a documented analysis of systemic violations The tech giants Google, Apple, Facebook (Meta), Amazon, and Microsoft (GAFAM) regularly suffer major data breaches, as evidenced by recurring incidents documented...
Last day to get grants of up to 50% on AI/quantum projects 💡 TL;DR Prompt Innov allocates $21M to collaborative AI and cybersecurity projects through the RSRI ( Prompt ). AI/quantum project call: Submissions due by April 15 for grants of up to 50% ( Québec.ca ). ...
Cybersecurity and Digital Transformation: Review and Outlook After the 2025 Cyberconference đź’ˇ TL;DR The 2025 Cyberconference in Montreal highlighted the urgency of protecting data against AI-related threats and prioritizing sovereign solutions (Neotrust). 22% of Quebecers struggle...
Stories of Big Tech abuse - Part 2 đź’ˇ TL;DR Fake judicial requests: Hackers tricked Apple and Meta into handing over personal data, leading to harassment and abuse. False algorithmic accusations: Biased algorithms led to professional suspensions or unjustified criminal accusations. ...
End of Windows 10 in October 2025: How to migrate to free and easy solutions while avoiding the landfill 💡 TL;DR October 14, 2025: End of support for Windows 10 → Millions of computers risk becoming obsolete ( Daily Kos ). Linux Mint and Zorin OS offer a familiar user experience, ideal for replacing Windows ( IT Pro, Zorin Blog ). ...