It's past time for all major companies – certainly in the Fortune 500, but the advice carries on down into even medium-sized organizations – to carve out a C-level role focusing solely on security.
A neighbor down the street put in a new brick walk last summer. Each brick was identical, which made it easy to stack them alongside each other for a seamless path. If only palletizing were that simple. But as warehouse workers contend with boxes of all shapes and sizes, a one-size-fits-all pallet pattern just won’t cut it.
Mutual Materials, a Pacific Northwest manufacturer and hauler of stones, bricks and other masonry products used for landscaping and construction purposes, is monitoring the locations and conditions of its vehicles via an RFID-based solution provided by electronic fleet-management technology company Zonar.
For all the enthusiasm surrounding the government's move to the cloud - and there's no shortage - one prominent federal CIO is emphatic that cloud computing, for all its virtues, is no panacea for the government's technology challenges.
Despite the vital role that technology plays in helping companies manage the complexity and volatility in global operations, only 48 percent of the more than 1,000 global companies surveyed for an Accenture study use technology extensively in their emerging market supply chains.
The exact moment when computers got better than people at human tasks arrived in 2011, according to data scientist Jeremy Howard, at an otherwise inconsequential machine-learning competition in Germany.
Big data is a big buzzword in retail and while the term can be ambiguous, 92 percent of executives say they're satisfied with the results of big data applications within their organizations.
As Home Depot scrambles to determine the scope and scale of a potentially massive breach of its customers' data, the retailer's troubles underscore the challenges facing retailers and card issuers attempting to gird themselves against cybercriminals.
Integrated business planning is a process that does exactly what its name implies-it brings together fragmented strands of strategic, financial and operational planning and performance management.
Bring-your-own-device has caught on, and for many it's a positive development. Security is a big issue for companies that follow the trend, though, and one way to ensure it is by having remote-wiping capability to invoke under certain sets of circumstances. The trouble is, many of the gadgets in use don't segregate business and personal data. That means when a phone or tablet is wiped, everything goes.