X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 bar codes


How Bar Codes Can Optimize Data Recording and Information Analysis
Bar code technology allows users to analyze information to develop more accurate maintenance, personnel, and financial planning. In particular it can hasten the

bar codes  Bar Codes Can Optimize Data Recording and Information Analysis Introduction Traditionally, bar code technology is used in product distribution, courier services, and point of sales (POS). However, it can also be particularly useful in maintenance processes, though its application in some industries, such as aerospace is not as well known, especially in Mexico and Latin America. In order to better understand the application of bar code technology in maintenance processes, we must first understand that

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » bar codes

Error Proofing with RFID


Carefully tracking components and assemblies throughout the manufacturing process can prevent costly production and sequencing errors, but executing these procedures can be difficult. While bar codes provide accurate, efficient product identification, they are not viable in many common industrial processes. Specialized RFID tags, however, are optimized for use on or around metal, and are an effective and viable alternative.

bar codes   Read More

Top 10 Supply Chain Technology Trends


You can’t pick up a business or IT magazine today without seeing numerous articles about the growth of mobile and wireless technologies. Why are these technologies so trendy? The answer is simple: developments in mobile computing, wireless communication, bar codes, and other data collection and communications technologies help businesses extend visibility and control over the operations that really matter to them.

bar codes   Read More

RFID Workbench: Understanding the Basics


Radio frequency identification (RFID) helps actualize the perfect integration of logistical and commercial chains and its use is rising in the US and Europe among large companies; government departments; and industries. Setting up RFID requires a validation test on a defined perimeter that involves the processes that have the most direct impact on your activity to see how RFID will affect your environment.

bar codes   Read More

3M Wraps Up HighJump, While Retalix Shops OMI International Part One: Recent Events


It appears that instead of a direct intra-market consolidation, some smaller, but profitable, undercapitalized, and undervalued warehouse management and supply chain execution vendors have lately found a shelter under wealthy, more visible parent companies with complementary products.

bar codes   Read More

MEMS: The New Class of Bar Code Scanner


What is compact, lightweight, ergonomic, and power-friendly? A microelectromechanical systems (MEMS)-based scan engine—an innovative scanning technology that provides outstanding reliability and performance. When it comes to supply chain laser scanning, the advantages MEMS scanners have over traditional lasers are unparalleled. While MEMS is not a new technology, it does provide a new option for bar code scanning.

bar codes   Read More

Inductance Calculations with PerMag


This white paper illustrates how to use finite-element codes to calculate inductance. The calculations address transmission lines in the limit that the radiation wavelength is long compared to the transverse dimensions of the structure. The paper also shows how to set up solutions with two-dimensional PerMag code (for static magnetic fields) to get useful information for both the low and high-frequency limits.

bar codes   Read More

Voice Self-Service Leverages the Knowledge Base to Improve Customer Interactions


Deploying voice self-service (VSS) is undeniably attractive to enterprises because it improves the speed, consistency, and convenience of information sent to customers, and decreases costs. Knowledge bases play a key role in helping enterprises achieve greater return on investment because they link web- and speech-based self-services together. In particular the emergence of VoiceXML has truly shifted speech and IVR platform hosting options.

bar codes   Read More

Fixed Assets Management: What You Need to Know


When managing fixed assets, you must follow Generally Accepted Accounting Principles (GAAP) for financial statement reporting, and you must follow the IRS tax codes and regulations for income tax reporting. Each has its own set of rules and requirements. This e-book explains the differences between GAAP principles and IRS regulations for fixed assets management, and provides a list of best practices to follow.

bar codes   Read More

Navigator Business Solutions Navigator One for SAP Business One (v88) for Accounting Certification Report


Navigator One for SAP Business One (v88) is now TEC Certified for online comparison of accounting software in TEC's Evaluation Centers. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

bar codes   Read More

Raising the Bar on Mobile Workforce Security with Integrated Data Protection and Strong Authentication


The growing adoption of laptops and other portable devices is changing the foundation of traveling and telecommuting. Laptops have overtaken desktops as the computer of choice for business users. While endpoint protection has been traditionally associated with solutions like antivirus and firewalls, these technologies don’t adequately protect data against theft, loss or unauthorized access. Learn more. Download this white paper now.

bar codes   Read More