|Home||Internet of Things||Aerospace||Apparel||Energy||Defense||Health Care||Logistics||Manufacturing||Retail|
RFID's Finest Hour
Radio frequency identification could play a tremendous role in securing the safety of global trade and supply chains.
Apr 17, 2006—The Dubai Ports World controversy has highlighted the fragility of our global supply chains and some of their weakest links. Despite all the media attention, the real issue is not about the ports or who manages them, but rather the end-to-end journey of goods and the people, processes and technology that conduct, manage and protect global trade. As we explore these strategic issues, the extent of RFID's ability to help secure this supply chain and fuel growth and innovation for its participants is only now beginning to be realized.
In recent decades, the perfect storm of globalization has opened up the free flow of trade, capital, people and knowledge across developed and emerging markets. Businesses have access to global markets from which to source their goods and services, and to export their finished products in order to grow revenues, reduce costs and improve performance. The world stage provides the opportunity to gain economies of scale, competitive advantage and the differentiation needed to produce the steady incremental growth required by capital markets.
Section 404 of SOX requires companies to have controls in place to protect against adverse, preventable events—including those within their supply chains—that could impact their value. C-TPAT requires companies to take responsibility for the security of their own supply chains. While C-TPAT is voluntary, the consensus is that it may well become mandatory in the near future.
In light of this increasingly complex supply chain and regulatory environment, businesses today are even more pressed to ensure they balance the agility needed for competitive advantage and operational efficiency with the assurance needed for the safety and security of their shipments. Globalization, decentralization, outsourcing and the Internet have, in effect, created a divide between agility and assurance. Businesses are operating with increased agility, yet their security mechanisms are outdated. Too often, security has been an afterthought layered on top of new and existing applications and processes.
Login and post your comment!
Not a member?
Signup for an account now to access all of the features of RFIDJournal.com!
SEND IT YOUR WAY
RFID JOURNAL EVENTS
ASK THE EXPERTS
Simply enter a question for our experts.