Across the global hotel industry, a select group of operators are quietly rewriting the rules of performance and the operating model for hotels leveraging technology and AI. We spoke with leaders ...
With this launch, Khazna has transitioned from a vendor-driven operations model to an insourced capability across more than ...
Rio Tinto’s journey towards operating an IT platform model was detailed by Remona Murugan, the company’s head of technology platforms, during a fireside chat at the recent Gartner IT Infrastructure, ...
SS&C Technologies Holdings, Inc. (Nasdaq: SSNC) today announced a long-term agreement with Saltus, a leading U.K. wealth management firm, to streamline its technology and operating model as the ...
Genesco Inc. (NYSE: GCO) today announced a strategic transformation of its information technology operations, advancing to a new business model designed to improve speed and scalability, accelerate AI ...
Hospitals and health systems are being inundated with challenges, and one of the most significant is how to effectively and efficiently operate a clinical pharmacy. Some drug prices have doubled over ...
Utilities operate in high-stakes environments where operational resilience, infrastructure reliability, and workforce efficiency are essential for maintaining uninterrupted service. Cutting-edge field ...
Fortinet has released its 2025 State of Operational Technology and Cybersecurity Report, revealing significant progress in operational technology (OT) cybersecurity maturity among organizations. The ...
Rising cyberattacks on critical infrastructure and Industry 4.0 adoption push OT security toward AI-driven, Zero Trust, and anomaly-based solutions. AUSTIN, TX ...
Nashville-based footwear retailer Genesco Inc. has announced an overhaul of its information technology operations to advance a new business model and to accelerate AI-enabled innovation. According to ...
The threat landscape for utility providers continues to evolve. Utilities are facing new security requirements, and over the years, the tools used for security have risen to the challenge. With recent ...