Supply Chain Management

Supply Chain Management | News, how-tos, features, reviews, and videos

logistics

Pitney Bowes bets on digital logistics and APIs to move beyond meters

Like many companies of a certain age, Pitney Bowes is banking on software to bolster lagging sales in a world where ecommerce is gaining steam.

machine learning

Machine learning: Cybersecurity dream-come-true or pipe dream?

Some security experts believe machine learning is a new Holy Grail for cybersecurity. Others dismiss it as over-hyped. The majority say it falls between those extremes, but is closer to the Holy Grail, and could revolutionize...

customer orders owens corning

Owens Corning can see customer orders at a glance

The manufacturer revamps IT to improve visibility into its supply chain and prevent late deliveries.

logistics trucking
Tip

CIO seeks to build the ‘killer app’ for logistics

From office space to agile development, Echo Global Logistics CIO Tim Kutz is driving process efficiencies and shaking things up in the IT department.

supply chain

Data analytics are ‘gold’ for pharmaceutical distributor

H.D. Smith is using cloud analytics software to get a better handle on its supply chain, allowing it to slice and dice inventory by profit margin and customer as well as track the shipping route of prescriptions and health and other...

false identity

Ubiquiti Networks victim of $39 million social engineering attack

Ubiquiti Networks Inc in its SEC filings reveal they were the victim of a social engineering attack resulting in the loss of $39 million

ICANN website security breached

On foot of a security breach to its website, ICANN has requested that users reset their passwords

rfid cards

Accuvant researchers to release open source RFID access tool

Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure systems.

government congress house of representatives cloud

Agencies need to pay more attention to supply chain security

Government agencies seeking the lowest bidders typically overlook cybersecurity when awarding contracts, and data breaches are the result.

outsource in house ts

Top five reasons companies are avoiding managed services

For many small and midsize companies, having someone else remotely monitor and manage their computer network is a no-brainer. But according to a new study from CompTIA, companies that don't use managed service providers are more...

scm ts

4 ways retailers can improve supply chain management

Supply chain experts share their tips for tracking and expediting inventory in today’s ‘I-want-it-now,’ multichannel retail world.

scotch
Tip

Why Johnnie Walker joined the Internet of Things

With the help of printed electronics and an Internet of Things smart product platform, beverage giant Diageo is equipping its Johnnie Walker Blue Label whisky with smart bottles.

zombie dude

Zombie apps haunt BYOD workplaces

According to a new study of around 3 million apps on employee smartphones, 5.2 percent of iOS apps and 3.9 percent of Android apps are actually dead, removed from their respective app stores and no longer supported.

google map location pin GPS geocache

Geofencing could add security layer for mobile devices

Geofencing technology -- tracking the location of a mobile device -- could offer an extra layer of security for enterprises trying to manage both company-owned and employee-owned devices. However, the technology can also raise worries...

Twenty-eight percent of security spending wasted on shelfware

The average organization spent $115 per user on security-related software last year, but $33 of it, or 28 percent, was underutilized or not used at all, according to a new report from Osterman Research

Why cybersecurity will suffer the same fate in 2015 as it did in 2014

CISOs continue to beg for financial table scraps and the scraps they do get are used to double down on existing technology. The same technology that is failing them now but with a new twist or new buzzwords describing really what they...

9 Must-See Enterprise Products From DEMO 2014

Countless fledgling companies showed off new products and services in Silicon Valley last week at DEMO Fall 2014, but these nine enterprise products stood out from the pack.

breach bucket

Nearly a billion records were compromised in 2014

In first nine months of 2014, after 1,922 confirmed incidents, criminals managed to compromise 904 million records. Many of the incidents reported in 2014 were record setting, including twenty of them that resulted in the compromise...

retail theft

Cost of retail crime skyrockets nearly 30 percent

Higher proportions of employee theft and shoplifting as a share of all retail losses, combined with higher spending on loss prevention, resulted in a 27 percent increase of the cost of retail crime in the United States, according to...

ss apple iphone evolution carousel 100412891 orig

Here are the limits of Apple's iOS 8 privacy features

The privacy improvements in the latest version of Apple's mobile operating system provide necessary, but limited, protection to customers, experts say.

Load More