E-Book, Englisch, 456 Seiten
Myerson RFID in the Supply Chain
Erscheinungsjahr 2006
ISBN: 978-1-4200-1298-9
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
A Guide to Selection and Implementation
E-Book, Englisch, 456 Seiten
ISBN: 978-1-4200-1298-9
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Giving organizations the ability to track, secure, and manage items from the time they are raw materials through the life-cycle of the product, radio frequency identification (RFID) makes internal processes more efficient and improves overall supply chain responsiveness. Helping you bring your organization into the future, RFID in the Supply Chain: A Guide to Selection and Implementation explains RFID technology, its applications in SCM, data storage and retrieval, business processes, operational and implementation problems, risks, security and privacy, facility layout, handling systems and methods, and transportation costs. In short, with its soup-to-nuts coverage, the book ensures that your RFID implementation is successful and that you get the most from your investment. The book discusses the major paradigm shift in product traceability that began with transitioning to RFID technology from bar code technology. It examines the economic feasibility of rolling out RFID and the challenges in supply chain synchronization, customer privacy, security, operations and IT, logistics, program management, education and training, and implementation, as well as what lessons have been learned. The author addresses the RFID business processes needed to analyze and resolve problems the suppliers face when they deal with multiple customers, each with a different mandate, and with their own set of suppliers. Going beyond the technology and how it has changed supply chain processes, the book includes selection guidelines and implementation examples, such as speed of tag reads versus quality of computer inputs and optimal tag location. The author discusses the implementation of a business process model and the separate but equal concerns that business and IT executives have about the implementation of RFID applications. The book also covers security, integrated control management linked to the corporate strategy, and laws and regulations.
Zielgruppe
Managers with the following responsibilities: supply chain management, inventory control, strategic planning, procurement, manufacturing optimization, operational performance, distribution, and IT
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Supply Chain Overview
Paradigm Shift in Product Traceability
RFID Markets
Economic Feasibility of Rolling out RFID
RFID Technology Infrastructure
Web-Centric Supply Chain Management challenges RFID Technology
Primary Drivers
Selection Guideline on Tags, Servers and Middleware
RFID Implementation Examples RFID applications in Supply Chain Management
Logistics
Management Storing and retrieving data
Two Big Questions
EPC Technology in Functional Areas
Perceptions of Retail Product Benefits
Database CD on Local Workstation
Remote Database Servers
Databases in Company Merger Processes
Hybrid Databases
Web Services RFID Business Processes
Business Process Reengineering
Organizational Maturity
Basic Multi-Layer Business Process Model
Adaptive Multi-Layer Business Process Model
Predictive Multi-Layer Business Process Model
RFID Business Processes Strategies
RFID Enterprise Supply Chain Systems
RFID Business Process Life Cycle RFID Security, Privacy and Risk Assessment
Security Policy
Security of RFID Query
Attacks on RFID Technology
Defense in Depth
Risk Assessment Appendix A: Passive RFID Technology
Appendix B: Active RFID Technology
Appendix C: Semi-Passive RFID Technology
Appendix D: RFID Middleware
Appendix E: Network/Server Interfaces
Appendix F: Physical Markup Language for RFID applications
Appendix G: Warehouse Management Systems
Appendix H: Supply Chain Execution Systems
Appendix I: Enterprise Intelligence:WebFOCUS
Appendix J: Enterprise Databases
Appendix K: Data synchronization: GoldenGate
Appendix L: Partitioning Large Databases: Oracle
Appendix M: Software Engineering Standards
Appendix N: Business Process Automation: IBM Products
Appendix O: Commercial Assessment Tools
Appendix P: Risk Related Software
Appendix Q: Sample security Policy Templates