You are not signed in. Sign in.

List Books: Buy books on ListBooks.org

RFID in the Supply Chain: A Guide to Selection and Implementation »

Book cover image of RFID in the Supply Chain: A Guide to Selection and Implementation by Judith M. Myerson

Authors: Judith M. Myerson
ISBN-13: 9780849330186, ISBN-10: 0849330181
Format: Hardcover
Publisher: Taylor & Francis, Inc.
Date Published: November 2006
Edition: (Non-applicable)

Find Best Prices for This Book »

Author Biography: Judith M. Myerson

Book Synopsis

Giving organizations the ability to track, secure, and manage items from the time they are raw materials through the life-cycle of the product, radio frequency identification (RFID) makes internal processes more efficient and improves overall supply chain responsiveness. Helping you bring your organization into the future, RFID in the Supply Chain: A Guide to Selection and Implementation explains RFID technology, its applications in SCM, data storage and retrieval, business processes, operational and implementation problems, risks, security and privacy, facility layout, handling systems and methods, and transportation costs. In short, with its soup-to-nuts coverage, the book ensures that your RFID implementation is successful and that you get the most from your investment.

The book discusses the major paradigm shift in product traceability that began with transitioning to RFID technology from bar code technology. It examines the economic feasibility of rolling out RFID and the challenges in supply chain synchronization, customer privacy, security, operations and IT, logistics, program management, education and training, and implementation, as well as what lessons have been learned. The author addresses the RFID business processes needed to analyze and resolve problems the suppliers face when they deal with multiple customers, each with a different mandate, and with their own set of suppliers.

Going beyond the technology and how it has changed supply chain processes, the book includes selection guidelines and implementation examples, such as speed of tag reads versus quality of computer inputs and optimal tag location. The author discusses the implementation of a business process model and the separate but equal concerns that business and IT executives have about the implementation of RFID applications. The book also covers security, integrated control management linked to the corporate strategy, and laws and regulations.

Table of Contents


Tables     xvii
Figures     xix
Preface     xxi
Supply Chain Overview     1
Paradigm Shift in Product Traceability     1
Transitioning to RFID Technology     1
Tracking Problems     5
Supply Chain     9
RFID Markets     12
Economic Feasibility of Rolling Out RFID     15
Supply Chain Synchronization     16
Customer Privacy Issues     16
Security Challenges     17
Operational and IT Challenges (Hardware, Software, System Compatibility, People Expertise)     17
Logistical Challenges     18
Program Management Challenges     19
Education and Training     19
Standard Implementation Challenges     20
Lessons Learned     20
Iraq: Asset Visibility     20
Wal-Mart: Implementation Training     23
International Paper: Business Processes     23
Procter & Gamble: Docking Loading Throughput     23
RFID Technology Infrastructure     24
Open Architecture: Savant Server     24
Major Vendor Servers     26
Tags     27
Antennas     29
Readers     30
Electronic Product Code     31
Object Name Service     33
EPC Information Service     34
Scenarios     35
Web-Centric Supply Chain Management Challenges     36
Combining Web-Centric with RFID Technology     36
E-Business Applications     36
Advantages and Disadvantages     37
References     38
RFID Technology     39
Primary Drivers     39
RFID Technology Deployment     39
RFID Technology: Basics, Advantages, and Disadvantages     43
Selection Guidance on Tags, Servers, and Middleware     46
EPC Tag Classes     47
ISO Standards     48
RFID Device Selection Criteria     50
What Are the Objects to Be Tagged?     50
What Are the Materials of the Objects and How Do They Affect Reading Ranges?     51
What Are Chip Antenna Types?     53
What Readers Can Read Both Passive and Active Tags?     55
What Are Other Considerations that Could Affect Externally the Optimal Location of Tags?     56
What Readers Can Read Both RFID Tags and Bar Codes for Easy Transitioning?     56
How Do Various Entities Organize Frequency Types or Ranges?     57
What Standards Are the Vendors Using for Their RFID Products?     60
Middleware Selection Criteria     60
RFID Plug-and-Play     61
RFID Supply Chain Execution Applications     62
RFID Platform-Dependent Legacy Systems     64
RFID Integration Hubs     67
RFID Implementation Examples     68
References     73
RFID Applications in Supply Chain Management     75
Logistics     75
SCM Logistics Maturity Model     77
Logistics: Reactive, Proactive, and RFID     79
Management     82
Oracle-PeopleSoft     82
Microsoft RFID Council     83
IBM     84
The METRO Group Future Store     85
Inventory Management     86
Information Management     86
Check-Out     87
Chain Pharmacy Operations     88
SAP     89
Web Services     91
Object Name Service     93
EPC Information Service     93
Electronic Product Code     95
Savant Servers     96
EPCglobal and the Auto-ID Center     97
References      100
Storing and Retrieving Data     101
Two Big Questions     101
Relationship between Data Storage and Retrieval Issues     101
Understanding Risks Associated with RFID/EPC Technologies     102
EPC Technology in Functional Areas     103
Perceptions of Product Benefits     103
Database CD on Local Workstation     105
Remote Database Servers     106
How Can We Reduce the Number of Traffic Bottleneck Incidents?     107
Why Do We Need to Divide the Database into the Static and Dynamic Partitions?     108
What Kind of Database Management Should We Get to Satisfy Our Requirements?     108
What Is the Optimal Way of Increasing Throughputs and Operational Efficiency?     109
Peoplesoft Enterprise Systems     110
IBM RFID Product     110
How Do We Reduce Loading Times Cost Effectively?     111
How Do We Migrate a Relational Database Management System to Another?     112
How Is Partitioning Emulated and What Are the Partitioning Types?     112
How Do You Determine the Number of Partitions for a Database?     115
What Are the Factors You Should Consider in Your Migration Planning?     116
Databases in Company Merger Processes     117
Hybrid Databases     117
Web Services     118
References     120
RFID Business Processes     121
Implementation Approaches     122
Dual Shipping Faces     123
Two Sides of the Mandates     124
RFID Implementation Checklist     124
Business Process Reengineering     126
Procter & Gamble: Dock Loading Throughput     127
Canus: Changing Antenna's Orientation     128
Unilever: Changing Tag Placement     128
Heinz: Adapting Tag Requirements     128
Gillette Scenario: Misplaced Case     129
Canus: Adjusting Computer Speed     131
Software Checklist     131
Organizational Maturity     132
Basic Multi-Layer RFID Business Process Model     135
Adaptive Multi-Layer RFID Business Process Model     136
Adaptive Maturity     137
Application Adaptors     138
The METRO Group     139
Predictive Multi-Layer Business Process Model     140
RFID Business Processes Strategy     143
IBM RFID Strategy     143
Heinz RFID Strategy     144
Canus RFID Strategy     144
International Paper RFID Strategy     145
Kayser-Roth RFID Strategy     145
Philips Semiconductors RFID Strategy     146
Intel RFID Strategy     148
Unilever RFID Strategy     149
Major Clothier Retailer RFID Strategy     149
Marks and Spencer RFID Strategy     149
RFID Enterprise Supply Chain Systems     150
Supply Chain Planning     150
Supply Chain Execution     151
Supply Chain Management     153
SCM Logistics     153
SCM Management     155
RFID Business Process Life Cycle     156
Older Life-Cycle Models     158
Waterfall Life Cycle     158
Incremental Life Cycle     159
Spiral Life Cycle     161
Newer Life-Cycle Models     162
Adaptive Linear Feedback Life Cycle     162
Adaptive Dynamic Life Cycle     162
References     163
RFID Security, Privacy, and Risk Assessment     165
Security Policy     165
Organizational Policy     166
Issue-Specific Policy     166
System-Specific Policy     167
Security of RFID Query     168
Query Scenario      168
Security Problems     169
Attacks on RFID Technology     170
War-Walking and Lifting     170
Counterfeiting     172
Denial-of-Service     173
Weak Cryptography     173
Defense in Depth     176
Risk Assessment     177
Risk Assessment Profile     178
Internal Asset Risk Assessment     178
Risk Assessment Service     182
References     183
Passive RFID Technology     185
Avonwood (http://www.avonwood.com)     185
Eureka 111 Systems     185
Eureka 211 Systems     185
Escort Memory Systems (http://www.ems-rfid.com/)     186
HMS Passive Read/Write Systems     186
HMS100 Series Passive Read/WriteTags     186
HMS800 Series Passive Reader/Writers     186
HMS827 Series Passive Reader/Writer     186
HMS828 Series Passive Reader/Writer     187
HMS820-04/HMS830-04 Series Passive Conveyor Reader/Writers     187
HMS820-08/HMS830-08 Series Passive Wide-Plate Reader/Writers     187
HMS820/HMS830 Passive Reader/Writers     187
HMS827-04 Passive Conveyor Reader/Writer      188
HMS827-05 Passive Tubular Reader/Writer     188
HMS814/HMS816 Portable Reader/Writers     188
Passive Read-Only Systems     188
ES600-Series Read-Only Tags     189
RS427 Read-Only Reader     189
RS427-04 Passive Read-Only Conveyor Antenna     189
Intermec (www.intermec.com)     189
RFID Tags and Inserts     189
RFID Readers     191
Intellitag PM4i Printer     194
RFID Partners     195
Northern Apex (www.northernapex-rfid.com)     195
Inlays and Tags     195
Readers and Antennas     197
900-MHz Readers and Antennas     197
13.56-MHz Readers and Antennas     198
Philips (www.semiconductors.philips.com)     199
I-CODE Transponder ICs     199
MIFARE Reader Components     201
SAMSys     201
Symbol Technologies (www.symbol.com; formerly Matrics)     202
Tags     202
Readers     202
Antennas     203
TAGSYS (www.tagsys.com)     204
Industry and Logistics Market     204
RFID Chips     205
RFID Tags     206
RFID Readers      207
RFID Antennas     208
RFID Kits     209
Industry and Logistics Partner Products     210
Athelia     210
Blackroc Technology (www.blackroc.com)     213
DAP Technologies (www.daptech.com)     213
EIA (www.eia-italia.com)     214
GIS (www.gis-net.de)     214
ichain (www.ichain.co-za)     215
ICS (www.ica.nl)     215
Microraab (www.microraab.hu)     216
Minec (www.minec.com)     217
Nordicid (www.nordicid.com)     218
Northern Apex (www.northernapex-rfid.com)     218
System Concepts (www.systemconcepts.com)     219
Teraoka Seiko (teraoka.digi.co.jp)     220
Toshiba (www.toshibatec-eu.com)     220
Touchstar (www.touchpc.com)     220
Products for the Library Market     221
TAGSYS Partner Products for the Library Market     224
Blackroc Technology (www.blackroc.com)     225
Minec (www.minec.com)     225
Vernon Library Supplies (www.vernlib.com)     225
Gemsys (www.gemsys.no)     226
VTLS Inc. (www.vtls.com)     226
Tech Logic (www.tech-logic.com)     226
Teraoka Seiko (teraoka.digi.co.jp)     227
Toshiba (www.toshibatec-eu.com)     227
Textile Rental Industry     227
TAGSYS Partner Products for Textile Rental Industry     232
Laundry Computer Technics (www.LCT.nl)     233
Jensen (www.jensen-group.com)     234
Positek RFID (www.positekrfid.com)     234
Metalprogetti (metalpro@tin.il)     235
Texas Instruments-RFID (www.ti-rfid.com)     236
13.56-MHz Products     236
Low-Frequency Products     237
Software     238
Active RFID Technology     241
Alien Technology (www.alientechnology.com)     241
Axcess Inc. (www.axcessinc.com)     243
Escort Memory Systems     243
Microtec (www.ksw-microtec.de)     246
SAMSys (www.samsys.com)     247
Savi Technology (www.savi.com)     248
WhereNet (www.wherenet.com)     250
Semi-Passive RFID Technology     253
Alien Technology (www.alientechnology.com)     253
Avonwood     254
KSW Microtec (www.ksw-microtec.com)     255
RFID Middleware     257
Acsis Inc. (www.acsis.com)     257
Axcess Inc. (www.axcessinc.com)     258
Blue Vector Systems (www.bluevectorsystems.com)     258
ConnecTerra (www.connecterra.com)     259
Data Brokers (www.databrokers.com)     259
EPCglobal (www.epcglobalinc.org)     261
Franwell (www.franwell.com)     261
GlobeRanger (www.globeranger.com)     261
i2 Technologies (www.i2.com)     262
Manhattan Associates (www.manh.com)     262
OATSystems (www.oatsystems.com)     262
Oracle (www.oracle.com)     263
RF Code (www.rfcode.com)     263
Savi Technology (www.savi.com)     264
Sun (www.sun.com)     264
T3Ci (www.t3ci.com)     265
TIBCO (www.tibco.com)     265
VeriSign (www.verisign.com)     265
webMethods (www.webmethods.com)     266
Network/Server Interfaces     267
Escort Memory Systems (www.ems-rfid.com)     267
WhereNet (www.wherenet.com)     269
Blue Vector Systems (www.bluevectorsystems.com)     271
Physical Markup Language for RFID Applications     273
XML File Instances     273
Instance 1: Multiple Tags with No Data     274
Instance 2: Tags with Data      275
Instance 3: Memory Tags with Data     276
Instance 4: Tags with Mounted Sensors     277
Instance 5: Observed Data in Hexbinary Format     278
XML Schemas     279
References     287
Warehouse Management Systems     289
RT-Systems: RT-Locator     289
Robocom     290
Management Control     291
Inbound     291
Inventory Management     291
Outbound     291
RDT Subsystem     292
Other RIMS Modules     292
HighJump     293
KARE Technologies     293
Daly Commerce     294
Supply Chain Execution Systems     297
HighJump     297
Provia     302
Softeon     302
ClearOrbit     306
Pro Series for Any ERP     307
Pro Series for Oracle 10.7/11.0/11i     309
Pro Series for SAP R/3     309
Peoplesoft (Formerly JD Edwards, Now Part of Oracle)     311
Enterprise Intelligence: WebFOCUS     313
Data Sources     313
Reporting Server     313
Data Management     315
Microsoft Integration     317
Portal Integration     317
Reports as Web Services     318
Web Services Adapter     319
Miscellaneous     319
Enterprise Databases     321
Base/One     321
Base/One Foundation Class Library     322
Database Command Processor     322
Common SQL Commands     323
Built-In Basic Commands     323
Built-In Commands That Use the Data Dictionary     323
DOS and WIN Command Lines     324
Error Suppression Commands     324
Database Buffer Commands     324
Database Manager Commands     325
Custom Commands     325
Macro Assignment Command Lines     326
Database Library     326
Systems Requirements     329
CodeBase     330
Windows CE 4.0     330
J2ME     331
JDBC 3.0     332
UNIX     334
Linux     334
Bundle for Windows and .NET     335
Delphi and Kylix     335
SQL 2.0 for Windows     335
64-Bit Add-On     335
Maximum Limits     336
Slow Query Performance     337
Unique Tag     337
Filtered Tag     337
Tag Using General Collating Sequence     339
Windows Registry     340
Using CodeBase from Microsoft Access     340
Running Visual Basic Example     341
Running Visual C++ Example     341
Data Synchronization: GoldenGate     343
Primary Modules     343
GoldenGate Capture Core     343
GoldenGate Delivery Core     344
GoldenGate Manager Core     344
Software Modules     344
Database Replication     345
Partitioning Large Databases: Oracle     347
Create Table Example     347
Create Table for Coded Unusable Items     350
Software Engineering Standards     353
IEEE Standards     353
ISO/IEC Standards     356
Related Standards     358
Business Process Automation: IBM Products     359
Commercial Assessment Products     363
HackerShield     363
NetRecon     364
Risk-Related Software     365
Sample Security Policy Templates     377
Acceptable Use Policy      377
Overview     378
Purpose     378
Scope     378
Policy     378
General Use and Ownership     378
Security and Proprietary Information     379
Unacceptable Use     380
Enforcement     382
Definitions     382
Acquisition Assessment Policy     382
Purpose     382
Scope     382
Policy     382
General     382
Requirements     383
Enforcement     384
Audit Vulnerability Scan Policy     384
Purpose     384
Scope     385
Policy     385
Network Control     385
Service Degradation or Interruption     385
Client Point of Contact during the Scanning Period     386
Scanning Period     386
Enforcement     386
Revision History     386
Automatically Forwarded E-Mail Policy     386
Purpose     386
Scope     386
Policy     386
Enforcement     387
Definitions     387
Database Password Policy      387
Purpose     387
Scope     388
Policy     388
General     388
Specific Requirements     388
Enforcement     389
Definitions     390
E-Mail Retention Policy     390
Purpose     390
Scope     391
Policy     391
Administrative Correspondence     391
Fiscal Correspondence     391
General Correspondence     391
Ephemeral Correspondence     392
Instant Messenger Correspondence     392
Encrypted Communications     392
Recovering Deleted E-Mail via Backup Media     392
Enforcement     392
Definitions     392
Revision History     393
Extranet Policy     393
Purpose     393
Scope     393
Policy     394
Prerequisites     394
Establishing Connectivity     395
Modifying or Changing Connectivity and Access     395
Terminating Access     395
Enforcement     396
Definitions     396
Information Sensitivity Policy      396
Purpose     396
Scope     397
Policy     397
Enforcement     400
Definitions     400
Password Policy     402
Overview     402
Purpose     403
Scope     403
Policy     403
General     403
Guidelines     404
Enforcement     406
Definitions     406
Remote Access Policy     407
Purpose     407
Scope     407
Policy     407
General     407
Requirements     408
Enforcement     409
Definitions     409
Risk Assessment Policy     411
Purpose     411
Scope     411
Policy     412
Risk Assessment Process     412
Enforcement     412
Definitions     412
Router Security Policy     412
Purpose     412
Scope     413
Policy     413
Enforcement     413
Definitions     414
Server Security Policy     414
Purpose      414
Scope     414
Policy     414
Ownership and Responsibilities     414
General Configuration Guidelines     415
Monitoring     416
Compliance     416
Enforcement     416
Definitions     416
Virtual Private Network (VPN) Policy     417
Purpose     417
Scope     417
Policy     417
Enforcement     418
Definitions     418
Wireless Communication Policy     418
Purpose     418
Scope     419
Policy     419
Register Access Points and Cards     419
Approved Technology     419
VPN Encryption and Authentication     419
Setting the SSID     419
Enforcement     419
Definitions     420
Revision History     420
Index     421

Subjects