FTO Blog Header
What Is The Future Of RFID?
For more than 30 years, RFID has been an effective method of tracking assets, products, and components through the course of any given process. RFID tags work by emitting a low-powered radio frequency transmission when passed within range of a scanner. The electronic chips inside RFID tags are being produced in...  Continue Reading..
The Shifting Tides Of Mobile Device Management
Significant advancements in mobile devices, their applications and associated wireless networks now enable line-of-business applications to be broadened to a wider variety of mobile workers. By Mark Gentile, President and CEO of Odyssey Software  Continue Reading..
Guest Column: The Shifting Tides Of Mobile Device Management
Significant advancements in mobile devices, their applications and associated wireless networks now enable line-of-business applications to be broadened to a wider variety of mobile workers. By Mark Gentile, President and CEO of Odyssey Software  Continue Reading..
Take RFID Beyond Its Borders
Webster's Dictionary defines the word 'asset' as 'an item of value owned.' Along with ownership of assets comes the responsibility of managing these assets effectively, and efforts toward effective management lead to a need for optimization, meaning an act, process, or methodology of making assets fully perfect...  Continue Reading..
Consider An Integrator For Your RFID Deployment
Think of RFID in a restaurant scenario. Companies desiring a seat at the RFID table can order from a vast menu of hardware, middleware, and software components. When you have a meal at a restaurant, you don't place an order with the steak provider, another with the lobster farm, and another with a vineyard. You place...  Continue Reading..
Mobile Security: A Balancing Act
Mobile computing has had an enormous positive effect on worker productivity worldwide. However, the flexibility, time savings and productivity gains that mobile computing affords must be balanced against inherent security risks. Some of these risks are obvious, such as the potential loss of company data from a stolen device or the possibility of data being intercepted in transit. Other risks from viruses/malware, over-privileged users and...  Continue Reading..
Mobile Security: A Balancing Act
Mobile computing has had an enormous positive effect on worker productivity worldwide. However, the flexibility, time savings and productivity gains that mobile computing affords must be balanced against inherent security risks. Some of these risks are obvious, such as the potential loss of company data from a stolen device or the possibility of data being intercepted in transit. Other risks from viruses/malware, over-privileged users and...  Continue Reading..
Guest Column: Getting Down To Business: Is The iPhone Ready For Enterprise?
The introduction of the new Apple iPhone 3G has been an unqualified success, with more than one million units sold in the first three days following its July 11 launch. Everyone from students to seniors seems to love the ultra-slick design of Apple’s user interface and device form factor. By Benjamin Wesson, Vice President of Product Management, Dexterra  Continue Reading..
Getting Down To Business: Is The iPhone Ready For Enterprise?
The introduction of the new Apple iPhone 3G has been an unqualified success, with more than one million units sold in the first three days following its July 11 launch. Everyone from students to seniors seems to love the ultra-slick design of Apple’s user interface and device form factor. By Benjamin Wesson, Vice President of Product Management, Dexterra  Continue Reading..
Scheduling & Routing's Customer Loyalty Advantages
Scheduling & Routing's Customer Loyalty Advantages  Continue Reading..

ARCHIVES

TWEETS FROM @FTONLINE