The Benefits of Open Standards for Process Automation: A Conversation with Dr. Eugene Tung

The Open Group Open Process Automation™ Forum has attracted companies across a wide spectrum of industries, from technology to oil and gas, chemicals manufacturers to food and beverage, minerals and mining to pulp and paper. With many of these industries facing the same technology issues when it comes to digitalization, they have seen a need to come together to explore how open standards can facilitate and address the technical challenges they have in common.

We recently spoke with Dr. Eugene Tung, Director of IT for Merck, about why pharmaceutical companies such as his are interested in open process automation standards and how even open process manufacturing vendors can benefit from them

Making Standards Work for e-Government at The Open Group Ottawa conference, July 17-20, 2017

The Open Group Ottawa 2017 Highlights

The aim of this event was to unite practitioners and industry experts to discuss achievements, lessons learned and looming issues in e-Government. The theme, “Making Standards Work® e-Government” looked at the e-Society, e-Technology and e-Management viewpoints –federal, provincial, municipal and NGOs. Emphasis was on how techniques such as Enterprise Architecture and Business Design and standards such as TOGAF® and ArchiMate® are acting as a foundational core for enterprise transformation.
Topics include: issues surrounding business transformation, business analysis, information sharing, e-health, privacy and cyber-security. In addition, the strategic execution and the application of emerging technologies and management techniques to e-Government will be the subject of presentations by global experts.

The Open Trusted Technology Provider™ Standard (O-TTPS) – Approved as ISO/IEC 20243:2015 and the O-TTPS Certification Program

By The Open Group

The increase of cybersecurity threats, along with the global nature of Information and Communication Technology (ICT), results in a threat landscape ripe for the introduction of tainted (e.g., malware-enabled or malware-capable) and counterfeit components into ICT products. This poses significant risk to customers in the operation of their business enterprises and our critical infrastructures.

1 2 3