I agree Utilizamos cookies para mejorar la experiencia de navegación del usuario y para estudiar cómo se utiliza nuestro sitio web. Si navega por nuestro sitio web, estará aceptando el uso de las cookies en las condiciones establecidas en la presente política de cookies. Esta política puede ser actualizada, por lo que le invitamos a revisarla de forma regular.
¡HI! If you want to propose us a project, send a mail to firstname.lastname@example.org
+34 91 433 30 99 GET OUR NEWSLETTER
THANKS FOR NOTICING HIGH FOR OUR NEWSLETTER
By Juan Emilio Alvárez, Specialist in Digital transformation and BPM
"The Industrial Revolution 4.0 and / or Digital Transformation,”, is already a reality. This transformation implies a reinvention, but, unlike previous transformations, times are critical. Supply and demand vary at Vertiginous speed, and every company has to find its way to success. In this scenario, is it possible to bypass digital transformation 4.0?
The immersion in the "Digital Transformation" has to be a reality, but do not confuse Digital Transformation, with change of technology. Elements such as manufacturing and additive intelligence, robotics, artificial ...(Keep reading)
By: Pedro Robledo, BPM process management expert
As the implementation of BPM (Business Process Management) in your organization is not only the implementation of BPM technology, to analyze the profitability to be obtained it is necessary to take into account the entire BPM Life Cycle. You must evaluate both the investment to be made and the benefits in each phase. It is also necessary to take into account in the analysis the number of BPM projects that will be implemented during the time period of study so that all costs in ...(Keep reading)
By Bernardo Ramos, IT security expert
A few weeks ago media around the world alarmed citizens with a "Ransomware" attack which they called "Wannacry". It had blocked lots of computers of some major companies around the world
Shortly afterwards the same media again alarmed us with a new wave of even more sophisticated attacks of the same type. Now they explained that Russia had used a cyber weapon called "Petya" to attack Ukraine with possible unpredictable effects in other countries.
Enterprise executives are not usually concerned with issues such ...(Keep reading)