Professional Documents
Culture Documents
Lecture 7 Supply Chain Technology - Managing Information Flows
Lecture 7 Supply Chain Technology - Managing Information Flows
Chain Management
Lecture 7: Supply Chain Technology- Managing Information Flows
CRICOS 00111D
TOID 3059
The importance of information
3.3
The importance of information
3.4
Information requirements
3.5
Information Systems: A History
RFID
EOQ MRP EDI JIT TOC ERP APS ERPII
ROP MPR II QR VMI MES XDM ECM
DRP CPR ARP CPFR
FAX ECR RF CRM
3.7
Information Requirements
Information connects the
extended supply chain,
providing cross-chain insights
regarding demand, customer
orders, delivery status,
inventory stock levels, and
production schedules.
Meet quality
standards
Support
multidirectional
flows Source: Figure 14-1
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 8
Information Requirements (continued)
Support
Meet Quality
Multidirectional Provide Decision Support
Standards
Flows
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 9
Systems
Capabilities
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 11
Systems Capabilities
Link Network Elements
A cohesive network of integrated technologies, skilled people, and
robust processes must be established.
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12
Systems Capabilities
Mitigate Technology Risks
Common risks must be identified and mitigated to maximize the
return on technology investments.
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 13
Supply Chain
Management (SCM)
Software
SCM Software
Four Software Categories
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 15
SCM Software: Planning Applications
SCM planning applications help organizations shift from autonomous
planning activities to synchronized planning processes that use real-
time data for collaboration across departments, suppliers & customers.
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 16
SCM Software: Execution Applications
Companies deploy a variety of execution software to facilitates desired
performance of day-to-day operating tasks required to support
customer demand.
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 17
SCM Software: Event Management Tools
Supply chain event management tools collect data in real time from
multiple sources across the network and convert them into information
that allows companies to automate the monitoring of supply chain
events as they occur on a day-to-day basis.
Provide the cross-chain Built-in work flow rules Integrated into other
visibility needed to initiate automated applications, event
detect, evaluate, and responses that are management solutions
adapt to changing either preemptive or help to close the loop
conditions before they reactive. between planning and
snowball into major execution to support
problems. synchronization of end-
to-end activities.
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 18
SCM Software: Business Intelligence Tools
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 19
SCM Software: Facilitating Tools
Facilitating systems and applications provide critical links between supply
chain processes, the organization, and external stakeholders. Collectively, they
create a holistic view of the supply chain.
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 20
SCM Technology
Implementation
SCM Technology Implementation
The key to harnessing the capabilities of supply chain technology within a
reasonable time frame is informed decision making, with a clear vision
regarding how technology spending will facilitate supply chain strategy and
satisfy specific requirements.
Need
Mitigate
Implementa-
Assessment 2 A multifaceted decision, involving
development alternatives (off the shelves
tion Issues vs. in-house), types of applications
(individual applications vs. integrated
suite), and purchase options (on-premise
1 vs. SaaS)
2 Software Selection
3 Training, cultural change, systems
interoperability, data synchronization,
data standardization, and application
integration
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 22
SCM Technology Implementation
10 Golden Rules for Success
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 23
Supply Chain
Technology
Innovations
Supply Chain Technology Innovations
Internet of Things Mobile Connectivity Functional Automation
(IoT)
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 25
Information strategy
3.26
Information strategy - WARNING
3.27
Bar Codes
3.28
Bar Codes
What is a bar
code?
A bar code is an optical machine- readable represent
of data, the data being represented as parallel lines an
spacings.
Bar code
is a type of font A bar code is a type of font
A70X465Q Bar codes represent characters
Font in Arial •Alpha
•Numeric
Font in Wingding •Alpha/numeric
Bar codes enable automatic data
3.29
capture by a scanning device
GS-1 Bar Code Types
• Also called Data Carriers
EAN/UPC
ITF-14 GS1-128
GS1 DataBar
3.30
Definition of a Retail Item
• A retail item is a good or a commodity sold in small
quantities directly to consumers, that will be scanned
at point of sale (POS).
3.31
Bar Codes for Retail Items
3.32
Definition of a Non-Retail Item
3.33
Retail or non-retail??
3.34
Reading Bar Codes
3.35
Reading Bar Codes
3.37
Radio Frequency Identification Devices (RFID)
3.22
Radio Frequency Identification Devices (RFID)
Radio Frequency Identification Devices (RFID) are used for automatic
identification in a wide range of applications: from smart card applications
to proprietary tracking systems.
3.23
Radio Frequency Identification Devices (RFID)
The hardware of RFID consists of the following three items: Tags
(Transponders), Readers (Electronic Interrogators) and Middleware.
Tags
Active tags:
Have their own power supply
Can transmit data over long ranges
Battery can last up to 10 years.
Larger storage capacities
Can also store information from the readers (making them read and write
enabled)
3.40
Radio Frequency Identification Devices (RFID)
Tags
Passive tags:
Do not have their own power supply; (Communication with the reader is
caused by minute electrical current or magnetic field induced by the
antenna of the reader. The incoming radio frequency carries enough
power for the tag to send a response back to the reader for
verification and exchange of data)
3.41
Radio Frequency Identification Devices (RFID)
Readers
Readers are electronic devices that use radio frequency to read or interrogate
the tags. When an RFID reader and tag communicate, they share energy in the
form of radio frequency which allows the exchange of information.
Middleware
Middleware refers to the hardware, software and technologies that collect and
process the information generated by RFID.
The reader reads the info written in PML on tag’s embedded memory
The reader passes the information to the server. The software then sorts and
analyses the data, making it relevant and useful for management decisions
3.42
RFID Technology
3.43
Radio Frequency Identification Devices (RFID)
RFID tags can hold much more information than bar codes.
3.44
Radio Frequency Identification Devices (RFID)
3.29
Radio Frequency Identification Devices (RFID)
3.46
Radio Frequency Identification Devices (RFID)
3.48
Radio Frequency Identification Devices (RFID)
Lyngsoe Systems has supplied the world's first RFID on Baggage solution
for Hong Kong International Airport and the first in Europe for Milan
Malpensa Airport.
The solutions are dedicated to elevating the passengers’ travel experience and optimizing
airport logistics through streamlining operational processes, identifying and removing
bottlenecks, increasing flow transparency and capacity, and reducing the quantity of
mishandled bags, trolleys and other assets.
(Lyngsoe Systems, 2009)
3.49
Radio Frequency Identification Devices (RFID)
http://news.bbc.co.uk/2/hi/technology/3697940.stm 3.34
Benefits of RFID
3.35
3.36
How auto-id system will automate the S.C.
With Auto-ID technology, physical objects will have embedded intelligence that will allow them to communicate with each other
and with businesses and consumers. Auto-ID technology offers an automated, numeric system of smart objects that
revolutionizes the way we manufacture, sell, and buy products. Here’s how it works:
The palettes of cola arrive at the shipping
Cherry Hydro,
send totruck
34
2 These tags will allow the cola cans to be identified, SpeedyMart, who has been
counted and tracked in a completely automated, cost- tracking the shipment thanks
effective fashion. The cans are packed into cases – to its own Savant
which feature their own RFID tags – and loaded onto connection. SpeedyMart also
tagged palettes. Need more has loading dock readers. As
3 As the palettes of cola
leave the manufacturer, an
Cherry Hydro soon as the cola arrives,
SpeedyMart’s retail systems
RFID reader positioned are automatically updated to
above the loading dock include every can of Cherry
door hits the smart tags Hydro that arrived. In this
with radio waves, manner, SpeedyMart can
powering them. locate its entire Cherry Hydro
inventory automatically,
4 broadcasting their individual EPCs.
The tags “wake up” and start accurately and without
Yourtotal
is $5.95 incurring cost.
Like a good kindergarten
teacher, the reader only allows one What’s more, SpeedyMart’s retail shelves also feature
tag to talk at a time. It rapidly integrated readers. When the cans of cola are
switches them on and off in stocked, the shelves “understand” what’s being put in
them. Now, when a customer grabs a six-pack of
sequence, until it’s read them all.
Cherry Hydro, the diminished shelf will route a
message to SpeedyMart’s automated replenishment
This second server uses PML, systems – which will order more Cherry Hydro from
or Physical Markup Language, SuperCola, Inc. With such a system, the need to Auto-ID makes the customer’s life easier, too.
to store comprehensive data maintain costly “safety volumes” of Cherry Hyrdo in Rather than wait in line for a cashier, she
Look under Can of Cherry Hydro about manufacturers’ products. remote warehouses is eliminated. simply walks out the door with her purchases.
EPC: SuperCola, Shipped fromBoston,
Inc. MA
It recognizes the incoming A reader built into the door recognizes the
F127C238.DF17CC EPCs as belonging to cans of items in her cart by their individual EPCs; A
SuperCola, Inc.’s Cherry Ad Added 6can s
ded 6cans
of Cherry
of
swipe of the debit or credit card and the
Hydro. Because it knows the Hydro
Cherry Hydr o customer is on her way.
location of the reader which
sent the query, the system now
also knows which plant
Servant computer ONS server PML sever
produced the cola. If an
incident involving a defect or
5
The reader is wired into a computer system running Savant. It sends
Savant the EPCs it’s collected, and Savant goes to work. The system tampering arose, this When the cola cans hit the
sends a query over the internet to an Object Name Service (ONS) information would make it easy recycling center, RFID readers
database, which acts like a reverse telephone directory – it receives a to track the source of the will automate the process of
number and produces an address. problem – and recall the At home, the refrigerator updates its sorting them into the
The ONS server matches the EPC number (the only data stored on an products in question. records to reflect the influx of Cherry appropriate recyclable
RFID tag) to the address of a server which has extensive information Hydro. As the cola is depleted, the category – eliminating
about the product. This data is available to, and can be augmented by, fridge will add the beverage to its expensive manual sorting. The
Savant systems around the world. automated grocery list. cans can even be routed to
their manufacturer for reuse at
the plant.
3.37
Technology guide www.autoidcenter.org
Integrating People & Technology
3.38
Integrating People and Technology
6.55
Integrating People and Technology
6.56
Integrating People and Technology
Workforce must be viewed as a critical resource and the necessary
capital for training programs must be committed. Once a firm invests in
workers, it must give them the responsibility and opportunity to use their
increasing skills.
6.57
Integrating People and Technology
“Knowledge is
experience,
everything else is
just information”
Albert Einstein
6.42
Integrating People and Technology
Knowledge is a justified personal belief that
increases an individual’s capacity to take
effective action (Nonaka, 1994).
6.43
Discussion Questions
Question 1
3.45
Discussion Questions
Video
3.46
Summary