X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 rfid key


Electronic Product Code (EPC): A Key to RFID
The real benefits of radio frequency identification will be achieved, when the integration of the EPC data will be a substantial part for the control of supply

rfid key  (EPC): A Key to RFID Introduction In simple terms, the electronic product code (EPC) is a unique number that identifies a specific item in the supply chain by linking serial numbers to the product information stored in a central database, and which is stored on a radio frequency identification (RFID) tag. Once it is retrieved from the tag, it can be associated with dynamic data such as where an item originated or the date of its production. Users of EPC codes will have to purchase the numbers from

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » rfid key

RFID - Myth versus Reality


The hype around the adoption of RFID as the 'hot new technology' continues. The reality is that RFID, despite the fact that this is a relatively mature technology, is still far from mainstream.

rfid key  a mandate related to RFID adoption. What does this all mean? As the Bard would say, is this in fact, much ado about nothing ? The reality is that each technology that is embraced is another bridge on the digital highway that is linking the global enterprises and communities who share common interests in global trade. The key is to recognize which components make sense in a specific business context, versus following the parade. In other words, what is my destination and therefore what path should I Read More

RFID Architecture Strategy


Early adopters of radio frequency identification (RFID) are beginning to look at enterprise scale solution design and integration are emerging as key focus areas. Infosys has designed an optimal RFID architecture strategy based on lessons learnt from early adopters and Infosys experience in providing real time control and data acquisition solutions in the telecom and process control industries.

rfid key  Product Strategy Architecture | RFID Strategy Architecture Key | RFID Architecture Strategy Transformation | RFID Strategy Architecture Practice | RFID Strategy Architecture Success | RFID Measurement Architecture Strategy | RFID Architecture Design Strategy | RFID Brand Architecture Strategy | RFID Architecture Strategy Resources | RFID Architecture Federation Strategy | RFID Architecture Transition Strategy | RFID Computing Architecture Strategy | RFID Serviceoriented Architecture Strategy | RFID Read More

RFID ... For Customers?


Recently I spoke at the National Retail Federation in the center of retail: New York City! The big buzz this year, no surprise, was about RFID.

rfid key  bunch of misconceptions about RFID in retail that were front and center in our discussion—poor ROI, reluctant consumers, over investing, overly well-honed processes—instead of attacking the huge delta of lost sales and waste still in the retail supply chain. Replenishment—Making it Smart First, I want to take issue with the whole concept of POS, telling the whole story about replenishment. I have really come full circle on this issue, watching the actual behavior of customers. I used to think, Read More

RFID Case Study: HP and Wal-Mart


HP is making strides in complying with Wal-Mart's RFID mandates. This article describes the key lessons learned.

rfid key  in complying with Wal-Mart's RFID mandates is HP. We can all learn some lessons from the experience of these kinds of supplier programs. The Pilot In early May, 2004, Hewlett Packard began shipping EPC-tagged printers and scanners to Wal-Mart's Dallas/Fort Worth distribution center as one of eight suppliers in Wal-Mart's initial trials. HP expects to ship its entire range of consumer products sold through Wal-Mart many weeks before the January 2005 deadline. At HP's Memphis manufacturing plant, tags are Read More

Accurate Costing Is Key to Profitability


Sustaining profitability in a landscape of volatile prices and exchange rates is difficult for even the best-run companies. One key challenge is to understand the real economic costs in your business and of your products so you can make accurate decisions about sourcing, substitutions, pricing, and logistics. Find out how to use the right costing methodology and have the right information—and the right analytical tools.

rfid key  Costing Is Key to Profitability Sustaining profitability in a landscape of volatile prices and exchange rates is difficult for even the best-run companies. One key challenge is to understand the real economic costs in your business and of your products so you can make accurate decisions about sourcing, substitutions, pricing, and logistics. Find out how to use the right costing methodology and have the right information—and the right analytical tools. Read More

The 7 Key Factors in Choosing a Mobile Device Management Solution


Managing an increasingly mobile workforce has become one of the most challenging and important responsibilities for IT departments. Users want freedom of choice when it comes to the smartphones and tablets they use, yet added freedom can bring added risks in security. This paper examines criteria for mobile device management (MDM) solutions, including support for multiple platforms and a high degree of security and management.

rfid key  7 Key Factors in Choosing a Mobile Device Management Solution Managing an increasingly mobile workforce has become one of the most challenging and important responsibilities for IT departments. Users want freedom of choice when it comes to the smartphones and tablets they use, yet added freedom can bring added risks in security. This paper examines criteria for mobile device management (MDM) solutions, including support for multiple platforms and a high degree of security and management. Read More

Finding the Key to Small Manufacturer’s Profits - Part 1


This post starts with a trivia question: Please name the mid-market enterprise resource planning (ERP) vendor that has existed the longest in the market with an ERP product that has never been merged with another product? In addition, the vendor and its product offerings have never been covered by TEC and myself. As a hint, the company was founded in 1979 and has always focused on discrete make-to

rfid key  the Key to Small Manufacturer’s Profits - Part 1 This post starts with a trivia question: Please name the mid-market  enterprise resource planning (ERP)  vendor that has existed the longest in the market with an ERP product that has never been merged with another product? In addition, the vendor and its product offerings have never been covered by TEC and myself. As a hint, the company was founded in 1979 and has always focused on discrete make-to-order (MTO) and engineer-to-order (ETO) Read More

RFID Case Study: Gillette and Provia Part Two: Challenges and Lessons Learned


Compliance with the market RFID mandate has unfortunately preceded the achievements of applied physics and computer science. One of the main obstacles is the lack of integration, since there is a dearth of software tools from enterprise application integration vendors to get data from RFID tags and readers into existing business systems, meaning that companies are often forced to do expensive custom integration work.

rfid key  the results of its RFID endeavors, as it has already put much effort in terms of the proof of concept in the field. Provia and other vendors are responding to the demand for an RFID-compliant solution by Wal-Mart , Target , Albertsons , the US Department of Defense [DoD] , and so on. In September 2003, Provia was likely the first SCE vendor offering full RFID support for a warehouse management system (WMS) in a standard product, which was already compliant with the most recent EPC specifications at the Read More

Workload Automation: The Key to Managing Windows Server Sprawl


Many companies use data centers running processes across multiple Windows servers using built-in schedulers instead of automating nightly batch streams on a mainframe. Simple schedulers work well on individual servers with only a handful of tasks, but scheduling becomes more difficult once you include dependencies, such as incoming files, the behavior of other applications, or the completion of business processes on other servers. Workload automation using a job scheduling system can save money and reduce complexity in the long term—read this white paper to learn more about solutions to "server sprawl".

rfid key  Automation: The Key to Managing Windows Server Sprawl Many companies use data centers running processes across multiple Windows servers using built-in schedulers instead of automating nightly batch streams on a mainframe. Simple schedulers work well on individual servers with only a handful of tasks, but scheduling becomes more difficult once you include dependencies, such as incoming files, the behavior of other applications, or the completion of business processes on other servers. Workload Read More

Looking for a Great IT VAR or Consultant? Culture Is the Key.


Have you ever been burned by a service provider who promised great service but didn't deliver? You’re not alone. Especially in the IT world, where virtually every company has a story about a consulting engagement gone wrong. So what makes an IT service provider great? Are there specific things that the best service providers do to delight their clients? Are there things that you, as a client

rfid key   Read More

3 Key VoIP Phone System Features and How to Use Them Effectively


Telephony is changing as internet protocol (IP)-based phone systems take hold. An IP phone system can deliver calls over the network as clearly and reliably as the public switched telephone network (PSTN), and more and more companies are even choosing a hosted or cloud-based voice over IP (VOIP) solution over an installed system. Discover three key VoIP features that can help you take advantage of IP telephony.

rfid key  Key VoIP Phone System Features and How to Use Them Effectively Telephony is changing as internet protocol (IP)-based phone systems take hold. An IP phone system can deliver calls over the network as clearly and reliably as the public switched telephone network (PSTN), and more and more companies are even choosing a hosted or cloud-based voice over IP (VOIP) solution over an installed system. Discover three key VoIP features that can help you take advantage of IP telephony. Read More

9 Key E-mail Strategies for 2008


Many marketers are continuing to improve subscriber engagement levels in their e-mail campaigns. But sending more e-mail doesn’t necessarily drive more revenue in the long run. Sending more relevant e-mail does. Learn about nine key strategies for e-mail marketing success, including best practices for reactivation techniques, automatic message-based e-mail, and the all-important preference center for your subscribers.

rfid key  Key E-mail Strategies for 2008 Many marketers are continuing to improve subscriber engagement levels in their e-mail campaigns. But sending more e-mail doesn’t necessarily drive more revenue in the long run. Sending more relevant e-mail does. Learn about nine key strategies for e-mail marketing success, including best practices for reactivation techniques, automatic message-based e-mail, and the all-important preference center for your subscribers. Read More

How to Address the Two Key Challenges with Virtualization


The amount of data and IT assets stored outside corporate data centers has risen significantly, and IT managers are now looking to consolidate their IT infrastructure. This paper examines the trends toward server consolidation and virtualization, and how wide area network (WAN) optimization can help IT organizations address the challenges of application performance and information availability within these environments.

rfid key  to Address the Two Key Challenges with Virtualization The amount of data and IT assets stored outside corporate data centers has risen significantly, and IT managers are now looking to consolidate their IT infrastructure. This paper examines the trends toward server consolidation and virtualization, and how wide area network (WAN) optimization can help IT organizations address the challenges of application performance and information availability within these environments. Read More

The Three Rs of RFID: Rewards, Risk, and ROI


Prominent organizations and retailers, such as Walmart and the US Department of Defense are taking advantage of radio frequency identification, which promises real time tracking of products from the manufacturing floor to the checkout terminal. Despite the typical risks associated with adopting any early-stage technology, the competitive advantage and bottom-line business benefits of RFID are significant to both retailers and suppliers. It can significantly decrease warehouse, distribution, and inventory costs; increase margins; and enhance customer service.

rfid key  (UPC) bar coding, which RFID promises to replace, RFID proactively transmits information, eliminating the manual point-and-read operations needed with bar coding. This enhanced visibility could significantly decrease warehouse, distribution, and inventory costs; increase margins; and enhance customer service. Several of the most prominent suppliers and retailers are already taking advantage of this new technology; Wal-Mart and the US Department of Defense (DOD) are the most visible. Wal-Mart is demanding Read More