240,230 research outputs found

    Critical Management Issues for Implementing RFID in Supply Chain Management

    Get PDF
    The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains

    CamFlow: Managed Data-sharing for Cloud Services

    Full text link
    A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers, which share the operating system (OS) kernel. Increasingly it is the case that applications also require facilities to effect isolation and protection of data managed by those applications. They also require flexible data sharing with other applications, often across the traditional cloud-isolation boundaries; for example, when government provides many related services for its citizens on a common platform. Similar considerations apply to the end-users of applications. But in particular, the incorporation of cloud services within `Internet of Things' architectures is driving the requirements for both protection and cross-application data sharing. These concerns relate to the management of data. Traditional access control is application and principal/role specific, applied at policy enforcement points, after which there is no subsequent control over where data flows; a crucial issue once data has left its owner's control by cloud-hosted applications and within cloud-services. Information Flow Control (IFC), in addition, offers system-wide, end-to-end, flow control based on the properties of the data. We discuss the potential of cloud-deployed IFC for enforcing owners' dataflow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software. In addition, the audit log associated with IFC provides transparency, giving configurable system-wide visibility over data flows. [...]Comment: 14 pages, 8 figure

    An Exploratory Study of RFID Implementation in the Supply Chain

    Get PDF
    The purpose of this paper is to investigate the barriers and motivations for adopting radio frequency identification (RFID), the level of RFID implementation, the processes RFID is utilized in, and issues in the deployment of RFID. A survey instrument was developed based on a literature review. The survey was then distributed to the members of the Association for Operations Management Rhode Island and Boston chapters. The results were then analyzed. It was found that the majority of the surveyed firms are not considering RFID implementation. Lack of a business case and lack of understanding were cited as their main concerns. For firms considering RFID implementation and firms that had implemented RFID, better inventory management, obtaining competitive advantage, and cost reduction were the three most important motivations for adopting RFID. Financial concerns and the lack of a business case were the most prevalent issues. In addition, product tracking (pallets, cases, and items) in shipping was the most cited RFID application. It was also found that considering firms are facing less pressure from customers to adopt RFID and reported a much higher degree of apprehension regarding potential issues than implementing firms reported for actual difficulties faced. One of the limitations is the small sample size (n = 49) which may limit the generalizability of the results. By identifying barriers, motivations, and issues in the implementation of RFID, this study further educates practitioners on the challenges and opportunities of RFID, as well as providing direction to academicians for further research on this area

    Exploiting rules and processes for increasing flexibility in service composition

    Get PDF
    Recent trends in the use of service oriented architecture for designing, developing, managing, and using distributed applications have resulted in an increasing number of independently developed and physically distributed services. These services can be discovered, selected and composed to develop new applications and to meet emerging user requirements. Service composition is generally defined on the basis of business processes in which the underlying composition logic is guided by specifying control and data flows through Web service interfaces. User demands as well as the services themselves may change over time, which leads to replacing or adjusting the composition logic of previously defined processes. Coping with change is still one of the fundamental problems in current process based composition approaches. In this paper, we exploit declarative and imperative design styles to achieve better flexibility in service composition

    Grid-enabled Workflows for Industrial Product Design

    No full text
    This paper presents a generic approach for developing and using Grid-based workflow technology for enabling cross-organizational engineering applications. Using industrial product design examples from the automotive and aerospace industries we highlight the main requirements and challenges addressed by our approach and describe how it can be used for enabling interoperability between heterogeneous workflow engines
    corecore