Find Research
Our World View
Industry Perspectives
Research Program
Parallax View Magazine
> stay tuned
View our collections of research around key subject areas:
>
>
>
>
ERP
>
>
>
>
>
>
>
SRM
>
>
WMS
 
 
Find Research
Please specify your search keywords.



Individual Research Found

We have located 35 items based on the search criteria you entered. (excluding archived research)

Item
A Framework for Securing the Industrial Internet of Things Article
The publication of the Industrial Internet Security Framework by the IIC is a vital early step towards creating security in the Industrial IoT. Strong security becomes increasingly crucial as more and... (more information)
by Bill McBeath

Active RFID
Market, Solutions and Major Players
Report
Of all the RFID solutions in the marketplace today, Active RFID comprises one of the larger RFID market sectors of interest to major companies. Active RFID solutions are used in government, business a... (more information)
by Ann Grackin


This research requires registration.
AeroScout Reborn Article
Since their acquisition by Stanley Black & Decker, RTLS provider AeroScout appears to be thriving and taking advantage of many opportunities to integrate with STANLEY's diverse business units and prod... (more information)
by Bill McBeath

Blockchain Gets Real Article
The Depository Trust and Clearing Corporation (DTCC) facilitates post-trade processing for over 98% of all credit derivatives worldwide (over $11 trillion). Last week, they announced (together with IB... (more information)
by Bill McBeath

Continuous Real-Time Situational Awareness for Time-Critical Operational Decision Making Article
Time-critical decisions in transportation, risk management, security, disaster response, manufacturing, and other operational domains require continuous real-time situational awareness and intelligenc... (more information)
by Bill McBeath

Counterfeit Threats Mount as Congress Moves Tentatively Towards Solutions Article
Counterfeiting increases in a down economy, since it has so many audiences in the general population. However, the loss to the economy as well as the public welfare, due to the use of unsafe counterfe... (more information)
by By Ann Grackin

DASH7 Alliance Progress Report Article
Standards groups are known for glacial speed, but Dash7 moves with faster frequency. ... (more information)
by By Ann Grackin

Fraudulent Returns Article
NRF survey reveals RFID opportunities.... (more information)
by By Ann Grackin

Future Forward Logistics
Creating an Extended Global Enterprise
Report
As enterprises focus on perceived "core functions," more activities are outsourced to third party providers of goods and services. This extended supply chain of manufacturers of products-- from raw ma... (more information)
by Carla Frances Reed


This research requires registration.
GS1 Enters Product Recall Article
GS1, HP and Microsoft enter product recall space - but GS1 enters as a nonprofit. What is the impact to industry?... (more information)
by By Ann Grackin

Hacking Reaches out Beyond Retail Article
Hacking reaches into every aspect of consumer data&.... (more information)
by Ann Grackin

Higher Supply Chain Security with Lower Cost: Lessons from Total Quality Management Whitepaper
This paper, authored by Hau Lee and Seungjin Whang, addresses the relationship of Total Quality Management principles and the positive impact these principles have, not only of supply chain costs, but... (more information)
by Hau Lee, Seungjin Whang


This research requires registration.
How the Pharmaceutical Industry Has Dramatically Reduced Thefts Article
The theft of pharmaceuticals has gone down dramatically in the past few years. Learn how they made such strides.... (more information)
by Bill McBeath

Location-Based Services Poised for Rapid Growth - Part 1 Article
For years, pundits have predicted that the market for Location-Based Services is about to take off. So far that has been mostly wishful thinking. But there are many signs that now the time really is r... (more information)
by By Bill McBeath

Looking Forward to 2015--RFID Continues Steady Growth Article
Item level intelligence requirements spur the growth of RFID across sectors such as industrial, manufacturing, retail, transportation, security, healthcare and consumer applications... ... (more information)
by Ann Grackin

Looking Forward: The Challenge of the Decade--Cyber Security Report
New types of challenges confront technology users. These challenges call for new and effective technologies to identify, authenticate, and protect people, assets and information. ... (more information)
by Ann Grackin

Reducing Risk in Global Life Sciences Supply Chains Whitepaper
Estimates on the effects of counterfeit trade exceed two hundred billion dollars (US), and inspections across the world cost billions. Yet only a very few shipments are actually inspected. This issue ... (more information)
by Ann Grackin


This research requires registration.
Retail Item-level RFID Tagging: Is the Privacy Threat Real? Article
Recent articles on Walmart's item-level tagging announcement dedicated a lot of print to privacy concerns. Is that the central story?... (more information)
by By Bill McBeath

RFID for Maritime Report

This report contains research into current and planned use of RFID in Maritime. In discussion with shippers, carriers, port operators and technology providers, the report covers these areas:
... (more information)
by Ann Grackin


This research requires registration.
RFID in Clinical Settings
New Dimensions in the Chain of Care
Report
Authorities across the globe recognize the value of sharing patient and remedy data across a network of expert medical practitioners. The concept of "tele-medicine" has been positively received in sev... (more information)
by Carla Frances Reed


This research requires purchase or the purchase of a subscription. $99.00
Risk Management Technology for the Supply Chain
Mini Report
Report
Cyber Security, Compliance, Privacy, Supply Chain, Import Security, Anti-Counterfeiting, Critical Infrastructures and scary threats like fraud and piracy, ID theft, fraudulent checks, skimmers, phishi... (more information)
by By Grackin, West, and the ChainLink Team


This research requires registration.
Sensor Networks and Real-time Locating Systems Article
The MIT RFID and Sensor SIG had something for every generation of futurists, from "social tribing" to manufacturing locating systems.... (more information)
by By Tom Coyle

Seven Principles for Stronger IoT Security Article
One of ChainLink's key predictions for 2017 is that IoT security breaches will reach an all-time ... (more information)
by Bill McBeath

Social Data Mining: Beyond Sentiment Article
Quite a few companies are focused on mining public social media data for consumer sentiment indicators. However, there are many other insights and information of value that can be gleaned from Tweets,... (more information)
by Bill McBeath

Sorry, Dropbox Article
The recent hacking into Dropbox emphasizes the need for corporate-weight MFT solutions.... (more information)
by Ann Grackin

Supply Chain Risk Now? Article
The supply chain business community now includes Risk Management as a business priority and cites it as a key area in need of improvement. Are solution providers ready?... (more information)
by Ann Grackin

The Evolution of Retail Store RFID Reader Strategies Article
Retailers that have rolled out RFID have traditionally used handheld readers. However, some are starting to use exit-monitoring or even whole-store illumination approaches. Smart shelves have yet to t... (more information)
by Bill McBeath

The Integrated Store Article
We are moving from the era of silos to integration of functions and systems within the retail store. ... (more information)
by By Bill McBeath

The Interview:
Getting Real with Paul Fox
Interview
With continued Supply Chain outsourcing to low cost producers, piracy and counterfeiting loom large. So I went to meet with Paul Fox, who is the Chairman of the Coalition Against Counterfeiting and Pi... (more information)
by Ann Grackin

The IoT Security Imperative--Part 1: Physical-Cyber Risk Landscape Article
With the current state of IoT security, we might call it the Internet-of-Vulnerable-Things. It's all the more alarming because of the types of physical machines/systems that are increasingly ne... (more information)
by Bill McBeath

The IoT Security Imperative--Part 2: Device Security Requirements Article
Control over physical devices is what makes IoT different, and more dangerous, than traditional IT software. Here we look at device-level security requirements for makers of IoT-enabled products and s... (more information)
by Bill McBeath

The IoT Security Imperative--Part 3: IoT Platform Security Requirements Article
IoT platforms, outside of the devices themselves, comprise the bulk of the intellectual property, infrastructure, and complexity in IoT. We examine requirements that are needed to ensure security in t... (more information)
by Bill McBeath

The Russians Are Coming? Article
Stealing trade secrets, patent infringements, piracy, counterfeiting and product tampering damage companies, make people ill, and deflate honest competition. And if financial and trade hacks are not e... (more information)
by Ann Grackin

Tyco Cuts the Ribbon Article
Tyco opens its Retail Performance Briefing Center in Boca Raton. ... (more information)
by Ann Grackin

U.S. Importers Face Fines and Delays in July
6 Tips to Help Companies Avoid Hardship
Article
After July 1, 2010, the CBP (Customs and Border Patrol) will start issuing significant financial penalties and increasing holds and inspections on shipments not complying with ISF (10+2). This article... (more information)
by By Matt Gersper, contributing author


MarketViz powered.