Remove tags chain
article thumbnail

How Data Can Take Some Hassle Out of Holiday Travel

Pure Storage

Taking a page from digital supply chain innovations , improved tracking and location data can help find bags and bring them home. Alaska Airlines is allowing customers to purchase electronic bag tags so they can check in their bags via the airline’s mobile app and skip check-in lines entirely.

Travel 92
article thumbnail

Save Time and Reduce Data Errors with DataOps

Pure Storage

For example, let’s look at the work required to install RFID tags in the pipelines to transport gasoline from refineries to large storage terminals and identify variations of pressure and the possible causes. Consider these examples: A British multinational retailer offered 50-inch 3D plasma screen TVs for £199 rather than £1,099.

Retail 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How brands are using AI to avoid a social media crisis

Marketpoint Recall

In February 2018, the fast-food chicken chain KFC ran out of chicken. Because of a supply chain glitch, KFC was unable to get chicken to many of its United Kingdom restaurants. A skillful example of tapping into new opportunities to engage is how Wendy’s burger chain approached the 2018 Super Bowl blackout.

Media 52
article thumbnail

The Digitally ‘Discerning’ Customer

arunpraka shray

The ‘App-y ones’ : If they like the interface of an app, easy to use, linked to multiple wallets, looks jazzy, has surprise elements related to convenience, they’ll tag on. Recently a French chain of salon started home visit by their stylists, was very well accepted by the customers.

B2C 52
article thumbnail

Tips for Managing Third-Party Risk in Health Care

Reciprocity

Third-party suppliers increasingly provide mission-critical operational and support services in the healthcare industry’s supply chain. That said, healthcare companies are finding it challenging to stay ahead of vendor breaches due to the volume of cyber attacks on supply chain suppliers.