Item |
The publication of the Industrial Internet Security Framework by the IIC is a vital early step towards creating security in the Industrial IoT. Strong security becomes increasingly crucial as more and... (more information)
by Bill McBeath
|
|
Of all the RFID solutions in the marketplace today, Active RFID comprises one of the larger RFID market sectors of interest to major companies. Active RFID solutions are used in government, business a... (more information)
by Ann Grackin
|
|
Since their acquisition by Stanley Black & Decker, RTLS provider AeroScout appears to be thriving and taking advantage of many opportunities to integrate with STANLEY's diverse business units and prod... (more information)
by Bill McBeath
|
|
The Depository Trust and Clearing Corporation (DTCC) facilitates post-trade processing for over 98% of all credit derivatives worldwide (over $11 trillion). Last week, they announced (together with IB... (more information)
by Bill McBeath
|
|
Here we explore three topics we believe will be key in 2018: Blockchain (and its use cases for supply chain), trends in Identity Management, and the increasing importance of Corporate Social Responsib... (more information)
by Bill McBeath
|
|
Time-critical decisions in transportation, risk management, security, disaster response, manufacturing, and other operational domains require continuous real-time situational awareness and intelligenc... (more information)
by Bill McBeath
|
|
Counterfeiting increases in a down economy, since it has so many audiences in the general population. However, the loss to the economy as well as the public welfare, due to the use of unsafe counterfe... (more information)
by By Ann Grackin
|
|
Standards groups are known for glacial speed, but Dash7 moves with faster frequency.
... (more information)
by By Ann Grackin
|
|
|
As enterprises focus on perceived "core functions," more activities are outsourced to third party providers of goods and services. This extended supply chain of manufacturers of products-- from raw ma... (more information)
by Carla Frances Reed
|
|
GS1, HP and Microsoft enter product recall space - but GS1 enters as a nonprofit. What is the impact to industry?... (more information)
by By Ann Grackin
|
|
Hacking reaches into every aspect of consumer data&.... (more information)
by Ann Grackin
|
|
This paper, authored by Hau Lee and Seungjin Whang, addresses the relationship of Total Quality Management principles and the positive impact these principles have, not only of supply chain costs, but... (more information)
by Hau Lee, Seungjin Whang
|
|
The theft of pharmaceuticals has gone down dramatically in the past few years. Learn how they made such strides.... (more information)
by Bill McBeath
|
|
For years, pundits have predicted that the market for Location-Based Services is about to take off. So far that has been mostly wishful thinking. But there are many signs that now the time really is r... (more information)
by By Bill McBeath
|
|
Item level intelligence requirements spur the growth of RFID across sectors such as industrial, manufacturing, retail, transportation, security, healthcare and consumer applications...
... (more information)
by Ann Grackin
|
|
New types of challenges confront technology users. These challenges call for new and effective technologies to identify, authenticate, and protect people, assets and information. ... (more information)
by Ann Grackin
|
|
Estimates on the effects of counterfeit trade exceed two hundred billion dollars (US), and inspections across the world cost billions. Yet only a very few shipments are actually inspected. This issue ... (more information)
by Ann Grackin
|
|
Recent articles on Walmart's item-level tagging announcement dedicated a lot of print to privacy concerns. Is that the central story?... (more information)
by By Bill McBeath
|
|
This report contains research into current and planned use of RFID in Maritime. In discussion with shippers, carriers, port operators and technology providers, the report covers these areas: ... (more information)
by Ann Grackin
|
|
Authorities across the globe recognize the value of sharing patient and remedy data across a network of expert medical practitioners. The concept of "tele-medicine" has been positively received in sev... (more information)
by Carla Frances Reed
|
|
Cyber Security, Compliance, Privacy, Supply Chain, Import Security, Anti-Counterfeiting, Critical Infrastructures and scary threats like fraud and piracy, ID theft, fraudulent checks, skimmers, phishi... (more information)
by By Grackin, West, and the ChainLink Team
|
|
The MIT RFID and Sensor SIG had something for every generation of futurists, from "social tribing" to manufacturing locating systems.... (more information)
by By Tom Coyle
|
|
|
Quite a few companies are focused on mining public social media data for consumer sentiment indicators. However, there are many other insights and information of value that can be gleaned from Tweets,... (more information)
by Bill McBeath
|
|
The recent hacking into Dropbox emphasizes the need for corporate-weight MFT solutions.... (more information)
by Ann Grackin
|
|
The supply chain business community now includes Risk Management as a business priority and cites it as a key area in need of improvement. Are solution providers ready?... (more information)
by Ann Grackin
|
|
Retailers that have rolled out RFID have traditionally used handheld readers. However, some are starting to use exit-monitoring or even whole-store illumination approaches. Smart shelves have yet to t... (more information)
by Bill McBeath
|
|
We are moving from the era of silos to integration of functions and systems within the retail store. ... (more information)
by By Bill McBeath
|
|
With continued Supply Chain outsourcing to low cost producers, piracy and counterfeiting loom large. So I went to meet with Paul Fox, who is the Chairman of the Coalition Against Counterfeiting and Pi... (more information)
by Ann Grackin
|
|
With the current state of IoT security, we might call it the Internet-of-Vulnerable-Things. It's all the more alarming because of the types of physical machines/systems that are increasingly ne... (more information)
by Bill McBeath
|
|
Control over physical devices is what makes IoT different, and more dangerous, than traditional IT software. Here we look at device-level security requirements for makers of IoT-enabled products and s... (more information)
by Bill McBeath
|
|
IoT platforms, outside of the devices themselves, comprise the bulk of the intellectual property, infrastructure, and complexity in IoT. We examine requirements that are needed to ensure security in t... (more information)
by Bill McBeath
|
|
Stealing trade secrets, patent infringements, piracy, counterfeiting and product tampering damage companies, make people ill, and deflate honest competition. And if financial and trade hacks are not e... (more information)
by Ann Grackin
|
|
Tyco opens its Retail Performance Briefing Center in Boca Raton. ... (more information)
by Ann Grackin
|
|
After July 1, 2010, the CBP (Customs and Border Patrol) will start issuing significant financial penalties and increasing holds and inspections on shipments not complying with ISF (10+2). This article... (more information)
by By Matt Gersper, contributing author
|
|