How smart manufacturing enabled by high performance private cellular networks can help solve them.

Industry 4.0 Transformation with Private Cellular Technology
Industry 4.0 Transformation with Private Cellular Technology
Industry 4.0 Transformation with Private Cellular Technology

Ericsson and Hexagon examined five different smart manufacturing use cases that will enable manufacturers to conduct their operations more efficiently and increase ROI. When all five are deployed together, our study showed payback can occur within two years.

Table of contents

Smart manufacturing is producing the goods
Manufacturing a more connected industry
An industry in flux
What manufacturing is up against
7 challenges manufacturing needs to overcome
Connectivity on an industrial scale
Primed for automation
Five smart manufacturing use cases
About the five we’ve chosen
AMR: The workhorse of smart factories
Cobots rising, quality rising.
Reality check — improving inspections with AR
Your best asset for maintaining machines
Manufacturers win with a digital twin
Using all 5 to create Industry 4.0


More and more of the world’s largest corporations are taking a broader look at their environmental impact. As a result, many are now focusing on emissions in their supply chain.

Understand Renewable Energy and Emissions to Become More Sustainable Value Chain Partner
Understand Renewable Energy and Emissions to Become More Sustainable Value Chain Partner
Understand Renewable Energy and Emissions to Become More Sustainable Value Chain Partner

Suppliers who commit to best practices in sustainability, energy, emissions, and resource usage could see new opportunities. In this article from Enel X, you’ll find out:

  • Why businesses like General Motors are examining their supply chain
  • How to gather environmental data and set science-based targets
  • How suppliers can switch to renewable energy sources

Table of contents

The World’s Largest Corporations are Turning to Their Supply Chain to Reduce Emissions
Your Emissions Are Your Customer’s Emissions, Too
Companies Are Broadening Their Environmental Focus
The Growing Focus on Suppliers
Putting On the Pressure
Customer Spotlight: General Motors on GHG Reduction and Supply Chain Emissions
How to Become a Sustainable Supply Chain Partner
Gather Your Environmental Data and Set Ambitious Resource Targets
Customer Spotlight: Sonoco Products Company Discusses Sustainability
Switch to Renewable Energy Sources
There’s No Better Time Than Now


Managing SAP change effectively comes with a cost whether you invest in new technology or maintain your processes and procedures.

The ROI of automated SAP change management
The ROI of automated SAP change management
The ROI of automated SAP change management

For businesses in today’s digital economy, automating SAP change management processes is essential for success. Discover how to use predictable costs and know baselines to build a compelling business case to automate your SAP change management processes and quickly realize value from your SAP investment.

Managing SAP change effectively comes with a cost whether you invest in new technology or maintain your processes and procedures. More and more businesses are automating SAP change management processes to meet the challenge head-on. Software solutions that are easy to implement and quick to return business value are crucial. …


This shift has created a new sense of urgency around digital transformation and ultimately the retail martech stack.

Shift to Digital-First Retail eCommerce
Shift to Digital-First Retail eCommerce
Shift to Digital-First Retail eCommerce

In the past year, retail has evolved, unlike any other industry. As eCommerce continues to grow, the shift to a digital-first world has fully arrived. This transformation requires deep expertise to get it right — and it starts with your tech stack.

Retail is unlike any other industry, it is complex and ripe for innovation. Over the past few years, enormous changes have permanently transformed retail into an ultra-competitive and digitally fluid landscape. This shift has created a new sense of urgency around digital transformation and ultimately the retail martech stack.

Table of contents

How to Use this Guide
Why You Need Technology Built for Retail
Building Your Retail Marketing Technology Stack
5 Characteristics of the Retail Martech Stack of the Future
Technology Must-Haves for a Best of Breed Retail Martech Stack
How to Measure the Value of Your Technology
Outcomes of a Best of Breed Retail Marketing Technology Stack
Sephora Improves Data Activation and Accessibility to Strengthen Loyalty
Hammacher Schlemmer Hones Personalization to Grow Digital Revenue
ASICS Reduces Size Sampling, Increases Conversion and Keep Rate with Personalized Digital Experiences
Making Changes in Your…


Read this article for the latest information on how to choose a new Office 365 or G Suite workspace security infrastructure.

Choose The Right Cloud Email Security and Productivity Solution
Choose The Right Cloud Email Security and Productivity Solution
Choose The Right Cloud Email Security and Productivity Solution

The new security challenges we face today indicate that it’s time to reevaluate your email security. Remote work is now normal, and with employees relying on their cloud mailboxes and productivity apps such as Teams, OneDrive, SharePoint, Google Drive, and others to complete important tasks and share sensitive information, the security gaps are bigger than ever.

Read this article for the latest information on how to choose a new Office 365 or G Suite workspace security infrastructure. To help you choose the optimal cloud email & productivity suite security solution in the new normal, this article presents:

  • The latest trends in email…

Ins and outs of third-party data breaches including the attack methods, the most common phrases, and the importance of a vendor access management platform.

Common Phases of Data Breach via Third-Party Access
Common Phases of Data Breach via Third-Party Access
Common Phases of Data Breach via Third-Party Access

Data breaches that stem from third-parties are rising. Without proper controls in place for vendor management and remote access, you’re setting yourself up for a data breach. This article covers the ins and outs of third-party data breaches including the attack methods, the most common phrases, and the importance of a vendor access management platform.

Read this article to learn:

  • The most common ways hackers use third-party access
  • The top breaches that stemmed from a third-party
  • About the top 5 phases of a data breach
  • How to lower the risk from cyberattacks
  • Strategies to reduce impacts from those attacks

Table of contents

Attack Methods
Most common ways hackers use third-party access
Top breaches that stemmed from a vendor or third party
The 5 Most Common Phases
Phase 1 Investigation: Choosing the victim
Phase 2 First blood: Attacking the vendor
Phase 3 Spreading the infection: Going after the healthy hosts
Phase 4 Movement: Breakout or going lateral
Phase 5 Finale: Persistence or payday
The importance of a vendor access management…


This rare peek from the C-suite into the full lifecycle of real-world data breaches can help you better prepare your own prevention and response plans.

How to Prevent and Response to Data Breach?
How to Prevent and Response to Data Breach?
How to Prevent and Response to Data Breach?

If 2020 taught us anything, it’s the importance of preparedness. The common refrain, ‘it’s not a matter of if your company will be breached, but when’ is even more true today.

Large-scale data breaches spiked more than 270 percent in 2020, costing companies billions as criminals take advantage of the massive increase in business conducted online. The average cost of a data breach is now a staggering $3.86 million, with healthcare breaches costing an all-time high of $7.13 million.

Table of contents

Pre-Breach Fundamentals
Discovering the Breach
First Steps After Breach Discovery
Preparing for Litigation
Seeking the Missing Data
Long-Term Post-Breach Investment
The Question of ROI
Lessons…


It sets out why 2020 will be the catalyst to radically accelerate hybrid working, where employees enjoy flexibility and choice, and businesses thrive through motivated, collaborative, and productive teams.

Practices, Spaces, and Culture for Hybrid Working
Practices, Spaces, and Culture for Hybrid Working
Practices, Spaces, and Culture for Hybrid Working

Almost overnight, COVID-19 forced millions of employees worldwide to work from home. In many cases, the adoption of remote working on a massive scale has demonstrated how employees can operate with the same (if not greater) efficiency and productivity while achieving a better work-life balance.

Yet this dramatic change suddenly overruled many business policies on when and where employees work. It also brought challenges around maintaining company culture and supporting home workers.

One thing is clear, however. The enforced changes brought about by the pandemic have opened the eyes of employees and business leaders to new ways of working. …


You still need a private point-to-point connection that is robust, secure, and mighty fast.

Point-To-Point Private Connection For The Most Important Tasks
Point-To-Point Private Connection For The Most Important Tasks
Point-To-Point Private Connection For The Most Important Tasks

Despite recent developments in cloud computing of late, it’s clear for many enterprises that not everything can be run over a public, unstructured network of networks. For some applications, you still need a private point-to-point connection that is robust, secure, and mighty fast. In this article, learn more about point-to-point connectivity.

Table of contents

Direct From Point A To Point B
A Secure Pipe For Data
Building A Good Foundation
Why Super Direct Service?
Resilience For Unexpected Situations
Speeds, Protocols, and Interconnection

Direct From Point A To Point B

Business resiliency is a key determinant of a business’ long-term prospects in today’s uncertain climate. …


What’s not said as much is that apps require a network that delivers the reliability, security, and performance needed to deliver a great experience.

Achieve Network Agility to Drive Business Transformation with SD-WAN
Achieve Network Agility to Drive Business Transformation with SD-WAN
Achieve Network Agility to Drive Business Transformation with SD-WAN

The network is the backbone of any company in a hyperconnected world. A network that cannot keep up, either because of its complexity or poor performance, is not a network to grow a company with.

Table of contents

What’s needed: A transformation
Which industry would benefit most from SD-WAN?
Planning ahead

While traditional setups-for example, those using Multiprotocol Label Switching (MPLS)-have been serving business needs by linking up multiple locations such as branch offices for years, they often fall short of what is needed today.

Consider cloud-based applications such as Office 365 and Salesforce. With employees looking to run critical business functions with these online apps at scale and speed, the performance is often left wanting on traditional setups. …

About

Alex Lim

Technology Blogger writing about emerging technologies (pupuweb.com) and marketing/lifestyle (paminy.com)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store