Remove Examples Remove Manufacturing Remove Security Remove Workshop
article thumbnail

Business process reengineering (BPR) examples

IBM Big Data Hub

BPR examples are not one-time projects, but rather examples of a continuous journey of innovation and change focused on optimizing end-to-end processes and eliminating redundancies. This blog outlines some BPR examples that benefit from a BPM methodology.

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Now for the big challenge - security. The "s" in IoT is for Security Ok, so the joke is a stupid oldie, but a hard truth lies within it: there have been some shocking instances of security lapses in IoT devices. But there are also some quick wins, especially in the realm of "using your common sense". Let's dive into it.

IoT 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sub-Zero shares 6 lessons learned from their data transformation journey

Collibra

As his company’s Data Governance Lead, Justin Swenson recognized the challenges and opportunities ahead as he looked to transform Sub-Zero, the leading American-based manufacturer of premium kitchen equipment, into a more data-driven organization. Enable Data Owners and Stewards with requests, ideas and workshops.

article thumbnail

Using the Human Factor in Cyber Attacks

Security Affairs

The Human Factor has a fundamental importance for the success of a cyber attack, for this reason it is important to create a culture of cyber security within organizations. Whaling: A specialized type of spear phishing that targets a “large” victim of a company, for example CEO, CFO or other executive.

article thumbnail

FTC Releases Report on the Increased Use of Mobile Payments

Hunton Privacy

An FTC Workshop on Mobile Payments (the “Report”). The Report is based on a workshop held by the FTC in April 2012 and highlights key consumer and privacy issues resulting from the increasingly widespread use of mobile payments. Data Security. The Report is a further example of the FTC’s focus on mobile technology issues.

Privacy 40
article thumbnail

Proposed Changes to FDA Guidance for the Content of Premarket Submissions for Management of Cybersecurity in Medical Devices: What you Should Know

HL Chronicle of Data Protection

Department of Homeland Security (DHS) earlier this month. The new draft premarket cybersecurity guidance provides information designed to aid manufacturers in determining how to meet the agency’s expectations during premarket review of medical devices. Consistent with the U.S. Tiers of risk.

article thumbnail

Yanfeng Auto adopts IBM Data, AI and Intelligent Automation Software to accelerate digital and intelligent transformation

IBM Big Data Hub

The auto parts manufacturers caught in it are facing the problem of how to survive and grow against the increasingly fierce competition. The Intelligent Manufacturing Department of Yanfeng Auto hopes to work with IBM CSM team to explore the way of building up its intelligent inventory platform with predictive capabilities.