Remove Case Study Remove Communications Remove IT Remove Manufacturing
article thumbnail

Business process reengineering (BPR) examples

IBM Big Data Hub

An early case study of BPR was Ford Motor Company, which successfully implemented reengineering efforts in the 1990s to streamline its manufacturing processes and improve competitiveness. The purpose of BPR is to streamline workflows , eliminate unnecessary steps and improve resource utilization.

article thumbnail

RedEnergy Stealer-as-a-Ransomware employed in attacks in the wild

Security Affairs

“The sample Stealer-as-a-Ransomware variant analyzed in this case study employs a deceptive FAKEUPDATES campaign to lure in its targets, tricking them into promptly updating their browsers. The malware communicates with the command and control servers through HTTPS. ” reads the analysis published by Zscaler.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The software-defined vehicle: The architecture behind the next evolution of the automotive industry

IBM Big Data Hub

A close-up of the SDV architecture The infrastructure layer This layer includes not only the vehicle but also the telco equipment, roadside units, smart city systems and similar components, as well as various backend systems of the original equipment manufacturers (OEMs).

article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

But that doesn’t just include thermostats, printers, and other connected devices that you have to protect — it now means electric cars, too. Teslas have plenty of vulnerabilities, as cybersecurity researchers have recently discovered. The zero-days reveal just how many items can threaten an organization’s cybersecurity.

IoT 117
article thumbnail

Top 10 of 2020: Our Favorite Pieces from a Weird Year

Thales Cloud Protection & Licensing

Speaking of the intersection of healthcare and technology, we released our case study with medical device manufacturer Candela. More clients and more revenue per client is a case study worth reading. Even in the midst of all the uncertainty, everyone loves a good end of year list. Healthcare’s connectivity cure?

article thumbnail

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

The latest evolution of digital technologies, such as robotics, Internet of Things, Artificial Intelligence, high-performance computers and powerful communication networks leads self-driving cars out of an imaginary world and into our daily lives. While these technologies are progressing rapidly, the EU intends to ensure common rules.

Privacy 69
article thumbnail

Best value procurement recognizes vendors as experts

CGI

As the failure of large information and communications technology (ICT) projects has become a matter of public discussion in several countries, the Best Value Procurement (BVP) approach is gaining rapid ground. Best value procurement recognizes vendors as experts. narmada.devarajan. Wed, 08/26/2015 - 03:15. Deference to vendor expertise.