Statoil Pumps up Production Levels through Information Sharing and 'Smart' Practices
By: IBM Line of Business View more from IBM Line of Business >>
Download this next:
CW Innovation Awards: Bharat Petroleum refines operations with a digital nerve centre
By: TechTarget ComputerWeekly.com
Type: eGuide
In this case study, learn how Bharat Petroleum's massive IoT project will enable the company to respond quickly to equipment failure or hazardous incidents, and provides a single view of the company's entire value chain.
These are also closely related to: "Statoil Pumps up Production Levels through Information Sharing and 'Smart' Practices"
-
CW Innovation Awards: Sime Darby ups ante in service management
By: TechTarget ComputerWeekly.com
Type: eGuide
In this case study, learn how Sime Darby Industrial's inService Suite has returned more than 100,000 hours to the company in a digitisation initiative that has improved efficiency and customer engagement.
-
How Kaspersky MLAD gives transparency to complex facilities
By: Kaspersky
Type: Case Study
The PJSC TANECO oil refinery in Russia uses Kaspersky MLAD to monitor complex industrial processes. At the strategic CDU-VDU-7 facility, MLAD analyzes telemetry data to detect anomalies and provide early warnings. After training on historical data, MLAD went live in 2018 and has detected issues like incorrect sensor readings. TANECO now has automatic alerts for potentially dangerous situations and tools for interpreting anomalies.
Read the full case study to learn how MLAD’s machine learning gives TANECO transparency into its most critical operations.
Find more content like what you just read:
-
CW APAC, April 2021: Trend Watch: IoT in India
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.
-
Data breaches in 2023: Analyst findings
By: Cato Networks
Type: Webcast
To dig into the findings of IBM’s “Cost of a Data Breach Report 2023,” and to explore the capabilities of AI security, tune into this webcast.
-
CW Innovation Awards: SIA taps blockchain for loyalty app
By: TechTarget ComputerWeekly.com
Type: eGuide
In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.
-
MicroScope – March 2023: Steering the storage market
By: MicroScope
Type: Ezine
In this issue, read all about how the storage world is continuing to evolve as it looks to the cloud, security and ESG compliance requirements. Also discover six steps to making your business more sustainable and read about how IBM's channel boss is set to make a difference.
-
What will a quantum datacentre look like?
By: TechTarget ComputerWeekly.com
Type: Infographic
IBM has updated its quantum computing roadmap to reflect how quantum processors, central processing units (CPUs) and graphics processing units (GPUs) will be woven into a compute fabric capable of solving computationally complex problems. Understand why this impacts both hardware installation and software.
-
CW Innovation Awards: How Zuellig Pharma is fighting fake drugs with blockchain
By: TechTarget ComputerWeekly.com
Type: eGuide
In this case study, learn how Zuellig Pharma is leveraging blockchain to help countries get up to speed with their vaccination programmes and counter the threat of counterfeit vaccines.
-
Computer Weekly 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.
-
CW Innovation Awards: Flybuys cranks up cloud for service efficiency
By: TechTarget ComputerWeekly.com
Type: eGuide
In this case study, learn about Flybuys' migration to the cloud, how they integrated security from the start and developed a change management plan to ensure key stakeholders were proactively engaged.
-
How to apply lean manufacturing to data management
By: HighByte
Type: eBook
The volume, velocity and variety of raw industrial data are ever increasing, making it difficult to work with. Fortunately, manufacturers already have the framework they need to streamline data production and preparation. Read on to learn how you can enable your organization with lean data.
-
Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.
-
CW Nordics - May-July 2019: Facing up to fintech
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue of CW Nordics, we take a look at how one of the Nordic region's big, traditional banks is going about meeting the challenges posed by new digital entrants into the finance sector. And it is another large traditional player, but this time in the IT world, which Nordea is turning to for support– none other than Big Blue.
-
What It Takes to Simplify Enterprise Backup and Get More From Your IBM Spectrum Protect Investment
By: Cobalt Iron
Type: White Paper
Check out this white paper for an objective look at Spectrum Protect technology, learn how enterprises can use it more effectively in a new and changing business world, and much more.
-
What It Takes to Simplify Enterprise Backup and Get More from Your IBM Spectrum Protect Investment
By: Cobalt Iron
Type: White Paper
Check out this white paper to take an objective look at Spectrum Protect technology, learn how enterprises can use it more effectively in a new and changing business world, and much more.
-
Data security: Don't make these 5 common mistakes
By: Ironside Group
Type: eBook
Take a look through this IBM Security e-book to learn how to avoid five common data security missteps.
-
Zero Trust: What you need to know
By: TD Synnex
Type: Podcast
To fill in any gaps in your understanding of Zero Trust, tune into this episode of Logicalis’s “Tech ChangeMakers Podcast,” which features the expertise of Hector Hernandez, a Solution Architect at Logicalis.
-
What Is the Future of Endpoint Security?
By: TD Synnex
Type: Podcast
What is the future of endpoint security? To answer that question, Hector Hernandez, Solution Architect at Logicalis, interviewed a subject-matter expert from IBM in this episode of the “Tech ChangeMakers Podcast.” Tune in to access the insightful conversation.
-
A guide to where mainframes fit in the cloud
By: TechTarget ComputerWeekly.com
Type: eBook
Far from being legacy IT, the mainframe is a driving force in modern computing. In this e-guide we look at its place in cloud computing.
-
Computer Weekly – 7 August 2018: How digital is driving golf to the connected course
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how one of the most traditional of sports, golf, is turning to technology to engage a new audience and build the connected course. Industry legend Stephanie 'Steve' Shirley discusses skills, diversity in tech and Brexit fears. And we assess four of the biggest cloud storage providers. Read the issue now.
-
IBM Cloud: No shift, Sherlock
By: TechTarget ComputerWeekly.com
Type: eGuide
OpenShift is a key ingredient in the latest shift in IBM's long-running cloud strategy. We look at what it means...
-
Enterprise Strategy Group report: Boosting OT cybersecurity
By: Palo Alto Networks
Type: ESG Economic Validation Report
Due to their lack of built-in security, OT assets – such as critical smart devices – tend to be highly susceptible to cyberattacks. In the face of increasingly complex cyberthreats, how can you level up your business’s OT cybersecurity? Unlock guidance in this Economic Validation report by TechTarget’s Enterprise Strategy Group (ESG).
-
How to Stay Ahead of Emerging Threats
By: Endace
Type: Product Overview
As cybercriminals develop more sophisticated attacks, you must develop stronger defenses. IBM Security and Endace have partnered to help you do so. Dig into this overview to learn how, by combining IBM QRadar with EndaceProbe Analytics Platforms, you can speed and strengthen your security incident response.
-
CW ANZ: Taming the data beast
By: TechTarget ComputerWeekly.com
Type: Ezine
Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.
-
-
Computer Weekly 3 September 2019: From IT disaster to digital innovation at RBS
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we meet the man brought in to turn around the technology at RBS Group after its catastrophic IT outage. We examine the latest best practice in securing mobile devices in the enterprise. And we look at progress towards "passwordless" security. Read the issue now.
-
9 IBM Cloud Paks for app modernization and cloud efforts
By: TechTarget ComputerWeekly.com
Type: eGuide
It takes time, money and labour to modernize applications and workflows to use cloud environments. IBM brings a new dimension to cloud adoption with highly integrated solution stacks that can provide a range of typical workflows for business users. In this e-guide, learn how IBM Cloud Paks can help ease some challenges of application modernization.
-
How Industrial DataOps is changing Industry 4.0
By: HighByte
Type: Blog
The change sweeping the manufacturing industry right now is so thorough that some are calling it “The 4th Industrial Revolution.” And with this change comes problems—namely the issue of unusable data. But with the right DataOps approach, you can start to make sense of these remarkably complex sets of data. Read on to learn more.
-
Top threats to modern sales & how to combat them
By: Pipeliner
Type: eBook
As the sales industry continues to get more complex and complicated, many organizations are worried about potential threats that could hurt the success of their business. But what threats should companies be most worried about and how can you most effectively combat them? Browse this guide to learn more.
-
AI governance for responsible, transparent, and explainable AI workflows
By: IBM
Type: eBook
This e-book discusses the concept of AI governance, which is defined as the overall process of directing, managing, and monitoring the AI activities of an organization to ensure outcomes are trusted and explainable. It outlines the key building blocks and introduces IBM’s new toolkit for AI governance, IBM watsonx.governance. Read on to learn more.
-
Elevate & Innovate: The CISO's Guide to Overcoming Cybersecurity Challenges
By: Insight
Type: eBook
From growing costs and complexity to constantly-evolving cyberthreats, cybersecurity is becoming a bigger challenge for organizations. In this ebook, read tips from a CISO about overcoming the challenges of modern cybersecurity and the traits of a winning strategy for any industry.
-
Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.
-
5 verticals, 5 SASE strategies: Brief e-book
By: Cato Networks
Type: eBook
Download this e-book to learn how SASE can augment security postures in 5 verticals, including manufacturing and technology.
-
9 business applications of AI/ML
By: TierPoint
Type: White Paper
Navigating the complex landscape of artificial intelligence (AI) and machine learning (ML) adoption can be a daunting task, often leaving companies uncertain about the right starting point. Look no further than this white paper, which dissects 9 top business applications of AI, specific uses by industry, and more.
-
Unlock 24/7 security support with an MSP
By: Flagship Solutions Group
Type: Product Overview
Download this overview to learn about how your organization can unlock 24/7 security support by employing a managed services provider.
-
Economic analysis of IBM Security QRadar SIEM
By: Clear Technologies
Type: Forrester Total Economic Impact Report
Download this Forrester TEI infographic to discover the three-year financial impact that a SIEM tool can deliver for your business.
-
How edge computing is shaping modern healthcare
By: Schneider Electric
Type: Research Content
As IT leaders in healthcare grapple with these difficulties, using emerging technologies like edge computing can make sure that healthcare organizations and the broader healthcare industry are ready for the future. Access this study to gain a deeper understanding of how edge computing is shaping modern healthcare.
-
What data security looks like in 2024
By: Clear Technologies
Type: Product Overview
These days, your sensitive data likely exists in multiple places, both outside of and within your company. How can you ensure that your data is safe in all its locations? Check out this overview to learn how a data security posture management solution can help.
-
Bringing all SAP instances to a new single platform with Service Express
By: Service Express
Type: Case Study
Discover in this case study how the hardware muscle provided by IBM’s Power10 generation helped Service Express empower Vivo Energy to boost employee productivity, streamline workflow processes and increase data visibility.
-
10 reasons you should consider AI-powered endpoint security
By: iT1 Source
Type: Product Overview
In this overview, discover ten reasons why you should consider adopting an EDR solution that is powered by AI and automation.
-
A Starting Point for Your Zero-trust Journey
By: Qriar
Type: Product Overview
So, you want to launch your journey to zero trust, but you’re wondering where to begin. This IBM paper advises to set identity and access management (IAM) as your starting point. Read on for more guidance.
-
How to better support your distributed workforce
By: Sinch
Type: Blog
The more distributed that workers are, the more complex it can be to keep them secure, connected and engaged. But, as the last few years have shown, remote and hybrid work are here to stay in many industries. Explore this article to learn how to better support your distributed workforce.
-
Challenges Facing Network Security Teams: Webcast
By: Endace
Type: Webcast
“What’s life really like for a security analyst?” In this episode of Endace’s “Secure Networks: The Packet Forensics Files,” host Michael Morris poses this question to a SOC expert from IBM. View now to discover the answer.
-
Computer Weekly – 12 July 2016: Watson gets to work
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue we explore the many ways Watson has evolved from the machine that bettered humans in Jeopardy! to providing deep analytical insights to solve real world crises. We also look at how Barclay's bank is using DevOps to remain competitive and reveal new research that illustrates why cloud computing is at the heart of business innovation.
-
Case study: Armellini Logistics experiences shadow IT's impact
By: Ironside Group
Type: Research Content
To analyze the state of attack surface management (ASM), Enterprise Strategy Group and Randori, an IBM Company, surveyed 398 IT decision-makers. Tap into this report to review the findings, which explore three forces driving organizations to adopt a more continuous approach to ASM.
-
Expert E-Book: Data Security and the Cloud
By: TechTarget Security
Type: eBook
This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
-
Watson Can Power Your Application. What Will You Do With It?
By: IBM
Type: Webcast
View this webcast to see experts discuss and demonstrate the new IBM Watson services available on Bluemix.
-
How to reduce the cost and complexity of data protection
By: Dell Technologies
Type: Infographic
With a Security as a Service (SaaS) platform designed to protect your data wherever it lives, your organization can move forward with a security solution that can deploy in minutes, scale on demand, and reduce costs for your organization. Take a look at the benefits of Dell Apex Backup Services for SaaS applications in this infographic.
-
Building an Android App using MobileData Cloud
By: IBM
Type: Webcast
Watch this video to learn how to augment a simple Android application with functionality provided by IBM Bluemix.