Remove Access Remove Energy and Utilities Remove IT Remove Mining
article thumbnail

Supply chain visibility in the energy and utilities industry

IBM Big Data Hub

For the energy and utilities industry (E&U), time is not on their side. Facts about the energy and utilities industry Transformer prices have doubled, while the average lead time for delivery has at least tripled from what it was two years earlier, reaching 52 weeks in some cases. Visibility.

article thumbnail

The advantages and disadvantages of renewable energy

IBM Big Data Hub

New developments in renewable energy are making headlines and inspiring hope in communities worldwide, from a remote Arctic village working to harness solar and wind power under challenging conditions to a U.S. Air Force base planning an advanced, utility-scale geothermal power system. Let’s take a look at both.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 December 2023

IT Governance

Researchers from the German cyber security company Aplite discovered 3,806 servers from 111 countries accessible on the Internet. Less than 1% of the DICOM servers on the Internet use effective authorisation. Data breached: more than 59 million data records. Akumin Inc. has suffered a second attack, this time by the BianLian ransomware group.

article thumbnail

Key strategies and technologies to help utilities respond to a “storm” never seen before

CGI

Key strategies and technologies to help utilities respond to a “storm” never seen before. For more than three decades, I served at a leading electric utility, responding to numerous storms to keep the lights on for customers and to support critical infrastructure. COVID-19 considerations and how technology can help.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

To this end, some impressive technology has been created to combat the technological side of the issue, to keep hackers and similar bad actors from accessing data and account privileges they shouldn’t. Read More At: Most Organizations Do DMARC Wrong. Here’s How to Do It Right. Table of Contents: Who Do Scammers Target and Why? Individuals.

article thumbnail

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI

CGI

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI. This series of blog posts builds on the 2018 CGI Client Global Insights, providing insights into how utilities are making progress toward digital transformation. Wed, 10/31/2018 - 03:39. Why is this so?

article thumbnail

Digital sobriety

Everteam

However, it is now common knowledge that their production, especially in Africa, destroys the soil in open-pit mines, where all ecological considerations are absent, and which favors exploitation of local poverty. A little history… EDM, ECM, Governance, Web 2.0, Well, not really. Well, not really.