article thumbnail

Business process reengineering (BPR) examples

IBM Big Data Hub

An early case study of BPR was Ford Motor Company, which successfully implemented reengineering efforts in the 1990s to streamline its manufacturing processes and improve competitiveness. Organizations of all sizes and industries implement business process reengineering.

article thumbnail

The software-defined vehicle: The architecture behind the next evolution of the automotive industry

IBM Big Data Hub

Regarding vehicle operation, AI is currently applied in cybersecurity to analyze incoming security events and incidents, and on the analysis of telematics data to gain insights into driving experiences. Some OEMs, such as Honda , use AI for knowledge management to deliver safer and more personalized automobiles.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

The authors propose a typology of records produced and/or recorded on blockchain systems with examples, locations, and a rich diplomatic analysis showing how the elements of the intellectual form may be identified in blockchain records. The analysis of blockchain-based records’ trustworthiness is based on archival and diplomatic theory.

article thumbnail

Top MDR Services for 2021

eSecurity Planet

This next-gen solution uses patented artificial intelligence (AI) to analyze log data in real-time to identify and respond to threats as they arise. Artificial intelligence-powered threat identification. However, clients report that SentinelOne could improve support for enterprise ticketing and case management.

Cloud 57
article thumbnail

Digital transformation examples

IBM Big Data Hub

A recent analysis from the IBM Institute for Business Value asked company executives “[…] how they use data to create performance baselines and to understand how applying technologies—for example, cloud, AI, generative AI—might materially improve performance in the parts of the business that generate income.”

article thumbnail

Malwarebytes Endpoint Protection Product Review

eSecurity Planet

The two main groups of layers of detection include rules-based detection and behavior/ artificial intelligence (AI) methods. Behavior and AI-based detection includes three layers: Machine learning, behavior analysis and exploit mitigation. Malwarebytes Endpoint Protection case studies.

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

So of course when I saw that some researchers were presenting a talk at SecTor 2021 in Toronto on defeating biometrics with artificial intelligence, well I knew I had to talk to them as well. The idea was to see whether a computer could possess a level of artificial intelligence that can mimic human responses under specific conditions.