Type to SearchView Tags

Category blogs - Featured

Blog Category Listing

The Pace of Change-Part 2: The Spotlight Effect
31

May 21, 2021

The Pace of Change-Part 2: The Spotlight Effect

Holly R. Pendleton Senior Practice Leader, Digital & Analytics

The Pace of Change is an article series that explores the quickening pace of change, how organizations are responding, and why the only way to keep up is by fundamentally shifting our view on change. This blog in the series focuses on how...
Engaging Executives to Drive Success - Part 1
126
“From Stakeholders to Transformers: Engaging Executives to Drive Success” is a two-part blog series that first explores and identifies what makes a transformer, and provides actionable advice on how to create your own transformers. In this blog, we...
CX Tools of the Trade, Part 2: Customer Personas
74

May 19, 2021

CX Tools of the Trade, Part 2: Customer Personas

Sandra Mathis Director, Digital & Analytics

In the “Tools of the Trade” series, we focus on commonly used customer experience tools and practices. The series kicked off with empathy mapping, a common yet often misused and misunderstood customer experience (CX) tool that is often confused with...
Beyond the Enterprise Walls
61

Apr 16, 2021

Beyond the Enterprise Walls

Russ Heasman SAP CTO, EMEA

The only constant when it comes to technology is change. Mobile networks are improving coverage, rolling out 5G, and introducing narrowband IoT networks. Not yet solved, but there have been significant improvements in battery capacity. The...
https://hcl.kapost.com/posts/e-commerce-and-commercialization-changing-the-shape-of-the-healthcare-industry
157

Apr 08, 2021

E-commerce and commercialization in healthcare

Neha Kukreja Deputy Manager, Digital & Analytics

With emerging growth in digital healthcare technologies, consumers demand more healthcare choices, better decision-making apps or tools, and control of their healthcare data. Many digital healthcare factors can create a future where e-commerce...
Email Security
138
The majority of threats to organizations still arrive by email. With many in the workforce moving from the office to remote work, cloud services usage has spiked though the lack of focus on email security persists. Many high-profile attacks and...
AR-VR
278
Utilities have started their digital transformation journey and are at different maturity levels. But fieldwork safety still remains the core problem statement impacting their brand value. This is a key deterrent in attracting new talent to replace...
Leveraging Automation Anywhere for PeopleSoft Accounts Payables Automation
156
The blog checks the effectiveness of robotic process automation of manual daily activities in the PeopleSoft Financials application that are time-consuming. Two business processes were identified that bots can perform without manual intervention and...
US Healthcare Outlook
152

Mar 19, 2021

US Healthcare Outlook

Neha Kukreja Deputy Manager, Digital & Analytics

The COVID-19 pandemic has made millions of lives and economies suffer across the world. The healthcare ecosystems and subsystems are getting stretched beyond their capacity by the torrent of infected patients. In many ways, digitalization is aiding...
Humans and Data at the Heart of Successful Digital Transformations
205

Jul 27, 2021

Humans and Data at the Heart of Successful Digital Transformations

Braden Kelley Solutions Director, Digital & Analytics

Digital transformation has become an overused buzzword. When most people speak about digital transformation, they are really speaking about digitization, digitalization, or digital strategy. They are all very different and none of them is digital...
Preparing for a Future Built on IoT
120

Jul 15, 2021

Preparing for a Future Built on IoT

Doug Concepcion Solution Evangelist

Over time, the definition of IoT has changed considerably. Today, IoT has crossed new boundaries and can be found in nearly every possible item. And with its inherent network connectivity, it’s become a major source of real-time data collection and...
cyber risks
609

Nov 14, 2019

Five hard questions to ask about your cyber risks

Rajesh Thakur Senior Vice President & Business Head

More quickly than most people realize, the scale and seriousness of the cyberthreats companies face have changed. Many of the most expensive cybercrimes are growing now by triple digit percentages every year, with no end in sight. Why the...
Data Platform
292

Aug 13, 2020

Getting ahead with Data Platform in the Cloud

Parashuram Patil Principal Architect, Digital & Analytics

In the search for an ideal solution to address innovation changes, cost savings, easier data handling, enterprises found cloud migration. Cloud migration is simple, but digital transformation isn't. What can smooth out this digital exodus is the...
Change Management
904

May 25, 2020

The Nuances of Organization Change Management

Nishant Varun Group Manager, Digital & Analytics

Change is the only constant. Especially in organizational management. Today, most businesses seek to adapt to the radically changing business approaches by implementing various data-driven methodologies and new-age technologies to make the most of...
Recognize ‘Normal’
632
To paraphrase a well-known cliché, either you have been breached or you will be breached. You might not be able to prevent infiltration by malicious intent, but you can recognize abnormal versus normal and react quickly...
Evolution of Vulnerability
77
Vulnerability Assessments (VA) as we know have been leveraged by enterprises for time immemorial to identify the gaps in their security posture. Vulnerability assessment detects weakness or misconfiguration in systems that an attacker could possibly...
GRC
780
Today, in the second decade of the twenty-first century, enterprise leaders are confronted by regulatory and economic volatility on a scale that has not been experienced in generations. Accelerated by disruptive innovations, GRC challenges are...
Role of CIAM for Simplified Digital Customer Experience
192
Digital transformation was never this fast and in such high demand before. Call it irony or a turn of fate, post-COVID-19 companies are speeding up digitization both at the operational and customer-facing level. McKinsey reveals that the...

The Evolution of Vulnerability Assessments in Cybersecurity -Part 1
Saurabh Singh - Group Manager | August 25, 2021
77 Views

Vulnerability Assessments (VA) as we know have been leveraged by enterprises for time immemorial to identify the gaps in their security posture. Vulnerability assessment detects weakness or misconfiguration in systems that an attacker could possibly exploit. However, it is not as simple as it sounds!


Fluid WISE – Workplace Industry Solutions and Experiences
Nikhil Singh - Deputy General Manager - DWP Product Group | August 19, 2021
93 Views

The modern workplace acts as a lynchpin for the enterprise in its pursuit of productivity and employee experience. This paradigm change has forced organizations everywhere to rethink how technology, processes and people can work together to achieve business goals. Fluid WISE (Workplace Industry Solutions and Experiences) is a unique industry specific offering that help organizations accelerate workplace transformation by leveraging workplace technologies. The ‘one size fits all’ model is no longer the best way to lead a customer’s workplace transformation journey. What’s different with workplaces of today are the service needs and requirements for each of them based on the nature of the day-to-day activities. Fluid WISE aims to address the strategic challenges of each industry and help enterprises embark on workplace transformation to deliver  productive, intuitive, connected work experience.


Making Your Blockchain Solution Ultra-Secure with Trusted Execution Environments
Vikram Sharma - Senior Technical Architect, Digital & Analytics | August 18, 2021
43 Views

Blockchain has revolutionized transactions through cryptocurrency by removing the need for a trusted third party to conduct transactions among untrusted parties. With the use of blockchain, the trust was established with the use of technology and without needing any trusted third party to mediate the transactions. These blockchains were public blockchains, which allowed anyone to join the network and further strengthen the trust by way of mathematical computations.

In this blog post, we will consider the private permissioned blockchain powered by Hyperledger Fabric, which is a part of the Linux Foundation.