recentpopularlog in

jonerp : columbus'   58

7 Signs It’s Time To Get Focused On Zero Trust
"69% of employees doubt the cybersecurity processes in place in their organizations today. When the majority of employees don’t trust the security processes in place in an organization, they invent their own, often bringing their favorite security solutions into an enterprise. Shadow IT proliferates, productivity often slows down, and enterprise is more at risk of a breach than ever before. When there’s no governance or structure to managing data, cybercriminals flourish."
business  featured  posts  technology  software  trends  &  concepts  breach  breaches  centrify  cybersecurity  hackers  louis  columbus'  blog  passwords 
november 2019 by jonerp
What’s New On The Zero Trust Security Landscape In 2019
"The latest Forrester Wave adds in and places high importance on Zero Trust eXtended (ZTX) ecosystem advocacy, allocating 25% of the weight associated with the Strategy section on the scorecard. Forrester sees Zero Trust as a journey, with vendors who provide the greatest assistance and breadth of benefits on a unified platform being the most valuable. The Wave makes it clear that Zero Trust doesn’t refer to a specific technology but rather the orchestration of several technologies to enable and strengthen their Zero Trust framework. Key insights from what’s new this year in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019 include the following.."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  forrester  wave™:  zero  trust  extended  ecosystem  platform  providers  louis  columbus'  blog  mobile  security  mobileiron  mobility  q4  2019 
november 2019 by jonerp
10 Charts That Will Change Your Perspective Of AI In Security
"AI’s greatest benefit is the increase in the speed of analyzing threats (69%) followed by an acceleration in the containment of infected endpoints/devices and hosts (64%). Because AI reduces the time to respond to cyber exploits organizations can potentially save an average of more than $2.5 million in operating costs. Source: The Value of Artificial Intelligence in Cybersecurity – Sponsored by IBM Security Independently conducted by Ponemon Institute LLC, July 2018."
business  featured  posts  technology  software  trends  &  concepts  ai  cybersecurity  artificial  intelligence  cyberattacks  fraud  detection  louis  columbus'  blog 
november 2019 by jonerp
Securing Multi-Cloud Manufacturing Systems In A Zero Trust World
"To stop the cybercriminals’ gold rush, merged manufacturing businesses need to take the first step of adopting an approach to secure each acquired company’s identity repositories, whether on-premises or in the cloud. For example, instead of having to reproduce or continue to manage the defined rights and roles for users in each AD, manufacturing conglomerates can better secure their combined businesses using a Multi-Directory Brokering approach."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  resource  planning  erp  louis  columbus'  blog  manufacturing  private  equity  firms 
november 2019 by jonerp
How To Make Complex CPQ Selling Simple With Visual Configurators
"Visual configurators are capable of so much more than they are delivering today. It’s time to graduate beyond the shock-and-awe stage, which has been very successful in driving leads, generating MQLs, and closing deals. It’s time to get down to the hard work of making all those impressive models buildable at scale and profitable. And that comes by doubling down efforts at shortening cycle times from product concept to completed product. That’s the true north of this market and the secret to succeeding. Getting engineering, manufacturing, and sales collaborating using product models as a single source of truth is the best place to start."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  elogic  engineer-to-order  louis  columbus'  blog  price  and  quote  product  configuration 
october 2019 by jonerp
How To Improve Your CPQ Pricing Strategies
"The typical manufacturer who has over $100M in sales generates 40% or more of their sales through indirect channels. The channel partners they recruit and sell through are also reselling 12 other competitive products on average. Which factors most influence a distributor or channel partner’s decision to steer a sale to one manufacturer versus another? The following are the steps manufacturers can take now to improve price management and drive more channel sales."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  engineer-to-order  louis  columbus'  blog  price  and  quote  pricing  management  product  configuration 
october 2019 by jonerp
What’s New In Gartner’s Hype Cycle For AI, 2019
"
Between 2018 and 2019, organizations that have deployed artificial intelligence (AI) grew from 4% to 14%, according to Gartner’s 2019 CIO Agenda survey.
Conversational AI remains at the top of corporate agendas spurred by the worldwide success of Amazon Alexa, Google Assistant, and others.
Enterprises are making progress with AI as it grows more widespread, and they’re also making more mistakes that contribute to their accelerating learning curve."
business  featured  posts  technology  software  trends  &  concepts  ai  cloud  computing  gartner  hype  cycle  for  artificial  intelligence  2019  louis  columbus'  blog 
october 2019 by jonerp
Three Reasons Why Killing Passwords Improves Your Cloud Security
"The Twitter CEO’s account getting hacked is the latest in a series of incidents that reflect how easy it is for hackers to gain access to cloud-based enterprise networks using mobile devices. Verizon’s Mobile Security Index 2019 revealed that the majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device. Mobile devices are one of the most porous threat surfaces a business has. They’re also the fastest-growing threat surface, as every employee now relies on their smartphones as their ID. IDG’s recent survey completed in collaboration with MobileIron, titled Say Goodbye to Passwords found that 89% of security leaders believe that mobile devices will soon serve as your digital ID to access enterprise services and data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  hackers  jack  dorsey  louis  columbus'  blog  mobileiron  twitter  hack  zero  trust  networks 
september 2019 by jonerp
State Of AI And Machine Learning In 2019
"Data mining, advanced algorithms, and predictive analytics are among the highest-priority projects for enterprises adopting AI and machine learning in 2019. Reporting, dashboards, data integration, and advanced visualization are the leading technologies and initiatives strategic to Business Intelligence (BI) today. Cognitive BI (artificial-intelligence-based BI) ranks comparatively lower at 27th among priorities. The following graphic prioritizes the 27 technologies and initiatives strategic to business intelligence."
business  featured  posts  technology  software  trends  &  concepts  ai  artificial  intelligence  louis  columbus'  blog  machine  learning  ml  state  of  2019  and  in 
september 2019 by jonerp
5 Key Insights From Absolute’s 2019 Endpoint Security Trends Report
"Endpoint security controls and their associated agents degrade and lose effectiveness over time. Over 42% of endpoints experience encryption failures, leaving entire networks at risk from a breach. They’re most commonly disabled by users, malfunction or have error conditions or have never been installed correctly in the first place. Absolute found that endpoints often failed due to the fragile nature of their encryption agents’ configurations. 2% of encryption agents fail every week, and over half of all encryption failures occurred within two weeks, fueling a constant 8% rate of decay every 30 days. 100% of all devices experiencing encryption failures within one year.'
business  featured  posts  technology  software  trends  &  concepts  absolute  security  cybersecurity  endpoint  louis  columbus'  blog 
september 2019 by jonerp
Why Manufacturing Supply Chains Need Zero Trust
"Supply chains are renowned for how unsecured and porous they are multiple layers deep. That’s because manufacturers often only password-protect administrator access privileges for trusted versus untrusted domains at the operating system level of Windows NT Server, haven’t implemented multi-factor authentication (MFA), and apply a trust but verify mindset only for their top suppliers. Many manufacturers don’t define, and much less enforce, supplier security past the first tier of their supply chains, leaving the most vulnerable attack vectors unprotected."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
september 2019 by jonerp
Mobile Identity Is The New Security Perimeter
"89% of security leaders believe that mobile devices will serve as your digital ID to access enterprise services and data in the near future according to a recent survey by IDG completed in conjunction with MobileIron, titled Say Goodbye to Passwords. You can download a copy of the study here. Mobile devices are increasingly becoming the IDs enterprises rely on to create and scale a mobile-centric zero trust security network throughout their organizations."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  louis  columbus'  blog  mobileiron  smartphones  zero  trust  network  security 
september 2019 by jonerp
The Truth About Privileged Access Security On AWS And Other Public Clouds
"In short, native IAM capabilities offered by AWS, Microsoft Azure, Google Cloud, and more provides enough functionality to help an organization get up and running to control access in their respective homogeneous cloud environments. Often they lack the scale to fully address the more challenging, complex areas of IAM and PAM in hybrid or multi-cloud environments."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  aws  cybersecurity  security  centrify  louis  columbus'  blog 
august 2019 by jonerp
What Needs To Be On Your CPQ Channel Roadmap In 2019
"Manufacturers can realize greater revenue potential through their channels by combining machine learning insights to find those aftermarket customers most ready to buy while accelerating sales closing cycles with CPQ. Manufacturers want to make sure they are getting their fair share of the aftermarket. Using a machine learning-based application, they can help their resellers increase average deal sizes by knowing which products and services to offer when. They’ll also know when to present upsell and cross-sell offers into an account at a specific point in time when they will be most likely to lead to additional sales, all based on machine learning-based insights. Combining machine learning-based insights to guide resellers to the most valuable and highest probability customer accounts ready to buy with an intuitive CPQ system increases sales efficiency leading to higher revenues."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  elogic  engineer-to-order  louis  columbus'  blog  price  and  quote  product  configuration 
august 2019 by jonerp
Your Mobile Phone Is Your Identity. How Do You Protect It?
"Accidental, inadvertent breaches from human error and system glitches are still the root cause for nearly half (49%) of the data breaches. And phishing attacks on mobile devices that are lost, stolen or comprised in workplaces are a leading cause of breaches due to human error."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  privilege  security 
august 2019 by jonerp
How To Deal With Ransomware In A Zero Trust World
"Ransomware attackers are becoming more sophisticated using spear-phishing emails that target specific individuals and seeding legitimate websites with malicious code – it’s helpful to know the anatomy of an attack. Some recent attacks have even started exploiting smartphone vulnerabilities to penetrate corporate networks, according to Dr. George."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
august 2019 by jonerp
Roadmap To Zero Trust For Small Businesses
"Small businesses and startups run so fast there’s often a perception that achieving greater security will slow them down. In a Zero Trust world, they don’t need to spend a lot of sacrifice speed for security. Following a Zero Trust roadmap can protect their systems, valuable intellectual property, and valuable time by minimizing the risk of falling victim to costly breaches.

Here’s what small businesses and startups need to include on their Zero Trust roadmaps"
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
july 2019 by jonerp
Why AI Is The Future Of Cybersecurity
"Fraud detection, malware detection, intrusion detection, scoring risk in a network, and user/machine behavioral analysis are the five highest AI use cases for improving cybersecurity. Capgemini analyzed 20 use cases across information technology (IT), operational technology (OT) and the Internet of Things (IoT) and ranked them according to their implementation complexity and resultant benefits (in terms of time reduction). Based on their analysis, we recommend a shortlist of five high-potential use cases that have low complexity and high benefits. 54% of enterprises have already implemented five high impact cases. The following graphic compares the recommended use cases by the level of benefit and relative complexity."
business  featured  posts  technology  software  trends  &  concepts  absolute  ai  centrify  cybersecurity  kount  louis  columbus'  blog  mobileiron 
july 2019 by jonerp
Passwords Are The Weakest Defense In A Zero Trust World
"These and many other fascinating insights make it clear that passwords are now the weakest defense anyone can rely on in a Zero Trust world. Two recent research studies quantify just how weak and incomplete an IT security strategy based on passwords is, especially when the need to access mobile apps is proliferating. Combined, these two MobileIron reports pack a one-two punch at passwords, and how they’re not strong enough alone to protect mobile devices, the fastest proliferating threat surface in a Zero Trust world."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  security 
july 2019 by jonerp
Salesforce Now Has Over 19% Of The CRM Market
"72.9% of CRM spending was on software as a service (SaaS) in 2018, which is expected to grow to 75% of total CRM software spending in 2019.
Worldwide enterprise application software revenue totaled more than $193.6B in 2018, a 12.5% increase from 2017 revenue of $172.1B. CRM made up nearly 25% of the entire enterprise software revenue market."
business  featured  posts  technology  software  trends  &  concepts  adobe  marketing  crm  customer  relationship  management  hubspot  louis  columbus'  blog  oracle  salesforce 
july 2019 by jonerp
Machine Learning Is Helping To Stop Security Breaches With Threat Analytics
"Immediate visibility with a flexible, holistic view of access activity across an enterprise-wide IT network and extended partner ecosystem. Look for threat analytics applications that provide dashboards and interactive widgets to better understand the context of IT risk and access patterns across your IT infrastructure. Threat analytics applications that give you the flexibility of tailoring security policies to every user’s behavior and automatically flagging risky actions or access attempts, so that you’ll gain immediate visibility into account risk, eliminating the overhead of sifting through millions of log files and massive amounts of historical data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  louis  columbus'  blog  privileged  access  management  verizon  zero  trust  privilege  security  ztp 
june 2019 by jonerp
Smart Machines Are The Future Of Manufacturing
"Capturing IIoT’s full value potential will require more sophisticated integrated approaches than current automation protocols provide. IIoT manufacturing systems are quickly becoming digital manufacturing platforms that integrate ERP, MES, PLM and CRM systems to provide a single unified view of product configurations and support the design-to-manufacturing process."
business  featured  posts  technology  software  trends  &  concepts  design-to-manufacture  iiot  industrial  internet  of  things  louis  columbus'  blog  manufacturing  intelligence 
june 2019 by jonerp
The State Of 3D Printing, 2019
"Proof of concepts and prototyping dominate 3D printing applications in 2019. Manufacturers are increasing their reliance on 3D printing as part of their broader manufacturing strategies, with production use up to 51% of all respondents from 38.7% in 2018. The following compares 2019’s purpose of 3D prints versus the last five years of survey data."
business  featured  posts  technology  software  trends  &  concepts  3d  modeling  printing  forecast  in  manufacturing  prototyping  design-to-manufacture  louis  columbus'  blog 
june 2019 by jonerp
How The Top 21% Of PAM-Mature Enterprises Are Thwarting Privileged Credential Breaches
"Energy, Technology & Finance are the most mature industries adopting Privileged Access Management (PAM), outscoring peer industries by a wide margin. Government, Education, and Manufacturing are the industries most lagging in their adoption of Zero Trust Privilege (ZTP), making them the most vulnerable to breaches caused by privileged credential abuse. Education and Manufacturing are the most vulnerable industries of all, where it’s common for multiple manufacturing sites to use shared accounts for controlling privileged access. The study found shared accounts for controlling privileged access is commonplace, with 52% of all organizations reporting this occurring often. Presented below are the relative levels of Zero Trust Privilege Maturity by demographics, with the largest organizations having the most mature approaches to ZTP, which is expected given the size and scale of their IT and cybersecurity departments."
business  featured  posts  technology  software  trends  &  concepts  centrify  2019  zero  trust  privilege  maturity  model  report  louis  columbus'  blog  pam  privileged  access  credential  abuse  credentials  management 
june 2019 by jonerp
Seven Things You Need To Know About IIoT In Manufacturing
"IIoT platforms are beginning to replace MES and related applications, including production maintenance, quality, and inventory management, which are a mix of Information Technology (IT) and Operations Technology (OT) technologies. IoT Analytics is seeing IIoT platforms begin to replace existing industrial software systems that had been created to bridge the IT and OT gaps in manufacturing environments. Their research teams are finding that IIoT Platforms are an adjacent technology to these typical industrial software solutions but are now starting to replace some of them in smart connected factory settings. The following graphic explains how IoT Analytics sees the IIoT influence across the broader industrial landscape."
business  featured  posts  technology  software  trends  &  concepts  ai  artificial  intelligence  iiot  industrial  internet  of  things  iot  analytics  louis  columbus'  blog  machine  learning 
june 2019 by jonerp
How to Improve Privileged User’s Security Experiences With Machine Learning
"Every business is facing the paradox of hardening security without sacrificing users’ login and system access experiences. Zero Trust Privilege is emerging as a proven framework for thwarting privileged credential abuse by verifying who is requesting access, the context of the request, and the risk of the access environment across every threat surface an organization has."
business  featured  posts  technology  software  trends  &  concepts  centrify  louis  columbus'  blog  machine  learning  zero  trust  privilege  security  ztp  zts 
june 2019 by jonerp
How To Improve Supply Chains With Machine Learning: 10 Proven Ways
"Machine learning-based algorithms are the foundation of the next generation of logistics technologies, with the most significant gains being made with advanced resource scheduling systems. Machine learning and AI-based techniques are the foundation of a broad spectrum of next-generation logistics and supply chain technologies now under development. The most significant gains are being made where machine learning can contribute to solving complex constraint, cost and delivery problems companies face today."
business  featured  posts  technology  software  trends  &  concepts  analytics  artificial  intelligence  centrify  erp  infor  inspectorio  louis  columbus'  blog 
may 2019 by jonerp
How To Secure Mobile Devices In A Zero Trust World
"Hacker’s favorite way to gain access to any business is by using privileged access credentials, which are increasingly being harvested from cellphones using malware. Hacking organizations would rather walk in the front door of any organizations’ systems rather than expend the time and effort to hack in. It’s by far the most popular approach with hackers, with 74% of IT decision makers whose organizations have been breached in the past say it involved privileged access credential abuse according to a recent Centrify survey, Privileged Access Management in the Modern Threatscape."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  forrester  zero  trust  framework  identity  access  management  louis  columbus'  blog  machine  learning  mobileiron 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part 2
"Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  gartner  top  10  security  projects  for  2018  louis  columbus'  blog  privileged  access  abuse  management 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part I
"The following are five strategies CIOs need to concentrate on to stop privileged credential abuse. Starting with an inventory of privileged accounts and progressing through finding the gaps in IT infrastructure that create opportunities for privileged credential abuse, CIOs and their teams need to take preemptive action now to avert potential breaches in the future."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  gartner  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  credential  abuse 
april 2019 by jonerp
5 Things Every Executive Needs To Know About Identity And Access Management
"Executives have a strong sense of urgency to improve Identity and Access Management (IAM) today to assure the right individuals access the right resources at the right times and for the right reasons. IAM components like Access Management, Single Sign-On, Customer Identity and Access Management (CIAM), Advanced Authentication, Identity Governance and Administration (IGA), IoT-Driven IAM, and Privileged Access Management address the need to ensure appropriate access to resources across an organization’s entire attack surface and to meet compliance requirements."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  identity  and  access  management  louis  columbus'  blog  mfa  multi-factor  authentication  pam 
april 2019 by jonerp
5 Ways To Demystify Zero Trust Security
"To Chase Cunningham’s point, more customer use cases need to be created, and thankfully that’s on his research agenda. Starting the conversation with each vendor visited by asking for their definition of Zero Trust either led to a debate of whether Zero Trust was needed in the industry or how their existing architecture could morph to fit the framework. Booth staffs at the following companies deserve to be commended for how much they know about their customers’ success with Zero Trust: Akamai, Centrify, Cisco, Microsoft, MobileIron, Palo Alto Networks, Symantec, and Trend Micro."
business  featured  posts  technology  software  trends  &  concepts  akamai  capgemini  centrify  cisco  ledios  cyber  louis  columbus'  blog  microsoft 
march 2019 by jonerp
74% Of Data Breaches Start With Privileged Credential Abuse
"Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In quantifying this gap consider the typical U.S.-based enterprise will lose on average $7.91M from a breach, nearly double the global average of $3.68M according to IBM’s 2018 Data Breach Study."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  ibm  2018  data  breach  study  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  report  credential  abuse  security 
march 2019 by jonerp
Top 25 IoT Startups To Watch In 2019
"The most successful IoT startups selling into enterprises excel at orchestrating analytics, Artificial Intelligence (AI), and real-time monitoring to deliver exceptional customer experiences. As a group, these top 25 IoT startups are showing early potential at enabling profitable new business models, revitalizing industries that have experienced single single-digit growth recently. Each of these startups is taking a unique approach to solving some of the enterprises’ most challenging problems, and in so doing creating valuable new patents that further fuel IoT adoption and growth."
business  featured  posts  technology  software  trends  &  concepts  internet  of  things  startups  louis  columbus'  blog  top  25  iot  2019 
february 2019 by jonerp
Digital Transformation’s Missing Link Is Zero Trust
"Gaps exist between the results digital transformation initiatives are delivering today, and the customer-driven value they’re capable of. According to Gartner, 75% of digital transformation projects are not aligned internally today, leading to delayed new product launches, mediocre experiences, and greater security risks than ever before."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  palo  alto  networks  privileged  access  management  (pam)  world  economic  forum 
february 2019 by jonerp
How Machine Learning Improves Manufacturing Inspections, Product Quality & Supply Chain Visibility
"Manufacturers’ most valuable data is generated on shop floors daily, bringing with it the challenge of analyzing it to find prescriptive insights fast – and an ideal problem for machine learning to solve.

Manufacturing is the most data-prolific industry there is, generating on average 1.9 petabytes of data every year according to the McKinsey Global Insititute. Supply chains, sourcing, factory operations, and the phases of compliance and quality management generate the majority of data."
business  featured  posts  technology  software  trends  &  concepts  inspectorio  louis  columbus'  blog  machine  learning  manufacturing  mckinsey  global  institute’  product  inspections  quality 
february 2019 by jonerp
Which Analytics And BI Technologies Will Be The Highest Priority In 2019?
"82% of enterprises are prioritizing analytics and BI applications and platforms as part of their budgets for new technologies and cloud-based services. 78% of enterprises are prioritizing advanced analytics, and 76% data preparation. 54% say AI, machine learning and Natural Language Processing (NLP) are also a high investment priority. The following graphic ranks enterprises’ investment priorities for acquiring or subscribing to new technologies and cloud-based services by analytics and BI initiatives or strategies. Please click on the graphic to expand for easier reading."
business  featured  posts  technology  software  trends  &  concepts  analytics  bi  and  in  the  age  of  ai  big  data  intelligence  cloud  computing  lake  louis  columbus'  blog 
january 2019 by jonerp
Reinventing After-Sales Service In A Subscription Economy World
"91% of manufacturers are investing in predictive analytics in the next 12 months, and 50% consider Artificial Intelligence (AI) a major planned investment for 2019 to support their subscription-based business models.
New subscription business models and smart, connected products are freeing manufacturers up from competing for one-time transaction revenues to recurring revenues based on subscriptions.
By 2020, manufacturers are predicting 67% of their product portfolios will be smart, connected products according to an excellent study by Capgemini."
business  featured  posts  technology  software  trends  &  concepts  digital  disruption  internet  of  things  iot  louis  columbus'  blog  manufacturing  services  revenue  subscription  economy 
november 2018 by jonerp
Tech Leaders Look To IoT, AI & Robotics To Fuel Growth Through 2021
"
30% of tech leaders globally predict blockchain will disrupt their businesses by 2021.
IoT, Artificial Intelligence (AI) and Robotics have the greatest potential to digitally transform businesses, making them more customer-centered and efficient.
26% of global tech leaders say e-Commerce apps and platforms will be the most disruptive new business model in their countries by 2021.
IDC predicts worldwide IoT spending will reach $1.1T by 2021."
business  featured  posts  technology  software  trends  &  concepts  analytics  internet  of  things  (iot)  iot  kpmg  louis  columbus'  blog  robotics 
november 2018 by jonerp
How Blockchain Can Improve Manufacturing In 2019
"Blockchain’s greatest potential to deliver business value is in manufacturing. Increasing visibility across every area of manufacturing starting with suppliers, strategic sourcing, procurement, and supplier quality to shop floor operations including machine-level monitoring and service, blockchain can enable entirely new manufacturing business models."
business  featured  posts  technology  software  trends  &  concepts  blockchain  industry  4.0  internet  of  things  (iot)  louis  columbus'  blog  manufacturing  smart  traceability 
november 2018 by jonerp
How To Protect Healthcare IoT Devices In A Zero Trust World
"Healthcare and medical device manufacturers need to start taking action now to secure these devices during the research and development, design and engineering phases of their next generation of IoT products. Specifying and validating that every IoT access point is compatible and can scale to support Zero Trust Security (ZTS) is essential if the network of devices being designed and sold will be secure. ZTS is proving to be very effective at thwarting potential breach attempts across every threat surface an organization has. Its four core pillars include verifying the identity of every user, validating every device, limiting access and privilege, and utilizing machine learning to analyze user behavior and gain greater insights from analytics."
business  featured  posts  technology  software  trends  &  concepts  accenture  capgemini  centrify  healthcare  internet  of  things  (iot)  iot  louis  columbus'  blog 
november 2018 by jonerp
Google Needs To Make Machine Learning Their Growth Fuel
"Google needs new AI- and machine learning-driven businesses that have lower Total Acquisition Costs (TAC) to offset the rising acquisition costs of their ad and search businesses. CB Insights found Google is experiencing rising TAC in their core ad and search businesses. With the strategic shift to mobile, Google will see TAC escalate even further. Their greatest potential for growth is infusing greater contextual intelligence and knowledge across the entire series of companies that comprise Alphabet, shown in the graphic below."
business  featured  posts  technology  software  trends  &  concepts  cb  insights  google  ai  machine  learning  louis  columbus'  blog  patents 
september 2018 by jonerp
Identities Are The New Security Perimeter
"18% of healthcare employees are willing to sell confidential data to unauthorized parties for as little as $500 to $1,000, and 24% of employees know of someone who has sold privileged credentials to outsiders, according to a recent Accenture survey.
Privileged credentials for accessing an airport’s security system were recently for sale on the Dark Web for just $10, according to McAfee."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  next-gen  access  zero  trust  security 
august 2018 by jonerp
Glassdoor’s 10 Highest Paying Tech Jobs Of 2018
"
Software Engineering Manager is the highest paying position with an average salary of $163,500 with 31,621 open positions on Glassdoor today.
Over 368,000 open positions are available across the 10 highest paying jobs on Glassdoor today.
$147,000 is the average salary of the top 10 tech jobs on Glassdoor today.
12.7% of all open positions are for software engineers, making this job the most in-demand in tech today."
business  featured  posts  technology  software  glassdoor  highest  paying  tech  jobs  louis  columbus'  blog 
august 2018 by jonerp
Where Business Intelligence Is Delivering Value In 2018
"Dashboards, reporting, end-user self-service, advanced visualization, and data warehousing are the top five most important technologies and initiatives strategic to BI in 2018."
business  featured  posts  technology  software  analytics  bi  intelligence  dresner  advisory  services  louis  columbus'  blog  predictive 
july 2018 by jonerp
Five Reasons Why Machine Learning Needs To Make Resumes Obsolete
"The comparative analysis of high achievers’ characteristics with applicants takes seconds to complete, providing a list of prospects complete with profiles. Machine learning-derived profiles of potential hires meeting the high performers’ characteristics provided greater contextual intelligence than any resume ever could."
business  featured  posts  technology  software  applicant  tracking  systems  artificial  intelligence  byline=louis  columbus  louis  columbus'  blog  machine  learning  recruitment  résumé 
may 2018 by jonerp
How To Close The Talent Gap With Machine Learning
"Many CEOs are also making greater diversity and inclusion their highest priority. Using advanced AI and machine learning techniques, a company founded by former Google and Facebook AI Scientists is showing potential in meeting these challenges. Founders Ashutosh Garg and Varun Kacholia have over 6000+ research citations and 80+ search and personalization patents. Together they founded Eightfold.ai as Varun says “to help companies find and match the right person to the right role at the right time and, for the first time, personalize the recommendations at scale.”
business  featured  posts  technology  software  artificial  intelligence  eightfold.ai  louis  columbus'  blog  machine  learning  recruiting  recruitment  talent  management 
april 2018 by jonerp
The State Of Cloud Business Intelligence, 2018
"Dashboards, advanced visualization, ad-hoc query, data integration, and self-service are the most-required Cloud BI features in 2018. Sales & Marketing need real-time feedback on key initiatives, programs, strategies, and progress towards goals. Dashboards and advanced visualization features’ dominance of feature requirements reflect this department’s ongoing need for real-time feedback on the progress of their teams towards goals. Reporting, data discovery, and end-user data blending (data preparation) make up the next tier of importance."
business  featured  posts  technology  software  analytics  and  big  data  cloud  bi  intelligence  computing  louis  columbus'  blog 
april 2018 by jonerp
10 Ways Machine Learning Is Revolutionizing Manufacturing In 2018
"Improving semiconductor manufacturing yields up to 30%, reducing scrap rates, and optimizing fab operations are is achievable with machine learning. Attaining up to a 30% reduction in yield detraction in semiconductor manufacturing, reducing scrap rates based on machine learning-based root-cause analysis and reducing testing costs using AI optimization are the top three areas where machine learning will improve semiconductor manufacturing. McKinsey also found that AI-enhanced predictive maintenance of industrial equipment will generate a 10% reduction in annual maintenance costs, up to a 20% downtime reduction and 25% reduction in inspection costs. Source: Smartening up with Artificial Intelligence (AI) – What’s in it for Germany and its Industrial Sector? (52 pp., PDF, no opt-in) McKinsey & Company."
business  featured  posts  artificial  intelligence  cloud  computing  erp  digital  manufacturing  enterprise  software  factory  of  the  future  louis  columbus'  blog  machine  learning 
march 2018 by jonerp
2018 Will be A Breakout Year For Supply Chain Analytics - by @louiscolumbus
"66% of supply chain leaders say advanced supply chain analytics are critically important to their supply chain operations in the next 2 to 3 years. The Hackett Group found the majority of supply chain leaders have a sense of urgency for getting advanced supply chain analytics implemented and contributing to current and future operations. The majority see the value of having advanced analytics that can scale across their entire supplier network."
business  technology  software  analytics  and  big  data  bi  byline=louis  columbus  logistics  louis  columbus'  blog  supply  chain  management 
january 2018 by jonerp
73% of Executives Are Researching & Launching IoT Projects In 2017 - by @louiscolumbus
"Manufacturing-based IoT connections grew 84% between 2016 and 2017, followed by energy & utilities (41%). Transportation and distribution (40%), smart cities and communities (19%) and healthcare and pharma (11%) are the remaining three industries tracked in the study who had positive growth in the number of IoT connections. The following graphic compares year-over-year growth by industry for the 2016 to 2017 timeframe."
featured  posts  technology  software  cloud  computing  internet  of  things  forecast  iot  louis  columbus'  blog 
october 2017 by jonerp
How Artificial Intelligence Is Revolutionizing Business In 2017
"The research found significant gaps between companies who have already adopted and understand Artificial Intelligence (AI) and those lagging. AI early adopters invest heavily in analytics expertise and ensuring the quality of algorithms and data can scale across their enterprise-wide information and knowledge needs. The leading companies who excel at using AI to plan new businesses and streamline existing processes all have solid senior management support for each AI initiative."
featured  posts  technology  software  artificial  intelligence  boston  consulting  group  (bcg)  cloud  computing  louis  columbus'  blog  machine  learning  mit  sloan  management  review 
september 2017 by jonerp
Gartner’s Hype Cycle for Emerging Technologies, 2017 Adds 5G, Edge Computing For First Time
"Gartner added eight new technologies to the Hype Cycle this year including 5G, Artificial General Intelligence, Deep Learning, Edge Computing, Serverless PaaS.
Virtual Personal Assistants, Personal Analytics, Data Broker PaaS (dbrPaaS) are no longer included in the Hype Cycle for Emerging Technologies."
featured  posts  technology  software  ai  amazon  web  services  analytics  artifical  intelligence  cloud  computing  landscape  deep  learning  gartner  hype  cycle  for  emerging  technologies  louis  columbus'  blog 
september 2017 by jonerp
73% Are Using Internet Of Things Data To Improve Their Business - by @louiscolumbus
"73% Are Using Internet Of Things Data To Improve Their Business. The data and insights gained from IoT are most often used for improving product quality or performance (47%), improving decision-making (46%) and lowering operational costs (45%). Improving or creating new customer relationships (44%) and reducing maintenance or downtime (42%) are also strategic areas where IoT is making a contribution today according to the Cisco study."
featured  posts  technology  software  and  best  practices  breakthroughs  cisco  internet  of  things  (iot)  study  cloud  computing  forecast  iot  louis  columbus'  blog  the  journey  to  value:  challenges 
july 2017 by jonerp
How AWS And Azure Competing Is Improving Public Cloud Adoption - by @louiscolumbus
"Only 37% of current Azure users expect to add or replace their Public Cloud provider, compared to 53% of current AWS users and 50% of GCP users. The study found that approximately 40% of respondents expect to add or replace their cloud provider in the next two years, compared to 43% who predicted that last year. Companies who have adopted Microsoft Azure are least likely to replace/add other vendors, as only 37% of current Azure users expect to add or replace, compared to 53% of current AWS users and 50% of GCP users."
business  featured  posts  amazon  aws  web  services  security  cloud  computing  landscape  louis  columbus'  blog  saas  early  adopter  research  economics 
june 2017 by jonerp
Business Intelligence And Analytics In The Cloud, 2017 - by @louiscolumbus
"Public cloud is the most preferred deployment platform for cloud BI and analytics, and the larger the organization toe more likely they are using private clouds. 46% of organizations selected public cloud platforms as their preferred infrastructure for supporting their BI, analytics, and data management initiatives in 2016. 30% are relying on a hybrid cloud platform and 24%, private clouds. With public cloud platforms becoming more commonplace in BI and analytics deployments, the need for greater PaaS- and IaaS-level orchestration becomes a priority."
featured  posts  technology  software  analytics  business  intelligence  cloud  computing  startups  erp  louis  columbus'  blog  as  a  service 
march 2017 by jonerp
2017 Is Quickly Becoming The Year Of The API Economy - by @louiscolumbus
" Individual persona needs must drive API development, and this encompasses the device(s) they use, apps they regularly work with and the workflows across all apps on a platform. When an app or platform provider has anticipated the persona needs and charted customer journeys, it shows in the APIs created. The APIs reflect customer preferences much more clearly and are more efficient in delivering great apps as a result. Providing an API code base that has these features accelerates new app development and opens entirely new channels for selling."
featured  posts  technology  software  cloud  computing  enosix  integration  salesforce  sap  ensosix  louis  columbus'  blog  as  a  service 
march 2017 by jonerp
Machine Learning Is Redefining The Enterprise In 2016 - by @louiscolumbus
"Exponential data growth with unstructured data being over 80% of the data an enterprise relies on to make decisions daily. Demand forecasts, CRM and ERP transaction data, transportation costs, barcode and inventory management data, historical pricing, service and support costs and accounting standard costing are just a few of the many sources of structured data enterprises make decisions with today."
business  featured  posts  technology  software  analytics  big  data  cloud  computing  enterprise  louis  columbus'  blog  machine  learning 
june 2016 by jonerp

Copy this bookmark:





to read