Best practices, technology, and new takes on critical business topics from ChainLink Research
If you are having trouble viewing this, click here to view in your browser
Welcome to the brief: Best practices, technology, new takes on critical business topics from ChainLink Research
Thursday August 27, 2015 -- Published twice monthly.
 
TM Mode Specialization
By Ann Grackin Thursday August 27, 2015
Riding the Rails with SAP.   [ Read: TM Mode Specialization
The IoT Security Imperative—Part 1: Physical-Cyber Risk Landscape
By Bill McBeath Thursday August 27, 2015
With the current state of IoT security, we might call it the Internet-of-Vulnerable-Things. It’s all the more alarming because of the types of physical machines/systems that are increasingly network-connected—traffic lights, airplanes, nuclear power plants, and other critical or potentially lethal systems. In part one, we discuss the nature of the challenge.
[ Read: The IoT Security Imperative—Part 1: Physical-Cyber Risk Landscape ]

RFID or IoT
By Ann Grackin Thursday August 27, 2015
First there were RFID hardware players. Then there were RFID middleware and track and trace platforms. Then there were IoT Platforms. The landscape is getting confused.
[ Read: RFID or IoT ]

Featured Insights above.  Headlines and Commentary follow below.

Technology
Infor Purchases GT Nexus
Does this signal a new direction for Infor?
Friday August 14, 2015   -   Read: Infor Purchases GT Nexus

Subscriber Tools
Sign Up Send Feedback Search Archives Privacy Policy
For additional information or questions please contact ChainLink Research • 617-762-4040
www.ChainLinkResearch.com • © 2012 ChainLink Research, Inc.