Fiji Airways implements EAM RFID across fleet
Fiji Airways is integrating RFID to improve in-cabin inspections for onboard emergency equipment such as life vests, life rafts, oxygen bottles, fire extinguishers, extension seat belts, earmuffs, flashlights, survival kits as well as oxygen generators.
Pick ‘n Pay cuts costs with personalised loyalty
Iconic retailer Pick ‘n Pay collaborated with the SAP product owners and SAP loyalty development team to enable central processing with acceptable response times; simpler for customers and better customer service.
Reduce road traffic with cloud control
As traffic continues to worsen and employees continue to demand more workplace flexibility, enterprises will be forced to seek out solutions, many of which are to be found in the cloud.
WannaCry might be the tip of the iceberg
WannaCry ransomware certainly got the attention of governments, media, consumers and law enforcement. But the actual impact could have been so much worse.
Analytics tells a compelling HR story
To unlock people value, there are four critical elements: Ensuring the company has the right leaders, that it employs the best people, that it has a facilitating and energising environment; and a culture of operational excellence in HR.
iLearn pioneers blended IT learnership in SA
Over the past years, and with the rise of online learning, the blended learning methodology has evolved into a quality pedagogy, with research studies showing that it is a better way to teach and learn.
How Goldfields is standardising global HR
Having made the decision to use SuccessFactors, it quickly became critical for the group’s HR function, she adds.
The first step in the journey was to standardise all key processes in the HR function.
Industrie 4.0/IIoT is revolution, not evolution
The Industrie 4.0/IIoT era presents both significant opportunities and significant threats. Suppliers and customers are becoming part of a holistic network, within which products can be customised and produced at the same cost as mass production.
Security: Exploiting data breaches
Understanding the most commonly exploited software, and the most frequently targeted vulnerabilities, can aid in mitigating the threat posed by exploit kits and prioritising their patching.
Cognitive computing and African digital transformation
Demand is growing for infrastructure systems choices capable of delivering cognitive workloads. However, the requirements of different industries or government entities varies, and there is no one-size fits all.
KPMG: No one should get away with fraud
Even information that is carefully hidden or deleted can be identified and disclosed; and adequate measures must be in place and appropriate provisions must be made to discipline guilty parties accordingly.
Stay human, team up and beat the bots
The 2016 Global Relationship Study by Andrew Sobel Advisors found that 28% of respondents said they were ‘very satisfied’ with the quality of relationships with outsiders such as clients and customers.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.