Total: 37 results found.

Search for:
Search Only:

Page 1 of 2

1. Privacy Policy
... propriate physical, electronic, and managerial procedures to safeguard and help prevent unauthorized access, maintain data security, and correctly use the information we collect through all channels. W ...
Created on 18 July 2017
2. IoT Project Successes
We've all read the shocking predictions of growth for the Internet of Things (IoT) connected devices. What we don't hear enough of are the actual real world successes of IoT.On the Supply Chain Dive site, ...
Created on 28 January 2017
3. It's Integration Time!
...  from the project. Ongoing support can also be provided. VAN (value added network) costs are avoided since connections are made directly with partners, and technical challenges like data security and backup ...
Created on 16 November 2016
4. IoT Devices and the Recent Internet Slowdown
Numerous articles have been written about the potential security vulnerabilities of Internet of Things (IoT) devices. Hot off the press is an example of how these issues can be exploited.In a short article ...
Created on 25 October 2016
5. Results of Recent Gartner Supply Chain Study
The results of this year's Gartner & The Supply Chain Digest study are in, and as usual they're a fascinating read. Not only is the methodology interesting to see, the results in some categories, in particular ...
Created on 02 August 2016
6. IoT Security Failures
All the great things promised by the Internet of Things (IoT) come with a cost. Wired magazine has collected a few highly publicized examples of failures due to security issues.Security is a known risk ...
Created on 01 February 2016
7. Highs and Lows for Big Data in 2015
2015 was a big year for Big Data. Great progress was made in many areas, yet problems persist that can impede its potential.On the Forbes site, Bernard Marr takes a look on a month-to-month basis and identifies ...
Created on 19 January 2016
8. Procurement Trends for 2016
Predictions abound this time of year. Susan Avery takes a shot at what we might see in the procurement arena in 2016 in an article on the My Purchasing Center site.It ought to be an interesting year, with ...
Created on 22 December 2015
9. Visibility Research Results
Visibility is always top of mind for supply chain managers. However, recent research by the Business Continuity Institute and Zurich Insurance shows a troubling lack of it, with disruptions and confusion ...
Created on 15 December 2015
10. Make IoT Simple
...  done anything to get the ball rolling.Little things like data security are getting in the way. Sheethal Kumbhar on the M2M Now site discusses how trying to 'make it simple' may help. Read his article ...
Created on 03 November 2015
11. The New World of IoT Security
...  the rise, but also that the overall strategy and types of security will need to change.Patrick Nelson takes a spin through the new world of IoT data security requirements in an article on the Network Worl ...
Created on 15 October 2015
12. Concerns About IoT
The Internet of Things (Iot) is moving ahead quite rapidly, but there are a few things impeding progress. Without resolution, we won't see a fully realized IoT, according to Tom Spring on the CRN site.Security, ...
Created on 03 September 2015
13. Cybersecurity Topics
As M2M and the Internet of Things (IoT) continue to make inroads in the business world, thoughts about security are top-of-mind. Steve Banker writes on the Forbes site about a recent data security conference ...
Created on 07 April 2015
14. IoT Security Concerns
... at can make or break it.In an article in The Guardian, Richard Moulds provides a concise look at the challenges and opportunities related to data security and IoT. Read it HERE. ...
Created on 02 December 2014
15. Big Data Applications & Cloud a Heavenly Match?
... out data security and privacy protections in the cloud? Vendors can provide you with recommendations. You still run most of their operations on mainframes and other archaic systems far removed from c ...
Created on 19 November 2014
16. Supply Chain Security Recommendations
Supply chain risk mitigation requires a focus on security. It's not just data security, but extends to all other processes as well. Philip Odette, on the site, provides a list of 7 majo ...
Created on 10 September 2014
17. Big Data Security
... e addressed and managed.On the CSO site, George Hulme describes some of his concerns. Read his take on Big Data security HERE. ...
Created on 02 August 2014
18. Research on Procurement Priorities
The Hackett Group recently presented this year's key issues for procurement, and the results show that priorities are changing. What used to be strictly driven by cost-avoidance is now focusing on issues ...
Created on 21 May 2014
19. More on Procurement System Needs
... detail.Data security and intellectual property are big concerns. Read about it HERE.  ...
Created on 30 October 2013
20. BYOD & Mobile Device Challenges
Ben Cole, in a Search Complianace blog, writes about the twin challenges facing IT organizations: BYOD (bring your own devices) and mobile device security.There are many tradeoffs that need to be considered. ...
Created on 09 June 2013