RFID tags, worker wristbands and mobile computers help Argenti Lemon get the lemons it harvests from the field to the shipping dock. The firm, which is one of the largest lemon exporters in Argentina, is expanding an RFID system that tracks production, streamlines productivity-based pay for pickers, and improves traceability. The RFID process begi Read More
Cybercrime is on the rise as organizations face the tough realities of a poor economy putting the squeeze on their security spending. But don t panic -- some creative ways to defend your data on a tight budget do exist. Read More
Google's e-mail service has been invaded by a phishing scam that is using instant messaging to dupe unsuspecting users into giving up their passwords. Once users' Gmail chats are hacked, the phishers take over users' chat accounts and send out messages to other users purportedly linking to a “funny video.” Read More
Another proposed RFID regulation, another unintended consequence. Nevada is the latest state to propose legislation to regulate how RFID data is collected and used. Senate Bill 125 (SB 125), which was introduced earlier this month, would make it a felony to use RFID to collect personal identification without a person's consent. Critics say the wa Read More
The popular micro-blogging platform Twitter continues its explosive growth. Twitter experienced a 900 percent increase in active users in the last year, according to a recent blog post from Biz Stone, the company s co-founder. Read More
Small businesses today are managing inventory but they have not had the tools to optimize inventory. PCMAG covers a new technology that determines the right of inventory to have on hand at peak financial performance. The end result reveals wealth that is needlessly tied up. Read More
Virtualization, a technology used primarily to squeeze more processing power from servers, is coming to corporate desktops and laptops, a development that could open up new revenue streams for pioneers like VMware Inc. (VMW) and Citrix Systems Inc. (CTXS). Virtualization allows companies to increase the amount of computing power they get from exis Read More
What s the most common type of malware on the Internet? Viruses? Botnet code? How about password-stealing worms, designed to victimize online gamers? Read More
Are you a late adopter of the new Microsoft Vista OS? Thinking about upgrading? Well Microsoft, so it seems, would like to help you and your small business transition from the legacy Microsoft OS (Windows XP) to the newest flavor of windows (Windows Vista). Buried in the bowels of Microsoft's Vista launch website is an offer which may be of int Read More
Now there will no need to carry different cards to accumulate your loyalty points at various stores rather a single RFID chip inside your phone would ensure that all details related to several cards you own could be found at one place. For this purpose Gyazapo will take care of everything. It will be a win-win situation for everybody. Check out ho Read More
Subscribe

Share your small business tips with the community!
Share your small business tips with the community!
Share your small business tips with the community!
Share your small business tips with the community!