Supply Chain Executive Commentary
-
How To Choose Inventory Tracking Software
9/2/2015
Think about this. A customer calls in to make an order from a company. But a customer service rep fumbles around due to old, outdated software that’s slow and not meant for a growing business. They confirm the order would be ready and shipped by a certain date, only to later find out that an integral piece to the order is out of stock.
-
2015: The Year of Mobile
8/28/2015
As you have probably heard, mid April of this year, Google made big changes to their search engine algorithm, giving priority to websites that are optimized for mobile devices. Over the past few months, many companies (our clients included) have started taking a closer look at their site traffic and refreshing their websites to make them mobile friendly.
-
How To Balance The Tech Side And The Human Side Of Data Security
8/27/2015
When it comes to a business’ data security strategy, it’s still a huge challenge to protect workers from their own carelessness, poor decision-making, and (occasionally) even their maliciousness, while also staying out of a worker’s way and avoiding data security becoming a cumbersome burden that harms productivity and leaves them irritated.
-
4 Mobility Trends Transforming The Manufacturing Industry
8/26/2015
From business decision-making to process workflows, user interfaces, and proactive maintenance, new utilizations of mobile devices and apps are drastically changing the way manufacturing gets done.
-
Workplace BYOD: Delivering Services Is The Key
8/25/2015
I’m often asked what I’d recommend for the surge in bring your own device business technology, especially for mobile workforce productivity.
-
How Your IT Clients Can Leverage The Power Of The IoT For Access Control Systems
8/25/2015
The Internet of Things (IoT) and interconnectivity are having a sizeable impact on the physical security industry. Among those technologies where it is having the most effect are access control systems.
-
Shark Tales And Monolithic IT Vendors — But Good News For The IT Channel
8/25/2015
Back in my home country of Australia a recent series of shark attacks, far above average, are causing distress among swimmers and attracting a lot of media attention. The reason for the change in shark patterns however is because the fish schools are coming in closer to shore, apparently a result of warming sea currents, bringing the predator sharks with them.
-
5 Ways IT Service Providers Can Win With SMB Mobile Security
8/25/2015
When the mobility wave hit, data security got way more complicated for IT services providers and their SMB customers. Indeed, as mobile devices have infiltrated the SMB market in a big way, hackers have kept pace, waging full-blown attacks against the mobile landscape. Studies have shown that mobile malware assaults rose by 58 percent in 2012, making mobile data security one of the biggest threats for businesses today.
-
7 Reasons To Use 2D Bar Code Scanners
8/24/2015
By now you are probably familiar with 2D bar codes — such as the ubiquitous QR (quick response) code — if not by name, then by sight. Your clients are probably even using QR codes for their businesses (and if they aren’t, they should be.) While QR codes can be easily read by most cell phones and mobile devices, they are not the only 2D bar codes.
-
What SMBs Are Looking For From Their IT Solutions Providers
8/20/2015
I do coaching for one of our member’s sales executives. Their owner asked for some feedback on a blog we were reviewing. One of the sales executives replied with the following...