ARC’s Sixteenth India Forum Focuses on Digitization
ARC Advisory Group’s sixteenth India Forum for the process and discrete industries, titled Digitizing and Securing Industry, Infrastructure, and Cities from July 5-6, 2018, Bangalore, India attracted over 250 delegates. Last…
Three AI Key Success Factors for Achieving Maximum Business Value
Artificial intelligence (AI) is making tremendous impact already in the world. Some of that impact is indirect and comes from the anticipation of things that may sound like science fiction…
How Adaptive Cyber Security Can Enable Digital Health Adoption
Digital health focuses on connecting the systems, tools, medical devices, and services together that deliver needed healthcare to each of us and gives critical data insights to each player across…
How will smart manufacturing transform the supply chain?
For manufacturers, managing the supply chain from beginning to end has been like traveling two superhighways interrupted by a long stretch of dirt road. Manufacturers have benefited from increasingly powerful…
How Do We Enhance Trust in Connected Things?
Is technology advancing and evolving faster than our collective mindset? It’s an interesting thought, and perhaps easy to confirm when you start considering connectivity. Today, we have the Internet of…
Edge Computing Benefits – Key Drivers for Smart Manufacturing
Edge computing has many beenefits; it means faster response times, increased reliability and security. A lot has been said about how the Internet of Things ( IoT ) is revolutionizing…
New business models for manufacturers
The convergence of Operational Technology (OT) and Information Technology (IT) systems may help manufacturers embrace new service offerings using web-based business models. Many years ago one of my distributor partners…
How to Build an Industrial IoT Project Without the Cloud
Contrary to what you might think, you don’t need cloud providers or platforms to run your enterprise IoT project. In fact, it might be to your advantage to just stick…
Binary randomization makes large-scale vulnerability exploitation nearly impossible
One of the main reasons cyber risk continues to increase exponentially is due to the rapid expansion of attack surfaces – the places where software programs are vulnerable to attack…
Options to monitor water and fluids with Industrial IoT sensor telemetry
IIoT or Industrial IoT (Internet of Things) is everywhere. It’s across all industries, from high tech transport, to natural resources and governments. IIoT software and hardware is deployed for numerous,…
The Overwhelming World of Smart Cities and Cyber-Kinetic Threats
For most people around the world, cities are central to our lives and security. More than half of the world’s population lives in urban areas and that percentage is expected…
Scrum – an Agile Approach to Digital Transformation
In 500BC the Chinese general and military strategist Sun Tzu taught his commanders that quickness is the essence of war, and agility the hinge of battle. Sun Tzu’s wisdom 0f…