Is data monetization the way forward for manufacturers?

OpenText Information Management

At OpenText™, we’ve been talking a lot about how to build resilience into organizations. In the latest edition of the Manufacturing Leadership Council Journal, I wrote about the advantage of monetizing data for manufacturers.

How to improve manufacturing ROI with prescriptive analytics

IBM Big Data Hub

Today's manufacturing organizations operate in a dynamic environment characterized by increased complexity and uncertainty. The financial performance of manufacturers hinges on their ability to rapidly adapt to constantly-changing conditions, from demand fluctuations to delivery challenges while managing production costs efficiently.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to delight customers with engaging experiences

OpenText Information Management

Too often, when customers reach out for help in solving a problem or completing a business task, they feel dread in anticipation of the experience they might encountered to solving their problem. What are your customers experiencing when they call your customer service team?

Compal, the Taiwanese giant laptop manufacturer hit by ransomware

Security Affairs

The Taiwanese electronics manufacture Compal suffered a ransomware attack over the weekend, media blames the DoppelPaymer ransomware gang. It is the second-largest contract laptop manufacturer in the world behind Quanta Computer.

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

The number of sensors and smart devices connected to the internet is exponentially rising, which are the 5 Major Vulnerabilities for IoT devices. IoT devices are exposed to cybersecurity vulnerabilities. A hacker managed to identify a weak spot in a security camera model.

IoT 105

The Debate Over How to Encrypt the Internet of Things

WIRED Threat Level

But some researchers argue that more manufacturers should stick with proven methods. So-called lightweight encryption has its place. Security Security / Security News

Experts demonstrate how to exfiltrate data using smart bulbs

Security Affairs

The devices are manufactured by the Chinese company called Zengge and could be controlled using both Android and iOS apps. The experts focused their study on devices using the Low Energy Attribute Protocol ( ATT ) to communicate. In this way, the researchers discovered the commands sent by the mobile app to the smart bulbs. “The main plan for exfiltration was to use light as a channel to transfer information from a compromised device to the attacker.

Customer Experience Trends: How To Stand Out From the Crowd


Customer experience trends might change from time to time, but the central component remains steady: The customer must be at the heart of every business decision that you make. Every facet of business has changed to adapt to the Experience Economy. The Road to Connected CX.

How to select the best IIoT companies in 2020

OpenText Information Management

Industrial manufacturers are quickly adopting intelligent and connected solutions to address their major IIoT challenges. In this blog, we’ll look closer at the things you should consider when selecting the … The post How to select the best IIoT companies in 2020 appeared first on OpenText Blogs. In previous blogs, we’ve looked at the incredible growth of the Industrial Internet of Things (IIoT) and why this requires a secure, centralized IIoT platform.

How to Reverse Engineer, Sniff & Bruteforce Vulnerable RF Adult Toys with WHID Elite

Security Affairs

Expert Luca Bongiorni was looking for new targets to test WHID Elite’s Radio Hacking capabilities and found an interesting one: Electrocuting C**k Ring. Last week I was looking for new targets to test WHID Elite’s Radio Hacking capabilities and suddenly I found an interesting one: an Electrocuting C**k Ring. Which translated for the non-RF folks… easy to: Sniff Replay And of course… Fuzz. Which allows us to eliminate the Rolling-Code assumption.

How To Solve The Cybersecurity Skills Shortage

Cyber Info Veritas

For me, this brings up the question of how to solve the cybersecurity skills shortage. This creativity works only if you are willing to put the effort into applying the solution that this problem requires. I’m referring to people from the HR department, some traditional top executives that don’t get it and high paying employees which think that this can be solved by throwing the traditional HR hiring structure. Their job is to solve a short-term necessity.

Chris Valasek and Charlie Miller: How to Secure Autonomous Vehicles


Famous car hackers Chris Valasek and Charlie Miller returned to Black Hat to discuss how manufacturers can secure autonomous vehicles. Black Hat Hacks IoT autonomous vehicles Charlie Miller Chris Valasek cruise self-driving cars uber waymo

How to Foster Innovation within Your Organization

Synergis Software

I had the pleasure of attending the Delaware Valley Industrial Resource Center (DVIRC) Manufacturing Summit on October 12 at The Fuge in Warminster where Valerie Gervais was a featured keynote. From someone whose primary role was in HR, it was illuminating to hear the importance of innovation in all departments and to consider what we can learn from different disciplines inside and outside of an organization. I want to be part of that team.

Researchers show how to clone Tesla S Key Fobs in a few seconds

Security Affairs

Researchers demonstrated that it is possible to rapidly clone the wireless key fob of the expensive Tesla Model S and possibly other vehicles. The team of experts COSIC research group at the KU Leuven University in Belgium has devised a new relay attack against the Passive Keyless Entry and Start (PKES) system that is used by many cars to unlock the doors and start the engine. We have already discussed relay attacks against PKES used by thieves to steal vehicles.

How to protect your digital privacy from new Christmas presents

The Guardian Data Protection

Don’t just turn it on and plug it in – you might be giving the manufacturer all sorts of information you don’t need to Jeff Bezos knows when you’ve been sleeping, he knows when you’re awake, he knows when you’ve been bad or good, because you didn’t change the default privacy settings on the Amazon smart speaker you set up in your bedroom, for goodness’ sake. Here are the best tips to protect your digital privacy, without resorting to Christmas gifts whittled from wood.

Spotlight: as Attacks Mount, how to secure the Industrial Internet

The Security Ledger

In this spotlight edition* of The Security Ledger Podcast, Steve Hanna of Infineon joins us to talk about the growing risk of cyber attacks on industrial systems and critical infrastructure. is poised to transform the global economy, Hanna said, but not if the issue of cyber risk can't be managed. We talk about how that might be. ” is poised to transform the global economy, Hanna said, but not if the issue of cyber risk can’t be managed.

IoT 40

How to Gain Valuable Insights from Untapped Data Using AI

Perficient Data & Analytics

You probably know your organization needs to invest in artificial intelligence (AI) solutions to take advantage of the deluge of data that mobile and digital users are creating, but do you know why or how? LEGACY ANALYTICS METHODS AREN’T EQUIPPED TO PROCESS ALL DATA TYPES. Traditional analytics methods can interpret structured data, but without an AI solution it’s challenging to analyze unstructured data in an efficient, meaningful way. Manufacturing.

How to Enable IoT Security and Protect Your Data From Weak Links


When hackers can co-opt a database of high rollers at a casino by fishing out data through the aquarium thermometer, it’s time to secure your IoT security loose ends. IoT devices often enter the enterprise without IT support or setup, so understanding how to protect yourself must start with knowing what you’re protecting yourself from. Develop your list and have procedures in place to identify every new IoT device that comes onto your corporate systems.

How to Unite B2B PR and Content Marketing for Powerful Results

OpenText Information Management

When you boil it down, there's a lot to be said for teamwork. According to these individuals, you should either have PR or content marketing -- not both. Let's take a closer look at PR and content marketing, and examine how both play an important role in your overall B2B strategy. As new technologies and trends emerge, public relations evolves to fit the times. And we see how public relations has gracefully handled these changes, to the benefit of all involved.

B2B 60

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

and then there's a tale of how risky life was back then compared to today. You know, stuff like having to walk themselves to school without adult supervision, crazy stuff like that which we somehow seem to worry much more about today than what we did then. I've been involved with a bunch of really poorly implemented "Internet of Things" things in the past that presented serious privacy risks to those who used them. We'll come back to that later.

Kali Project Encryption and Isolation Using Vagrant and BitLocker

Perficient Data & Analytics

Furthermore, maybe you also have the need to keep the data for each of those projects isolated from the others – in other words, you need to avoid cross-contamination between your projects. In this article I will show you how to use my Vagrant Kali Project Setup tool to quickly and easily accomplish the following on your Windows host: Create a project folder that will provide the workspace for a new project. This is good and what you want to see.

Securing the Internet of Things through Class-Action Lawsuits

Schneier on Security

This law journal article discusses the role of class-action litigation to secure the Internet of Things. It proposes proactive class action litigation against manufacturers of unsafe and unsecured IoT devices before those devices cause unnecessary injury or death.

IoT 111

These 3 GDPR Requirements You Must Support Today are Nothing Compared With What’s Coming


The primary objectives of the GDPR are to give control back to their EU citizens and residents over their personal data, to simplify the regulatory environment for international business, and to unify regulations within the European Union. Personal data includes a wide range of personal identifiers, from addresses and public information, to social profiles, images, IP information, device IDs and medical and financial details.


Securing the International IoT Supply Chain

Schneier on Security

The basic problem we try to solve is: how to you enforce IoT security regulations when most of the stuff is made in other countries? And our solution is: enforce the regulations on the domestic company that's selling the stuff to consumers. Selling to U.S.

IoT 94

#ModernDataMasters: Sarit Bose, Cognizant


Sarit is accustomed to working across large enterprises and driving C-Level initiatives. I used to save money from my pocket money and gifts. Before I decided to buy anything, I used to calculate the interest I could earn. The love for numbers and computation led me to do statistics and then computer science at college. For me everything was a formula which is why I quickly realised the vital importance of good input data to work with. “We

#ModernDataMasters: Martin Squires, The Analysis Foundry


Four weeks later I asked if I could stay with that project because it was a lot more interesting to me than economics! How would you define “modern” data management and the connection between that and business analytics? Particularly the data governance side is beginning to be seen as really important. It is difficult for people to keep track of what they are trying to deliver because of all the different technologies they have to choose from.

#ModernDataMasters: Michele Chambers, AWS


She has a proven track record in launching new lines of high-tech businesses (hardware and software) successfully and in creating visions and strategic plans for her teams to profitably execute upon. Michele is also a speaker, author and evangelist for the use of analytics to drive better business decision-making. I then worked on a large-scale BI project at Coca-Cola, which was where I really started to understand the importance of analytics. Kate Tickner, Reltio.

MDM migration in 8 easy steps

Jamf on Retail

Kyle Ericson, a systems engineer at a large manufacturing organization, explains how to easily move from an existing mobile device management (MDM) solution to Jamf

MDM 36

MDM migration in 8 easy steps

Jamf on Retail

Kyle Ericson, a systems engineer at a large manufacturing organization, explains how to easily move from an existing mobile device management (MDM) solution to Jamf

MDM 36

QNAP urges users to take action to protect devices against Brute-Force attacks

Security Affairs

Taiwanese manufacturer QNAP published an alert urging its customers to secure their devices after a growing number of users reported that their devices have been hit by brute-force attacks. If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

How Microsoft Word “Protected View” Stops Information Leaks

Perficient Data & Analytics

Unfortunately, these features can be abused by bad actors to obtain operational intelligence on individuals, or even to steal credentials. Someone engaging in spear phishing could employ Word-based web trackers to learn more about the type of desktop computer and operating system a target is using, helping the spear phisher tune his or her strategy for further attack. When you click on an ad, the ad server knows who you are by information added to the URL of the ad.

#ModernDataMasters: Tony Saldanha, President, Transformant


H e has more than 30 years’ experience in industry, including 27 at P&G, and is a champion of creating new, relevant business and technology models to stay ahead of disruptive technology capabilities. Also I was CIO of Gilette when P&G acquired them and then had the opportunity to run IT and Shared services for P&G in all corners of the world. “I Trying to align all of those was my first insight into the incredible importance of master data. Kate Tickner, Reltio.

#ModernDataMasters: Bob More, SVP Global Field Operations


Despite the hype the key to success in these areas has always required reliable data to make the systems work properly – and that was a challenge for all of them too – so we as sales and customer success (before they had a name for it) people lived and breathed all the data problems. Being in control of your own destiny was key – certainly there’s a financial element of it – but I thought that it was a great opportunity to learn a lot and move around an organisation.

MDM 40

NI CompactRIO controller flaw could allow disrupting production

Security Affairs

A serious flaw in National Instruments CompactRIO controllers could allow remote attackers to disrupt production processes in an organization. These controllers are used in multiple sectors, including heavy equipment, industrial manufacturing, transportation, power generation, and oil and gas.

#ModernDataMasters: Scott Taylor, “The Data Whisperer”


Scott Taylor also known as “The Data Whisperer” is a firm believer in “making your data do the work,” and has enlightened many business executives to the value of proper data management by focusing on the strategic rationale and business alignment rather than technical implementation and system integration. The companies I worked for all had taxonomy and content assets, so to deal with that I had to talk to business leaders across all sorts of global enterprises.

MDM 40

Analyzing IoT Security Best Practices

Schneier on Security

van Oorschot: Abstract: Best practices for Internet of Things (IoT) security have recently attracted considerable attention worldwide from industry and governments, while academic research has highlighted the failure of many IoT product manufacturers to follow accepted practices.

IoT 107

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. government, standards will not apply to the IoT market at-large. Also Read: Edge Security: How to Secure the Edge of the Network.

IoT 94

CPQ + CAD? Introducing DPQ!

Role Model Software

In the manufacturing and design world, computer-aided design (CAD) is a commonly used tool. It is just what its name implies: the use of computers to assist with any aspect and stage of a design. We’ll come back to it later. How would that be done?

Hacking a Tesla Model X with a DJI Mavic 2 drone equipped with a WIFI dongle

Security Affairs

A security duo has demonstrated how to hack a Tesla Model X’s and open the doors using a DJI Mavic 2 drone equipped with a WIFI dongle. The scenario is disconcerting, hackers could use a drone to fly on your Tesla Model X and open the doors, a couple of researchers demonstrated.

Gigaset Android smartphones infected with malware after supply chain attack

Security Affairs

A new supply chain attack made the headlines, threat actors compromised at least one update server of smartphone maker Gigaset to deliver malware. Gigaset manufactures DECT telephones. We expect to be able to provide further information and a solution within 48 hours.