Oracle Corp., Lawson Software Inc. and i2 Technologies Inc. all have either shipped an updated supply chain management (SCM) system or plan to ship one over the next month. And SAP AG disclosed last ...
Ben Ames has spent 30 years as a journalist since starting out as a reporter for daily newspapers in Pennsylvania and Massachusetts. He has focused on business and technology reporting since 1999 for ...
Bamboo Rose has been working with retailers including Home Depot, Urban Outfitters and Kohl’s since its founding in 2001. Now it’s ready to partner with a goliath. Preparing for the Black Friday ...
Oracle AI World 2025 showcased the growing and increasingly essential role of agentic AI in ERP, finance and supply chain ...
Blue Yonder, a supply chain software provider for Starbucks and other retailers, confirmed service disruptions caused by a ransomware attack. Starbucks is grappling with operational challenges after a ...
Ben Ames has spent 30 years as a journalist since starting out as a reporter for daily newspapers in Pennsylvania and Massachusetts. He has focused on business and technology reporting since 1999 for ...
Rival vendors of supply chain management software are racing to develop tools that give users additional collaboration capabilities and real-time visibility of product inventory and demand levels. For ...
A growing market for supply chain sustainability software is being driven primarily by increasing scrutiny from regulators and stakeholders of ESG performance, as well as a greater consideration of ...
Editor’s Note: Norman Katz, president of supply chain consultancy Katzscan Inc., writes a monthly column for Supply Chain Management Review. Katz’s column appears on the third Monday of each month.
Historically, organizations have relied on static risk assessments and due diligence processes to evaluate their suppliers. This involves vetting vendors using questionnaires, compliance audits, and ...
Last year’s MOVEit and 3CX vulnerabilities offered a stark reminder of the risk insecure VPN appliance pose today. Threat actors exploit vulnerabilities to infiltrate a software provider’s network and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results