recentpopularlog in

jonerp : posts   277

« earlier  
10 Ways To Own Your Cybersecurity In 2020
"Vault away passwords to critical systems and data. In the privileged access world of Cybersecurity operations in any organization, password vaults have become commonplace. Password vaults are similar to password managers many people use for their personal devices, web applications, and sites they regularly visit. In the case of a password vault, privileged credentials are checked in and out by admins, with each password automatically rotating to ensure greater randomization."
business  featured  posts  technology  software  trends  &  concepts  amazon  echo  bring-your-own-device  centrify  zero  trust  privilege.  cybersecurity  dashlane  google  home  lastpass 
21 days ago by jonerp
10 Ways Asset Intelligence Improves Cybersecurity Resiliency And Persistence
"Track, trace and find lost or stolen devices on or off an organizations’ network in real-time, disabling the device if necessary. Every device, from laptops, tablets, and smartphones to desktops and specialized use devices are another threat surface that needs to be protected."
business  featured  posts  technology  software  trends  &  concepts  absolute  persistence  platform  resilience  software’s  2019  endpoint  security  report  asset  intelligence 
27 days ago by jonerp
Introducing the Future of Work Global Index
"We believe the convergence of significant macro-trends in the market have attributed to the strong growth of “Future of Work” companies including:

digital transformation and the rapid adoption of cloud technologies in the enterprise
low unemployment forcing companies to investment in technology solution to more effectively streamline critical HR processes
workforce globalization requiring new investments collaboration and productivity tools
rapid automation of jobs and the need to reskill the global workforce"
business  featured  posts  technology  software  future  of  work  hrtech  human  resources  saas  slack 
4 weeks ago by jonerp
Shadow IT Is The Cybersecurity Threat That Keeps Giving All Year Long
"Shadow personal IoT voice assistants, Amazon Kindles, smartphone, and tablet devices are proliferating across enterprise networks today, accelerated by last-minute shopping everyone is trying to get done before the end of December. 82% of organizations have introduced security policies governing the use of these devices but just 24% of employees are aware of them. Meanwhile, the majority of IT senior management, 88%, believe their policies are effective. These and many other fascinating insights are from a recent study completed by Infoblox titled, What is Lurking on Your Network, Exposing the threat of shadow devices (PDF, 7 pp., no opt-in)."
business  featured  posts  technology  software  trends  &  concepts  byod  chief  information  officer  christmas  amazon  shopping  sales  ciso  cybercrime 
8 weeks ago by jonerp
Outward-Facing Corporate Culture
"In Tech, the most scarce and valuable input is talented people. Attracting and retaining these talented people is harder than any other industry except perhaps Finance, but in Tech compensation is driven by the long term incentive alignment of stock options. Ownership. As software is eating the world, and software is made of people, the effective norms for talent will extend from and beyond Tech.

The Google Walkout and other visible Tech employee activism are a cultural revolution against inward-facing corporate cultures that failed them. The employees-as-stakeholder had bought into Google’s Don’t Be Evil values that were part of it’s founding. But this value was astonishingly repealed. In Google’s case employees revolted against creating products that were being sold for evil."
featured  posts  trends  &  concepts  corporate  culture  change  hr  techlash  values 
9 weeks ago by jonerp
Why Cybersecurity Needs To Focus More On Customer Endpoints
"There are over thirty vendors competing in the endpoint security market right now. A few of the most interesting are Absolute Software, Microsoft, Palo Alto Networks, and others who are seeing a surge of activity from enterprises based on discussions with CIOs and CISOs. Absolute Software’s Persistence self-healing endpoint security technology is embedded in the firmware of more than 500 million devices and gives CIOs, CISOs and their team’s complete visibility and control over devices and data. Absolute is the leading visibility and control platform that provides enterprises with tamper-proof resilience and protection of all devices, data, and applications."
business  featured  posts  technology  software  trends  &  concepts  absolute  persistence  resilience  (tse:  abt)  asset  management  christy  wyatt  ceo  of  cloud-based  endpoint  protection  platforms  (epp) 
10 weeks ago by jonerp
Decade-end review: Enterprise Applications have NOT eaten the world
"In this greatly fragmented market we are seeing many opportunities in “edges” and “junctions” – Zoho is finding new customers in Nigeria, UAE and other markets that bigger vendors have ignored, Plex is moving into MES as plants are increasingly modernized, Rimini is doing fine with third party maintenance as companies stay with legacy, Workfront is finding traction in new buying centers that have increasingly been digitized – Marketing Operations, New Product Development, and various corporate shared services. RPA vendors like Automation Anywhere, tools like Prism Analytics from Workday and MuleSoft from Salesforce are increasingly bridging gaps across the enterprise fragmentation. The big caveat from this fragmentation – application portfolios are screaming to be rationalized."
business  featured  posts  technology  software 
10 weeks ago by jonerp
Three Industries Where Technology Is Reducing Our Carbon Footprint
"Greta Thunberg has done an amazing job of raising awareness in younger generations particularly about the dangers of climate change, but even before she burst on the scene, the 2019 regulations governing NEVs (New Energy Vehicles) in China and the 2020 emissions regulations for vehicle manufacturers in the EU (as well as local ordinances by cities restricting access to older, more polluting vehicles and countries on the phase-out date for the sale of Internal Combustion Engined vehicles) meant that vehicle manufacturers have had no option but to get on board with the electrification of cars and increasingly other modes of transport as well."
featured  posts  technology  software  battery  storage  carbon  footprint  clean  meat  co2  electric  vehicles  energy  lithium  ion  renewables  solar 
11 weeks ago by jonerp
7 Signs It’s Time To Get Focused On Zero Trust
"69% of employees doubt the cybersecurity processes in place in their organizations today. When the majority of employees don’t trust the security processes in place in an organization, they invent their own, often bringing their favorite security solutions into an enterprise. Shadow IT proliferates, productivity often slows down, and enterprise is more at risk of a breach than ever before. When there’s no governance or structure to managing data, cybercriminals flourish."
business  featured  posts  technology  software  trends  &  concepts  breach  breaches  centrify  cybersecurity  hackers  louis  columbus'  blog  passwords 
11 weeks ago by jonerp
What’s New On The Zero Trust Security Landscape In 2019
"The latest Forrester Wave adds in and places high importance on Zero Trust eXtended (ZTX) ecosystem advocacy, allocating 25% of the weight associated with the Strategy section on the scorecard. Forrester sees Zero Trust as a journey, with vendors who provide the greatest assistance and breadth of benefits on a unified platform being the most valuable. The Wave makes it clear that Zero Trust doesn’t refer to a specific technology but rather the orchestration of several technologies to enable and strengthen their Zero Trust framework. Key insights from what’s new this year in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019 include the following.."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  forrester  wave™:  zero  trust  extended  ecosystem  platform  providers  louis  columbus'  blog  mobile  security  mobileiron  mobility  q4  2019 
12 weeks ago by jonerp
10 Charts That Will Change Your Perspective Of AI In Security
"AI’s greatest benefit is the increase in the speed of analyzing threats (69%) followed by an acceleration in the containment of infected endpoints/devices and hosts (64%). Because AI reduces the time to respond to cyber exploits organizations can potentially save an average of more than $2.5 million in operating costs. Source: The Value of Artificial Intelligence in Cybersecurity – Sponsored by IBM Security Independently conducted by Ponemon Institute LLC, July 2018."
business  featured  posts  technology  software  trends  &  concepts  ai  cybersecurity  artificial  intelligence  cyberattacks  fraud  detection  louis  columbus'  blog 
12 weeks ago by jonerp
5 Proven Ways Manufacturers Can Get Started With Analytics
" I believe they’re in a tough situation with customers wanting short-notice production time while supply chains often needing to be redesigned to reduce or eliminate tariffs. They’re turning to analytics to gain the insights they need to take on these challenges and more. The graphic below is from Gartner’s latest survey of heavy manufacturing CIOs, it indicates the technology areas where heavy manufacturing CIOs’ organizations will be spending the largest amount of new or additional funding in 2019 as well as the technology areas where their organizations will be reducing funding by the highest amount in 2019 compared with 2018"
business  featured  posts  technology  software  trends  &  concepts  2019  analytics  spending  manufacturing  cio  agenda  heavy  insights  intelligence  crm  gartner  louis  columbus’  blog  cycle  time 
november 2019 by jonerp
Securing Multi-Cloud Manufacturing Systems In A Zero Trust World
"To stop the cybercriminals’ gold rush, merged manufacturing businesses need to take the first step of adopting an approach to secure each acquired company’s identity repositories, whether on-premises or in the cloud. For example, instead of having to reproduce or continue to manage the defined rights and roles for users in each AD, manufacturing conglomerates can better secure their combined businesses using a Multi-Directory Brokering approach."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  resource  planning  erp  louis  columbus'  blog  manufacturing  private  equity  firms 
november 2019 by jonerp
Improving Endpoint Security Needs To Be A Top Goal In 2020
"Cyberattacks are growing more complex and difficult to prevent now and will accelerate in the future, making endpoint security a top goal in 2020. Cybercriminals are using structured and unstructured machine learning algorithms to hack organizations’ endpoints with increasing frequency. Endpoint attacks and their levels of complexity will accelerate as cybercriminals gain greater mastery of these techniques."
business  featured  posts  technology  software  trends  &  concepts  absolute  absolute’s  2019  endpoint  security  report  cyberattacks  cybersecurity 
november 2019 by jonerp
What’s New In Gartner’s Hype Cycle For CRM, 2019
"Four new technologies are on the Hype Cycle for CRM, reflecting enterprises’ need for greater integration of diverse systems and the demand for more predictive and prescriptive analytics-based insights. The four technologies include the following."
business  featured  posts  technology  software  trends  &  concepts  2019  gartner  hype  cycle  for  crm  sales  louis  columbus’  blog  partner  relationship  management  configure  price  quote  cpq  customer 
october 2019 by jonerp
How To Make Complex CPQ Selling Simple With Visual Configurators
"Visual configurators are capable of so much more than they are delivering today. It’s time to graduate beyond the shock-and-awe stage, which has been very successful in driving leads, generating MQLs, and closing deals. It’s time to get down to the hard work of making all those impressive models buildable at scale and profitable. And that comes by doubling down efforts at shortening cycle times from product concept to completed product. That’s the true north of this market and the secret to succeeding. Getting engineering, manufacturing, and sales collaborating using product models as a single source of truth is the best place to start."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  elogic  engineer-to-order  louis  columbus'  blog  price  and  quote  product  configuration 
october 2019 by jonerp
How To Improve Your CPQ Pricing Strategies
"The typical manufacturer who has over $100M in sales generates 40% or more of their sales through indirect channels. The channel partners they recruit and sell through are also reselling 12 other competitive products on average. Which factors most influence a distributor or channel partner’s decision to steer a sale to one manufacturer versus another? The following are the steps manufacturers can take now to improve price management and drive more channel sales."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  engineer-to-order  louis  columbus'  blog  price  and  quote  pricing  management  product  configuration 
october 2019 by jonerp
What’s New In Gartner’s Hype Cycle For AI, 2019
"
Between 2018 and 2019, organizations that have deployed artificial intelligence (AI) grew from 4% to 14%, according to Gartner’s 2019 CIO Agenda survey.
Conversational AI remains at the top of corporate agendas spurred by the worldwide success of Amazon Alexa, Google Assistant, and others.
Enterprises are making progress with AI as it grows more widespread, and they’re also making more mistakes that contribute to their accelerating learning curve."
business  featured  posts  technology  software  trends  &  concepts  ai  cloud  computing  gartner  hype  cycle  for  artificial  intelligence  2019  louis  columbus'  blog 
october 2019 by jonerp
Three Reasons Why Killing Passwords Improves Your Cloud Security
"The Twitter CEO’s account getting hacked is the latest in a series of incidents that reflect how easy it is for hackers to gain access to cloud-based enterprise networks using mobile devices. Verizon’s Mobile Security Index 2019 revealed that the majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device. Mobile devices are one of the most porous threat surfaces a business has. They’re also the fastest-growing threat surface, as every employee now relies on their smartphones as their ID. IDG’s recent survey completed in collaboration with MobileIron, titled Say Goodbye to Passwords found that 89% of security leaders believe that mobile devices will soon serve as your digital ID to access enterprise services and data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  hackers  jack  dorsey  louis  columbus'  blog  mobileiron  twitter  hack  zero  trust  networks 
september 2019 by jonerp
State Of AI And Machine Learning In 2019
"Data mining, advanced algorithms, and predictive analytics are among the highest-priority projects for enterprises adopting AI and machine learning in 2019. Reporting, dashboards, data integration, and advanced visualization are the leading technologies and initiatives strategic to Business Intelligence (BI) today. Cognitive BI (artificial-intelligence-based BI) ranks comparatively lower at 27th among priorities. The following graphic prioritizes the 27 technologies and initiatives strategic to business intelligence."
business  featured  posts  technology  software  trends  &  concepts  ai  artificial  intelligence  louis  columbus'  blog  machine  learning  ml  state  of  2019  and  in 
september 2019 by jonerp
5 Key Insights From Absolute’s 2019 Endpoint Security Trends Report
"Endpoint security controls and their associated agents degrade and lose effectiveness over time. Over 42% of endpoints experience encryption failures, leaving entire networks at risk from a breach. They’re most commonly disabled by users, malfunction or have error conditions or have never been installed correctly in the first place. Absolute found that endpoints often failed due to the fragile nature of their encryption agents’ configurations. 2% of encryption agents fail every week, and over half of all encryption failures occurred within two weeks, fueling a constant 8% rate of decay every 30 days. 100% of all devices experiencing encryption failures within one year.'
business  featured  posts  technology  software  trends  &  concepts  absolute  security  cybersecurity  endpoint  louis  columbus'  blog 
september 2019 by jonerp
Why Manufacturing Supply Chains Need Zero Trust
"Supply chains are renowned for how unsecured and porous they are multiple layers deep. That’s because manufacturers often only password-protect administrator access privileges for trusted versus untrusted domains at the operating system level of Windows NT Server, haven’t implemented multi-factor authentication (MFA), and apply a trust but verify mindset only for their top suppliers. Many manufacturers don’t define, and much less enforce, supplier security past the first tier of their supply chains, leaving the most vulnerable attack vectors unprotected."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
september 2019 by jonerp
Mobile Identity Is The New Security Perimeter
"89% of security leaders believe that mobile devices will serve as your digital ID to access enterprise services and data in the near future according to a recent survey by IDG completed in conjunction with MobileIron, titled Say Goodbye to Passwords. You can download a copy of the study here. Mobile devices are increasingly becoming the IDs enterprises rely on to create and scale a mobile-centric zero trust security network throughout their organizations."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  louis  columbus'  blog  mobileiron  smartphones  zero  trust  network  security 
september 2019 by jonerp
As 47% of enterprises seek to reduce their reliance on outsourcing… we’re going straight to digital
"It’s taken more than 12 years – ever since the first-ever blog post written right here – but the outsourcing marketing is on the cusp of its most seismic change since the offshore revolution… the majority of enterprises are seeking to pull away from their stale outsourcing relationships and replace people with intelligent cognitive workers which learn context – or simply bots that perform transactional tasks. And the reality of outsourcing is that it’s far easier for an enterprise to eliminate workers that are contracted via a service partner than have to go through all the painful change and resistance when trying to eliminate their own staff directly with software investments. What’s more, enterprises rarely want to bring outsourced work back inhouse until it has been fully automated and the outsourcing offers little future value."
business  featured  posts 
august 2019 by jonerp
Plex ML project – something every software vendor/systems integrator could emulate
"Our customers are trying to figure out how to optimize their settings, so when I was pondering that stat – 15% of our tickets are related to configuration settings – I realized this would be a great place to build a machine learning model that could help us understand what the net effect is.

Our desire was to ask “How could a customer use this model to compare it to their settings?” and be able to say, “Here are the settings you should change in order to have the optimum configuration.”
featured  posts  technology  software  cloud  computing  industry  commentary  saas 
august 2019 by jonerp
The Truth About Privileged Access Security On AWS And Other Public Clouds
"In short, native IAM capabilities offered by AWS, Microsoft Azure, Google Cloud, and more provides enough functionality to help an organization get up and running to control access in their respective homogeneous cloud environments. Often they lack the scale to fully address the more challenging, complex areas of IAM and PAM in hybrid or multi-cloud environments."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  aws  cybersecurity  security  centrify  louis  columbus'  blog 
august 2019 by jonerp
What Needs To Be On Your CPQ Channel Roadmap In 2019
"Manufacturers can realize greater revenue potential through their channels by combining machine learning insights to find those aftermarket customers most ready to buy while accelerating sales closing cycles with CPQ. Manufacturers want to make sure they are getting their fair share of the aftermarket. Using a machine learning-based application, they can help their resellers increase average deal sizes by knowing which products and services to offer when. They’ll also know when to present upsell and cross-sell offers into an account at a specific point in time when they will be most likely to lead to additional sales, all based on machine learning-based insights. Combining machine learning-based insights to guide resellers to the most valuable and highest probability customer accounts ready to buy with an intuitive CPQ system increases sales efficiency leading to higher revenues."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  elogic  engineer-to-order  louis  columbus'  blog  price  and  quote  product  configuration 
august 2019 by jonerp
Your Mobile Phone Is Your Identity. How Do You Protect It?
"Accidental, inadvertent breaches from human error and system glitches are still the root cause for nearly half (49%) of the data breaches. And phishing attacks on mobile devices that are lost, stolen or comprised in workplaces are a leading cause of breaches due to human error."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  privilege  security 
august 2019 by jonerp
How To Deal With Ransomware In A Zero Trust World
"Ransomware attackers are becoming more sophisticated using spear-phishing emails that target specific individuals and seeding legitimate websites with malicious code – it’s helpful to know the anatomy of an attack. Some recent attacks have even started exploiting smartphone vulnerabilities to penetrate corporate networks, according to Dr. George."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
august 2019 by jonerp
Roadmap To Zero Trust For Small Businesses
"Small businesses and startups run so fast there’s often a perception that achieving greater security will slow them down. In a Zero Trust world, they don’t need to spend a lot of sacrifice speed for security. Following a Zero Trust roadmap can protect their systems, valuable intellectual property, and valuable time by minimizing the risk of falling victim to costly breaches.

Here’s what small businesses and startups need to include on their Zero Trust roadmaps"
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
july 2019 by jonerp
Cloud Applications – A long, winding road dotted with Bystanders
"In wave 1 of the cloud, the economics were compelling. The cloud collapsed 4 contracts from on-prem world – the software, the hosting, the AMS and that of SIs who did frequent upgrades. Multi-tenancy and simplified contracting explained why it was so attractive to look at a Salesforce or a SuccessFactors relationship. But in the last decade, reality has set in. I have heard from a number of customers their incumbent infrastructure is fully amortized – the cloud only adds to that cost layer. I have heard from others who have sharpened their pencils, that buying their infrastructure is still cheaper than subscribing in the cloud when it is annualized. Then there is the expectation that comes from their outsourcing experiences – when you hand someone a 3 or 5 year contract you have the right to expect CMM Level 5 or Six Sigma continuous improvements. Instead, too many SaaS renewals are turning into unpleasant head-butting experiences – no improvements, just massive cost increases."
featured  posts  technology  software  cloud  computing  industry  commentary  saas 
july 2019 by jonerp
Why AI Is The Future Of Cybersecurity
"Fraud detection, malware detection, intrusion detection, scoring risk in a network, and user/machine behavioral analysis are the five highest AI use cases for improving cybersecurity. Capgemini analyzed 20 use cases across information technology (IT), operational technology (OT) and the Internet of Things (IoT) and ranked them according to their implementation complexity and resultant benefits (in terms of time reduction). Based on their analysis, we recommend a shortlist of five high-potential use cases that have low complexity and high benefits. 54% of enterprises have already implemented five high impact cases. The following graphic compares the recommended use cases by the level of benefit and relative complexity."
business  featured  posts  technology  software  trends  &  concepts  absolute  ai  centrify  cybersecurity  kount  louis  columbus'  blog  mobileiron 
july 2019 by jonerp
Passwords Are The Weakest Defense In A Zero Trust World
"These and many other fascinating insights make it clear that passwords are now the weakest defense anyone can rely on in a Zero Trust world. Two recent research studies quantify just how weak and incomplete an IT security strategy based on passwords is, especially when the need to access mobile apps is proliferating. Combined, these two MobileIron reports pack a one-two punch at passwords, and how they’re not strong enough alone to protect mobile devices, the fastest proliferating threat surface in a Zero Trust world."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  security 
july 2019 by jonerp
Want to survive the AI era? YOU have a simple choice to make…
"When it comes to staying relevant in today’s workforce, let’s get to the heart of the matter – YOU have a simple choice to make:

Do nothing and be part of the “Frozen Middle”. Decide you can’t be bothered to learn anything new, so make sure your firm has the same attitude (or has a thin veneer of innovation masking a cesspool of lethargy and love of perpetuating legacy processes and business practices). And ride this next wave of hype out for a few years before you can quietly ride off into a comfortable sunset, or…
Become a change-driver. Decide you have to get ahead of emerging technologies and their massive impact on business ecosystems and make sure your firm has what it takes to sponsor your burning ambition to drive cultural changes, new learning and ability to rethink how business processes and practices are wired."
featured  posts  trends  &  concepts 
july 2019 by jonerp
The DIY movement in IT – what does it take to succeed ?
"If you are modernizing your IT function to enable a largely DIY culture – your economic model will probably need teams to be self sufficient on dev and ops, as opposed to one team having all the fun developing cool stuff and another doing the grunt work supporting it and answering the pager.

Will your software engineers hang around long enough if they are woken up at 3 AM by their buzzing pagers ? Do they have the skills to continuously automate ( the SRE types ) ? As you build follow-the-sun teams across the world – will your engineers have the skills and patience to work with people who are across time zones ? As you become more geographically distributed – will they be ok being further removed from the users for whom they are building software?
featured  posts  technology  software  uncategorized 
july 2019 by jonerp
Salesforce Now Has Over 19% Of The CRM Market
"72.9% of CRM spending was on software as a service (SaaS) in 2018, which is expected to grow to 75% of total CRM software spending in 2019.
Worldwide enterprise application software revenue totaled more than $193.6B in 2018, a 12.5% increase from 2017 revenue of $172.1B. CRM made up nearly 25% of the entire enterprise software revenue market."
business  featured  posts  technology  software  trends  &  concepts  adobe  marketing  crm  customer  relationship  management  hubspot  louis  columbus'  blog  oracle  salesforce 
july 2019 by jonerp
Machine Learning Is Helping To Stop Security Breaches With Threat Analytics
"Immediate visibility with a flexible, holistic view of access activity across an enterprise-wide IT network and extended partner ecosystem. Look for threat analytics applications that provide dashboards and interactive widgets to better understand the context of IT risk and access patterns across your IT infrastructure. Threat analytics applications that give you the flexibility of tailoring security policies to every user’s behavior and automatically flagging risky actions or access attempts, so that you’ll gain immediate visibility into account risk, eliminating the overhead of sifting through millions of log files and massive amounts of historical data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  louis  columbus'  blog  privileged  access  management  verizon  zero  trust  privilege  security  ztp 
june 2019 by jonerp
Smart Machines Are The Future Of Manufacturing
"Capturing IIoT’s full value potential will require more sophisticated integrated approaches than current automation protocols provide. IIoT manufacturing systems are quickly becoming digital manufacturing platforms that integrate ERP, MES, PLM and CRM systems to provide a single unified view of product configurations and support the design-to-manufacturing process."
business  featured  posts  technology  software  trends  &  concepts  design-to-manufacture  iiot  industrial  internet  of  things  louis  columbus'  blog  manufacturing  intelligence 
june 2019 by jonerp
What Matters Most In Business Intelligence, 2019
"Improving revenues using BI is now the most popular objective in 2019, despite BI initially being positioned as a solution for compliance and risk management. Executive Management, Marketing/Sales, and Operations are driving the focus on improving revenues this year. Nearly 50% of enterprises now expect BI to deliver better decision making, making the areas of reporting, and dashboards must-have features. Interestingly, enterprises aren’t looking to BI as much for improving operational efficiencies and cost reductions or competitive advantages."
business  featured  posts  technology  software  trends  &  concepts  analytics  bi  intelligence  dashboards  data  integration  dresner  advisory  associates  louis  columbus’  blog  manufacturing 
june 2019 by jonerp
The State Of 3D Printing, 2019
"Proof of concepts and prototyping dominate 3D printing applications in 2019. Manufacturers are increasing their reliance on 3D printing as part of their broader manufacturing strategies, with production use up to 51% of all respondents from 38.7% in 2018. The following compares 2019’s purpose of 3D prints versus the last five years of survey data."
business  featured  posts  technology  software  trends  &  concepts  3d  modeling  printing  forecast  in  manufacturing  prototyping  design-to-manufacture  louis  columbus'  blog 
june 2019 by jonerp
How The Top 21% Of PAM-Mature Enterprises Are Thwarting Privileged Credential Breaches
"Energy, Technology & Finance are the most mature industries adopting Privileged Access Management (PAM), outscoring peer industries by a wide margin. Government, Education, and Manufacturing are the industries most lagging in their adoption of Zero Trust Privilege (ZTP), making them the most vulnerable to breaches caused by privileged credential abuse. Education and Manufacturing are the most vulnerable industries of all, where it’s common for multiple manufacturing sites to use shared accounts for controlling privileged access. The study found shared accounts for controlling privileged access is commonplace, with 52% of all organizations reporting this occurring often. Presented below are the relative levels of Zero Trust Privilege Maturity by demographics, with the largest organizations having the most mature approaches to ZTP, which is expected given the size and scale of their IT and cybersecurity departments."
business  featured  posts  technology  software  trends  &  concepts  centrify  2019  zero  trust  privilege  maturity  model  report  louis  columbus'  blog  pam  privileged  access  credential  abuse  credentials  management 
june 2019 by jonerp
Seven Things You Need To Know About IIoT In Manufacturing
"IIoT platforms are beginning to replace MES and related applications, including production maintenance, quality, and inventory management, which are a mix of Information Technology (IT) and Operations Technology (OT) technologies. IoT Analytics is seeing IIoT platforms begin to replace existing industrial software systems that had been created to bridge the IT and OT gaps in manufacturing environments. Their research teams are finding that IIoT Platforms are an adjacent technology to these typical industrial software solutions but are now starting to replace some of them in smart connected factory settings. The following graphic explains how IoT Analytics sees the IIoT influence across the broader industrial landscape."
business  featured  posts  technology  software  trends  &  concepts  ai  artificial  intelligence  iiot  industrial  internet  of  things  iot  analytics  louis  columbus'  blog  machine  learning 
june 2019 by jonerp
How to Improve Privileged User’s Security Experiences With Machine Learning
"Every business is facing the paradox of hardening security without sacrificing users’ login and system access experiences. Zero Trust Privilege is emerging as a proven framework for thwarting privileged credential abuse by verifying who is requesting access, the context of the request, and the risk of the access environment across every threat surface an organization has."
business  featured  posts  technology  software  trends  &  concepts  centrify  louis  columbus'  blog  machine  learning  zero  trust  privilege  security  ztp  zts 
june 2019 by jonerp
Industry 4.0’s Potential Needs To Be Proven On The Shop Floor
"In the many conversations I’ve had with mid-tier manufacturers located in North America this year, I’ve learned the following:

Their top investment priorities are upgrading existing machinery, replacing fully depreciated machines with next-generation smart, connected production equipment, and adopting real-time monitoring including Manufacturing Execution Systems (MES).
Manufacturers growing 10% or more this year over 2018 excel at integrating technologies that improve scheduling to enable more short-notice production runs, reduce order cycle times, and improve supplier quality."
business  featured  posts  technology  software  trends  &  concepts  artificial  intelligence  erp  industry  4.0  machine  learning  manufacturing  execution  system  mes 
may 2019 by jonerp
How To Improve Supply Chains With Machine Learning: 10 Proven Ways
"Machine learning-based algorithms are the foundation of the next generation of logistics technologies, with the most significant gains being made with advanced resource scheduling systems. Machine learning and AI-based techniques are the foundation of a broad spectrum of next-generation logistics and supply chain technologies now under development. The most significant gains are being made where machine learning can contribute to solving complex constraint, cost and delivery problems companies face today."
business  featured  posts  technology  software  trends  &  concepts  analytics  artificial  intelligence  centrify  erp  infor  inspectorio  louis  columbus'  blog 
may 2019 by jonerp
How To Secure Mobile Devices In A Zero Trust World
"Hacker’s favorite way to gain access to any business is by using privileged access credentials, which are increasingly being harvested from cellphones using malware. Hacking organizations would rather walk in the front door of any organizations’ systems rather than expend the time and effort to hack in. It’s by far the most popular approach with hackers, with 74% of IT decision makers whose organizations have been breached in the past say it involved privileged access credential abuse according to a recent Centrify survey, Privileged Access Management in the Modern Threatscape."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  forrester  zero  trust  framework  identity  access  management  louis  columbus'  blog  machine  learning  mobileiron 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part 2
"Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  gartner  top  10  security  projects  for  2018  louis  columbus'  blog  privileged  access  abuse  management 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part I
"The following are five strategies CIOs need to concentrate on to stop privileged credential abuse. Starting with an inventory of privileged accounts and progressing through finding the gaps in IT infrastructure that create opportunities for privileged credential abuse, CIOs and their teams need to take preemptive action now to avert potential breaches in the future."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  gartner  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  credential  abuse 
april 2019 by jonerp
Why does G Suite keep kicking into Microsoft’s goal post? #googlenext19
"The tragedy in all of this is that Google does have the best capabilities, the best real-time interplay and the absolute best NLP in the market. All sitting atop GCP which remains the best-kept secret on Planet Enterprise. Thanks in part to GCP and in part to the genius of Kahuna co-founder and CTO Jacob Taylor and his team, at Kahuna we on-boarded 80 million consumers in a single day, with zero dev ops support.

And yet, Google misses the forest for the trees by deploying these maddingly sophisticated resources only towards improving the “how”, vs re-imagining the “what”."
featured  posts  technology  software  collaborative  organizations  digital  transformation  enterprise  and  social  sofware  google  next  2019  goognext19 
april 2019 by jonerp
The State Of Cloud Business Intelligence, 2019
"An all-time high 48% of organizations say cloud BI is either “critical” or “very important” to their operations in 2019. Organizations have more confidence in cloud BI than ever before, according to the study’s results. 2019 is seeing a sharp upturn in cloud BI’s importance, driven by the trust and credibility organizations have for accessing, analyzing and storing sensitive company data on cloud platforms running BI applications."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  analytics  aws  intelligence  cloud  bi  analysis  forecast  for  2019  computing  louis  columbus 
april 2019 by jonerp
5 Things Every Executive Needs To Know About Identity And Access Management
"Executives have a strong sense of urgency to improve Identity and Access Management (IAM) today to assure the right individuals access the right resources at the right times and for the right reasons. IAM components like Access Management, Single Sign-On, Customer Identity and Access Management (CIAM), Advanced Authentication, Identity Governance and Administration (IGA), IoT-Driven IAM, and Privileged Access Management address the need to ensure appropriate access to resources across an organization’s entire attack surface and to meet compliance requirements."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  identity  and  access  management  louis  columbus'  blog  mfa  multi-factor  authentication  pam 
april 2019 by jonerp
The Best Cloud Computing Companies And CEOs To Work For In 2019 Based On Glassdoor
"Indexing the most interesting and fastest growing cloud computing companies by their Glassdoor scores and reputations is a great way to begin defining a long-term career growth strategy. One factor not quantified is how well of a fit an applicant is to company culture. Take every opportunity for in-person interviews, read Glassdoor ratings often and observe as much as possible about daily life in companies of interest to see if they are a good fit for your skills and strengths."
business  featured  posts  technology  software  trends  &  concepts  cloud  computing  jobs  cloudian  computer  reseller  news’  100  coolest  vendors  of  2019  fivetran  glassdoor  kony 
march 2019 by jonerp
5 Ways To Demystify Zero Trust Security
"To Chase Cunningham’s point, more customer use cases need to be created, and thankfully that’s on his research agenda. Starting the conversation with each vendor visited by asking for their definition of Zero Trust either led to a debate of whether Zero Trust was needed in the industry or how their existing architecture could morph to fit the framework. Booth staffs at the following companies deserve to be commended for how much they know about their customers’ success with Zero Trust: Akamai, Centrify, Cisco, Microsoft, MobileIron, Palo Alto Networks, Symantec, and Trend Micro."
business  featured  posts  technology  software  trends  &  concepts  akamai  capgemini  centrify  cisco  ledios  cyber  louis  columbus'  blog  microsoft 
march 2019 by jonerp
The State of Recruiting Technology in 2019 — A Year of Consolidation, Growth & Innovation
"Oracle and IBM, in particular, are hemorrhaging market share (see above) and customers are now demanding that their core recruiting platforms do more than just process applicants. They must also become global marketing platforms that engage their audience (i.e. candidates), drive corporate initiatives such as diversity and inclusion, and support career and pay progression."
"Oracle  and  IBM  in  particular  are  hemorrhaging  market  share  (see  above)  customers  now  demanding  that  their  core  recruiting  platforms  do  more  than  just  process  applicants.  They  must  also  become  global  marketing  engage  audience  (i.e.  candidates)  drive  corporate  initiatives  such  as  diversity  inclusion  support  career  pay  progression.featured  posts  technology  software  hr  hrtech  recruiting-technology  venture  capital 
march 2019 by jonerp
Vodafone’s 2019 IoT Barometer Reflects Robust Growth In The Enterprise
"
85% of enterprises who develop deep expertise with IoT succeed at driving revenue faster than competitors.
81% of enterprises say Artificial Intelligence streamlines interpreting and taking action on data insights gained from IoT systems and sensors.
68% of enterprises are using IoT to track the security of physical assets, making this use case the most common across enterprises today.
Transport & Logistics and Manufacturing & Industrials saw the most significant increase in adoption between 2018 and 2019."
business  featured  posts  technology  software  trends  &  concepts  5g  artificial  intelligence  iiot  industrial  internet  of  things  iot  enterprise  adoption 
march 2019 by jonerp
74% Of Data Breaches Start With Privileged Credential Abuse
"Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In quantifying this gap consider the typical U.S.-based enterprise will lose on average $7.91M from a breach, nearly double the global average of $3.68M according to IBM’s 2018 Data Breach Study."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  ibm  2018  data  breach  study  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  report  credential  abuse  security 
march 2019 by jonerp
The coming Enterprise Software Hurricane
"In the book, I point out that “tilting the bell curve of customers” to move Bystanders into the Risk Taker and Modernizer categories is SAP’s big short term opportunity. The book has several ideas for SAP to do so. Other on-prem vendors have similar opportunities in their own customer bases. And, whoever does it quickly in their customer base will also have a shot at attracting Risk-takers and Modernizers from other on-prem competitors. However, as these vendors introduce new offerings and messages, SaaS, TPM and other vendors won’t stand still – they will update their own offerings to remain competitive."
featured  posts  technology  software  cloud  computing  enterprise  (ibm  microsoft  oracle  saas  sap 
february 2019 by jonerp
Top 25 IoT Startups To Watch In 2019
"The most successful IoT startups selling into enterprises excel at orchestrating analytics, Artificial Intelligence (AI), and real-time monitoring to deliver exceptional customer experiences. As a group, these top 25 IoT startups are showing early potential at enabling profitable new business models, revitalizing industries that have experienced single single-digit growth recently. Each of these startups is taking a unique approach to solving some of the enterprises’ most challenging problems, and in so doing creating valuable new patents that further fuel IoT adoption and growth."
business  featured  posts  technology  software  trends  &  concepts  internet  of  things  startups  louis  columbus'  blog  top  25  iot  2019 
february 2019 by jonerp
Polishing brand ERP
"As an industry, we have implemented or upgraded ERP software tens of millions of times. It is absurd that we tolerate the failure rates and cost overruns that has become synonymous with ERP. Every aspect of ERP was a reason to gouge – close to 100% gross margins on software, ridiculous MPLS circuit and storage pricing, you name it. Offshore vendors who could show CMM Level 5 continuous improvements suddenly forgot that discipline when it came to ERP support. Much of what is delivered by SIs and outsourcers can and should be automated – see several ideas here"
featured  posts  technology  software  accenture  eds)  enterprise  (ibm  (other  vendors)  microsoft  offshoring  oracle  outsourcing  sap 
february 2019 by jonerp
Digital Transformation’s Missing Link Is Zero Trust
"Gaps exist between the results digital transformation initiatives are delivering today, and the customer-driven value they’re capable of. According to Gartner, 75% of digital transformation projects are not aligned internally today, leading to delayed new product launches, mediocre experiences, and greater security risks than ever before."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  palo  alto  networks  privileged  access  management  (pam)  world  economic  forum 
february 2019 by jonerp
Top 10 Ways Internet Of Things And Blockchain Strengthen Supply Chains
"One CIO told me recently his company deliberately spins up several POCs at once, adding “they’re our proving grounds, we’re pushing blockchain and IoT’s limits to see if they can solve our most challenging supply chain problems and we’re learning a tremendous amount.”
business  featured  posts  technology  software  trends  &  concepts  blockchain  forecasts  use  cases  ethical  supply  chains  ibm  food  trust  iiot  industrial  internet  of  things 
february 2019 by jonerp
How Machine Learning Improves Manufacturing Inspections, Product Quality & Supply Chain Visibility
"Manufacturers’ most valuable data is generated on shop floors daily, bringing with it the challenge of analyzing it to find prescriptive insights fast – and an ideal problem for machine learning to solve.

Manufacturing is the most data-prolific industry there is, generating on average 1.9 petabytes of data every year according to the McKinsey Global Insititute. Supply chains, sourcing, factory operations, and the phases of compliance and quality management generate the majority of data."
business  featured  posts  technology  software  trends  &  concepts  inspectorio  louis  columbus'  blog  machine  learning  manufacturing  mckinsey  global  institute’  product  inspections  quality 
february 2019 by jonerp
Which Analytics And BI Technologies Will Be The Highest Priority In 2019?
"82% of enterprises are prioritizing analytics and BI applications and platforms as part of their budgets for new technologies and cloud-based services. 78% of enterprises are prioritizing advanced analytics, and 76% data preparation. 54% say AI, machine learning and Natural Language Processing (NLP) are also a high investment priority. The following graphic ranks enterprises’ investment priorities for acquiring or subscribing to new technologies and cloud-based services by analytics and BI initiatives or strategies. Please click on the graphic to expand for easier reading."
business  featured  posts  technology  software  trends  &  concepts  analytics  bi  and  in  the  age  of  ai  big  data  intelligence  cloud  computing  lake  louis  columbus'  blog 
january 2019 by jonerp
Defense contractor: IT must embrace ‘radical transparency and culture change’
" One of the things that I didn’t like when I joined, and it’s common in corporate culture but I wanted to change within L3 is, somebody would ask a perfectly reasonable question, and another person will say, “Well, we don’t know the answer. We’ll get back to you.”

Well, now the conversation is dead. But, what you want is an active, “Well, let’s see what the data says,” because it exists, right? That’s the thing that drove me crazy. Somebody has got the data. How come it all isn’t in a giant warehouse so that we can peal things back to the infinite level that we want to? Sort of like an onion. You peel back the layers and peel back the layers to get down to the answer to say, “The reason why this isn’t working or is working so well, is because of this.”"
business  featured  posts 
january 2019 by jonerp
How To Protect Healthcare Records In A Zero Trust World
"Using access credentials stolen from co-workers or stolen laptops, unethical healthcare insiders are among the most prolific at stealing and selling patient data of any insider threat across any industry. Accenture’s study, “Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workforce Survey on Cybersecurity,” found that the most common ways healthcare employees financially gain from stealing medical records is to commit tax return and credit card fraud."
business  featured  posts  technology  software  trends  &  concepts  centrify  healthcare  breaches  protenus  breach  barometer  idaptive  louis  columbus  privileged  access  credentials  zero  trust  privilege 
december 2018 by jonerp
Monday’s Musings: What’s Up With Big Tech Stocks? The Insider View For 2019
"Algo’s have been reset so the markets are operating on different rules and that model will be reset again soon. Why Big Tech? They play in a winner takes all market. Apple and Google provide 99% of all the consumer software in the US. Facebook, Google, and Amazon drive almost 63% of all advertising dollars
Tech is still strong with 20 to 40% growth. Investors will find it hard to find other asset allocation classes this good and this dominant."
business  featured  posts  technology  software  $appl  $goog  $nflx  $tsla  018  2018  2019  adbe 
december 2018 by jonerp
SAP’s evolving partner economy
"It was nice to spend some time listening to Diane Fanelli, SVP describe how SAP is showcasing in its App Center a growing number of ISV offerings using tools in its Cloud Platform and Leonardo offerings. In previous attempts, SAP has tried to do similar around NetWeaver and HANA. The customer access is much more digital this time around, the Cloud Platform leverages lot more open source and the barriers to partner participation appear much lower. It is fledgling at this point in terms of revenues for the ISVs and SAP (Fanelli says focus is adoption prior to monetization). I hope they continue with her statement “the future is small, simple applications that snap into existing landscapes. You go shopping [for them] on your phone.” Which also means the onus for vertical and other books of record will stay with SAP. Too many vendors abdicate heavy lifting to their platform partners."
business  featured  posts 
december 2018 by jonerp
CPQ Needs To Scale And Support Smarter, More Connected Products
"Industrial Internet of Things (IIoT) platforms has the potential of providing a single, unified data model across an entire manufacturing operation, giving manufacturers a single unified view of product configurations across their lifecycles. Producing smart, connected products at scale also requires a system capable of presenting a unified view of configurations in the linguistics each department can understand. Engineering, production, marketing, sales, and service all need a unique view of product configurations to keep producing new products. Leaders in this field include Configit and their Configuration Lifecycle Management approach to CPQ and product configuration."
business  featured  posts  technology  software  trends  &  concepts  cad  configit  configuration  lifecycle  management  configure  price  quote  cpq  crm  integration 
december 2018 by jonerp
Using Machine Learning To Find Employees Who Can Scale With Your Business
"Betting on solid data and personalization at scale, on the other hand, delivers real results. Real data slices through the probabilities and is the best equalizer there is at eradicating conscious and unconscious biases from hiring decisions."
business  featured  posts  technology  software  trends  &  concepts  ai  applicant  tracking  systems  artificial  intelligence  ats  eightfold  hr  machine  learning  human  resource  management 
december 2018 by jonerp
Where Cloud Computing Jobs Will Be In 2019
"The Hiring Scale is 78 for jobs that require cloud computing skill sets, with the average job post staying open 46 days. The higher the Hiring Scale score, the more difficult it is for employers to find the right applicants for open positions. Nationally an average job posting for an IT professional with cloud computing expertise is open 46 days. Please click on the graphic to expand for easier reading."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  aws  cloud  computing  employment  jobs  deloitte 
december 2018 by jonerp
86% Of Enterprises Increasing IoT Spending In 2019
"86% of enterprises expect to increase their spending on IoT in 2019 and beyond. Enterprises increased their investments in IoT by 4% in 2018 over 2017, spending an average of $4.6M this year. Nearly half of enterprises globally (49%) interviewed are aggressively pursuing IoT investments with the goal of digitally transforming their business models this decade. 38% of enterprises have company-wide IoT deployments today, and 55% have an IoT vision and are currently executing their IoT plans."
business  featured  posts  technology  software  trends  &  concepts  centrify  cisco  f5  idaptive  industrial  internet  of  things  intelligent  enterprise  index 
december 2018 by jonerp
Predicting The Future Of Digital Marketplaces
"Competitive differentiation, buyer retention, buyer acquisition, and social media engagement and the four most common customer-facing challenges marketplaces face today. 39% of marketing execs say that differentiating from competitors is the greatest challenge, followed by buyer retention (32%), buyer acquisition (29%) and effective social media campaigns (29%) Further validation that today’s digital marketplaces are enabling greater digital transformation through personalization is found in just 22% of respondents said customer experience is a challenge."
business  featured  posts  technology  software  trends  &  concepts  altimeter  group  byline=louis  columbus  digital  marketplaces  ecommerce  forrester  google  cloud  platform  kahuna 
november 2018 by jonerp
Which CRM Applications Matter Most In 2018
"Marketing analytics continues to be hot for marketing leaders, who now see it as a key business requirement and a source of competitive differentiation. In my opinion and based on discussions with CMOs, interest in marketing analytics is soaring as they are all looking to quantify their team’s contribution to lead generation, pipeline growth, and revenue. I see analytics- and data-driven clarity as the new normal. I believe that knowing how to quantify marketing contributions and performance requires CMOs and their teams to stay on top of the latest marketing, mobile marketing, and predictive customer analytics apps and technologies constantly. The metrics marketers choose today define who they will be tomorrow and in the future."
business  featured  posts  technology  software  trends  &  concepts  ai  byline=louis  columbus  cloud  computing  cpq  crm  customer  relationship  management  enterprise 
november 2018 by jonerp
The State Of IoT Intelligence, 2018
"Manufacturers see IoT as the most critical to achieving their product quality, production scheduling and supply chain orchestration goals. Insurance industry leaders also view IoT as critical to operations as their business models are now concentrating on automating inventory and safety management. Insurance firms also track vehicles in shipping and logistics fleets to gain greater visibility into how route operations can be optimized at the lowest possible risk of accidents."
business  featured  posts  technology  software  trends  &  concepts  analytics  and  big  data  dresner  advisory  services  industrial  internet  of  things  (iot)  iot  early  adopters 
november 2018 by jonerp
Reinventing After-Sales Service In A Subscription Economy World
"91% of manufacturers are investing in predictive analytics in the next 12 months, and 50% consider Artificial Intelligence (AI) a major planned investment for 2019 to support their subscription-based business models.
New subscription business models and smart, connected products are freeing manufacturers up from competing for one-time transaction revenues to recurring revenues based on subscriptions.
By 2020, manufacturers are predicting 67% of their product portfolios will be smart, connected products according to an excellent study by Capgemini."
business  featured  posts  technology  software  trends  &  concepts  digital  disruption  internet  of  things  iot  louis  columbus'  blog  manufacturing  services  revenue  subscription  economy 
november 2018 by jonerp
Tech Leaders Look To IoT, AI & Robotics To Fuel Growth Through 2021
"
30% of tech leaders globally predict blockchain will disrupt their businesses by 2021.
IoT, Artificial Intelligence (AI) and Robotics have the greatest potential to digitally transform businesses, making them more customer-centered and efficient.
26% of global tech leaders say e-Commerce apps and platforms will be the most disruptive new business model in their countries by 2021.
IDC predicts worldwide IoT spending will reach $1.1T by 2021."
business  featured  posts  technology  software  trends  &  concepts  analytics  internet  of  things  (iot)  iot  kpmg  louis  columbus'  blog  robotics 
november 2018 by jonerp
How Blockchain Can Improve Manufacturing In 2019
"Blockchain’s greatest potential to deliver business value is in manufacturing. Increasing visibility across every area of manufacturing starting with suppliers, strategic sourcing, procurement, and supplier quality to shop floor operations including machine-level monitoring and service, blockchain can enable entirely new manufacturing business models."
business  featured  posts  technology  software  trends  &  concepts  blockchain  industry  4.0  internet  of  things  (iot)  louis  columbus'  blog  manufacturing  smart  traceability 
november 2018 by jonerp
How To Protect Healthcare IoT Devices In A Zero Trust World
"Healthcare and medical device manufacturers need to start taking action now to secure these devices during the research and development, design and engineering phases of their next generation of IoT products. Specifying and validating that every IoT access point is compatible and can scale to support Zero Trust Security (ZTS) is essential if the network of devices being designed and sold will be secure. ZTS is proving to be very effective at thwarting potential breach attempts across every threat surface an organization has. Its four core pillars include verifying the identity of every user, validating every device, limiting access and privilege, and utilizing machine learning to analyze user behavior and gain greater insights from analytics."
business  featured  posts  technology  software  trends  &  concepts  accenture  capgemini  centrify  healthcare  internet  of  things  (iot)  iot  louis  columbus'  blog 
november 2018 by jonerp
IBM / RedHat: A grand play at out-sharing Microsoft’s open source economy
"So what it’s really about, is cornering the growing appetite for Open Source in the enterprise IT services market. As Paul Cormier, President of Product and Technologies at RedHat recently announced “Today is a banner day for open source. The largest software transaction in history and it’s an open source company. Let that sink in for a minute. We just made history.”
business  featured  posts  technology  software  bluehat  ibm  open  souce  redhat 
october 2018 by jonerp
IBM Red Hat: Reading the tea leaves
"Reading the tea leaves, though I wonder if this signals

a) The end of another hype cycle for AI?

I saw a recent Fortune issue which was all about AI and I wondered if that is a signal of the peak of the current AI hype cycle. BTW, we are going through the 4th or 5th hype cycle around AI. They appear and disappear every decade or so. As I wrote in Silicon Collar"
business  featured  posts  bluehat  cloud  computing  ibm  redhat  saas  silicon  collar 
october 2018 by jonerp
« earlier      
per page:    204080120160

Copy this bookmark:





to read