X
Browse RFP templates
Visit the TEC store for RFP templates that can save you weeks and months of requirements gathering, and help ensure the success of your software selection project.
Browse Now


Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 privacy and rfid


RFID Architecture Strategy
Early adopters of radio frequency identification (RFID) are beginning to look at enterprise scale solution design and integration are emerging as key focus

privacy and rfid  and costs Security and Privacy Policies and Commitments Financial viability of vendors Early Adopters are also recognizing that vendor selection needs to factor how business processes will be changed to leverage the technology. Activity Dependencies RFID Tag Selection Country of Origin, Object/Packaging Material, Programmability, EPC Considerations, Readability, Trading Partner and strategic considerations discussed above RFID Reader Selection Tag Type(s), Programmability, Readability, Network and other I

Read More


Browse RFP templates

Visit the TEC store for RFP templates that can save you weeks and months of requirements gathering, and help ensure the succes of your software selection project.

Browse Now
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » privacy and rfid

Successful Cross-channel Retailing: 4 Concepts to Master


Savvy retailers know that it’s not enough to simply develop different retail channels. You need to make sure they all work together to deliver a seamless and satisfying customer experience. In his latest article, TEC analyst Philippe Reney covers the four major components of a successful cross-channel retailing strategy

privacy and rfid  noisy environment with no privacy to make an educated decision for a purchase. This was compounded by the fact that technical support wasn’t available on-site. Trust couldn’t be established. Moreover, such locations didn’t lend themselves to a key aspect of Dell’s offering: PC customization. Kiosks weren’t a new concept at the time; Dell should have known—through observation or case studies—that kiosks were being used successfully for items of much lower value and complexity. Successful Read More

RFID--A New Technology Set to Explode? Part Two: Early Adopters, Challenges, and User Recommendations


Radio frequency identification or RFID has a potential of becoming a new technology inflection point. It can be a missing piece in the long-lasting puzzle of squeezing excess inventory out of supply chains, but only when (and if) it reaches a critical mass of adoption and maturity over the next several years.

privacy and rfid  there is the well-debated privacy issue, which has been exploited by the press and a number of, rightfully or not, concerned consumer organizations. In theory, these issues have already penetrated our lives—whether it might be the data from loyalty or frequent flyer cards from stores or airlines, EZ highway toll passes, credit and debit cards, numerous, easily obtainable customer databases and lists, or cell phone cards and bills—since these technologies have already created a data collection Read More

RFID Case Study: HP and Wal-Mart


HP is making strides in complying with Wal-Mart's RFID mandates. This article describes the key lessons learned.

privacy and rfid  paranoia about loss of privacy and Big Brother conspiracy theories, in many cases leading to near hysteria when the story inevitably breaks. HP, with Wal-Mart, has taken the approach of making the identification of RFID tagged product prominent and clear, explaining RFID to the consumer. Time will tell whether this has any negative impact on sales, but it certainly beats the cloak and dagger approach, which has proven to be disastrous. Making RFID Work with Metals and Liquids Much has been made of the dif Read More

Leveraging Technology to Maintain a Competitive Edge During Tough Economic Times--A Panel Discussion Analyzed Part Four: RFID Software Issues


Logically, radio frequency identification (RFID) deployment will be a far cry from a minor development project that can be completed in a few months or weeks. It will take months and years to assess how RFID will affect manufacturing and shipping operations and IT systems. It will take time to bring software up to a pilot stage, and after that, years of fine-tuning and IT system development will be needed to fully realize the gains in operational efficiency that the technology promises.

privacy and rfid  there is the well-debated privacy issue, which has been exploited by the press and a number of, rightfully or not, concerned consumer organizations. In theory, these issues have already penetrated our lives—whether it be the data from loyalty and frequent flyer cards; EZ highway toll passes; credit and debit cards; cell phone cards and bills, and the numerous, and easily obtainable customer databases and lists. These technologies have already created a data collection infrastructure which could be Read More

Ponemon Institute


Ponemon Institute conducts independent research on privacy, data protection, and information security policy with the goal of enabling organizations in both the private and public sectors to have a clearer understanding of the trends in practices, perceptions, and potential threats that will affect the collection, management, and safeguarding of personal and confidential information about individuals and organizations. 

privacy and rfid  conducts independent research on privacy, data protection, and information security policy with the goal of enabling organizations in both the private and public sectors to have a clearer understanding of the trends in practices, perceptions, and potential threats that will affect the collection, management, and safeguarding of personal and confidential information about individuals and organizations. Read More

Protecting Customer Data: How Much is Your Customer’s Trust Worth? Part I: The Business Case for Privacy


Customers are a company’s true source of value creation, and maintaining their trust is imperative. When companies understand this, privacy protection will become an important business tool, rather than just a regulatory requirement (as many companies think of it). Obtaining, using, and especially protecting customer data has never been more important to the strength and positioning of a company’s success.

privacy and rfid  The Business Case for Privacy Customers are a company’s true source of value creation, and maintaining their trust is imperative. When companies understand this, privacy protection will become an important business tool, rather than just a regulatory requirement (as many companies think of it). Obtaining, using, and especially protecting customer data has never been more important to the strength and positioning of a company’s success. Read More

Why Not Take Candy From Strangers? More Privacy Problems May Make Ad Agencies Nutty


Online advertising network 24/7 has acquired AwardTrack, a newly launched provider of loyalty programs.

privacy and rfid  Candy From Strangers? More Privacy Problems May Make Ad Agencies Nutty Event Summary AwardTrack had only been offering its services - loyalty programs by which a website can offer incentive points to its users for any behavior from completing a survey to reading an e-mail - for six weeks when ad network 24/7 (NASDAQ: TFSM) made them an offer they couldn't resist. 24/7 now owns AwardTrack after an exchange of stock valued at $75 million. Among AwardTrack's attractions was that it allows surfers to switch Read More

As Hype Becomes Reality, a Radio Frequency Identification Ecosystem Emerges


Radio frequency identification (RFID) is the latest technology to gain major recognition as being a sizeable market for the future. The RFID ecosystem includes a diverse grouping of solution providers, but the opportunity for market leadership remains wide open.

privacy and rfid  Hype Becomes Reality, a Radio Frequency Identification Ecosystem Emerges Background Radio frequency identification (RFID) has been a major topic of discussion for a couple of years now, with Wal-Mart and the United States Department of Defense driving the attention already focused on this technology to a whole new level, thus triggering the corresponding RFID hype of the media, trade publications, and analyst community. Of particular interest has been the emergence of an RFID ecosystem of hardware, Read More

Radio Frequency Identification Implementation: The First Steps


Phase one of the four phase approach to a successful radio frequency identification implementation consists of several essential steps, including the careful selection of business partners and the development of a test environment and corrective label placement procedures.

privacy and rfid  Frequency Identification Implementation: The First Steps As part of our ongoing series on radio frequency identification (RFID) implementation (please see Are You Tuned into Radio Frequency Identification? and A How-to Guide for a Radio Frequency Identification Site Survey ), the introductory phase of implementing an RFID system will be explained, including the selection of proper RFID business partners and the setting up of the development environment and label placement. Phase One: Getting Started Read More

Data Masking: Strengthening Data Privacy and Security


Many business activities require access to real production data, but there are just as many that don’t. Data masking secures enterprise data by eliminating sensitive information, while maintaining data realism and integrity. Many Fortune 500 companies have already integrated data masking technology into their payment card industry (PCI) data security standard (DSS) and other compliance programs—and so can you.

privacy and rfid  Masking: Strengthening Data Privacy and Security Many business activities require access to real production data, but there are just as many that don’t. Data masking secures enterprise data by eliminating sensitive information, while maintaining data realism and integrity. Many Fortune 500 companies have already integrated data masking technology into their payment card industry (PCI) data security standard (DSS) and other compliance programs—and so can you. Read More

Privacy Challenges for Data Providers


Ensuring the quality, accuracy, and security of customer data has never been more important than it is today. The growing potential for privacy breaches and tighter compliance regulations have created unique challenges and responsibilities for many data providers. Here we discuss some of the key privacy issues surrounding data management, and how partnering with a provider of master data management (MDM) software can help.

privacy and rfid  The growing potential for privacy breaches and tighter compliance regulations have created unique challenges and responsibilities for many data providers. Here we discuss some of the key privacy issues surrounding data management, and how partnering with a provider of master data management (MDM) software can help. Read More

Automating Document-intensive Tasks with Workflow Software


In today’s business world, heightened privacy concerns and tightened regulations such as the US Sarbanes-Oxley (SOX) Act have forced organizations to improve their workflow and archival and records management processes. That's why many results-oriented organizations are now using workflow software—bringing together people, processes, and documents to improve efficiency, reduce costs, and meet compliance requirements.

privacy and rfid  today’s business world, heightened privacy concerns and tightened regulations such as the US Sarbanes-Oxley (SOX) Act have forced organizations to improve their workflow and archival and records management processes. That's why many results-oriented organizations are now using workflow software—bringing together people, processes, and documents to improve efficiency, reduce costs, and meet compliance requirements. Read More

As Hype Becomes Reality, a Radio Frequency Identification Ecosystem Emerges Part Two: The Middleware Dilemma, Partnerships, and What Next?


Given the pressures on radio frequency identification (RFID) middleware vendors, pure-play middleware suppliers will likely either diversify or get absorbed by larger companies. All RFID vendors, regardless of category, will tend to form partnerships to hasten time to market.

privacy and rfid  Hype Becomes Reality, a Radio Frequency Identification Ecosystem Emerges Part Two: The Middleware Dilemma, Partnerships, and What Next? The Middleware Dilemma As the radio frequency identification (RFID) ecosystem evolves, it is becoming clear that not all of the position players are going to survive a shake-out as technologies overlap. One category in the ecosystem, namely middleware, is especially vulnerable. Forrester Research defines middleware as the platforms for managing RFID data and routing it Read More

ezONE Smart Enterprise Suites and vertical application suites including RFID


The company’s flagship product is the ezONE Smart Enterprise Suites (ezONE SES). The ezONE product series consists of the core platform, based on J2EE (Java EE), and several vertical application suites. The core platform is scalable and provides the integration infrastructure for the ‘ez’ vertical application suites. The vertical suites consist of six main modules, which can work together, or separately. The ezCMS is a content management system that offers integrated search and categorization of data, as well as workflow capabilities, while ezBI is a group of business intelligence components that helps organizations to integrate, analyze, and disseminate critical business information. Tsinghua Tongfang’s radio frequency identification (RFID), which aid in storing and remotely retrieving data, is used in the ezDCS (Digital Campus Suite) and the ezEAM (Enterprise Asset Management) suites.  

privacy and rfid  Smart Enterprise Suites and vertical application suites including RFID The company’s flagship product is the ezONE Smart Enterprise Suites (ezONE SES). The ezONE product series consists of the core platform, based on J2EE (Java EE), and several vertical application suites. The core platform is scalable and provides the integration infrastructure for the ‘ez’ vertical application suites. The vertical suites consist of six main modules, which can work together, or separately. The ezCMS is a Read More