Case Studies.
Add Case Study
Our Case Study database tracks 1,844 case studies in the global IoT Ecosystem.
Filters allow you to explore case studies quickly and efficiently.
Filters
-
(450)
- (298)
- (42)
- (36)
- View all
-
(404)
- (112)
- (88)
- (74)
- View all
-
(366)
- (88)
- (79)
- (57)
- View all
-
(319)
- (89)
- (71)
- (36)
- View all
-
(275)
- (167)
- (47)
- (43)
- View all
- View all 15 Technologies
- (152)
- (108)
- (102)
- (87)
- (87)
- View all 40 Industries
- (451)
- (133)
- (120)
- (107)
- (107)
- View all 13 Functional Areas
- (93)
- (91)
- (68)
- (59)
- (51)
- View all 102 Use Cases
- (146)
- (112)
- (91)
- (58)
- (57)
- View all 9 Services
- (31)
- (27)
- (27)
- (26)
- (22)
- View all 536 Suppliers
Selected Filters
![]() |
Exploring New Frontiers in Real-time CRM
As the world at large has become more data-driven, marketing technology companies like Numberly increasingly rely on their ability to deliver the best insights from diverse, voluminous datasets to gain a competitive advantage. Generating the greatest return on marketing and advertising spend hinges on their ability to deliver precisely targeted, relevant, and timely messages.To maintain its foothold as a global leader, Numberly must include, process, and reconcile large and diverse datasets--such as static data from CRMs and streaming sensor data--and make that data accessible for data science and analytics in close to real-time.
|
|
![]() |
Powering Search with a Modern Data Platform
The company needed a semantic search engine to power the search function for all the applications on its platform. This would help it understand the user’s intent through the search context and improve the relevance of the results.To provide the foundation for this, the company needed to create a modern architecture framework to enable better searches, replicate data, and do experimental customization analytics. The platform would also be designed to handle the increased search traffic and data volumes expected in the future - which is an important step toward an intelligent enterprise.
|
|
![]() |
Bringing Value and Insight into Data
As Cox Automotive was formed, executives sought to implement an enterprise data strategy that would enable the company to deliver new customer experiences using rich automotive data from across its brands.When the 20 brands came together, it was not possible to bring all the data together in traditional environments such as Netezza or SQL Server.
|
|
![]() |
Accelerates Data Discovery, Testing, and Deployment
As datasets get bigger and data sources more varied, complexity increases and work processes become more time-consuming. Demyst clients need help identifying which external data attributes are predictive in marketing, risk, and portfolio management use cases across the vast ocean of external data.
|
|
![]() |
Global IT Security Service Provider Streamlines Operations
Hitachi Systems Security had individual tools managing each individual part of the business—accounting, projects, resources, business development, and more. None of the information was integrated.Hitachi Systems Security had highly disjointed solutions running every part of their business, due to their fast growth, and found they were not able to get accurate and timely integrated informationHitachi Systems Security identified project risk by instinct— they were unable to determine an exact budget, time, and resource allocation to make sure projects stayed on trackDecision-making was always two to three months in arrears due to their disparate systems environment. The company used spreadsheets and whiteboards as its primary source of integrated information
|
|
![]() |
Automates Protection of AWS Environment
Given the nature of DigiCert’s business, they are subjected to some form of attack (usually multiple attacks) on a daily basis. As their usage of AWS grew, and they embraced a true hybrid model, DigiCert realized they needed a new security solution.To eliminate management complexity, DigiCert wanted a solution from a single provider that delivered both WAF protection and DDoS mitigation across their entire hybrid environment.The solution would have to manage risk and monitor all traffic to rapidly identify threats, while only allowing valid traffic to gain access to their applications.After doing their research and testing, DigiCert determined that Imperva, an APN Security Competency Partner, met all their application security needs.
|
|
![]() |
Encouraged Autonomous Trade Engagements
The challenges are as follows:Challenges in conventional B2B trading practice Challenges in validating the trustworthiness of the counterparties Loss of actual and potential revenues Lengthy & expensive dispute resolution Missed sales opportunities & overhead costs for B2B vendors
|
|
![]() |
Security Team Sought Packet-level Visibility
As the digital infrastructure at EV Group became more complex, the team sought to improve its security stature by going beyond the log-based analysis that its existing security tools relied on. Their log-based SIEM technology gave a good overview of the digital estate, but a lack of packet-level insight at the network traffic layer meant that security incidents were not being recognized and controlled fast enough.The primary aim was to minimize the time between an event happening and it is acknowledged.
|
|
![]() |
Modernize, Streamline and Expedite the ER Experience
Currently, the healthcare industry is massively expensive: doctors and hospitals often eat costs incurred in the diagnosis and treatment stages in the ER which in turn increase costs for patients. Because 50-80% of people who visit emergency rooms are in non-critical condition, meaning physicians need to prioritize treatment accordingly. TeleMedCo recognized this market inefficiency and sought to alleviate this human problem through a technological solution. And considering the team developing the idea had no software, hardware, or artificial intelligence expertise, they required a technology partner that could fully grasp the use case, visualize the real-world processes at play, ideate a diagnosis solution and then bake it into a working prototype for sales and demonstration purposes.
|
|
![]() |
Application Re-architecture and DevOps on Cloud
The client was using a monolith architecture-based application and suffered from a lack of agility with complex interdependencies. They had been practicing extensive manual testing and strived to keep release on track. With their outdated framework, it became a huge task to adopt a new framework and to implement continuous deployment which required the entire application to be redeployed.
|
|
![]() |
Continuous Support and Monitoring of AKS
The client needed help with Azure Cloud Services and also requested continuous support and monitoring of their Azure Kubernetes Service. The client faced several issues including unavailability of application for 30 minutes during AKS update and also required a solution to fix their AKS vulnerability. They also wished to reduce their turnaround time by implementing Azure best practices.The other issues they faced included lack of support for on-premise systems, complex deployment in CPT and their PDMS application involving AI/ML, redundant storage accounts and application service plans, not enough pods available, and inefficient pod deployments.
|
|
![]() |
Redesign Data Pipeline and Slash Technical Debt
As the company transitioned from a scrappy disruptor to a major industry player, it began to experience issues with a monolithic application it had built when the company was started. They also experienced other issues later with synchronous REST API calls between services, after they had split the monolith into microservices.Namely, developers and data engineers couldn’t resolve issues fast enough or iterate on their search functionality with sufficient agility and were taking on a significant amount of technical debt as an increasing amount of data threatened to slow down the productivity and time to market for new features.The challenge is to create an event bus to improve data collection, event-driven communication between microservices, and data discovery for new use cases.
|
|
![]() |
Integrating vision into a manual assembly process
Quality defect analysis indicated that many of the defects associated with manual assembly could be identified using industrial vision. Each variant requires a dedicated manufacturing fixture which can be used on any of 80 assembly workbenches.Once the tubing is locked into the fixture, operators assemble the product from printed assembly documentation which include written instructions, diagrams and pictures.On completion, the assembly is visually inspected and compressed air is forced through the tube to ensure that there are no blockages.When testing is passed, the completed part is released and production data is sent to the company’s OEE system.While it was clear that adding a vision system could identify defects, the company’s Advanced Manufacturing Team realised that a much more complete solution was to fully integrate the vision system as part of the assembly process in order to:Utilise the manufacturing SQL databaseEnsure that only appropriately trained operators can work on a particular assemblyEnsure that the correct fixture is being used for a batchProvide complete traceability for individual assembliesProvide the flexibility to adapt the system for any new or modified variantsReduce the amount of paperwork involved in the assembly processThis improves the efficiency of the assembly process and reduces costs associated with waste and rejected products.
|
|
![]() |
Ansys + Vitesco Technologies
With the boom in connected vehicles and the increase in the range of models, customers’ needs and requirements have evolved significantly. One example is the desire to integrate lighting systems into door handles. For automakers, light plays an essential role in practicality and comfort, but it also contributes to the visual signature of the vehicle by differentiating brands and making them recognizable.
|
|