The Small Producer's Toolkit: A Guide to Choosing Techniques and Systems to Help You Win. Boca Raton New York Auerbach Publications is an imprint of Taylor & Francis Group, an IT business.
PREFACE
The supplier-customer relationship in the selection and implementation of RFID technology can become very complex in the supply chain. A security program must be established before RFID is implemented in the supply chain (see Chapter 6).
SUPPLY CHAIN OVERVIEW
PARADIGM SHIFT IN PRODUCT TRACEABILITY
- Transitioning to RFID Technology
- Tracking Problems
- Supply Chain
Each player has a role in the physical movement of materials and products from one point to another in the supply chain. SCO with RFID technology aims for the best operational performance while optimizing schedules to reduce production and logistics bottlenecks in the supply chain.
RFID MARKETS
The RFID infrastructure is a possible replacement for the Supply Chain Inventory Visibility (SCIV) system, as the real-time RFID tracking activities can help increase the visibility of the products being tracked. SCPM leverages event and performance alerts to help parties in the supply chain detect, troubleshoot, and resolve issues in real time.
ECONOMIC FEASIBILITY OF ROLLING OUT RFID
- Supply Chain Synchronization
- Customer Privacy Issues
- Security Challenges
- Operational and IT Challenges (Hardware, Software, System Compatibility, People Expertise)System Compatibility, People Expertise)
- Logistical Challenges
- Program Management Challenges
- Standard Implementation Challenges
- Lessons Learned
The standards organizations that contribute to the RFID standards are EPCglobal Inc., International Standards Organization (ISO), and the American National Standards Institute (ANSI). As we move to the next higher level, the organization matures until it reaches maturity in the final stage.
RFID TECHNOLOGY INFRASTRUCTURE
- Open Architecture: Savant Server
- Major Vendor Servers
- Tags
- Antennas
- Readers
- Electronic Product Code
- Object Name Service
- EPC Information Service
- Scenarios
Even if the tagged items are placed in a correct orientation order in the cart to prevent signal interference, mobile RFID handheld readers (e.g., shoppers) in close proximity to one another can garble data while scanning tags. In the fourth step, the reader sends the information to the warehouse manager to confirm receipt of the pallet.
WEB-CENTRIC SUPPLY CHAIN MANAGEMENT CHALLENGESCHALLENGES
- Combining Web-Centric with RFID Technology
- E-Business Applications
- Advantages and Disadvantages
When a supply chain receives it, back-end information systems process the order into various business transactions throughout the chain. Then we must consider the security and information assurance issues of the web-centric supply chain, which have not been addressed.
Furthermore, the EPC standards for global tag classes are still evolving and not all industries use the latest standard updates. For example, some vendors use Class 0 tags (factory default), while others use Class 2 tags (programmable to read and in some cases write depending on the memory in the passive tag circuit).
RFID TECHNOLOGY
PRIMARY DRIVERS
- RFID Technology Deployment
The METRO Group's early deployment success in the initial deployment in November 2004 does not mean that the deployment was flawless. Rather than requiring all major suppliers to use RFID tags on the same day as mandated by Wal-Mart, Albertsons, a major supermarket chain in the United States, took an incremental collaborative approach, not just the METRO Group's incremental approach not. Target Corp., the fourth largest retailer in the United States targeted June 1, 2005 for RFID compliance.
SELECTION GUIDELINE ON TAGS, SERVERS, AND MIDDLEWARE
- EPC Tag Classes
- ISO Standards
- RFID Device Selection Criteria
- Middleware Selection Criteria
Active tags can be combined with passive tags to create hierarchical visibility of asset tracking in the supply chain. This means that when the tag is tampered with, it triggers an alert to the relevant parties in the supply chain. SCE applications can also extend and synchronize business processes for trading partners across the supply chain network.
RFID IMPLEMENTATION EXAMPLES
He placed the labels on the top third of the box of dishwashing liquid bottles that taper at the top. The capital cost of the system is less than 1/10th the annual cost of using barcodes, reading feed trays, dollies and roll cages 83 percent faster at every point in the supply chain. At each stage of the garment handling process, garments are placed on the station platform to record the status of each process.
RFID APPLICATIONS IN SUPPLY CHAIN
MANAGEMENT
LOGISTICS
- SCM Logistics Maturity Model
- Logistics: Reactive, Proactive, and RFID
Analyzes of the costs and benefits of new technologies to improve the development process of the logistics visibility system have been carried out. To begin with, we first enter the pilot study stage and then progress to the higher levels of the logistics maturity model. Increases the visibility of the materials management component of the supply chain management system to allow hospital staff to focus on the patient case.
MANAGEMENT
- Oracle–PeopleSoft
- Microsoft RFID Council
- The METRO Group Future Store
- Chain Pharmacy Operations
- Web Services
With electronic shelf labels, conventional price labels are a thing of the past in the Future Store. It was one of the first software vendors to join the Auto-ID Center (now EPCglobal). The following is a list of members of the Board of Overseers of the Auto-ID Center as of August 23, 2003.
STORING AND RETRIEVING DATA
- TWO BIG QUESTIONS
- EPC TECHNOLOGY IN FUNCTIONAL AREAS
- PERCEPTIONS OF PRODUCT BENEFITS
- DATABASE CD ON LOCAL WORKSTATION
- REMOTE DATABASE SERVERS
- How Can We Reduce the Number of Traffic Bottleneck Incidents? Incidents?
- Why Do We Need to Divide the Database into the Static and Dynamic Partitions?and Dynamic Partitions?
- What Kind of Database Management Should We Get to Satisfy Our Requirements?to Satisfy Our Requirements?
- What Is the Optimal Way of Increasing Throughputs and Operational Efficiency?and Operational Efficiency?
- How Do We Reduce Loading Times Cost Effectively?
- How Do We Migrate a Relational Database Management System to Another?System to Another?
- How Is Partitioning Emulated and What Are the Partitioning Types?Are the Partitioning Types?
- How Do You Determine the Number of Partitions for a Database?for a Database?
- What Are the Factors You Should Consider in Your Migration Planning?Migration Planning?
- DATABASES IN COMPANY MERGER PROCESSES
- HYBRID DATABASES
- WEB SERVICES
The risks of moving forward with RFID and EPC technologies with impure synchronized data between trading partners in the supply chain are high. In addition, the information initially stored on the RFID tag must be written according to the requirements of the rest of the value chain. When the truck drove over a crash site on the road under reconstruction, an object fell from the truck.
RFID BUSINESS PROCESSES
IMPLEMENTATION APPROACHES
- Dual Shipping Faces
- Two Sides of the Mandates
- RFID Implementation Checklist
A scenario for the multidimensional approach is a supplier that sells its products to many customers and receives supplies from other suppliers to complete the emerging technologies RFID infrastructure business processes at the pallet, case and item levels. These suppliers rushed to implement RFID technology without considering improving business processes in a product's life cycle, from parts assembly to case or pallet delivery. From the answers you can determine which business processes need to be improved in order for the implementation to succeed.
BUSINESS PROCESS REENGINEERING
- Procter & Gamble: Dock Loading Throughput
- Canus: Changing Antenna’s Orientation
- Unilever: Changing Tag Placement
- Heinz: Adapting Tag Requirements
- Gillette Scenario: Misplaced Case
- Canus: Adjusting Computer Speed
- Software Checklist
Now what if the EPC number is not properly registered in the manufacturer's EPC repository. Let's assume that the item was shipped in error and it is not possible to reconnect to the purchase even if the EPC number is correctly registered in the manufacturer's EPC repository. On the other hand, if the location specified in the query does not correspond to a product distribution area associated with the store at the location in the manufacturer's enterprise system, the Discovery Workstation will respond with a "gray market".
ORGANIZATIONAL MATURITY
How you want the app to use EPCGobal to return customer information. Does the application allow you to specify at what level inventory should be maintained at certain locations. To what extent will the application allow you to customize the way information is displayed on the screen.
BASIC MULTI-LAYER RFID BUSINESS PROCESS MODEL
Once the strategy and plan are in place and the goals are set, we move on to the next layer, the business processes that support RFID. To connect with the rest of the company's systems, you need middleware technologies, web service standards, and integration processes to streamline business processes. For example, you need a leading web service based on one or more business processes to orchestrate other web services.
ADAPTIVE MULTI-LAYER RFID BUSINESS PROCESS MODELPROCESS MODEL
- Adaptive Maturity
- Application Adaptors
- The METRO Group
Let's see how METRO Group uses IBM WebSphere RFID Premises Server to improve flexible business processes. The server helps users create business processes and integrate business information in multiple business applications on different platforms. It also enables users to improve business processes in response to changes in the highly competitive market due to emerging technologies and shifts in the economy.
PREDICTIVE MULTI-LAYER BUSINESS PROCESS MODEL
To improve business processes and integrate business information, WebSphere Business Integration Server, as the name suggests, does the work. In 2005, the first implementations of utilizing RFID were to improve business processes. Some data that is considered predictive may also be used in the company's system of business processes.
RFID BUSINESS PROCESSES STRATEGY
- IBM RFID Strategy
- Heinz RFID Strategy
- Canus RFID Strategy
- International Paper RFID Strategy
- Kayser-Roth RFID Strategy
- Philips Semiconductors RFID Strategy
- Intel RFID Strategy
- Unilever RFID Strategy
- Major Clothier Retailer RFID Strategy
- Marks and Spencer RFID Strategy
Unlike other vendors mandated to implement RFID technology, Kayser-Roth Corp., the maker of hosiery and apparel, volunteered to meet. It contacted IBM to help set up the initial pilot and select suppliers for the project to improve business processes. It extracts data from the RFID infrastructure through data and process integration into these business processes.
RFID ENTERPRISE SUPPLY CHAIN SYSTEMS
- Supply Chain Planning
- Supply Chain Execution
- Supply Chain Management
The study of strategies, goals and objectives, the core component of the Adaptive Multi-Layer Business Process Model is not applicable. It moves to the layer of middleware technologies of the Adaptive Multi-Layer Business Process Model only when the organization's operations have met certain criteria. This SCM aspect looks at the intervening mechanism to integrate with ERP systems (e.g. Oracle-PeopleSoft), web services, handheld devices (e.g. The METRO Group Future Store) and smart shelves (e.g. Chain Pharmacy Operations).
RFID BUSINESS PROCESS LIFE CYCLE
- Older Life-Cycle Models
- Newer Life-Cycle Models
Then they move on to design, implement and test the RFID business processes. The incremental model does not allow iterations of the model; it only allows the incremental implementation phases. In response to technology changes, the model sends feedback to the beginning of the model's first phase.
RFID SECURITY, PRIVACY, AND RISK ASSESSMENT
SECURITY POLICY
- Organizational Policy
- Issue-Specific Policy
- System-Specific Policy
RFID Security, Privacy and Risk Assessment 167 Password protection policy to define standards for creating,. VPN security policy to define requirements for virtual telephone network (VPN) connections to the organization's network. Wireless communication policy to define standards for wireless systems used to connect to the organization's networks.
SECURITY OF RFID QUERY
- Query Scenario
- Security Problems
When the secure device receives the certificate, it reads the Electronic Product Code (EPC) compliant tags according to the content of the query and stores the data in the manufacturer's EPC Information Systems (EPC IS). The manufacturer and retailer then use SSL to establish a secure encrypted connection to allow the retailer to send the request to the manufacturer. First, it doesn't take into account that “128 bytes of data on most tags are visible to anyone with a reader, without tags.
ATTACKS ON RFID TECHNOLOGY
- War-Walking and Lifting
- Counterfeiting
- Denial-of-Service
- Weak Cryptography
Texas Instruments tags for this platform have more processing power and are more expensive than lower frequency passive RFID tags. Imagine when this type of technology becomes available for passive RFID tags with more processing power at low cost. This can cause denial of service not only for RFID tags, but also at the data and network level.