Sidebar

RFID: The Next Wave of Supply Chain Technology

RFID
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Some unsettling news recently added anxiety to the daily avalanche of already unsettling news. The Food and Drug Administration (FDA) announced its approval of the use of a minute device that can be embedded under the skin of patients in hospitals. This device allows hospitals to instantly know all essential details about the person's medical data, including blood type, allergies, etc. Think about it: a tiny chip under your skin that tells someone all about you. No wonder this news got so much attention. And for many people, it was the first time they had closely looked at Radio Frequency Identification (RFID), a revolutionary and justifiably worrisome technology that is already being used more widely than most people realize.

Briefly, RFID is an integrated circuit (IC) chip the size of a pinhead that can be programmed with many bits of data and attached to a mini antenna. This device is activated by an electromagnetic field that initiates a process of transmitting the chip's data to a nearby receiving antenna and relaying it to a back-end computer. As you can imagine, the applications are endless: from medicine to manufacturing, from security to logistics, from transportation to just about anything you can think of. Of course, it's also easy to imagine more nefarious uses, like stealing identities and invading privacy, which are very real concerns. Still, the benefits are remarkable in terms of positive identification, efficiency of processes, improvement of quality, and reduction of theft and forgery.

The world's largest retailers are heralding RFID as a technology that will save them billions of dollars over the next several years. Perhaps you already know that Wal-Mart's 100 largest suppliers were mandated some time ago to begin identifying their pallets and cases with RFID tags by January 1, 2005. Although it looks like this date is going to slip yet again as the standards and technologies are still being sorted out, most manufacturers and distributors aren't being lulled into complacency about RFID. They know (or should) that compliance will be inevitable. Yes, a few kinks must still be worked out, but with the dropping cost of implementing RFID, it won't be long before it becomes the standard for product identification.

Wal-Mart is not the only large entity that has recently put its largest suppliers on notice that RFID will soon be a requirement. Most notably, Albertson's, Target, and the U.S. Department of Defense (DoD) have warned vendors that RFID will be required in the next year or so. The initial benefit of the technology is that it eliminates the line-of-sight and serial scanning limitations of barcodes; for instance, a pallet of merchandise can be instantly inventoried without taking the pallet apart and scanning each case. Plus, there are many other potential savings once the technology is perfected; for example, instant warehouse inventories, automatic triggering of restocks/reorders when products leave store shelves, instant tracking of recalled products, and much more.

Theoretically, RFID is not much more complex than barcodes. Like barcodes, each tag contains an identifying code that is associated to other information in back-end databases. In application, however, RFID can be complex because of the many issues regarding standards, environmental factors, and an often-challenging implementation process. Despite this, RFID has already reached astonishing levels of versatility, economy, and pervasiveness, making it a rapidly growing means of identifying and tracking merchandise, assets, individuals, vehicles, and more.

A Little History

During World War II, the Allies unceremoniously introduced RFID as a way to identify which aircraft entering England via the English Channel were "the good guys." A radio frequency transponder attached to Allied aircraft broadcast an appropriate response to an "interrogating" radio signal sent from installations on the coast of England, thus alerting defense crews on the ground that the aircraft was friendly. In the 1970s, this same concept of electronic interrogation/response was shrunk down to fit on IC chips with small, attached antennas for use in animal identification, factory automation, and military applications. Through the 1980s and 1990s, as RFID technology became more cost-effective, other common uses naturally arose, particularly around transportation management and personnel access. The fact is, you may have been carrying around an RFID tag on your company ID tag or your toll-way tag for years without ever knowing it.

Today, RFID is used widely in the security and transportation industries. It comes as no surprise that the security industry was an early adopter of RFID and continues to be a very large consumer of the technology. RFID chips are commonly embedded in identification badges and in rigid barcode labels to track the whereabouts of equipment. In the transportation industry, prepaid toll road tags and parking passes often use RFID to identify you and verify your account status. RFID has been used for years to identify semi-trucks, trailers, and shipping containers as they pass in and out of freight yards.

Now, RFID is being adopted in supply chain applications to automatically track inventory as it is shipped, received, and moved around a warehouse, and it's being used in manufacturing processes to ensure the proper identification and routing of components and sub-assemblies in manufacturing workflows. Additionally, RFID is used to track high-value products for service and warranty purposes. Many new cars and even tires have embedded RFID tags for this very purpose.

Anatomy of an RFID Tag

An RFID tag (also called a "transponder") is made up of an IC memory chip and an antenna, and in some cases, a battery to boost the signal. RFID tags are available in a spectrum of shapes and sizes: They can be thick and rigid or thin and flexible enough to be embedded within an adhesive label and run through a label printer. Tags can be screw-shaped to identify trees or wooden items, while credit-card shaped tags are commonly used in security access applications. Long, paper-thin, disposable tags are used to identify pallet loads and caseloads of merchandise to entities in a supply chain. And, as mentioned, very small tags can be inserted under the skin for human and animal ID purposes. The type of tag simply depends upon what it needs to deliver in terms of quantity of information, range of transmission, and the operating environment.

Following is a diagram of a simple RFID tag. As you can see, there isn't much to it in its basic form. In fact, with read-only tags, the chip may be only a little larger than a pinhead; the rest of the size is taken up by the antenna, the size of which is dictated by the needed detection range.

RFIDarticle110104V400.jpg

A simple RFID tag (courtesy Matrics)

Typically, the larger the tag, the larger the memory capacity, the greater the durability, and the more extended the range in which the tag can be detected. In addition, different tags transmit at different frequencies, depending on the industry where they are used and the reception/transmission range needed. RFID allows hundreds of tags to be read simultaneously, and individual tags can be read at remarkable speeds, often as fast as 100 milliseconds per tag.

RFIDarticle110104V401.png

Square chip/antenna inlay for carton tags (courtesy Matrics)

http://www.mcpressonline.com/articles/images/2002/RFIDarticle110104V402.png

Round chip/antenna inlay for CD/DVD tag (courtesy Texas Instruments)

RFIDarticle110104V403.png

RFIDarticle110104V404.png

Interior/exterior of rigid semi-trailer tag (courtesy Intermec)

RFIDarticle110104V406.png


RFIDarticle110104V405.jpg

 Interior/Exterior of small cylindrical tag (courtesy Texas Instruments)

RFIDarticle110104V407.png

Barcode label with embedded RFID tag (courtesy T.L. Ashford)

RFIDarticle110104V408.jpg

Livestock ear tags (courtesy Destron)

Tags can be read-only (programmed once only), read/write-capable (reprogrammed multiple times), or a hybrid of the two (certain data can be permanently written--for instance, a serial number--while other data can be changed or added as needed--for instance, purchase and warranty information). Read-only tags are preprogrammed or encoded when they are manufactured (i.e., when large quantities of tags have the same information) or are programmed just prior to the tag being attaching to an item, sometimes by the same device that detects and reads the tags (the reader).

RFID tags are either "passive" or "active." Passive tags are activated by the energy field that is transmitted by the reader. Because passive tags do not have their own power supply for transmitting encoded information to the reader, the distance they can be located from a reader is greatly limited. Active tags are each powered by their own battery, which adds cost but significantly extends the detection range. The battery power of active tags enhances read/write capabilities (data on tags can be revised or erased thousands of times), allowing greater versatility of use. Of course, active tags are usually more expensive and heavier than passive tags; therefore they're typically not used in supply-chain applications. Active tags can cost several dollars each to produce, while passive tags can be purchased for as little as 25 cents each (but only at quantities in the millions). Because of the price, only passive tags are used in the supply chain, and then mostly on high-ticket items or at the case and pallet level; however, within the next few years, it is expected that the price of passive tags will drop to a few cents each, at which point it is likely that RFID will begin to replace barcodes on individual products.

RFID Readers/Interrogators

Another critical component of RFID technology is the "reader" or "interrogator," which transmits an energy field that causes a tag to activate and then transmit the data stored within its chip. If the tag doesn't have a battery, the reader's energy field provides the necessary power for the tag to transmit its information back to the reader, although the detection/transmission distance is significantly reduced. When this data is received by the reader, it's passed along to back-end computing systems in order to initiate transactions.

Readers can be fixed or portable, like barcode scanners. Fixed readers range in size from floor models that are as tall as a person to smaller handheld units the size of handheld barcode readers. It simply depends on the application. These units typically collect data on products traveling through "choke points" such as dock doors, conveyor belts, gates, and doorways. Portable, wireless readers can be attached to forklifts and collection carts.

Not only do readers locate, activate, and receive transmissions from RFID tags, many of them have the capability of sending data back to read/write-capable tags to either add or replace information.

RFIDarticle110104V409.png

RFID reader and antenna (courtesy Alien Technologies)


RFIDarticle110104V410.png

Handheld reader/interrogator (courtesy Intermec)

RFID in Supply Chain Applications

To comply with the mandates of large retailers to have RFID tags that identify merchandise on cases and pallets, a special RFID tag called a "smart label" is often used. A smart label is essentially a barcode label that has a flat RFID tag embedded inside.
RFIDarticle110104V411.png

Flexible "smart label" (courtesy T.L. Ashford)

The RFID tag within smart labels is typically coded with an Electronic Product Code (EPC) and any additional information required by the customer. The cost for smart labels is currently about 40 to 50 cents each, while the printer that accommodates both the printing and programming of smart labels costs between $1,500 and $3,000. In addition, it is necessary to ensure that back-end software can accommodate the RFID data passed to the printer/encoder. For some companies, this latter task can be expensive, especially if the software needs to be changed to accommodate RFID data.

EPC Codes and Standards

The EPC (a.k.a. Global Trade Item Number, or GTIN) is the basis of an enhanced global supply chain network that RFID is propelling. The EPC is substituted at the pallet and case level for the well-known Universal Product Code (UPC). There are two reasons that EPC codes are necessary when RFID is used in supply chain applications: First is to create globally accepted standards for product identification. Products around the world must be identified and described in a standardized way, and communications about product attributes between partners must also be standardized (UPC codes are limited to use only in certain geographies). Second, EPC provides the capability to uniquely identify every item that is produced. For instance, each gallon of milk can potentially have a unique ID number that indicates the manufacture date, the plant where it was bottled, the lot number, the expiration date, etc.

Today, serial numbering is not yet cost-effective unless the item has a high value, but once tags cost a few cents each, serial numbered RFID tags will likely appear on all items. This will provide many benefits to retailers; for instance, a retailer will be able to automatically detect when shelves need to be restocked (which can in turn trigger the automatic generation of purchase orders) and will be able to quickly locate and remove from sale products that are defective, out of date, etc.

EPC codes are typically 96 bits in size (24 four-bit characters) and are programmed onto RFID tags to identify the manufacturer and type of product (as barcodes do today). In many instances, companies use their present UPC code within their new EPC code. Until the cost of RFID tags reach cents-per-piece levels, many companies will use RFID codes only to track items at the SKU level (identifies manufacturer and product type) and then only in case and pallet units of measure. Even so, this complies with the mandates of Wal-Mart and the like.

RFIDarticle110104V412.png

A 96-bit EPC code (courtesy Lansa)

In the above example, the portion of the code shown as the "EPC Manager" identifies the company, while the portion of the code shown as the "Object Class" identifies the brand, model, size, unit of measure, etc. Finally, the last portion, the "Serial Number," can be used to optionally identify the individual product.

Before a company can program EPC codes into RFID tags to meet basic RFID compliance requirements with major retail customers, they must ensure they have EPC codes that meet global standards, and the EPC codes must be must be registered on the Global Data Synchronization Network (GDSN). Essentially, GDSN is a private "Internet" for global trading partners that allows partners to access standardized information about a product. To register EPC codes, a company must subscribe to a trading partner that is a member of the GDSN. Trading partners include UCCnet, Transora, WorldWide Retail Exchange, and many others.

Once a company has standardized and registered EPC codes, these need to be associated with inventory items in the back-end systems. Third-party software is required to take the EPC code data and write it to the RFID tag, usually a "smart tag" that is encoded as it passes through a special label printer/encoder. The printed/encoded tags are then applied to cases and pallets.

The Potential of EPC

The purpose of EPC codes is to create globally accepted standards for product identification. Products registered on GDSN can have up to 200 standardized product attributes that can be seen and shared by all trading partners (and potential trading partners). GDSN is currently in its formative stages, but eventually the benefits of being part of the GDSN will be significant. For instance, when a vendor introduces a new product and its EPC code is registered on the network, a "catalog item notification" can be automatically distributed to all retailers connected to the GDSN. These retailers can instantly access complete standardized product information and decide whether to stock the item. If a retailer decides to purchase, an instant notification can be sent to the vendor. In addition, if a vendor makes any change to the product attributes, a "catalog notification" can be automatically distributed to all retailers advising of the change. Again, this system can also be very valuable for recalls because vendors can immediately know all of the purchasers in the supply chain.

EPCglobal Frequency Specifications for RFID

An organization called EPCglobal has created different specifications for the frequency, encoding characteristics, and other attributes of RFID tags and has become the standard in supply chain applications. EPCglobal is an affiliate of the United States' Uniform Code Council (UCC) and Europe's EAN International (EAN). Both of these organizations maintain the EAN.UCC System, which for years has managed worldwide barcode numbering assignments and barcode symbology standards.

Unfortunately, there is still not a single agreed-upon standard for RFID tags that are used in supply chains, although it is likely that one will emerge soon. For now, different retailers have decided to go with different "classes" as defined in EPCglobal specs:

Version 1.0 (Generation 1, or Gen1)

  • Class 0 tags: These tags are read-only (programmed only once), have 64- or 96-bit memory capacities, and operate in the UHF frequency band between 868 and 930 MHz.
  • Class 0+ tags: These tags are identical to Class 0 tags but are rewriteable.
  • Class 1 tags: These one-time programmable (OTP) tags can be updated once after being encoded with an EPC number; they have a 96-bit memory capacity and operate between 868 and 930 MHz.

 

Version 2.0 (Generation 2, or Gen2)

Generation 2 (Gen2) tags were recently developed to overcome concerns regarding interference by environmental causes, such as lighting, that arose from Gen1 tags. In fact, Wal-Mart and the DoD now require Gen2 tags when their suppliers ship with RFID tags. It appears that most other larger retailers that intend to require RFID will follow suit. There is currently a single class for Gen2 tags, which has a memory capacity from 96 to 256 bits. The operating frequency band is 860 to 960 MHz, which also happens to be consistent with ISO 18000-6 standards, allowing this standard to better integrate with other global standards.

Brand New Wonder or Brave New World?

Certainly, the genie is out of the bottle when it comes to RFID, and like any other technology that can be used for good or ill, it needs to be closely managed and regulated. It is critical that the public be made aware of how this technology will benefit them and when they need to be cautious. Of course, there are urban myths floating about that the government will soon require tags in everyone's forearms and the IRS will have agents disguised as Maytag repairmen cruising the streets with long-range readers and taking instant inventories of valuables. But regardless of the myths and the very real dangers for abuse, there is no doubt that organizations and individuals are already experiencing tremendous efficiencies and conveniences from the technology. Either way, we have only seen the beginning of how this technology will affect our lives.

Bill Rice is a freelance technology writer and marketing consultant, as well as a regular writer for MC Showcase Online. He can be reached at This email address is being protected from spambots. You need JavaScript enabled to view it..

Bill Rice

Bill Rice is a technology marketer and founder of Humanized Communications, a digital marketing agency. He is a former editor of MC Showcase, is a former marketing communications director for Vision Solutions, and even did a stint as an IT manager for a shop that had an AS/400 model C10 (this just dated him). He can be reached at billr@humanizedcommunications.com.

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

RESOURCE CENTER

  • WHITE PAPERS

  • WEBCAST

  • TRIAL SOFTWARE

  • White Paper: Node.js for Enterprise IBM i Modernization

    SB Profound WP 5539

    If your business is thinking about modernizing your legacy IBM i (also known as AS/400 or iSeries) applications, you will want to read this white paper first!

    Download this paper and learn how Node.js can ensure that you:
    - Modernize on-time and budget - no more lengthy, costly, disruptive app rewrites!
    - Retain your IBM i systems of record
    - Find and hire new development talent
    - Integrate new Node.js applications with your existing RPG, Java, .Net, and PHP apps
    - Extend your IBM i capabilties to include Watson API, Cloud, and Internet of Things


    Read Node.js for Enterprise IBM i Modernization Now!

     

  • Profound Logic Solution Guide

    SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation.
    Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.
    The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the companyare not aligned with the current IT environment.

    Get your copy of this important guide today!

     

  • 2022 IBM i Marketplace Survey Results

    Fortra2022 marks the eighth edition of the IBM i Marketplace Survey Results. Each year, Fortra captures data on how businesses use the IBM i platform and the IT and cybersecurity initiatives it supports.

    Over the years, this survey has become a true industry benchmark, revealing to readers the trends that are shaping and driving the market and providing insight into what the future may bring for this technology.

  • Brunswick bowls a perfect 300 with LANSA!

    FortraBrunswick is the leader in bowling products, services, and industry expertise for the development and renovation of new and existing bowling centers and mixed-use recreation facilities across the entertainment industry. However, the lifeblood of Brunswick’s capital equipment business was running on a 15-year-old software application written in Visual Basic 6 (VB6) with a SQL Server back-end. The application was at the end of its life and needed to be replaced.
    With the help of Visual LANSA, they found an easy-to-use, long-term platform that enabled their team to collaborate, innovate, and integrate with existing systems and databases within a single platform.
    Read the case study to learn how they achieved success and increased the speed of development by 30% with Visual LANSA.

     

  • Progressive Web Apps: Create a Universal Experience Across All Devices

    LANSAProgressive Web Apps allow you to reach anyone, anywhere, and on any device with a single unified codebase. This means that your applications—regardless of browser, device, or platform—instantly become more reliable and consistent. They are the present and future of application development, and more and more businesses are catching on.
    Download this whitepaper and learn:

    • How PWAs support fast application development and streamline DevOps
    • How to give your business a competitive edge using PWAs
    • What makes progressive web apps so versatile, both online and offline

     

     

  • The Power of Coding in a Low-Code Solution

    LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks

     

     

  • Why Migrate When You Can Modernize?

    LANSABusiness users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.
    In this white paper, you’ll learn how to think of these issues as opportunities rather than problems. We’ll explore motivations to migrate or modernize, their risks and considerations you should be aware of before embarking on a (migration or modernization) project.
    Lastly, we’ll discuss how modernizing IBM i applications with optimized business workflows, integration with other technologies and new mobile and web user interfaces will enable IT – and the business – to experience time-added value and much more.

     

  • UPDATED: Developer Kit: Making a Business Case for Modernization and Beyond

    Profound Logic Software, Inc.Having trouble getting management approval for modernization projects? The problem may be you're not speaking enough "business" to them.

    This Developer Kit provides you study-backed data and a ready-to-use business case template to help get your very next development project approved!

  • What to Do When Your AS/400 Talent Retires

    FortraIT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators is small.

    This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn:

    • Why IBM i skills depletion is a top concern
    • How leading organizations are coping
    • Where automation will make the biggest impact

     

  • Node.js on IBM i Webinar Series Pt. 2: Setting Up Your Development Tools

    Profound Logic Software, Inc.Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. In Part 2, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Attend this webinar to learn:

    • Different tools to develop Node.js applications on IBM i
    • Debugging Node.js
    • The basics of Git and tools to help those new to it
    • Using NodeRun.com as a pre-built development environment

     

     

  • Expert Tips for IBM i Security: Beyond the Basics

    SB PowerTech WC GenericIn this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level. Robin will cover:

    • Reducing the risk posed by special authorities
    • Establishing object-level security
    • Overseeing user actions and data access

    Don't miss this chance to take your knowledge of IBM i security beyond the basics.

     

     

  • 5 IBM i Security Quick Wins

    SB PowerTech WC GenericIn today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
    There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?
    Join top IBM i security expert Robin Tatam as he outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
    Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Robin Tatam will show you how to achieve them.

  • Security Bulletin: Malware Infection Discovered on IBM i Server!

    SB PowerTech WC GenericMalicious programs can bring entire businesses to their knees—and IBM i shops are not immune. It’s critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between:

    • Viruses, native objects, and the integrated file system (IFS)
    • Power Systems and Windows-based viruses and malware
    • PC-based anti-virus scanning versus native IBM i scanning

    There are a number of ways you can minimize your exposure to viruses. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected and compliant with regulations such as PCI.

     

     

  • Encryption on IBM i Simplified

    SB PowerTech WC GenericDB2 Field Procedures (FieldProcs) were introduced in IBM i 7.1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i including PII, PCI, PHI data in your physical files and tables.
    Watch this webinar to learn how you can quickly implement encryption on the IBM i. During the webinar, security expert Robin Tatam will show you how to:

    • Use Field Procedures to automate encryption and decryption
    • Restrict and mask field level access by user or group
    • Meet compliance requirements with effective key management and audit trails

     

  • Lessons Learned from IBM i Cyber Attacks

    SB PowerTech WC GenericDespite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls.
    In this webinar, you'll get insight into how the criminals accessed these systems, the fallout from these attacks, and how the incidents could have been avoided by following security best practices.

    • Learn which security gaps cyber criminals love most
    • Find out how other IBM i organizations have fallen victim
    • Get the details on policies and processes you can implement to protect your organization, even when staff works from home

    You will learn the steps you can take to avoid the mistakes made in these examples, as well as other inadequate and misconfigured settings that put businesses at risk.

     

     

  • The Power of Coding in a Low-Code Solution

    SB PowerTech WC GenericWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks

     

     

  • Node Webinar Series Pt. 1: The World of Node.js on IBM i

    SB Profound WC GenericHave you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.
    Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.
    In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).
    Watch Now.

  • The Biggest Mistakes in IBM i Security

    SB Profound WC Generic The Biggest Mistakes in IBM i Security
    Here’s the harsh reality: cybersecurity pros have to get their jobs right every single day, while an attacker only has to succeed once to do incredible damage.
    Whether that’s thousands of exposed records, millions of dollars in fines and legal fees, or diminished share value, it’s easy to judge organizations that fall victim. IBM i enjoys an enviable reputation for security, but no system is impervious to mistakes.
    Join this webinar to learn about the biggest errors made when securing a Power Systems server.
    This knowledge is critical for ensuring integrity of your application data and preventing you from becoming the next Equifax. It’s also essential for complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA
    Watch Now.

  • Comply in 5! Well, actually UNDER 5 minutes!!

    SB CYBRA PPL 5382

    TRY the one package that solves all your document design and printing challenges on all your platforms.

    Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.

    Request your trial now!

  • Backup and Recovery on IBM i: Your Strategy for the Unexpected

    FortraRobot automates the routine tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:
    - Simplified backup procedures
    - Easy data encryption
    - Save media management
    - Guided restoration
    - Seamless product integration
    Make sure your data survives when catastrophe hits. Try the Robot Backup and Recovery Solution FREE for 30 days.

  • Manage IBM i Messages by Exception with Robot

    SB HelpSystems SC 5413Managing messages on your IBM i can be more than a full-time job if you have to do it manually. How can you be sure you won’t miss important system events?
    Automate your message center with the Robot Message Management Solution. Key features include:
    - Automated message management
    - Tailored notifications and automatic escalation
    - System-wide control of your IBM i partitions
    - Two-way system notifications from your mobile device
    - Seamless product integration
    Try the Robot Message Management Solution FREE for 30 days.

  • Easiest Way to Save Money? Stop Printing IBM i Reports

    FortraRobot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
    Manage your reports with the Robot Report Management Solution. Key features include:

    - Automated report distribution
    - View online without delay
    - Browser interface to make notes
    - Custom retention capabilities
    - Seamless product integration
    Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.

  • Hassle-Free IBM i Operations around the Clock

    SB HelpSystems SC 5413For over 30 years, Robot has been a leader in systems management for IBM i.
    Manage your job schedule with the Robot Job Scheduling Solution. Key features include:
    - Automated batch, interactive, and cross-platform scheduling
    - Event-driven dependency processing
    - Centralized monitoring and reporting
    - Audit log and ready-to-use reports
    - Seamless product integration
    Scale your software, not your staff. Try the Robot Job Scheduling Solution FREE for 30 days.