X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 rfid softw are


RFID--A New Technology Set to Explode? Part One: RFID Technology
For retailers and the other vertical industries, radio frequency identification (RFID) tags present enormous opportunities to improve supply chain operations

rfid softw are  to Explode? Part One: RFID Technology RFID Technology Supply chain technology has, for some time, been based on the traditional bar-code technology familiar to ordinary shoppers and consumers, but recently the software capability has been expanded to also use radio frequency identification (RFID) technology. While radio ID tag-enabled software is still just a miniscule part of total supply chain management (SCM) providers' revenues, more and more user companies and software vendors are adopting this

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » rfid softw are

RFID Case Study: HP and Wal-Mart


HP is making strides in complying with Wal-Mart's RFID mandates. This article describes the key lessons learned.

rfid softw are  in complying with Wal-Mart's RFID mandates is HP. We can all learn some lessons from the experience of these kinds of supplier programs. The Pilot In early May, 2004, Hewlett Packard began shipping EPC-tagged printers and scanners to Wal-Mart's Dallas/Fort Worth distribution center as one of eight suppliers in Wal-Mart's initial trials. HP expects to ship its entire range of consumer products sold through Wal-Mart many weeks before the January 2005 deadline. At HP's Memphis manufacturing plant, tags are Read More

RFID Architecture Strategy


Early adopters of radio frequency identification (RFID) are beginning to look at enterprise scale solution design and integration are emerging as key focus areas. Infosys has designed an optimal RFID architecture strategy based on lessons learnt from early adopters and Infosys experience in providing real time control and data acquisition solutions in the telecom and process control industries.

rfid softw are  as key areas in RFID deployments. To realize the potential of RFID, enterprises must have an RFID Architecture strategy that integrates data from the hardware layer with existing systems. Source : Infosys Technologies Resources Related to RFID Architecture Strategy : Radio-Frequency Identification (RFID) (Wikipedia) RFID Architecture Strategy Architecture Strategy is also known as : Application Architecture Strategy , Architecture Design Strategies , Architecture Marketing Strategies , Brand Read More

RFID Workbench: Understanding the Basics


Radio frequency identification (RFID) helps actualize the perfect integration of logistical and commercial chains and its use is rising in the US and Europe among large companies; government departments; and industries. Setting up RFID requires a validation test on a defined perimeter that involves the processes that have the most direct impact on your activity to see how RFID will affect your environment.

rfid softw are  of information generated by RFID tags. Source : SEEBURGER Resources Related to RFID Workbench: Understanding the Basics : Radio-Frequency Identification (RFID) (Wikipedia) RFID Workbench: Understanding the Basics RFID Workbench is also known as : Active RFID System , White Paper RFID , RFID Systems Service , RFID Workbench Analysis , RFID Workbench Simulation , RFID Workbench Middleware , Seeburger RFID Workbench , Advice RFID Implementation , Subset RFID Workbench , RFID Workbench White Papers , Vendor Read More

RFID--A New Technology Set to Explode? Part Two: Early Adopters, Challenges, and User Recommendations


Radio frequency identification or RFID has a potential of becoming a new technology inflection point. It can be a missing piece in the long-lasting puzzle of squeezing excess inventory out of supply chains, but only when (and if) it reaches a critical mass of adoption and maturity over the next several years.

rfid softw are  Group decided to make RFID tags a key part of their logistics. To that end, Wal-Mart has recently instructed its top one hundred suppliers that it expects RFID transmitters on all pallets and cases starting January 2005, although there indications that the deadline will be delayed for a few months at least. Namely, as the world's largest retailer, with over 5,000 outlets worldwide, Wal-Mart currently uses traditional bar-coding and UPCs ( unique product codes ) to identify items and cases and pallets of Read More

Active Execution Management--Delivering on the RFID Promise


Active Execution Management captures radio frequency identification (RFID) and electronic product code (EPC) data and integrates it into the supply chain business process. AXM associates individual EPC events (the observation of an EPC tag at an RFID reader) with the supply chain transaction that is currently being executed and then determines if that supply chain transaction is executing as planned. AXM is able to make this determination by comparing key performance indicators of the supply chain transaction with the characteristics of the EPC event. The paper describes multiple business cases, such as promotions management, deductions management, complex international shipments, and spoilage management, and shows how RFID data can be leveraged to improve supply chain performance.

rfid softw are  Execution Management--Delivering on the RFID Promise Active Execution Management captures radio frequency identification (RFID) and electronic product code (EPC) data and integrates it into the supply chain business process. AXM associates individual EPC events (the observation of an EPC tag at an RFID reader) with the supply chain transaction that is currently being executed and then determines if that supply chain transaction is executing as planned. AXM is able to make this determination by comparing Read More

Times are Tough - RIR Might Leave More Cash on Your Balance Sheet


For residents and tourists of Paris (France), using RER or Paris Metro is certainly a way to save on commuting costs (and parking frustrations) compared to owning and renting cars. This blog post is not about transportation, but rather about an inventory management method with a similar name. Namely, this blog post is about RIR or Rapid Inventory Rightsizing, which is an innovative new program

rfid softw are   Read More

Are Your Company Laptops Truly Secure?


The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and limitations of laptop security, including the technology for accurately tracking IT assets, recovering missing computers, and deleting data remotely.

rfid softw are  laptop security guidelines for it professionals,laptop security,it professionals,it,information technology,laptop security business,laptop security software,laptop security solution,laptop security system,absolute software computrace securely tracks assets,secure laptops,pc security,enhance endpoint security,laptop security alarms,laptop theft security,lojack for laptops,laptop security encryption,laptop security locks,laptop tracking software,laptop full disk encryption,data encryption laptops Read More

Cloud ERP Users Are Happier, Study Purports


Plex Systems Inc., provider of Plex Online, a cloud enterprise resource planning (ERP) offering for manufacturers, recently announced the results of the survey entitled “2012 ERP Study: Implementation and Usage Trends for SaaS/Cloud vs. Traditional Systems.” Conducted by the Manufacturing Performance Institute (MPI) on behalf of Plex Systems, the study assessed implementations of ERP systems

rfid softw are   Read More

Industry Consolidation: Are You Ready?


Growth is predicted for the nutraceutical industry, as well as consolidation. Will the nutraceutical manufacturer find ways of thriving in a competitive market? Five critical requirements increase your chances of survival. The first is to integrate your business processes and information, with a single, unified enterprise resource planning (ERP) solution database. Don’t miss the other four—find out how you can benefit.

rfid softw are   Read More

Three Mistakes Organizations Are Making That Kill CRM Collaboration


Many experts are talking and writing about how collaboration can improve the relationship between a company and its customers, but most of them assume that employees collaborate naturally and are willing to work together for the success of the company. This is not always the case.The main reason—human nature being what it is—is that employees are motivated first by their own

rfid softw are   Read More

Are Retailers Rational Players Stuck in an Irrational Game? Changing the High-stakes Game of Retail Technology


Continuous change in the retail industry is limiting retailers’ ability to plan, forecast, price, and replenish. Thus, many retailers are facing a dilemma: they need new retail technology to adapt their processes and respond more rapidly to changing markets, but they can’t afford the up-front expenditure or lengthy implementation. But advances in new software-as-a-service (SaaS) retail solutions can help. Learn how.

rfid softw are   Read More

Are Your Laptops Protected against Careless Employee Use?


The best encryption and security policies will not protect your laptops against careless employee use. Learn about the latest innovations in tracking IT assets off the local area network (LAN), remotely deleting sensitive data, and physically recovering stolen computers.

rfid softw are  end point security,network access control,network security products,it security,it security professionals,end point security control over data,end point security control over firewalls Read More

Process Manufacturers: Are You Running the Wrong Type of ERP Software? [SURVEY]


Take the survey now! Or read on to find out why we're talking about this.* In his article Process Manufacturing Software: A Primer, TEC author Joe Strub explains the difference between process and discrete manufacturing with an example: Once you make a can of soda, you cannot return it back to its basic components such as carbonated water, citric acid, potassium benzoate, aspartame

rfid softw are   Read More

Are You Doing Enough to Prevent Access Risk and Fraud?


A recent survey of enterprise resource planning (ERP) customers reveals that they are serious about protecting their critical applications from the risks associated with user access, and that managing access risks is very important to senior leadership in their organizations. In fact, the top driver for these programs is internal policies, whereas traditionally, access risk programs have been driven more by regulatory compliance. Read this white paper to learn more.

rfid softw are  access risk,ERP security,ERP user fraud,ERP fraud prevention,access risk management,automated access risk management Read More