Open post

Caterpillar – Elevating its Supply Chain with Technology

Caterpillar (CAT) recently successfully elevated its supply chain visibility to network collaboration. Using Infor Nexus’ real-time supply chain management visibility solution, it has combined SCM with the internet of things (IoT) and geo-fencing for true clarity. With this technology, CAT and its customers know exactly where machines are, if they are on time and when […]

Continue readingMore Tag
Open post

Next-gen managed services and automation in AWS

In order to gain all the benefits offered by the constantly evolving cloud ecosystem, companies are using the expertise of Managed Service Providers (MSPs). Traditionally, MSPs provided attractive alternatives for enterprises wanting to outsource steady-state IT operations to someone who could do it cheaper, but this has evolved as the cloud itself has evolved. Next-generation […]

Continue readingMore Tag
Open post

iOCO hosts customers at the SAP S/4 HANA ‘Move In Motion’ Event

As our customers drive their digital transformation journeys, legacy ERPs may not be enabling innovation or intelligent automation of processes which enterprises are seeking, and traditional ERP systems are struggling to keep up with the digital economy. External factors such as regulatory and reporting changes are also impacting many of our customers. In addition, since […]

Continue readingMore Tag
Open post

Creating the Next Generation of Game Changers and Smart Leaders

In addition to nurturing and developing skills, mentorship remains a key strategy for us to connect, build our leadership skills and share knowledge across our business. As iOCO transforms, our mentorship application will follow suit and re-invent itself within the HR ecosystem.  This ecosystem aims to be a one-stop experience, where mentorship is accessible from […]

Continue readingMore Tag
Open post

People are Cyber security’s Weakest Link. So Can Robots Do Better?

Ask any cyber security specialist about their biggest network safety concern, and it’s likely to be the human element. No matter how resilient or intelligent the cyber security solution, it’s only as effective as its weakest link, and people unassumingly, are always a risk. Whether it’s recycling passwords across platforms, a company laptop being stolen […]

Continue readingMore Tag

Posts navigation

1 2 3 4 5 6 7 8 9 10 12 13 14