article thumbnail

Unlocking Enterprise systems using voice

All Things Distributed

Alexa can control the environment, help you find directions, book a room, report an issue, or find transportation. One of the biggest applications of voice in the enterprise is conference rooms and we've built some special skills in this area to allow people to be more productive. For example, many meetings fail to start on time.

article thumbnail

4 hidden risks of your enterprise cloud strategy

CIO Business Intelligence

As enterprise CIOs seek to find the ideal balance between the cloud and on-prem for their IT workloads, they may find themselves dealing with surprises they did not anticipate — ones where the promise of the cloud, and cloud vendors, fall short versus the realities of enterprise IT. How long do they retain these logs?” Levine says.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Report: SMEs Are Prime Targets and Must Plan for Disaster Recovery

SecureWorld News

Small and midsize enterprises (SMEs) often do not have the resources to protect themselves from cybercriminals with bad intentions, leaving them vulnerable to financial and productivity losses, operation disruptions, extortion payments, settlement costs, and regulatory fines. SMEs are becoming more frequent targets of cyberattacks.

article thumbnail

The year’s top 10 enterprise AI trends — so far

CIO Business Intelligence

Generative AI touches every aspect of the enterprise, and every aspect of society,” says Bret Greenstein, partner and leader of the gen AI go-to-market strategy at PricewaterhouseCoopers. Gen AI is that amplification and the world’s reaction to it is like enterprises and society reacting to the introduction of a foreign body. “We

article thumbnail

Supply Chain in the Cloud

IT Toolbox

According to a current market research report, the cloud-based supply chain management solution market is estimated to grow from the $3.26 This MarketsandMarkets research is based on sales statistics from enterprise systems that include transportation management, procurement New IoT Apps Enhance Digital Supply Chain.

Cloud 113
article thumbnail

Oil & Gas Industry Vulnerability Typifies Threat to Key Infrastructure

SecureWorld News

A new research report has exposed vulnerabilities in the oil and gas industry, specifically to flow computers that regulate and calculate volume and flow rates of substances such as natural gas, crude oils, and other hydrocarbon fluids. The report was issued by Team82, the research arm of Claroty, an industrial security company.

article thumbnail

Telstra – Building A Better Operations Management Platform

CIO Business Intelligence

A new operations management platform was needed to enable a fast-growing portfolio of work executed for business and enterprise customers. Finally, the team needed better operations performance reporting and visibility to management for all the work in progress.

Infosys 92