X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 privacy and rfid


RFID Architecture Strategy
Early adopters of radio frequency identification (RFID) are beginning to look at enterprise scale solution design and integration are emerging as key focus

privacy and rfid  and costs Security and Privacy Policies and Commitments Financial viability of vendors Early Adopters are also recognizing that vendor selection needs to factor how business processes will be changed to leverage the technology. Activity Dependencies RFID Tag Selection Country of Origin, Object/Packaging Material, Programmability, EPC Considerations, Readability, Trading Partner and strategic considerations discussed above RFID Reader Selection Tag Type(s), Programmability, Readability, Network and other

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » privacy and rfid

Leveraging Technology to Maintain a Competitive Edge During Tough Economic Times--A Panel Discussion Analyzed Part Four: RFID Software Issues


Logically, radio frequency identification (RFID) deployment will be a far cry from a minor development project that can be completed in a few months or weeks. It will take months and years to assess how RFID will affect manufacturing and shipping operations and IT systems. It will take time to bring software up to a pilot stage, and after that, years of fine-tuning and IT system development will be needed to fully realize the gains in operational efficiency that the technology promises.

privacy and rfid   Read More

The Ghost in the Machine: Where Has Process Automation Left the Consumer?


Business process automation is all very well and good. After all, nothing succeeds like success, especially automated success. But what is the effect of automation on the consumer, that most unpredictable of systems?

privacy and rfid   Read More

Successful Cross-channel Retailing: 4 Concepts to Master


Savvy retailers know that it’s not enough to simply develop different retail channels. You need to make sure they all work together to deliver a seamless and satisfying customer experience. In his latest article, TEC analyst Philippe Reney covers the four major components of a successful cross-channel retailing strategy

privacy and rfid   Read More

RFID--A New Technology Set to Explode? Part Two: Early Adopters, Challenges, and User Recommendations


Radio frequency identification or RFID has a potential of becoming a new technology inflection point. It can be a missing piece in the long-lasting puzzle of squeezing excess inventory out of supply chains, but only when (and if) it reaches a critical mass of adoption and maturity over the next several years.

privacy and rfid   Read More

Radio Frequency Identification (RFID) RFI/RFP Template


Tags and Data Storage Devices, Readers, Interrogation Equipment, and Printers, Wireless Hubs and Edge Servers, Application Network, Application Technology

privacy and rfid   Read More

ezONE Smart Enterprise Suites and vertical application suites including RFID


The company’s flagship product is the ezONE Smart Enterprise Suites (ezONE SES). The ezONE product series consists of the core platform, based on J2EE (Java EE), and several vertical application suites. The core platform is scalable and provides the integration infrastructure for the ‘ez’ vertical application suites. The vertical suites consist of six main modules, which can work together, or separately. The ezCMS is a content management system that offers integrated search and categorization of data, as well as workflow capabilities, while ezBI is a group of business intelligence components that helps organizations to integrate, analyze, and disseminate critical business information. Tsinghua Tongfang’s radio frequency identification (RFID), which aid in storing and remotely retrieving data, is used in the ezDCS (Digital Campus Suite) and the ezEAM (Enterprise Asset Management) suites.  

privacy and rfid   Read More

Provia Tackles RFID in a Twofold Manner Part Five: 3PL Support and SCE Optimization


FourSite 4.4 is an upgrade of its fulfillment solution oriented towards third party logistics (3PL) providers. ViaOptimize, is an advanced step for companies who have already automated their facilities with Provia's WMS and are now looking at optimization as a key area of improvement, efficiency and cost reduction.

privacy and rfid   Read More

Active RFID Solutions for Asset Tracking and Inventory Management


Radio frequency identification (RFID) technology is fast replacing ScanCode technology in asset tracking and inventory management. Traditionally, asset tracking and inventory management in retail supply chain or manufacturing or service units depended heavily on manual scanning of bar code printed on each item at every strategic point. This white paper focuses on details of RFID technology and how you can automate asset tracking and inventory management of your enterprise using it. The white paper takes aid of a case study on how FicusSoft has developed and successfully implemented RFID integrated asset tracking and inventory management solutions for a reputed manufacturer of ultra-sensitive instruments used in the field of biotechnology and pharmaceutical research.

privacy and rfid   Read More

Top 10 Supply Chain Technology Trends


You can’t pick up a business or IT magazine today without seeing numerous articles about the growth of mobile and wireless technologies. Why are these technologies so trendy? The answer is simple: developments in mobile computing, wireless communication, bar codes, and other data collection and communications technologies help businesses extend visibility and control over the operations that really matter to them.

privacy and rfid   Read More

Why Not Take Candy From Strangers? More Privacy Problems May Make Ad Agencies Nutty


Online advertising network 24/7 has acquired AwardTrack, a newly launched provider of loyalty programs.

privacy and rfid   Read More