Manufacturing 4.0? Industry 4.0? It’s all digital manufacturing to me

OpenText Information Management

I recently attended the Manufacturers Leadership Summit hosted by Frost & Sullivan in LA. This three-day event was full of presentations, case studies and discussions on the journey to Manufacturing 4.0.

Australian manufacturing companies boost productivity and competitive advantage with enterprise social software


While a bit light on details, I'm not going to complain about this positive story in the ITPro section of the Fairfax newspapers about two packaging manufacturing companies using enterprise social software to help their bottom-line. BTW If you are interested in manufacturing case studies, also have a look at this Socialtext example featuring a US-based Industrial Mold & Machine

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Malicious PDF Analysis

Security Affairs

” Let’s go to our case study: I received a scan request for a PDF file that was reported to support an antivirus vendor, and it replied that the file was not malicious. In the last few days I have done some analysis on malicious documents, especially PDF.

Ephesoft Recognized as Alfresco Software’s Global Technology Partner of the Year

Document Imaging Report

With powerful synergies, Ephesoft and Alfresco are heavily focused on solving content acquisition and management challenges in government and specifically in federal and public sectors, financial services, insurance, manufacturing and healthcare, among other industries.

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

The hacker group has been targeting Japanese heavy industry, manufacturing and international relations at least since 2012, According to the experts, the group is linked to the People’s Republic of China and is focused on exfiltrating confidential data.

How Secure Are Bitcoin Wallets, Really?

Security Affairs

So, the companies behind those wallets wisely emphasize why their products are more secure than what competitors offer and why that’s the case. His tale of woe proves a hacker couldn’t contact a Bitcoin wallet manufacturer, masquerade as a wallet owner and get the goods for access. Often, they involve unusual methods that exploit vulnerabilities the manufacturer never fathomed. Purchasers of Bitcoin wallets usually have one priority topping their lists: security.

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

These draft guidelines highlight the data protection risks related to such applications, with general recommendations regarding the processing of personal data in relation to the non-professional use of connected vehicles and present some use cases.

Digital Workers Thrive with ABBYY and UiPath Partnership

Document Imaging Report

To learn more about Medline’s success using content IQ skills in its invoice processing, visit The Content IQ Summit Nashville October 24-25 to hear Stokes share the case study. Collaborative Use of Digital IQ Skills with UiPath Robots will be Demonstrated at UiPath FORWARD III.

How to Unite B2B PR and Content Marketing for Powerful Results

OpenText Information Management

As propsects move down your funnel, content may include later-stage content such as case studie and webinars. Case studies. If you want to generate leads, you'll want to generate leads, think webinars, demos, case studies and other later-stage content.

B2B 78

Best value procurement recognizes vendors as experts


A case study by the Performance Based Studies Research Group at Arizona State University documented that BVP is highly successful, with client satisfaction levels of 98%. Best value procurement recognizes vendors as experts. narmada.devarajan. Wed, 08/26/2015 - 03:15.

The Unobserved Need

Positively RIM

Last week I traveled to rural Indiana to research a case study of a mid-size manufacturing firm. It may be as unglamorous as a midsize manufacturing business in rural Indiana. While the subject is interesting in its own right, it is symbolic of a huge, unobserved need. In the U.S. alone, there are close to 100,000 small to mid-size businesses. Different numbers define this SMB group, but I see it as organizations with between 100 and 1,000 staffers.