For all its unpredictable ups and downs, the supply chain technology sector remains an attractive target for investors. Prominent among investment firms that are bullish on supply chain and logistics ...
Ben Ames has spent 30 years as a journalist since starting out as a reporter for daily newspapers in Pennsylvania and Massachusetts. He has focused on business and technology reporting since 1999 for ...
The supply chain software landscape is changing rapidly. Today, Blue Yonder, a leading provider of supply chain planning and today execution solutions, announced signing an agreement to acquire One ...
Countless supply chain executives currently report the dichotomy of healthy but elongated sales pipelines, as prospects delay new software investments until they gain clarity on the transformative ...
According to the terms of the deal, Aptean will acquire all of Logility’s outstanding common stock for $14.30 per share in an all-cash transaction The transaction is expected to close in the second ...
Ben Ames has spent 30 years as a journalist since starting out as a reporter for daily newspapers in Pennsylvania and Massachusetts. He has focused on business and technology reporting since 1999 for ...
HAMBURG, Germany & MINNEAPOLIS & CARY, N.C.--(BUSINESS WIRE)--Körber Supply Chain Software, a joint venture between Körber AG and KKR, and leader in end-to-end supply chain software solutions, signed ...
Supply chain project management has evolved, shifting from a focus on efficiency to navigating a complex landscape influenced by globalization, technology, and changing consumer preferences. The ...
ATLANTA--(BUSINESS WIRE)--American Software, Inc., a leader in AI-first supply chain planning software, is changing its name to Logility Supply Chain Solutions, Inc. (Logility) to align its name with ...
Körber Supply Chain Software announced a binding agreement to acquire MercuryGate International, known for its MercuryGate transportation management system. The agreement was announced this morning.
Last year’s MOVEit and 3CX vulnerabilities offered a stark reminder of the risk insecure VPN appliance pose today. Threat actors exploit vulnerabilities to infiltrate a software provider’s network and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results