Authors: Judith M. Myerson
ISBN-13: 9780849330186, ISBN-10: 0849330181
Format: Hardcover
Publisher: Taylor & Francis, Inc.
Date Published: November 2006
Edition: (Non-applicable)
Book Synopsis
Giving organizations the ability to track, secure, and manage items from the time they are raw materials through the life-cycle of the product, radio frequency identification (RFID) makes internal processes more efficient and improves overall supply chain responsiveness. Helping you bring your organization into the future, RFID in the Supply Chain: A Guide to Selection and Implementation explains RFID technology, its applications in SCM, data storage and retrieval, business processes, operational and implementation problems, risks, security and privacy, facility layout, handling systems and methods, and transportation costs. In short, with its soup-to-nuts coverage, the book ensures that your RFID implementation is successful and that you get the most from your investment.
The book discusses the major paradigm shift in product traceability that began with transitioning to RFID technology from bar code technology. It examines the economic feasibility of rolling out RFID and the challenges in supply chain synchronization, customer privacy, security, operations and IT, logistics, program management, education and training, and implementation, as well as what lessons have been learned. The author addresses the RFID business processes needed to analyze and resolve problems the suppliers face when they deal with multiple customers, each with a different mandate, and with their own set of suppliers.
Going beyond the technology and how it has changed supply chain processes, the book includes selection guidelines and implementation examples, such as speed of tag reads versus quality of computer inputs and optimal tag location. The author discusses the implementation of a business process model and the separate but equal concerns that business and IT executives have about the implementation of RFID applications. The book also covers security, integrated control management linked to the corporate strategy, and laws and regulations.
Table of Contents
Tables xvii
Figures xix
Preface xxi
Supply Chain Overview 1
Paradigm Shift in Product Traceability 1
Transitioning to RFID Technology 1
Tracking Problems 5
Supply Chain 9
RFID Markets 12
Economic Feasibility of Rolling Out RFID 15
Supply Chain Synchronization 16
Customer Privacy Issues 16
Security Challenges 17
Operational and IT Challenges (Hardware, Software, System Compatibility, People Expertise) 17
Logistical Challenges 18
Program Management Challenges 19
Education and Training 19
Standard Implementation Challenges 20
Lessons Learned 20
Iraq: Asset Visibility 20
Wal-Mart: Implementation Training 23
International Paper: Business Processes 23
Procter & Gamble: Docking Loading Throughput 23
RFID Technology Infrastructure 24
Open Architecture: Savant Server 24
Major Vendor Servers 26
Tags 27
Antennas 29
Readers 30
Electronic Product Code 31
Object Name Service 33
EPC Information Service 34
Scenarios 35
Web-Centric Supply Chain Management Challenges 36
Combining Web-Centric with RFID Technology 36
E-Business Applications 36
Advantages and Disadvantages 37
References 38
RFID Technology 39
Primary Drivers 39
RFID Technology Deployment 39
RFID Technology: Basics, Advantages, and Disadvantages 43
Selection Guidance on Tags, Servers, and Middleware 46
EPC Tag Classes 47
ISO Standards 48
RFID Device Selection Criteria 50
What Are the Objects to Be Tagged? 50
What Are the Materials of the Objects and How Do They Affect Reading Ranges? 51
What Are Chip Antenna Types? 53
What Readers Can Read Both Passive and Active Tags? 55
What Are Other Considerations that Could Affect Externally the Optimal Location of Tags? 56
What Readers Can Read Both RFID Tags and Bar Codes for Easy Transitioning? 56
How Do Various Entities Organize Frequency Types or Ranges? 57
What Standards Are the Vendors Using for Their RFID Products? 60
Middleware Selection Criteria 60
RFID Plug-and-Play 61
RFID Supply Chain Execution Applications 62
RFID Platform-Dependent Legacy Systems 64
RFID Integration Hubs 67
RFID Implementation Examples 68
References 73
RFID Applications in Supply Chain Management 75
Logistics 75
SCM Logistics Maturity Model 77
Logistics: Reactive, Proactive, and RFID 79
Management 82
Oracle-PeopleSoft 82
Microsoft RFID Council 83
IBM 84
The METRO Group Future Store 85
Inventory Management 86
Information Management 86
Check-Out 87
Chain Pharmacy Operations 88
SAP 89
Web Services 91
Object Name Service 93
EPC Information Service 93
Electronic Product Code 95
Savant Servers 96
EPCglobal and the Auto-ID Center 97
References 100
Storing and Retrieving Data 101
Two Big Questions 101
Relationship between Data Storage and Retrieval Issues 101
Understanding Risks Associated with RFID/EPC Technologies 102
EPC Technology in Functional Areas 103
Perceptions of Product Benefits 103
Database CD on Local Workstation 105
Remote Database Servers 106
How Can We Reduce the Number of Traffic Bottleneck Incidents? 107
Why Do We Need to Divide the Database into the Static and Dynamic Partitions? 108
What Kind of Database Management Should We Get to Satisfy Our Requirements? 108
What Is the Optimal Way of Increasing Throughputs and Operational Efficiency? 109
Peoplesoft Enterprise Systems 110
IBM RFID Product 110
How Do We Reduce Loading Times Cost Effectively? 111
How Do We Migrate a Relational Database Management System to Another? 112
How Is Partitioning Emulated and What Are the Partitioning Types? 112
How Do You Determine the Number of Partitions for a Database? 115
What Are the Factors You Should Consider in Your Migration Planning? 116
Databases in Company Merger Processes 117
Hybrid Databases 117
Web Services 118
References 120
RFID Business Processes 121
Implementation Approaches 122
Dual Shipping Faces 123
Two Sides of the Mandates 124
RFID Implementation Checklist 124
Business Process Reengineering 126
Procter & Gamble: Dock Loading Throughput 127
Canus: Changing Antenna's Orientation 128
Unilever: Changing Tag Placement 128
Heinz: Adapting Tag Requirements 128
Gillette Scenario: Misplaced Case 129
Canus: Adjusting Computer Speed 131
Software Checklist 131
Organizational Maturity 132
Basic Multi-Layer RFID Business Process Model 135
Adaptive Multi-Layer RFID Business Process Model 136
Adaptive Maturity 137
Application Adaptors 138
The METRO Group 139
Predictive Multi-Layer Business Process Model 140
RFID Business Processes Strategy 143
IBM RFID Strategy 143
Heinz RFID Strategy 144
Canus RFID Strategy 144
International Paper RFID Strategy 145
Kayser-Roth RFID Strategy 145
Philips Semiconductors RFID Strategy 146
Intel RFID Strategy 148
Unilever RFID Strategy 149
Major Clothier Retailer RFID Strategy 149
Marks and Spencer RFID Strategy 149
RFID Enterprise Supply Chain Systems 150
Supply Chain Planning 150
Supply Chain Execution 151
Supply Chain Management 153
SCM Logistics 153
SCM Management 155
RFID Business Process Life Cycle 156
Older Life-Cycle Models 158
Waterfall Life Cycle 158
Incremental Life Cycle 159
Spiral Life Cycle 161
Newer Life-Cycle Models 162
Adaptive Linear Feedback Life Cycle 162
Adaptive Dynamic Life Cycle 162
References 163
RFID Security, Privacy, and Risk Assessment 165
Security Policy 165
Organizational Policy 166
Issue-Specific Policy 166
System-Specific Policy 167
Security of RFID Query 168
Query Scenario 168
Security Problems 169
Attacks on RFID Technology 170
War-Walking and Lifting 170
Counterfeiting 172
Denial-of-Service 173
Weak Cryptography 173
Defense in Depth 176
Risk Assessment 177
Risk Assessment Profile 178
Internal Asset Risk Assessment 178
Risk Assessment Service 182
References 183
Passive RFID Technology 185
Avonwood (http://www.avonwood.com) 185
Eureka 111 Systems 185
Eureka 211 Systems 185
Escort Memory Systems (http://www.ems-rfid.com/) 186
HMS Passive Read/Write Systems 186
HMS100 Series Passive Read/WriteTags 186
HMS800 Series Passive Reader/Writers 186
HMS827 Series Passive Reader/Writer 186
HMS828 Series Passive Reader/Writer 187
HMS820-04/HMS830-04 Series Passive Conveyor Reader/Writers 187
HMS820-08/HMS830-08 Series Passive Wide-Plate Reader/Writers 187
HMS820/HMS830 Passive Reader/Writers 187
HMS827-04 Passive Conveyor Reader/Writer 188
HMS827-05 Passive Tubular Reader/Writer 188
HMS814/HMS816 Portable Reader/Writers 188
Passive Read-Only Systems 188
ES600-Series Read-Only Tags 189
RS427 Read-Only Reader 189
RS427-04 Passive Read-Only Conveyor Antenna 189
Intermec (www.intermec.com) 189
RFID Tags and Inserts 189
RFID Readers 191
Intellitag PM4i Printer 194
RFID Partners 195
Northern Apex (www.northernapex-rfid.com) 195
Inlays and Tags 195
Readers and Antennas 197
900-MHz Readers and Antennas 197
13.56-MHz Readers and Antennas 198
Philips (www.semiconductors.philips.com) 199
I-CODE Transponder ICs 199
MIFARE Reader Components 201
SAMSys 201
Symbol Technologies (www.symbol.com; formerly Matrics) 202
Tags 202
Readers 202
Antennas 203
TAGSYS (www.tagsys.com) 204
Industry and Logistics Market 204
RFID Chips 205
RFID Tags 206
RFID Readers 207
RFID Antennas 208
RFID Kits 209
Industry and Logistics Partner Products 210
Athelia 210
Blackroc Technology (www.blackroc.com) 213
DAP Technologies (www.daptech.com) 213
EIA (www.eia-italia.com) 214
GIS (www.gis-net.de) 214
ichain (www.ichain.co-za) 215
ICS (www.ica.nl) 215
Microraab (www.microraab.hu) 216
Minec (www.minec.com) 217
Nordicid (www.nordicid.com) 218
Northern Apex (www.northernapex-rfid.com) 218
System Concepts (www.systemconcepts.com) 219
Teraoka Seiko (teraoka.digi.co.jp) 220
Toshiba (www.toshibatec-eu.com) 220
Touchstar (www.touchpc.com) 220
Products for the Library Market 221
TAGSYS Partner Products for the Library Market 224
Blackroc Technology (www.blackroc.com) 225
Minec (www.minec.com) 225
Vernon Library Supplies (www.vernlib.com) 225
Gemsys (www.gemsys.no) 226
VTLS Inc. (www.vtls.com) 226
Tech Logic (www.tech-logic.com) 226
Teraoka Seiko (teraoka.digi.co.jp) 227
Toshiba (www.toshibatec-eu.com) 227
Textile Rental Industry 227
TAGSYS Partner Products for Textile Rental Industry 232
Laundry Computer Technics (www.LCT.nl) 233
Jensen (www.jensen-group.com) 234
Positek RFID (www.positekrfid.com) 234
Metalprogetti (metalpro@tin.il) 235
Texas Instruments-RFID (www.ti-rfid.com) 236
13.56-MHz Products 236
Low-Frequency Products 237
Software 238
Active RFID Technology 241
Alien Technology (www.alientechnology.com) 241
Axcess Inc. (www.axcessinc.com) 243
Escort Memory Systems 243
Microtec (www.ksw-microtec.de) 246
SAMSys (www.samsys.com) 247
Savi Technology (www.savi.com) 248
WhereNet (www.wherenet.com) 250
Semi-Passive RFID Technology 253
Alien Technology (www.alientechnology.com) 253
Avonwood 254
KSW Microtec (www.ksw-microtec.com) 255
RFID Middleware 257
Acsis Inc. (www.acsis.com) 257
Axcess Inc. (www.axcessinc.com) 258
Blue Vector Systems (www.bluevectorsystems.com) 258
ConnecTerra (www.connecterra.com) 259
Data Brokers (www.databrokers.com) 259
EPCglobal (www.epcglobalinc.org) 261
Franwell (www.franwell.com) 261
GlobeRanger (www.globeranger.com) 261
i2 Technologies (www.i2.com) 262
Manhattan Associates (www.manh.com) 262
OATSystems (www.oatsystems.com) 262
Oracle (www.oracle.com) 263
RF Code (www.rfcode.com) 263
Savi Technology (www.savi.com) 264
Sun (www.sun.com) 264
T3Ci (www.t3ci.com) 265
TIBCO (www.tibco.com) 265
VeriSign (www.verisign.com) 265
webMethods (www.webmethods.com) 266
Network/Server Interfaces 267
Escort Memory Systems (www.ems-rfid.com) 267
WhereNet (www.wherenet.com) 269
Blue Vector Systems (www.bluevectorsystems.com) 271
Physical Markup Language for RFID Applications 273
XML File Instances 273
Instance 1: Multiple Tags with No Data 274
Instance 2: Tags with Data 275
Instance 3: Memory Tags with Data 276
Instance 4: Tags with Mounted Sensors 277
Instance 5: Observed Data in Hexbinary Format 278
XML Schemas 279
References 287
Warehouse Management Systems 289
RT-Systems: RT-Locator 289
Robocom 290
Management Control 291
Inbound 291
Inventory Management 291
Outbound 291
RDT Subsystem 292
Other RIMS Modules 292
HighJump 293
KARE Technologies 293
Daly Commerce 294
Supply Chain Execution Systems 297
HighJump 297
Provia 302
Softeon 302
ClearOrbit 306
Pro Series for Any ERP 307
Pro Series for Oracle 10.7/11.0/11i 309
Pro Series for SAP R/3 309
Peoplesoft (Formerly JD Edwards, Now Part of Oracle) 311
Enterprise Intelligence: WebFOCUS 313
Data Sources 313
Reporting Server 313
Data Management 315
Microsoft Integration 317
Portal Integration 317
Reports as Web Services 318
Web Services Adapter 319
Miscellaneous 319
Enterprise Databases 321
Base/One 321
Base/One Foundation Class Library 322
Database Command Processor 322
Common SQL Commands 323
Built-In Basic Commands 323
Built-In Commands That Use the Data Dictionary 323
DOS and WIN Command Lines 324
Error Suppression Commands 324
Database Buffer Commands 324
Database Manager Commands 325
Custom Commands 325
Macro Assignment Command Lines 326
Database Library 326
Systems Requirements 329
CodeBase 330
Windows CE 4.0 330
J2ME 331
JDBC 3.0 332
UNIX 334
Linux 334
Bundle for Windows and .NET 335
Delphi and Kylix 335
SQL 2.0 for Windows 335
64-Bit Add-On 335
Maximum Limits 336
Slow Query Performance 337
Unique Tag 337
Filtered Tag 337
Tag Using General Collating Sequence 339
Windows Registry 340
Using CodeBase from Microsoft Access 340
Running Visual Basic Example 341
Running Visual C++ Example 341
Data Synchronization: GoldenGate 343
Primary Modules 343
GoldenGate Capture Core 343
GoldenGate Delivery Core 344
GoldenGate Manager Core 344
Software Modules 344
Database Replication 345
Partitioning Large Databases: Oracle 347
Create Table Example 347
Create Table for Coded Unusable Items 350
Software Engineering Standards 353
IEEE Standards 353
ISO/IEC Standards 356
Related Standards 358
Business Process Automation: IBM Products 359
Commercial Assessment Products 363
HackerShield 363
NetRecon 364
Risk-Related Software 365
Sample Security Policy Templates 377
Acceptable Use Policy 377
Overview 378
Purpose 378
Scope 378
Policy 378
General Use and Ownership 378
Security and Proprietary Information 379
Unacceptable Use 380
Enforcement 382
Definitions 382
Acquisition Assessment Policy 382
Purpose 382
Scope 382
Policy 382
General 382
Requirements 383
Enforcement 384
Audit Vulnerability Scan Policy 384
Purpose 384
Scope 385
Policy 385
Network Control 385
Service Degradation or Interruption 385
Client Point of Contact during the Scanning Period 386
Scanning Period 386
Enforcement 386
Revision History 386
Automatically Forwarded E-Mail Policy 386
Purpose 386
Scope 386
Policy 386
Enforcement 387
Definitions 387
Database Password Policy 387
Purpose 387
Scope 388
Policy 388
General 388
Specific Requirements 388
Enforcement 389
Definitions 390
E-Mail Retention Policy 390
Purpose 390
Scope 391
Policy 391
Administrative Correspondence 391
Fiscal Correspondence 391
General Correspondence 391
Ephemeral Correspondence 392
Instant Messenger Correspondence 392
Encrypted Communications 392
Recovering Deleted E-Mail via Backup Media 392
Enforcement 392
Definitions 392
Revision History 393
Extranet Policy 393
Purpose 393
Scope 393
Policy 394
Prerequisites 394
Establishing Connectivity 395
Modifying or Changing Connectivity and Access 395
Terminating Access 395
Enforcement 396
Definitions 396
Information Sensitivity Policy 396
Purpose 396
Scope 397
Policy 397
Enforcement 400
Definitions 400
Password Policy 402
Overview 402
Purpose 403
Scope 403
Policy 403
General 403
Guidelines 404
Enforcement 406
Definitions 406
Remote Access Policy 407
Purpose 407
Scope 407
Policy 407
General 407
Requirements 408
Enforcement 409
Definitions 409
Risk Assessment Policy 411
Purpose 411
Scope 411
Policy 412
Risk Assessment Process 412
Enforcement 412
Definitions 412
Router Security Policy 412
Purpose 412
Scope 413
Policy 413
Enforcement 413
Definitions 414
Server Security Policy 414
Purpose 414
Scope 414
Policy 414
Ownership and Responsibilities 414
General Configuration Guidelines 415
Monitoring 416
Compliance 416
Enforcement 416
Definitions 416
Virtual Private Network (VPN) Policy 417
Purpose 417
Scope 417
Policy 417
Enforcement 418
Definitions 418
Wireless Communication Policy 418
Purpose 418
Scope 419
Policy 419
Register Access Points and Cards 419
Approved Technology 419
VPN Encryption and Authentication 419
Setting the SSID 419
Enforcement 419
Definitions 420
Revision History 420
Index 421
Subjects