Supply Chain Visibility >> Editors' Blog
Selling apparel and other merchandise over the internet is difficult enough for retailers as it is. Now they want to make it even tougher on themselves.
Foremost in the minds of every supply-chain planner are those key words: What if?
Transportation providers are jumping on the blockchain bandwagon in a big way.
The Internet of Things would seem ideally suited to the task of monitoring and tracking containers around the world.
The huge security flaw discovered in chips made by Intel Corp., AMD and ARM is threatening nearly all computers, servers, TVs, phones and other mobile devices.
And so the cryptocurrency mania continues, in yet another form.
It’s been 23 years since the U.S. Food and Drug Administration began requiring "nutrition facts" labels on most food products. Is it time to do the same for disclosing the environmental impact of laboratory products?
In the age of analytics and Big Data, all customers are not created equal.
Worried about managing supply-chain risk? All you need is cash.
The start of the phased-in compliance period for installation of electronic logging devices (ELDs) on commercial trucks is just over a month away. But many drivers appear to be lagging in adopting the technology.
Artificial intelligence, for decades little more than a dream in the minds of behavioral scientists, is insinuating itself into every aspect of supply-chain management today. The latest incursion is taking place in the realm of sourcing.
More and more online shoppers want their stuff fast. But the economics of making that happen haven't changed.
An unusual partnership between a major industry trade group and private retailer seeks to create a system for benchmarking supply-chain performance by e-commerce companies.
Calling yourself a "threat hunter" in the battle to shore up corporate cybersecurity isn't enough. There's a wide gap between the effectiveness of best-in-class and inexperienced security organizations.
We're at the dawn of a promising new age of autonomous vehicles and connected devices for supply-chain management. And with that cutting-edge technology comes the heightened risk of cyberattack.