Ingeniøren Insights

Digitalt mindset & digital transformationHent

Få inspiration til at arbejde med digital transformation og udvikling af et digitalt mindset. Dette whitepaper indeholder grundlæggende viden om centrale begreber inden for digital transformation og kompetenceudvikling.
Der er masser af inspiration at hente til, hvordan I kommer i gang med at udvikle medarbejdere og ledere til en digital omstilling. Inspirationskatalogets tre guides er udviklet i samarbejde med Digital Dogmes medlemsvirksomheder i vores co-labs for henholdsvis Teknologiforståelse & Digitalt Mindsetog Digital Transformation. Dertil giver inspirationskataloget eksempler fra virksomheders arbejde med digital opkvalificering, herunder erfaringer og udfordringer.

Whitepaperet er dermed baseret på eksisterende viden fra nogle af de mest anerkendte aktører inden for digital transformationsledelsesuniverset samt virksomheders arbejde med digital transformation.

Der findes ikke nogen onesize-fits-all løsning til digital transformationsledelse, men vi håber alligevel, at inspirationskataloget kan give dig nogle inputs, du kan bruge i dit videre arbejde med digital transformation.

Du vil i det følgende blive præsenteret for tre guides og t...

Læs mere

Læs også

2021-tjeklisten til cloud og netværksstrategi

Quickguide til den sikre, gennemtænkte og agile strategi, som understøtter forretningen.

IT Operations Analytics - Fra bakspejl til krystalkugle

Dette whitepaper henvender sig til CIO’er og IT-ansvarlige, som ønsker at gøre det komplekse IT-landskab mere forudsigeligt og håndterbart ved hjælp af IT Operations Analytics. Dette kan gøres ved at forbinde relevant IT-data til information om forretningen og gøre det til en del af IT-overvågningen.

Selv organisationer, der allerede bruger Application Performance Management (APM) til at nå dette mål, kan have glæde af at orientere sig mod IT Operations Analytics.

Digital transformation styrker den grønne omstilling

En Sentia e-bog om cloudløsninger set i et grønt perspektiv. For organisationer og virksomheder, der arbejder med en bæredygtig IT- og forretningsstrategi. Fremfor to adskilte dagsordener er digitalisering og bæredygtighed to sider af samme sag, der begge styrker forretningen. En robust og agil..

Endpoint Detection and Response - Advanced Threat Detection, Focused Investigation And Effective Response

The advanced threat challenges you face today Cyber-criminals are growing ever more sophisticated and today’s advanced attacks are increasingly difficult to detect.

Using techniques that individually look like routine behavior, an attacker may access your infrastructure and remain undetected for months, significantly increasing the risk of a costly data breach.

X.e Case Study: Service Life of a Conveyor Belt Drive

Besides the oil seals, the shaft-hub connection and the lubricant used, the key factors in determining the service life of an industrial gear unit are the rolling bearings, the loads placed on them and the gearing’s load capacity for reliably transferring the torque.

Understanding More About the Thermal and Acoustic Properties of Gear Units

Are you interested in the physics of gear units? Would you like to learn more about the underlying thermal and acoustic properties and how they affect the dimensioning and operation of a drive?

This brochure provides you with an overview of key questions and answers that will help you see your gear unit through new eyes in the future.

The Value of Outsourcing Detection and Response

Outsourcing IT services is common practice for organisations everywhere. The majority of organisations already outsource significant parts of their IT services to third parties,, and the remainder are likely to have at least considered it. Cost is still one of the key reasons for outsourcing, but other value-related reasons are becoming more important.

IT Outsourcing Concerns and Mitigations

Outsourcing of IT operations and development has been a hot topic for years. Outsourcing critical operations adds certain risks, but with it also comes benefits.

Common advantages include scalability, more robust disaster recovery, easier access to subject matter experts, lower costs and being able to focus resources on core business development.

Skjulte perler fra Ingeniøren Insights

The Top 4 Things to Look for in a Customer Identity and Access Management (CIAM) Solution

No one wants their company to make headlines like “80,000 Company X Accounts Were Compromised in the Latest Breach” or “3 Billion Company Y Accounts Have Been Stolen in the Past Year.” Whether your company has an ecommerce website, a portal for your customers to pay bills online, or you provide a subscription service, most organizations have a website or applications that customers need to log in to. And unfortunately, it is through insecure access or poor password hygiene that credentials are stolen and company data is breached.