Por años, los fabricantes han estado tratando de optimizar sus procesos y cadenas de suministro asociadas creando mercados, intercambios estandarizados, y sistemas monolíticos. En muchos casos, estas soluciones no logran su objetivo, lo que da origen a procesos fragmentados y frágiles, y en los que compartir datos es complicado.
Blockchain, la tecnología que está detrás de Bitcoin y otras criptomonedas, puede resolver estos problemas. Compartir información mediante una red distribuida confiable con una lógica de negocio integrada ofrece muchos beneficios al sector manufacturero, especialmente cuando se combina con las comunidades de IoT y de IA.
Vea este webinar titulado Blockchain y Manufactura: Una Manera Inteligente de Elevar la Eficiencia en las Cadenas de Suministro de Semiconductores y Electrónica, conducido por Nelson Petracek, director de Tecnología de TIBCO Software. Entre los temas que se abordan se incluye:
• Blockchains empresariales
• Casos de uso en el sector manufactur
Around 70% of Agile projects are contracted using a Time & Materials approach (T&M). However, this leaves clients carrying all the risk rather than sharing it with their supplier. But there is a better way.
Listen now to find out:
• How alternative models for Agile contracting can improve risk-sharing and promote quality and collaboration
• How Coca-Cola European Partners’ have optimised their approach to Agile sourcing (with Kai Uhlemann, Director, Collaborative Solutions, CCEP).
Published By: Veeam '18
Published Date: Oct 28, 2019
The damage caused by ransomware is widely discussed in the media. But this is far from the only danger that threatens the availability of your data. In this webinar, you will learn about the basic concepts of IT system availability and how Veeam® can help you implement these concepts in your company. The following issues will be highlighted:
backup rule "3-2-1";
why snapshots are not a backup;
how to prevent implicit data corruption.
Omnichannel is one of those words everyone
uses, but few use correctly. It’s not another word for
multichannel. It’s a different state of existence.
In our experience, multichannel is the ability to interact
with customers across many different channels, but
not necessarily in a cohesive fashion. As new channels
become available, they are “bolted on” to existing
customer experience infrastructure such as CRM
or customer support systems. Too frequently, the
management of these channels becomes siloed (web
versus in-store sales, for example). The effect of this from
the customer experience standpoint can be disjointed
and jarring. For example, the resolution of an issue
following a customer conversation with an associate
in the contact center may not be reflected when the
customer goes online or into a store.
Yet the ability to offer multichannel service experience is
table stakes for today’s business. If you’re not available in
the channels where customers want you to be, you cease
By the time most customers reach a human employee with a question, chances are they have
already researched online or tried to self-serve. This means employee transformation is required
to develop more sophisticated employees in the age of automation to solve more advanced
Because front-line jobs are becoming more complex, employees need to be tactical, technical, and
ready to emotionally handle these new types of interactions.
Recently, Lamont Exeter, head of Learning & Development at TTEC Digital, teamed up with Tim
Duranleau of SAP Litmos in a webinar to discuss ways that companies can combine learning
and technology to create more sophisticated employees. Below are some key highlights from
According to the annual report on fraud and internet crime published by the FBI’s Internet Crime Complaint Center (IC3), a staggering total of more than $2.7 billion was lost through online fraud and financial crime in 2018, the last full year available. And according to the Federal Trade Commission (FTC), there were more than 1.4 million fraud reports in that same time period. Many of these fraud events involved brand impersonation or illegal activities conducted via a brand’s website. In other words, the trust and faith the public has in your brand can be used as a cover for illegal activities, making fraudsters’ schemes appear authentic or trustworthy.
To keep the trust within your brand, download the whitepaper to learn how and why identifying and stopping online fraud is essential.
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with
collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Today, deep learning is at the forefront of most machine learning implementations across a broad set of business verticals. Driven by the highly flexible nature of neural networks, the boundary of what is possible has been pushed to a point where neural networks outperform humans in a variety of tasks, such as classifying objects in images or mastering video games in a matter of hours. This guide outlines the end-to-end deep learning process implemented on Amazon Web Services (AWS). We discuss challenges in executing deep learning projects, highlight the latest and greatest technology and infrastructure offered by AWS, and provide architectural guidance and best practices along the way.
This paper is intended for deep learning research scientists, deep learning engineers, data scientists, data engineers, technical product managers, and engineering leaders.
The European Union’s new regulatory framework for data protection laws, the General Data Protection Regulation (GDPR), became enforceable on 25 May, 2018. Under GDPR, organisations have new obligations to improve the security and privacy practices for the personal data they collect and use. With these new obligations comes the potential for heavier fines and penalties. Fortunately, Amazon Web Services (AWS) can help guide your organisation toward compliance under the new requirements. Take advantage of our services, resources, and experts as you navigate these changes.
City leaders around the world are working to improve the quality of life and increase the number of useful services for their citizens, businesses, and visitors. Smart city initiatives are gaining attention in several countries, as administrators, industry, and citizens are working together to enhance their communities, cities, regions, and nations. After more than ten years of smart city hype, innovative projects have emerged, but few have provided a disruptive impact on the city system itself. Because every city is different, few of the existing models apply universally. An effective response requires leaders to consider a series of prerequisites: consider the local culture and the people, prioritize basic needs and requests, work at overcoming silos and encourage collaboration across departments, and consider each “smart” initiative as an integral part of an overall city system. A smart city reflects a number of aspirations: efficiency, resiliency, connectedness, innovation, and su
This paper examines how cities are using cloud technology to address public challenges, using the framework of the global coalition, Smart Cities Council. This framework promotes three core values for smart cities: livability, providing clean, healthy living conditions without pollution and congestion; workability, providing an enabling infrastructure (energy, transportation, internet connectivity) and high-quality jobs; and sustainability, doing so at no cost to future generations, as the Council puts it. This paper proposes a fourth core value, inclusivity: provisioning services to all city residents regardless of their background.
Government agencies often look to promote new technology for cost-savings and efficiency, but it does not stop there. The second and third-tier effects of technology can be long lasting for citizens, businesses, and economies. When public institutions adopt the cloud, they experience an internal transformation. Inside an organization, cloud usage drives greater accessibility of data and information sharing, increases worker productivity, and improves resource allocation. The external benefit of the cloud is recognized through a government’s ability to put reclaimed time and resources toward serving citizens. This includes provisioning public services, such as occupational-skills training, quicker and more effective service delivery, a pathway to a more productive workforce, and ultimately, a boost to local development. This whitepaper examines the enterprise-level benefits of the cloud, as well as the residual impact on economic development. The U.S. Economic Development Administration
In January 2016, the Federal Risk and Authorization Management Program released a draft of its high-impact baseline for moving federal data to the cloud. Not long after, Amazon Web Services (AWS) accepted an offer to pilot the new security threshold. AWS worked with FedRAMP to develop a set of standards under which highly sensitive government data could securely migrate into cloud environments. If ever you doubted that cloud computing was the new frontier for federal data and software management, look around. Over 2,300 government agencies worldwide have already migrated to the AWS Cloud. And in the U.S., this will only increase with the release of FedRAMP’s high baseline standards. Previously, CSPs could only become certified at a low or moderate baseline under FedRAMP, meaning agencies had no security baseline from which to spring their sensitive data into the cloud. These new standards effectively represent the fall of the final formal barrier to federal cloud computing. Terabytes o
Amazon Web Services (AWS) provides rapid access to flexible and low-cost IT resources. With cloud computing, public sector organizations no longer need to make large upfront investments in hardware, or spend time and money on managing infrastructure. The goal of this whitepaper is to help you gain insight into some of the financial considerations of operating a cloud IT environment and learn how to maximize the overall value of your decision to adopt AWS.
This document provides information to assist customers who want to use AWS to store or process content containing personal data, in the context of common privacy and data protection considerations. It will help customers understand: the way AWS services operate, including how customers can address security and encrypt their content, the geographic locations where customers can choose to store content, and the respective roles the customer and AWS each play in managing and securing content stored on AWS services.
Amazon Web Services (AWS) offers scalable, cost-efficient cloud services that public sector customers can use to meet mandates, reduce costs, drive efficiencies, and accelerate innovation. The procurement of an infrastructure as a service (IaaS) cloud is unlike traditional technology purchasing. Traditional public sector procurement and contracting approaches that are designed to purchase products, such as hardware and related software, can be inconsistent with cloud services (like IaaS). A failure to modernize contracting and procurement approaches can reduce the pool of competitors and inhibit customer ability to adopt and leverage cloud technology.
Innovation requires many ingredients: a great idea, creativity, persistence, the right data, and technology. Governments around the world are taking advantage of the cloud to reduce cost and transform the way they deliver on their mission. The expectations of an increasingly digital citizenry are high, yet all levels of government face budgetary and human resource constraints. Cloud computing (on-demand delivery of IT resources via the Internet with pay-as-you-go pricing) can help government organizations increase innovation, agility, and resiliency, all while reducing costs. This whitepaper provides guidelines that governments can use to break down innovation barriers and achieve a digital transformation that helps them engage and serve citizens.
"Digital Transformation Is Changing How Enterprises Provide Secure Web Access to Users.
According to Gartner, “Digital business and edge computing have inverted access requirements, with more users, devices, applications, services, and data located outside of an enterprise than inside.”
A New Approach to Enterprise Security in the Cloud Is Needed.
Gartner recommends, “Complexity, latency and the need to decrypt and inspect encrypted traffic once will increase demand for consolidation of networking and security-as-a-service capabilities into a cloud-delivered secure access service edge (SASE, pronounced “sassy”).” This new approach requires an Internet isolation solution that:
- Provides 100 percent malware-free email and web browsing
- Preserves the native email and web browsing experience
- Gives users ubiquitous yet secure access wherever they work
Menlo already offers the solution that delivers on Gartner’s vision of network security in the cloud. Find out more by downloading t
"Internet Isolation Provides 100% Protection from Web-based Attacks without Changing the Native User Experience.
The breach of 1.5 million patient records—including patient data for the prime minister—at SingHealth, Singapore’s largest group of healthcare institutions, has been called the most serious breach of personal data in the nation’s history. The breach was of great concern and created a chill of fear in many public and private organizations throughout the region and the world. If Singapore, one of the world’s most connected countries, as well as one of the world’s most cybersecure, could have a breach of this magnitude perpetrated against a national institution, why couldn’t this happen to any organization, anywhere?
In This White Paper We Will Discuss:
- What is the network separation concept?
- Who uses network separation?
- What is Isolation and how it can separation networks?"
"The “detect and prevent” approach has reached its potential, and attackers have learned how to bypass this defense method. Verizon reports that 2018 was a record year, with 41,686 reported security incidents and 2,013 confirmed cybersecurity breaches. What’s more appalling is that studies have shown that 68 percent of breaches take months or longer to detect.
Menlo Security’s Internet Isolation Platform enables the Zero Trust Internet, which takes the guesswork out of security by assuming that all Internet content and websites are malicious.
- How companies are able to separate their enterprise network from the public web while still allowing employees to have seamless access to the Internet.
- How you can warn employees that they are on a phishing site when they’ve fallen for a real phishing attack.
- How you never have to worry about malware, viruses, or ransomware being downloaded."
"Protecting organizations from Web threats has typically been done with a proxy or DNS solution but a new approach has emerged. Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.
Identified by Gartner as ""one of the single most significant ways to reduce web-based attacks,"" remote browser isolation has become an important line item in IT budgets around the world.
But not all Isolation is created equal. With so many offerings how do you weed through the noise?
- Why remote browser isolation technology adoption is on the rise
- Key use cases for Isolation that should be evaluated
- 3 critical requirements when selecting a practical browser isolation solution"
DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Our portfolio of live events, online and print publishing, business intelligence and professional development brands are centred on the complexities of technology convergence. Operating in 42 different countries, we have developed a unique global knowledge and networking platform, which is trusted by over 30,000 ICT, engineering and technology professionals.
Data Centre Dynamics Ltd.
102-108 Clifton Street
London EC2A 4HW