outsource cio supply chainToday’s CIO has more on their mind than merely keeping their company’s data safe from hackers, which isn’t easy in light of the lightning speed technology is advancing. Matters such as BYOD, shadow IT, cloud migration and virtualization also tug for attention, but even that’s not everything a CIO has to master.

hacker2EDI is a secure environment. At least that’s the premise that most supply chain professionals work by. And the truth is that for the most part the EDI transaction chain is very secure. But that doesn’t mean there aren’t areas to monitor and steps to take to make certain your assumptions about security are correct… and that your transactions are not going to be compromised.

Take-our-SurveyWe need your opinion please. The survey below includes 5 questions and should take you about 3 minutes to complete. We are interested in understanding the most frequent causes of failure for EDI documents. 

 

Your answers are annonomous. 

 

Thanks for your help!

 

Please follow the link below to complete the survey.

 

survey-button

 

 

ancient historyYour first thought might be: “I know already or I wouldn’t be reading this publication.” Yes, we will give you the “schoolbook” definition. We will even tell you a brief history of EDI (Electronic Data Interchange), but our real purpose is to give you the modern era definition of EDI; and back it up with an expert opinion.Developed in the United States in the mid-1960s, the idea of what became known as EDI today originated with a group of railroad companies.

Do-It-YourselfThere's been a lot of action in the EDI VAN industry in recent years. If you know what I am talking about, you are concerned. If you don't know, consider yourself lucky. My client is in the former group and posed an interesting question to me.