More
Further posts with tag:
-
GenAI and low-code: What companies should consider when employees prompt their own appsDigitalization, automation and simplification of daily work tasks: this is the objective of many companies looking to make processes more efficient and reduce the workload […]
-
Using complexity as a tool: 3 cases from businessOur world is becoming increasingly complex. Companies are looking for smart solutions that can help reduce this complexity. But is reduction of this kind always […]
-
Is Germany becoming a home working paradise? A closer look at remote workingGermany is well prepared for mobile working and there is a willingness to work from home. At least, that is the result obtained by recent […]
-
Deep dive with Siemens: Opportunities & challenges presented by Zero TrustSiemens is one of the first companies to adopt a Zero Trust approach to IT & cyber security. Which opportunities does this present for the […]
-
Cloud Journey at Siemens: Cyber security pioneers on the trail of the “next big thing”"In the past, the cloud was deemed to be insecure, but today this is exactly where security development is taking place," says Thomas Müller-Lynch from […]
-
Cyber attacks in SMEs: how companies can strengthen their resilienceThe number of cyber attacks is rising. SMEs are increasingly the target: with inadequate protection, hackers often have an easy target. What can SMEs do […]
-
Agile as a panacea? Why classic project management has not outlived its usefulnessRapid utilization, continuous optimization: this is what Agile project management can deliver. But is this method suitable for all areas of application? Isabel Münnig illustrates […]
-
Personalized medicine: digital twins revolutionize healthcareFaster drug approval, personalized treatment, improved prevention: there is enormous potential for research and healthcare in digital twins. Dr. Henning Dickten, Head of Consulting Pharma […]
-
Expert Talk: “Successful zero trust strategies rely on pragmatism!”Cyber security attacks are causing more and more security incidents: once an attacker has crossed the corporate network perimeter, there is little protection remaining for […]