X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 rfid supply chain security


Supply Chain Cost-cutting Strategies
Process industries (chemicals, food and beverage, oil and gas, etc.) face rising manufacturing and logistics costs. And they’re finding that the old strategies

rfid supply chain security  | revenue cost | rfid and supply chain | strategy analysis | supplier chain | supply chain analysis | supply chain best practices | supply chain collaboration | supply chain costs | supply chain definition | supply chain design | supply chain distribution | supply chain efficiency | supply chain event management | supply chain execution | supply chain forecasting | supply chain innovation | supply chain inventory management | supply chain issues | supply chain logistics | supply chain logistics

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » rfid supply chain security

Supply Chain Network Visibility and Analytics


The complexity of the global economy is a powerful motivation for companies to look for new ways to increase efficiency and productivity. That’s why companies must have the ability to transform information into meaningful, accurate insights. Most importantly, these insights must be systematically interconnected, to align business strategy with tactics through a seamless integration of analytical, transactional, and collaborative processes.

rfid supply chain security   Read More

Taking Stock of TAKE Supply Chain Solutions - Part 2


Part 1 of this blog series introduced TAKE Supply Chain, a supply chain management (SCM) division of TAKE Solutions, Ltd. The TAKE Solutions parent company is a global technology solutions and service provider, with significant focus across two principal business areas – life sciences and SCM, with an almost even breakdown of revenues between these divisions (the company is

rfid supply chain security   Read More

Using Visibility to Manage Supply Chain Uncertainty


Technology has advanced supply chain visibility beyond mere track and trace functions. Visibility can be used to manage supply chain uncertainty, thereby preemptively troubleshooting problematic areas and reallocating resources to better meet the demands of an enterprise.

rfid supply chain security   Read More

Supply Chain Collaboration: The Key to Success in a Global Economy


Outsourcing and global competition are forcing companies to transform their supply chains from linear processes into adaptive networks. Communities of customer-centric, demand-driven companies must share knowledge in order to adapt to changing markets, and respond to shorter life cycles. Discover how supply chain management (SCM) solutions can help your company create a truly adaptive and collaborative supply network.

rfid supply chain security   Read More

Malware Security Report: Protecting Your Business, Customers, and Bottom Line


Find out how in Malware Security Report: Protecting Your Business, Customers, and Bottom Line.

rfid supply chain security   Read More

Every Organization Values Supply Chain Visibility but Sharing Information Can Be a Dangerous Proposition


To achieve a high level of supply chain transparency, companies must share their technology systems and data with many suppliers, distributors, transportation carriers, and channel partners that bring their products to market. This information may be seen by thousands worldwide. While there are doubtless benefits to be achieved, increased data sharing also carries an inherent level of risk. Know how to manage these risks.

rfid supply chain security   Read More

Security Breach: Now What?


When people's lives or financial transactions are at risk, proper Security Incident handling is of extreme importance.

rfid supply chain security   Read More

Spire Security


Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics.

rfid supply chain security   Read More

Malware Security Report


Learn how to protect your company in the VeriSign Malware Security Report.

rfid supply chain security   Read More

Achieving Supply Chain Visibility: There Is More to It than Meets the Eye


Industry research shows that one of the most important challenges facing supply chain professionals today is supply chain visibility. As companies scramble to adopt a way to gaining better visibility into their supply chain, they quickly realize that it’s not as simple as it seems. While achieving the right type of visibility is the first step, leveraging it to take quick and effective action is the key to its success.

rfid supply chain security   Read More