Remove 2016 Remove supply chain software solutions Remove Supply Chain Visibility
article thumbnail

Breaking the.XLSX Chains: Corporate Venture Supply Chain Software as the Potential Game-Changer

Let's Talk Supply Chain

Breaking the.XLSX Chains: Corporate Venture Supply Chain Software as the Potential Game-Changer From 2018 to 2022, a whopping $55 billion of venture capital poured into supply chain technology. For around the 30th consecutive year, Excel reigns as the most-used Supply Chain Management tool.

article thumbnail

Who’s Using TMS, Why and How? Notes from the 2016 TMS Benchmark Study

Supply Chain Collaborator

So clearly TMS as a solution is on a strong upward vector. Yet, TMS has not come close to achieving levels of adoption enjoyed by other supply chain focused enterprise software solutions like ERP systems for example. In other words, shippers see TMS as a product best developed by software providers or 3PLs.”

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The 25 Hottest US Procurement Startups

Procurement Software

If you want to search the whole range of procurement tech companies out there beyond just startups, then check our our free software directory. Focal Point Focal Point is a growing Atlanta-based procurement startup offering a unique solution tacking three different challenges within procurement.

article thumbnail

UltraShipTMS Integrates MacroPoint for Superior Shipment Visibility

Supply Chain Collaborator

Software-as-a-Service Solutions Provider Enables MacroPoint Load Position Monitoring Capability for More Effective Transportation Execution. For shippers with private fleet vehicles or using larger common carriers, EDI is already in widespread use.

article thumbnail

Strategies for Embracing the Internet of Things

Supply Chain Brain

The 2016 cyberattack on domain-name system provider Dyn, Inc. Sastri says it’s essential for businesses to achieve total visibility over their devices. In the process, they can better manage software updates, patch gaps, lock down systems and prevent remote on-site access by various types of malware. Comment on this article.