Monday, December 9, 2019
Innovations in Supply Chain Management
Question: Discuss about the Innovations in Supply Chain Management. Answer: Introduction: RFID has a long tuff relationship with both liquids solids (metals) since both will make the RFID more difficult to obtain an appropriate read on assets. For solid (metals), the challenge stems from the radio waves which bounce all over the place. For liquid, it plays a hazard role with RFID of the steep prices(Chen, 2011). Whether the RFID used is hardware or software, RFID will need more resources which are very expensive. This expensive equipment needs a periodic maintenance throughout the life of the solution(Correll, 2011). Moreover, tags can wet a business back a way whether these RFID are active, passive or semi- passive. Even if the prices have gone down with upgrade of RFID since the year 1970s business are still doing well and taking a pass since there are steep prices(Floerkemeier, 2012). To enable this realization of profit and to ensure an excellent in business this expensive equipment must be put in place which in turn makes the whole setup very expensive and costly. Difficulty in grasping the technology: Using RFID is very difficult for many people as it is very difficult to understand and comprehend this RFID technology since it is very complex(Kiritsis, 2012). Fathoming the different frequencies and tags as well as how to operate and use RFID technology for both in hardware and software which is actually a great challenge. Managers of most firms which deal with RFID needs an update on the technology to help them train their workers on the outs and ins of RFID and a current flow of work (Ruiz, 2013). The use of this RFID will require the manager to train their new employees for a long period of time since this technology takes the time to be understood. The employees come across reader tags while they are dealing with the RFID technology. With the reader collision, an employee might come an across interloping with another reader in the field. The tag collision is a slightly different, therefore employees and readers happenstance problems in reading an abundance of the tags at a single time. This occurs when over and above a single tag replicates a signal and it puzzles the reader(Wang, 2011). Since the RFID system employs the application of the electromagnetic spectrum for instance WiFi systems, they are quite simple to jam by the help of energy at an appropriate energy. Even though this would only be an untimeliness for customers in the store longer time is taken at the checkout. This is catastrophic in another environment where RFID is highly employed for examples in hospitals and military(Wiley, 2014). Moreover, active RFID tags - those which employ the application of a battery to upturn the variety of the system. This is attained by recurrently interviewed to costume the battery down and also to disturb the system. Challenges with RFID Principles: This RFID has been executed in diverse means by several producers; international principles are being operated on up to date. It worth noting that some RFID equipment should not leave their networks (as for the occasion of the RFID tags employed for catalog control in a firm). This impact and causes difficulties for the company(Wiley, 2014). The client or the costumes will as well be faced with the complications with RFID principles, for examples, ExxonMobils SpeedPass system is a trademarked RFID scheme. Whenever alternative firm needs to apply the convenient SpeedPass, for instance at the drive-in window of one's suitable profligate food restaurant he will need to pay to obtain it which seems as an uncommon situation. And if every firm had their personal `` SpeedPass`` scheme, another client would require containing several devices with them(Floerkemeier, 2012). Because it is possible to read the tags without being swiped or scanned obviously, for instance for the bar codes or magnetic strips, anybody with a RFID tag reader is able to read the embedded tags in one's cloth or even in other customers goods without anyones knowledge. For instance, one could be scanned before he or she enters the store, and this is done just to check what one is carrying(Chen, 2011). Any individual might approach by a clerk who understands what an individual might be carrying in his or her purse or backpack and can propose accessories or even other items. RFID tags are not easy to remove: RFID tags in most occasions are difficult for the client to eliminate where most are very minor of about a half- millimeter square and also sheet of paper thin. Some might be concealed or even sometimes embedded esoteric a good where the buyer is not able to see it. This new technology permits RFID tags to get `` printed`` safely on the commodity and might not be capable to be removed by any means(Wang, 2011). For several aims, RFID tags or readers systems are made such that distance in between the reader and the tag is held in reserve to smallest. Nonetheless, a thin- gain aerial may be applied to enable reading of the tags for more distance away resulting to confidentiality difficulties(Kiritsis, 2012). RFID tags with unique serial numbers are able be associated to an specific credit card number Currently, the Universal Product Code (UPC) executed with barcodes offers each good sold in a stock to have distinctive numbers which will identify the good. If the commodity is glance over or scanned for procurement and is remunerated for it, the RFID tag number for a specific item can be allied with a credit number(Wiley, 2014). Bibliography Avanzi, R., 2012. Selected Areas in Cryptography: 15th Annual International Workshop. 4th ed. Colorado: Springer. Chen, J., 2011. RFID challanges. 1st ed. Manchester : Manchester press . Correll, K., 2011. Thinking About Invention Patenting. 5th ed. Hull: BookBaby. Floerkemeier, C., 2012. The Internet of Things: First International Conference. 2nd ed. Amsterdam: Dutch press. Kiritsis, D., 2012. Engineering Asset Management: Proceedings of the Fourth World Congress on Engineering Asset Management. 1st ed. Manchester: Springer Science. Ruiz, P. M., 2013. RFID. 3rd ed. Manchester: Springer. Wang, J., 2011. Innovations in Supply Chain Management for Information Systems: Novel Approaches: Novel Approaches. 2nd ed. Chicago: IGI Global. Wiley, J., 2014. RFID Systems: Research Trends and Challenges. 2nd ed. New York: Miodrag sons press.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.