Remove 10
Remove 2023 Remove Examples Remove Manufacturing Remove Strategy
article thumbnail

Business process reengineering (BPR) examples

IBM Big Data Hub

BPR examples are not one-time projects, but rather examples of a continuous journey of innovation and change focused on optimizing end-to-end processes and eliminating redundancies. This blog outlines some BPR examples that benefit from a BPM methodology.

article thumbnail

4 strategic sourcing use cases to strengthen your supply chain

IBM Big Data Hub

Where tactical sourcing is a short-term strategy, strategic sourcing is for long-term business goals. For example, Antonello Produce wanted to provide food that its customers could trust. For sourcing teams, that means pivoting their mindset around selecting suppliers from a tactical, lowest-cost-above-all approach to a strategic one.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates

CGI

Tue, 02/19/2019 - 10:45. Bloomberg NEF data indicates that worldwide, wind and solar can generate a whopping 1TW of electricity, with the second terawatt (expected in 2023) to cost 46% less. For example, Tennet and DSOs in the Netherlands are working together to develop market platforms for trading demand side flexibility.

article thumbnail

GUEST ESSAY: Taking proactive steps to heal the planet — by reducing the impact of video streaming

The Last Watchdog

Encoders, for instance, consume significantly more energy than decoders – sometimes as much as 5 to 10 times as much energy, in comparison. This should include everything from the extraction of raw materials, design, manufacturing, transportation, and even the final recycling of the devices. In 2022, VITEC moved its U.S.

article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

2023 Quantum Threat Timeline Report from the Global Risk Institute HNDL attacks take immediate advantage of this future vulnerability. Organizations with long-term data needs for more than 5-10 years are even more vulnerable. As the clock has turned to 2024, this brings us ever closer to the chance of current cryptography being broken.

Risk 87
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

That's an example of AI. It's not just going to be Taiwan, they're going to be facing as for example, in this case, you know, the United States has come straight out and said they are our military ally. I will give you an example. And we're also on the cusp of ChatGPTs on everyone's terms. AI will be used maliciously.

article thumbnail

CyberheistNews Vol 13 #10 [Eye Opener] BusinessWeek: The Satellite Hack Everyone Is Finally Talking About

KnowBe4

CyberheistNews Vol 13 #10 | March 7th, 2023 [Eye Opener] BusinessWeek: The Satellite Hack Everyone Is Finally Talking About This week, Bloomberg News pointed at a brand-new article at BusinessWeek, one of their media properties. The strategy is intended to prioritize defensibility, resiliency, and values alignment.