article thumbnail

Mitigating the impact of climate change in insurance and other financial services  

IBM Big Data Hub

For other financial services firms outside of the insurance sector, property accepted as loan security might face climate-related risks as well. Across the financial sector, there are transition risks to consider as we move to a low-carbon economy. Financial services firms can use the tool for “what if?”

article thumbnail

Turning climate risks into business opportunities 

IBM Big Data Hub

In Africa, for example, recurring droughts, floods and cyclones due to climate change might cause crop failures and food insecurity. In some business sectors, such as financial services, fast-moving consumer goods and healthcare, business interruptions can have a significant detrimental impact on daily life.

Risk 68
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How AI is helping companies meet sustainability goals

IBM Big Data Hub

If we think about asset maintenance, for example, the questions are which technicians are available, where, and how should their work be prioritized. This use case shows how AI can help by processing unstructured image and video data in addition to structured data in the previous examples. It’s not about minimizing travel.

article thumbnail

The Economy of Things: the next value lever for telcos

IBM Big Data Hub

For example, a fleet truck outfitted with an EoT-secure identity and wallet is able to pay for its own fuel at a similarly EoT-enabled fuel pump without the driver having to open an app or provide a credit card. Telcos can also play the role of data providers as well as data marketplace and brokerage operators within the ecosystem.

IoT 55
article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

For example, Amazon reminds customers to reorder their most often-purchased products, and shows them related products or suggestions. Agricultural machines can engage in autonomous pruning, moving, thinning, seeding and spraying. A flood of applications can be screened, sorted and passed to HR team members with precision.

article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

Examples of IoCs include malicious IP and email addresses, suspicious domain names and URLs, unusual file paths or file names, unexpected network traffic patterns, and behavioral oddities like frequent unauthorized access attempts.

article thumbnail

GUEST ESSAY: Why organizations need to prepare for cyber attacks fueled by quantum computers

The Last Watchdog

For example, in 2021 the Colonial Pipeline was hacked, and the company decided to pay $5 million in ransom since most of the East Coast’s fuel supply was shut down. Panicked East Coast Americans began hoarding gas due to a major disruption in fuel supply.