Total: 16 results found.

Search for:
Search Only:

1. Is Blockchain the Answer… to Everything Supply Chain?
(Integration)
If you’re involved in any way with technology you’re innundated with stories about how blockchain is changing the world and every bit data is now saved from corruption and theft because… blockchain. Is ...
Created on 07 May 2018
2. eCommerce Sales Grew 16% in 2017; Online Fraud Soared 30%
(News)
... potential losses, from identity theft to chargeback fraud.” Eaton-Cardone says there are several proactive steps eCommerce merchants can take to reduce fraud risk and improve profitability: Always ...
Created on 07 May 2018
3. Who Cares About Cyber Attacks on Supply Chains?
(Management)
... That includes surveillance, spying, and theft of intellectual property. Again many of these kinds of attacks are conducted by nation-state sponsored groups. But the rise of what has been supposedly benign ...
Created on 26 March 2018
4. Technologies are defining the supply chain
(Technology)
... to malware, data theft, ransomware, and more. Crypto Currency Unregulated currencies are finding their way into payment processes. Monetary alternatives like BitCoin are accepted as valid payments ...
Created on 29 January 2018
5. Big Pharma Wants Blockchain Tech for the Supply Chain
(News)
According to Drug Topics, blockchain technology could be revolutionize the pharmacy supply chain.It could be a way to prevent theft and tampering of pharmaceuticals.  Read the article on Drug ...
Created on 20 November 2017
6. Gaps in Drug Supply Chain Lead to Problems
(News)
As pharmaceutical companies expand and add additional supply chain partners, there is more chance for counterfeiting or theft of the product, reports News Day. Read the article on News Day  ...
Created on 16 October 2017
7. Trends In Healthcare And The Life Sciences And Their Impact On Ecommerce
(Management)
... technology can go a long way to lowering the costs of healthcare. It can become increasingly accessible and more immediate, although the risks of Internet hacking, cybercrime and identity theft remain ...
Created on 23 April 2015
8. Supply Chain Pros Say Data Loss Is Greatest Risk
(Technology)
... released earlier this month, indicate that when global supply chain pros work with third-party vendors, 63 percent fear the loss and theft of confidential data more than any other risk. In a press release, ...
Created on 16 March 2015
9. RFID Improves Efficiencies and Reduces Shrinkage for Retailers
(Technology)
... or asset. Interestingly, a newly released report indicates that retailers are considering RFID as a means to reduce shrinkage, as well. According to the Global Retail Theft Barometer, an annual study conduc ...
Created on 08 April 2013
10. Supply Chain Management And Logistics Risk
(Logistics)
... l disasters: hurricanes, tornadoes, floods, snow. Add to this list terrorist attacks, health epidemics, theft (physical or data), all the way to pirates capturing your ship. You will need to know anythi ...
Created on 20 March 2013
11. Reasons for Creating a Risk Framework
(News)
Risk is indeed all around us. That's why you need to develop a risk framework to help you identify and address threats. In an APICS article, Abe Eshkenazi discusses a few examples of recent supply ...
Created on 19 August 2012
12. It's Risky Out There
(Supply)
... for transactions and commerce (i.e. data theft, denial of service attacks, hackers, network reliability, cloud security), but they also implement safeguards into the applications used by the business to ...
Created on 18 August 2012
13. It's Risky Out There
(Logistics)
... for transactions and commerce (i.e. data theft, denial of service attacks, hackers, network reliability, cloud security), but they also implement safeguards into the applications used by the business to ...
Created on 18 August 2012
14. Required Attire for a Remote Workforce
(Retail)
...  physical theft of devices on planes, trains, waiting rooms and terminals -- the most likely places where they get stolen. Even if you pay connectivity bills for mobile staffers, send to them monthl ...
Created on 09 April 2012
15. Required Attire for a Remote Workforce
(Logistics)
...  physical theft of devices on planes, trains, waiting rooms and terminals -- the most likely places where they get stolen. Even if you pay connectivity bills for mobile staffers, send to them monthl ...
Created on 09 April 2012
16. Watch for the sharks, they may be after your AS/2
(Management)
... rithms are very strong, the theft of the certificates and keys is simple. There are products that are easily hacked by exploiting some simple designed-in functionality..." The IMer went on to describe two sce ...
Created on 05 July 2005