Welcome!

News Feed Item

SC-integrity, Inc. (LoJack SCI) Launches Disposable Tracking Program for Supply Chain Protection and Visibility

RICHARDSON, Texas, Aug. 21, 2014 /PRNewswire/ -- SC-integrity, Inc. (LoJack SCI) announces today a new supply chain solution, with the introduction of "SC iOn Traxx," a unique, disposable tracking solution.  The SC iOn Traxx is aimed at providing a low cost, high value, visibility and temperature sensing solution for the protection of cargo and assets in transit.  When combined with the SC iOn Command Center, LoJack SCI's newest web-based tracking and visibility portal, the company expects to revolutionize the process of ensuring that business rules and regulatory compliance protocols are followed through supply chain movements.  Through the use of highly reliable disposable units, SC iOn Traxx will eliminate the burden of expensive deployment and management costs typically associated with the reverse logistics of tracking devices.

LoJack SCI

The SC iOn Traxx was developed in concert with LoJack SCI's strategic partner, Locus Traxx Worldwide, which has thousands of its "SmartTraxx™ Go" products protecting produce, food and perishable products, worldwide.  "We have taken advantage of what Locus Traxx has done in producing a highly unique product in high volumes for their market and adapted it to meet the protocols-based services for protecting the overall supply chain market," stated Ted Wlazlowski, CEO, LoJack SCI.  "Their track record for high volume reliability, coupled with our visibility, monitoring and functional enhancements, makes this the most important product in years for covert cargo and supply chain tracking and visibility."  Locus Traxx Worldwide CEO, David Benjamin says, "Our strategic vision to grow with a leading company like LoJack SCI is important to our mission.  LoJack SCI's approach to the market brings great value to our customers."

The company has a very simple program for the SCI iOn Traxx.  For a single fee per shipment, LoJack SCI customers will purchase and deploy the Traxx, following simple, user-friendly instructions. LoJack SCI will monitor the shipment according to its customer's protocols.  The necessity for a cumbersome device retrieval process has been eliminated, as the Traxx can either be disposed of, or returned for a reward, once the device reaches its destination. "This uncomplicated approach is the means to relieve much of the burden the industry deals with in protecting shipments," Ted Wlazlowski continued.  

About LoJack SCI
LoJack Supply Chain Integrity provides integrated solutions for supply chain protection that includes shared supply chain intelligence and analytics, covert cargo tracking, monitoring, and recovery services.  The LoJack SCI solutions feature proactive alert based security and increased visibility across all modes of transportation with clear chain of custody management utilizing active sensing of the cargo's environment while in-transit.  Visit www.lojacksci.com for more information.

LoJack is a trademark or registered trademark of LoJack Corporation in the United States and other countries and, used under license by SC-integrity, Inc.  LoJack Corporation is not responsible for any content herein.

Contact:

LOJACK SCI 
Contact: Steve Lang 
Phone: (214) 377-0222 
Email: [email protected]

Logo - http://photos.prnewswire.com/prnh/20130319/DA78808LOGO

SOURCE LoJack SCI

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"Peak 10 is a national cloud data center solutions managed services provider, and part of that is disaster recovery. We see a growing trend in the industry where companies are coming to us looking for assistance in their DR strategy," stated Andrew Cole, Director of Solutions Engineering at Peak 10, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of ...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...