I guess by now most people have fully understood the value of data driven decisions and are looking to find the right entry point, i.e. the right initial use cases to dip their toes into the data lake before really getting feet wet. One of the questions coming up quite often in customer discussions is how to start. Maybe the following can help some of you to find those initial use cases.
Please keep in mind: IoT / Smart Manufacturing / Industry 4.0 etc. is about making use of information for fast and accurate decisions for incidents, risks, need or opportunities, making use of modern technology to retrieve and visualise the information, simulate decisions and feed the decisions back into an (hopefully highly automated) execution system. Read More
It’s not just central locking systems, power mirrors or the 18 electromechanical actuators one German luxury car had built into the driver’s seat as early as 1985 – the majority of vehicle processes have been managed electrically/electronically for decades. While today E/E components make up 20% to 40% of manufacturing costs of a car, this proportion is expected to rise to at least 50% in the years to come. This is not just due to the fact that the vehicles’ internal control mechanisms are becoming more complex with every model year, as is demonstrated by the current debate about the emissions control systems of a number of leading automakers. Read More
During the last 15 years outsourcing and offshoring of IT services has lowered the IT costs of many companies significantly. Major focus has been on developing and maintaining IT solutions for large customers.
All began with building service and support centers in Eastern Europe and India. Since then we have seen waves of going east: Philippines, Vietnam, China… So what is next? Read More
Following the first article about why organizations should outsource security services, in this post I would like to address some further considerations.
Adding external IT service providers to your company’s IT service portfolio requires a lot more considerations and arrangements. It is not the intension of this article to be comprehensive in this regards, because many aspects are outside the information security scope. Therefore the below covers just a few more but important action items when searching for a new security service provider. Read More
This article takes you on a comprehensive tour de force of Managed Security Services (MSS). Learn why organizations outsource security services, how they select providers, how the two sides work together and where the pitfalls are even when all necessary steps were taken to ensure a successful project/service. Read More