Delivered in PeopleSoft Financials and Supply Chain Management (FSCM 9.2) Update Image 16, Asset Tracking provides a mobile physical inventory solution within PeopleSoft Asset Management that replaces the need for third-party integrations. The browser-based solution using PeopleSoft’s Fluid User Interface leverages existing, deployed asset tags.
Major advantages
- Perform mobile physical inventory.
- Access real time data in the Asset Repository using your mobile scanning device.
- Add a new asset or edit an existing asset using your mobile scanning device.
- Automatically populate the PI_SCAN and PI_SCAN_HIST tables with scan records, simply by scanning a barcode.
- Send email notifications regarding an asset from your mobile scanning device.
Hardware and Software requirements
Hardware
Mobile device paired with barcode scanner or dedicated barcode scanner: A handheld unit that you can use to collect asset data. The device must have web browsing capability to access the PeopleSoft Fluid User Interfaces available in the Asset Tracking homepage.
You can integrate the Physical Inventory feature of PeopleSoft Asset Management with virtually any bar coding hardware.
Software
Barcode scanning devices using an Apple Operating System (iOS): Barcode scanning devices using an Apple Operating System must use the Safari browser in full screen mode. Furthermore, the virtual keyboard will not display when using the Physical Inventory tile in the PeopleSoft Fluid User Interface.
Barcode scanning devices using an Android Operating System: Barcode scanning devices that use an Android Operating System will display the virtual keyboard when using the Physical Inventory tile in the PeopleSoft Fluid User Interface.
Future
If this capabilities is extended with evolving technology around mobile devices and compatibility of these devices with RFID or similar mass scanning technology then it will enable Inventory process more streamlined and robust & efficient.
October 15, 2012
ReplyDeleteEarlier I had written about performing SQL injection in search field and how to do a DoS attack and privilege escalation using 'Like' operators. Now another SQLi exploitation I came across recently. That too in the search field. barcode scanning devices
I’m not sure where you’re getting your information, but good topic. I need to spend some time learning more or understanding more. Thanks for fantastic info I was looking for this information for my mission.
ReplyDeleteAsset Management Software
Asset Tracking Software
Asset Management Software India
Asset Management Software Chennai