Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Top RFID Software Comparisons
Find the best RFID software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
Are You Tuned into Radio Frequency Identification?
This article examines the organizational fit of radio frequency identification (RFID) and its technology’s basic mechanics. Its prohibitive costs often account for the decision to not implement RFID. Yet some factors influencing adoption may shed new light on why RFID is important.
: Are You Tuned into Radio Frequency Identification? Are You Tuned into Radio Frequency Identification? Dylan Persaud - November 28, 2007 Read Comments Originally published - June 15, 2007 Radio frequency identification (RFID) has been around for over 60 years, so why does it have such negative connotations? Many misconceptions and horror stories of organizations failed implementations have been plastered all over the press, which has contributed to the negative perceptions of this re-emerging technology.
Radio Frequency Identification Implementation: The First Steps
Phase one of the four phase approach to a successful radio frequency identification implementation consists of several essential steps, including the careful selection of business partners and the development of a test environment and corrective label placement procedures.
: Radio Frequency Identification Implementation: The First Steps Radio Frequency Identification Implementation: The First Steps Dylan Persaud - September 14, 2007 Read Comments As part of our ongoing series on radio frequency identification (RFID) implementation (please see Are You Tuned into Radio Frequency Identification? and A How-to Guide for a Radio Frequency Identification Site Survey ), the introductory phase of implementing an RFID system will be explained, including the selection of proper RFID
The Supply Chain of Sitcoms—Enhanced with Radio Frequency Identification
Imagine what sitcoms like Cheers, Laverne and Shirley, and Green Acres would look like if they were radio frequency identification (RFID) enhanced. Then picture the impact that RFID technology can have on the customer experience in your own enterprise.
: The Supply Chain of Sitcoms—Enhanced with Radio Frequency Identification The Supply Chain of Sitcoms—Enhanced with Radio Frequency Identification Laura Faught - February 23, 2006 Read Comments Introduction A few evenings ago I took a break from my latest research project to channel surf, and happened upon reruns of Cheers, Laverne and Shirley, and Green Acres. And, since my latest research project is centered around the impact that radio frequency identification (RFID) technology can have upon the
A How-to Guide for a Radio Frequency Identification Site Survey
As organizations prepare for a radio frequency identification (RFID) implementation, they often don't understand the preliminary work necessary to begin the project. The importance of a site survey can influence the success or failure of an RFID project.
: documentation is lacking (for risk mitigation). After the survey is complete, a written document should be produced by the surveying company for the organization s records and for use as a guide for hardware quantities. This responsibility should rest upon the chosen business partner. The document should contain the results from the test, the recommended hardware, and most importantly, equipment placement. Further, documentation will eliminate any issues for hardware placement if the vendor and the
Governance, Risk, and Compliance Management
Governance, Risk, and Compliance Management: Realizing the Value of Cross-Enterprise Solutions. Download Free Technology Study Reports Related To Governance, Risk, and Compliance Management. Governance, risk, and compliance (GRC) issues are hot topics today, thanks to high-profile stories about companies that failed to meet regulatory requirements. In each case, executives were held accountable, stock prices dropped, and brand image suffered. Find out about cross-enterprise GRC solutions that can make it easier to monitor compliance and risk effectively, and adjust to changing regulatory mandates.
: to monitor compliance and risk effectively, and adjust to changing regulatory mandates. Governance, Risk, and Compliance Management style= border-width:0px; /> comments powered by Disqus Related Topics: Accounting and Financial Management, Compliance Management/Sarbanes-Oxley Compliance, Risk Management, Risk Management, Regulatory and Compliance Source: SAP Learn more about SAP Readers who downloaded this white paper also read these popular documents! Best Practices for ERP
1/29/2009 10:43:00 AM
Intelligent Workload Management
Computing infrastructure today though versatile must be used wisely. Intelligent workload management (IWM) allows for efficient consumption of computing resources while ensuring business tasks are supported by all needed resources—and that this is all done securely. IWM tools support the building, management, monitoring, and securing of workloads. See how to run your cloud computing system with leading-edge technology.
: Cost Control, Risk Management, security, best practices, e-commerce, cloud computing, it risk management, risk management tools, security risk management, business risk management, risk management plan, risk management system, enterprise risk management, risk management definition, risk management software, risk management training, project risk management, credit risk management, what is risk management Source: Quocirca Ltd Learn more about
2/28/2011 11:18:00 AM
One Vendor s Dedicated Governance, Risk Management, and Compliance Unit
SAP's governance, risk management, and compliance roadmap is still in its beginning stages. Only time will prove the vendor's delivery of true, tangible products (and not vaporware), as well as the success of those products with current and prospective customers.
: One Vendor s Dedicated Governance, Risk Management, and Compliance Unit One Vendor s Dedicated Governance, Risk Management, and Compliance Unit P.J. Jakovljevic - May 4, 2007 Read Comments SAP , a leading enterprise resource planning (ERP) vendor, has recognized the need for enterprise systems that will help companies meet the increasing number of challenges inherent with corporate compliance and other risks. Recently, the vendor has launched its latest product suite, which places compliance at its core.
Dangerous Collaboration Practices in a Challenging Economy: 5 Roles IT Must Perform to Minimize Risk
For many companies, collaborating with outside partners involves sharing confidential information. Unfortunately, in order to work quickly and efficiently, project team members must sometimes share information without using a safe collaboration platform—putting companies at risk of security breaches. Learn how IT leaders can mitigate that risk by creating highly secure online work spaces for document sharing.
: Must Perform to Minimize Risk Dangerous Collaboration Practices in a Challenging Economy: 5 Roles IT Must Perform to Minimize Risk Source: Brainloop Document Type: White Paper Description: For many companies, collaborating with outside partners involves sharing confidential information. Unfortunately, in order to work quickly and efficiently, project team members must sometimes share information without using a safe collaboration platform—putting companies at risk of security breaches. Learn how IT
1/22/2010 4:18:00 PM
Web Application Security: How to Minimize Prevalent Risk of Attacks
Vulnerabilities in Web applications are now the largest vector of enterprise security attacks. Attacks compromising sensitive data are often the result of “cross-site scripting,” “SQL injection,” and “buffer overflow.” As many companies have discovered, these attacks will evade traditional network defenses unless you take new precautions with automated detection. Learn more in this primer to Web application security.
: How to Minimize Prevalent Risk of Attacks Web Application Security: How to Minimize Prevalent Risk of Attacks Source: Qualys Document Type: White Paper Description: Vulnerabilities in Web applications are now the largest vector of enterprise security attacks. Attacks compromising sensitive data are often the result of “cross-site scripting,” “SQL injection,” and “buffer overflow.” As many companies have discovered, these attacks will evade traditional network defenses unless you take new
4/23/2009 11:18:00 AM
Enhancing Governance, Risk, and Compliance through Effective Access Risk Management
Regardless of the size of the organization, embedding governance, risk, and compliance (GRC) management into all business process is imperative. But most organizations are reactive rather than proactive when it comes to undertaking a risk management initiative. Leading companies identify building a risk-aware culture as a key strategy. Read on to find out more about ways to enable effective access risk management.
: Compliance through Effective Access Risk Management Enhancing Governance, Risk, and Compliance through Effective Access Risk Management Source: SAP Document Type: White Paper Description: Regardless of the size of the organization, embedding governance, risk, and compliance (GRC) management into all business process is imperative. But most organizations are reactive rather than proactive when it comes to undertaking a risk management initiative. Leading companies identify building a risk-aware culture as
7/12/2012 11:58:00 AM
Provia Tackles RFID in a Twofold MannerPart Six: Market Impact
Recently delivered products like ViaView, a product that combines supply chain visibility, event management, and decision support, or FourSite WMS product, designed specifically for the 3PL industry, show that Provia is adept at leveraging its position to generate new forms of revenue.
: Provia Tackles RFID in a Twofold Manner Part Six: Market Impact Provia Tackles RFID in a Twofold Manner Part Six: Market Impact P.J. Jakovljevic - August 18, 2004 Read Comments Market Impact These days when radio frequency identification (RFID) is constantly on everyone s lips, and when every relevant enterprise application vendor is hedging its bets towards becoming RFID-ready or is even convincing the market that its RFID-compliant solution is exactly what the doctor (such as Wal-Mart , Target ,
White Paper Newsletters