X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 rfid supply chain security


Tyco Retail Extends RFID & IoT Across the Store Floor and the Supply Chain
Tyco Retail Solutions, a global vendor of retail performance and security solutions, has nearly 50 years of experience in the realm of loss prevention. In this

rfid supply chain security  Retail Extends RFID & IoT Across the Store Floor and the Supply Chain Tyco Retail Solutions, a global vendor of retail performance and security solutions, has nearly 50 years of experience in the realm of loss prevention. In this vendor note TEC's P.J. Jakovljevic takes a look at Tyco's RFID expertise and the vendor's recent releases in areas outside of loss prevention, as well as the platform upon which Tyco's solutions are based, the TrueVUE Retail Platform.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » rfid supply chain security

Streamlining for Success: The Lean Supply Chain


When flexibility and speed are requisites for success, it’s the lean organization that leads the race. World-class manufacturing organizations know the value of focusing on the lean fundamentals: eliminating waste, simplifying processes, and continuously improving. By pursuing lean strategies—optimizing inventory and streamlining manufacturing processes—they can reduce inefficiencies and costs in their production processes, and improve customer responsiveness.

rfid supply chain security   Read More

Supply Chain Network Visibility and Analytics


The complexity of the global economy is a powerful motivation for companies to look for new ways to increase efficiency and productivity. That’s why companies must have the ability to transform information into meaningful, accurate insights. Most importantly, these insights must be systematically interconnected, to align business strategy with tactics through a seamless integration of analytical, transactional, and collaborative processes.

rfid supply chain security   Read More

Top 10 Supply Chain Technology Trends


You can’t pick up a business or IT magazine today without seeing numerous articles about the growth of mobile and wireless technologies. Why are these technologies so trendy? The answer is simple: developments in mobile computing, wireless communication, bar codes, and other data collection and communications technologies help businesses extend visibility and control over the operations that really matter to them.

rfid supply chain security   Read More

Supply Chain Collaboration: The Key to Success in a Global Economy


Outsourcing and global competition are forcing companies to transform their supply chains from linear processes into adaptive networks. Communities of customer-centric, demand-driven companies must share knowledge in order to adapt to changing markets, and respond to shorter life cycles. Discover how supply chain management (SCM) solutions can help your company create a truly adaptive and collaborative supply network.

rfid supply chain security   Read More

The Complete Guide to Google Apps Security: Building a Comprehensive Google Apps Security Plan


Innovative cloud technologies require new ways of approaching security when it comes to data; traditional systems may be outdated and no longer suffice. Google Apps for Work does provide security within their system, but every company should check for potential protection gaps that may remain. When used in conjunction with other apps, Google Apps for Work gives your business the best protection and fully secures your company’s data. Ensuring your business has the top security measures in place allows people to work with confidence within the cloud, whether workers are onsite or mobile.

This Google Apps for Work protection guide outlines a detailed five-point plan for even greater data security by way of
  • securing core data
  • enhancing email protection
  • extending data recovery
  • locking down document security
  • saving Gmail and Docs for compliance
In this white paper you’ll learn how to customize and configure a variety of Google Apps for Work settings to your company’s specific needs, in a clear step-by-step process. In addition to self-customization, read how your team can further secure core data by using additional solution applications concurrently with Google Apps for Work such as CipherCloud to protect e-mail, Backupify to retain and restore data, Cloudlock for document protection, and Vault to help with compliance issues.

rfid supply chain security   Read More

Logility Voyager Solutions for Supply Chain Management (SCM) Certification Report


Logility Voyager Solutions is now TEC Certified for online evaluation of supply chain management solutions in the Supply Chain Management (SCM) Evaluation Center. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

rfid supply chain security   Read More

The Effective Supply Chain


In The Effective Supply Chain, learn how your manufacturing operation can employ cross-organizational traceability, kanban loops, EDI, and supplier...

rfid supply chain security   Read More

EXE Latest Vendor to Join IBM Supply Chain Club


IBM and EXE Technologies today announced a global strategic relationship in which the two vendors will provide supply chain customers with integrated solutions that will help them transform into e-businesses. These solutions will be initially targeted to customers in the automotive, consumer packaged goods, electronics, retail and wholesale distribution industries. In addition, EXE and IBM announced that Pep Boys, a large automotive products retailer in the United States, and Metro Richelieu, one of Canada's largest grocers, are the first customers to take advantage of this relationship.

rfid supply chain security   Read More

Managing Risk in the Global Supply Chain


Global fashion supply chains face a “perfect storm” of risk factors, ranging from volatile materials prices and skyrocketing shipping costs, to uncertainty about the outcome of legislative trade initiatives such as the Trans-Pacific Partnership. Download this white paper to find out how NGC’s Web-based Supply Chain Management (SCM) and Global Sourcing system can help.

rfid supply chain security   Read More

Malware Security Report


Learn how to protect your company in the VeriSign Malware Security Report.

rfid supply chain security   Read More