Operations | Monitoring | ITSM | DevOps | Cloud

November 2024

How to Improve Team Efficiency Through Scrum

You may have heard of Scrum but aren’t sure what it is or how it benefits the business. Or perhaps you use it but others in your organization don’t understand it. As a certified Scrum master, I’d like to share a bit about how I’ve used Scrum to transform my work and my team’s working model to improve efficiency, among other things. I truly believe it can help you once you (or others in your organization) understand its purpose and how it’s meant to be applied.

Season 3 | Coffee with Zebra | Episode 1 | Inchz IOT | Zebra

In this episode of Coffee with Zebra, Robbie Pang from Inchz IOT joins us to discuss about how RFID technology is being used by retailers to stop shop lifting and shrinkages. Learn how businesses can leverage technology to stay ahead of the curve and benefit from digital transformation to gain greater efficiency and customer satisfaction. Join us for a cup of coffee as we explore the future of retail with cutting-edge RFID solutions.

Free App Makes It Simple for You to Setup and Connect Android Mobile Devices to Your Zebra Printers

If you use Zebra desktop, industrial, or mobile printers, you’re going to want to download the free Zebra Print App from the Google Play Store on all your Android mobile devices today. Why? Because this is the app that’s going to help you instantly get your Zebra printers connected and secured on your network. It’s also the app that’s going to make it super simple for your frontline workers to print labels, PDFs, pictures, and other media from their Android mobile devices.

Having a "Secure Network" or "Secure Devices" Isn't Enough Anymore. So, What Is?

There’s this notion that a secure network of devices is not good enough…that what you need is a network of secure devices. However, at Zebra, we believe the only thing that’s acceptable these days is a secure network of secure devices. That’s why we’re working with Google Cloud and Qualcomm Technologies, Inc. to look deep into on-prem and cloud architectures to implement the best security features at every potential access point.