Best practices, technology, and new takes on critical business topics from ChainLink Research
If you are having trouble viewing this, click here to view in your browser
 |
Tuesday, April 27, 2010 |
 |
Application-Specific Mass-Market RFID Readers
In the past, the majority of fixed RFID readers were either your standard issue 4-port "one-size-fits-all" readers or, at the other end of the spectrum, customized for a very specific application such as toll collection or embedded in a machine, tool, or vehicle. We are starting to see RFID readers now that tread a middle path between those two extremes...
Tuesday, April 27, 2010
ChainLink Commentary
|  |
 |
Risk Management Technology for the Supply Chain - Mini Report
Cyber Security, Compliance, Privacy, Supply Chain, Import Security, Anti-Counterfeiting, Critical Infrastructures and scary threats like fraud and piracy, ID theft, fraudulent checks, skimmers, phishing, malware, key loggers, and botnets afflict us all: from government, to business, to consumers, our lives are fraught with risk. Risk Management Technology is a growing sector, but the solutions are fragmented. See our new Solutions Guide chart in this report:
Tuesday, April 27, 2010
Commentary by the ChainLink Research Team
|  |
|
|

|