article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Now information technologies and the information revolution are again transforming society. The COVID-19 pandemic further accelerated the transformation from many years to just a couple of years. This 3-part series will discuss digital transformation (DT) from several perspectives. The Genesis of Digital Transformation.

article thumbnail

Digital Transformation: Exploring AI

Archives Blogs

For the last two decades, we have been transforming our accumulated knowledge for the best use in the digital era. Minnesota Mining and Manufacturing) Plant Showing an Employee Working on one of the Products. Minnesota Mining and Manufacturing) Plant Showing an Employee Working with one of the Machines.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to unlock a scientific approach to change management with powerful data insights

IBM Big Data Hub

Grasping these opportunities at IBM, we’re increasingly building our specialism in process mining and data analysis tools and techniques we believe to be true ‘game changers’ when it comes to building cultures of continuous change and innovation. So how do you spot this early, and react or even prevent this in a timely and effective manner?

Mining 52
article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

Now information technologies and the information revolution are again transforming society. The COVID-19 pandemic further accelerated the transformation from many years to just a couple of years. This 3-part series will discuss digital transformation (DT) from several perspectives. Development sequence in small groups.

article thumbnail

Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds

eSecurity Planet

That means hackers will increasingly mimic nation-state threat groups by establishing a long-term presence inside networks to mine highly sensitive data. Additionally, attacks are poised to become even more damaging as companies expand their digital footprint and the attack surface grows. Read next: Zero Trust: Hype vs. Reality.

article thumbnail

Spotlight Podcast: Beyond HIPAA – a Conversation with Nemours CPO Kevin Haynes

The Security Ledger

» Related Stories Episode 170: Cyber Monday is for Hackers Spotlight Podcast: RSA President Rohit Ghai warns Digital Transformation is magnifying Enterprise Risk Spotlight Podcast: Two Decades On, Trusted Computing Group tackles IoT Insecurity. The post Spotlight Podcast: Read the whole entry. »

article thumbnail

31 Letters to Santa from ECM Users

AIIM

I want a new football game and football because my little brother always tries to steal mine. So here are comments from 31 different user organizations, grouped into four gifts that they hope Santa will leave under their tree – Simplicity, Commitment, Strategy, and Solutions. Let’s get down to business.”. Dear Santa. I am doing fine.

ECM 83