Maturing Open RFID Applications Will Reshape SCM The first open

advertisement
Strategic Planning, SPA-19-0971
J. Woods, K. Peterson, C. Hirst
Research Note
30 January 2003
Maturing Open RFID Applications Will Reshape SCM
The first open, standards-based radio frequency
identification applications will mature by 2007. Coupled with
new business applications, RFID will radically change
supply chain management business strategies by 2012.
Core Topic
ERP II, Supply Chain & Manufacturing:
Supply Chain Management — Strategies,
Applications and
Key Issues
How will SCP and SCE technology and
architectures evolve?
How will SCP and SCE support current and
emerging business models, and key
enterprise business initiatives?
Strategic Planning Assumptions
During the period 2007 through 2012, the
most-strategic uses of RFID technology will
involve building radical new business
processes that leverage the technology's
data collection and distribution capabilities
(0.6 probability).
At least 50 percent of the RFID applications
in use in 2012 will not have been
contemplated in 2003 (0.7 probability).
Note 1
What Is RFID?
First conceived in 1948, RFID is an
automated data collection (ADC)
technology that enables equipment to read
tags without contact or line of sight. RFID
uses radio frequency (RF) waves to transfer
data between a reader and an item to
identify, track or locate that item. It has
several advantages over bar codes,
including noncontact readability (with no
direct line of sight required) and a longer
read range (100 feet or more with some
technologies). A typical RFID system
comprises three components: an antenna,
RFID tags (transponders) that are
electronically programmed with unique
information and an RF module with a
decoder (transceiver).
Radio frequency identification (RFID) holds great potential for
reshaping business strategies. The use of RFID to capitalize on
data flow in global supply chains could be one of the mostsignificant developments since enterprises first explicitly
recognized the importance of information flow in the supply
chain. Catalyzed by RFID, great change is ahead for productcentric enterprises worldwide (see "Supply Chain RFID Is
Tactical Now, but Will Be Strategic"). During the period 2007
through 2012, the most-strategic uses of RFID technology will
involve building radical new business processes that leverage
the technology's data collection and distribution capabilities (0.6
probability).
RFID is not a monolithic technology (see Note 1) or application: It
is a core technology that enables new processes and strategies.
Enterprises will never "install" RFID; rather, they will install
applications that enable the enterprise to exploit RFID or procure
the hardware to exploit it. This distinction may seem subtle, but it
is important to point that there are many ways that RFID will
affect applications, although it has little or no value in and of
itself.
RFID may not be generally applicable across many processes in
the enterprise until 2007, but specific applications with strategic
importance to some enterprises are likely to mature earlier.
Some RFID projects (such as livestock tracking) are already in
wide use. This is why Gartner encourages users to evaluate
individual RFID applications, rather than the overall technology
itself.
Given RFID's many applications, its resulting benefits and
beneficiaries will be largely unplanned. At least 50 percent of the
RFID applications in use in 2012 will not have been
contemplated in 2003 (0.7 probability). As a result, users must be
Gartner
© 2003 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior written permission is
forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the
accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information
contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended
results. The opinions expressed herein are subject to change without notice.
flexible and opportunistic when thinking about RFID. However,
there are architectural and standards issues that enterprises
should begin to address now to prepare for the 2007-to-2012
time frame, when interactions among multiple RFID deployments
will fundamentally change the way enterprises operate.
Four Phases of Deployment Involving Open, Interoperable,
Standards-Based RFID
RFID will achieve global granular visibility only by developing
unified standards and a low-cost tag (see "Standards Evolution
and Costs Will Drive RFID Deployments"). Assuming a global
granular visibility develops, enterprises will go through four
phases of RFID applications deployment (see Figure 1). Each
stage of development will increase the scope of the applications
being deployed and the strategic power of those applications to
create competitive differentiation for the enterprise.
Figure 1
Four Phases of Open RFID Deployment
Using RFID to Create New
Processes and Strategies
Open-Systems
RFID Applications
2007–2012
Closed-Loop Pilots
Strategic Based on Open
Power Standards
2004–2007
2002–2004
Closed-Loop
Applications
Pre-2002
Phase
1
2
3
4
Scope of Solution
Source: Gartner Research
Phase 1. Closed Applications: This is where most mature
applications (such as vehicle tagging and building access
controls) are today. Enterprises might attach RFID codes to a
limited number of items in a specific retail store or a warehouse.
Systems built on proprietary data standards will often be used to
manage the data associated with these transactions. There is
also limited technical and data interoperability of various RFID
systems.
© 2003 Gartner, Inc. and/or its Affiliates. All Rights Reserved.
SPA-19-0971
30 January 2003
2
Phase 2. Closed Pilots Based on Open Standards: This is
what leading adopter enterprises are currently investigating or
piloting. Many of the pilots of RFID applications, such as those of
Auto-ID Center participants, involve a limited number of
participants, but they are attempting to use open standards in
these pilots. These standards are still in their early or formative
stages, so they are typically not ready to be deployed in full-scale
production systems.
These initiatives are often proof-of-concept pilots that use
nascent standards, which enterprises conduct to learn about the
technology or to identify how it will change business strategy.
However, these pilots are often terminated without continuous
extension into full-scale production. At other times, these are
limited-scope pilots, using more mature, but not widely deployed,
standards that enterprises undertake with the expectation that
the standard will catch on — enabling broader sharing of data or
interoperable business processes — with the initial goal of
extending the pilot into full-scale production. Closed pilots based
on open standards will continue as the dominant form of RFID
deployment through 2004 (0.7 probability).
Phase 3. Open Systems RFID Applications: Open systems
refer to standards agreed on by a significant number of industry
players — fully documented, open to all parties that want to
adopt the standard and widely deployed enough to enable
interoperability in the context of industry business processes.
Truly open systems RFID applications will begin to appear in
2005 (0.7 probability). Open standards will appear around RFID,
as opposed to other areas where open standards have struggled,
because these standards are largely focused on transactional
information and do not depend on the development of loosely
coupled, semantically mediated interactions between systems.
However, open applications will largely be implemented in the
context of established business applications. For example, an
RFID tag in a retail application will be read in a traditional point of
sale (POS) application that has been retrofitted to read RFID
tags and convert data into Universal Product Codes (UPCs),
which can then be processed in a traditional fashion. By 2005,
entirely new types of POS applications, such as self-checkout or
instant-checkout that fully exploit the properties and technologies
of RFID will not have emerged.
Phase 4. Using RFID to Create New Processes and
Strategies: Beyond 2007, enterprises must create more-mature
RFID implementations, create new business processes and
reform business strategies to exploit these new processes. To
extend the previous example, potential changes in POS illustrate
the complex trade-offs enterprises will face in crafting new
© 2003 Gartner, Inc. and/or its Affiliates. All Rights Reserved.
SPA-19-0971
30 January 2003
3
strategies around RFID-enabled processes. A POS application
might be rewritten to enable self-checkout as the customer
leaves the store, as opposed to concentrating the transaction at
the front of the store. This new self-checkout application might
also dynamically try to upsell and cross-sell, based on an
understanding of what's in a customer's cart and what the
customer has decided not to put in the cart (in conjunction with
smart-shelf technology that can tell when products are removed
and replaced on the shelf).
However, expensive in-store merchandising like this has been
tried many times before, but it has never proved to be costjustifiable, because it's hard to get customers to make enough
incremental purchases. Nonetheless, by leveraging the RFID
architecture that is likely to be cost-justified (due to other supply
chain projects) and pervasive through 2007 in retail stores, this
type of individualized merchandising will finally be viable in
certain circumstances.
The Need for New Strategies
Phase 4 deployments will require interenterprise coordination
and new business strategies to support them. Four areas will
need to be addressed when enterprises and entire value
networks begin to engage in Phase 4 RFID deployments.
Information Sharing Strategies: To exploit the benefits of
interoperable RFID, business processes and the applications
supporting them will need to cross industry boundaries. To deal
with fluid collaboration and information sharing, enterprises will
implement business-to-business collaborative-commerce (B2B ccommerce) application architectures in conjunction with RFID
applications to create strategic advantage (see "Multienterprise
SCM Systems Will Come of Age by 2012"). Enterprises will also
have to deal with complex information sharing and hiding
strategies in RFID applications. Although not all RFID tags will be
able to record data throughout the life of a product, some tags
will have this capability. Enterprises need to understand how this
data is collected, shared, erased and secured before allowing
these types of tags into their operations. Enterprises will also
need trading partner buy-in before they will be able to use these
data pathways in their enterprises and value networks.
Business Application Upgrade/Replacement and New
Business Processes: Business applications will need to be
rethought, even within the four walls of the enterprise.
Enterprises will be forced to cope with mountains of new data
produced by RFID and to determine what data must be kept and
what can be discarded. They will then have to build business
© 2003 Gartner, Inc. and/or its Affiliates. All Rights Reserved.
SPA-19-0971
30 January 2003
4
applications strategies that carry out these decisions about
information capture, storage, archiving and elimination.
In addition, enterprises and vendors will have to rethink how their
applications operate in the context of RFID. For example, in a
warehouse management system (WMS), RFID may introduce
data latency to achieve maximum benefit from the technology.
Data latency is not inherently negative (enterprises should
choose a certain amount of latency in circumstances where the
cost of zero data latency is too high), but it's a problem if
applications cannot account for this latency, and processes are
not engineered around it. Currently, a WMS operates on the
assumption that it has the most up-to-date data about the status
of a specific product in the warehouse.
For example, a best practice in many warehouse environments is
to scan a product with a wireless bar code reader whenever it is
removed from the shelf. This scan verifies that the right product
is being picked and tells the WMS to decrement that inventory
from the slot. However, because of the way RFID enables new
processes by enabling users to read many tags at once, an
operator may decide that the scan verification is best done at the
end of the aisle, when all of the RFID tags can be read
simultaneously. This choice will introduce data latency into the
warehouse environment, because the WMS will not know that
the item has been removed from the shelf until, potentially, a few
minutes after the item has been picked. This can wreak havoc on
warehouse operations if the WMS is not equipped to deal with
this situation. Because of the significant retooling of logic and
careful considerations about costs and productivity in this WMS
example, enterprises will need to rethink fundamental
assumptions about enterprise applications and business
processes in the face of Phase 4 RFID deployments.
Cost-Sharing Strategies: Not all RFID applications can costjustify themselves solely within the four walls of an enterprise.
Often, the costs and benefits will be borne asymmetrically
throughout the supply chain. For example, a manufacturer in the
consumer packaged goods (CPG) supply chain bears all of the
costs of applying RFID tags to individual products, but it receives
little, if any, direct benefit from this application. The retailer is
likely to be the primary beneficiary of item-level tagging in CPG,
whereas the manufacturer and distributor will be the primary
beneficiaries of case and pallet-level tagging. The obvious
answer is that manufacturers will pass on the costs of tags to
retailers, but this is not always easy to work out.
For example, manufacturers might benefit from the tags in recall
processes, complicating the split of costs between manufacturer
and retailer. In another example, some retailers might not use the
© 2003 Gartner, Inc. and/or its Affiliates. All Rights Reserved.
SPA-19-0971
30 January 2003
5
tags as much as other retailers, making the manufacturer's
goods less competitively priced to that retailer. Sophisticated
payment structures that enable those who bear the costs of the
technology to recover those costs from the actual users of the
technology could emerge in the 2007-to-2012 time frame to solve
these problems. This could be an application in which the
micropayment structures developed in the late 1990s could be
useful. Enterprises should consider the future costs and benefits
of RFID tagging in negotiating and pricing contracts.
RFID Architecture: Profoundly strategic architectural choices
about RFID are masquerading as mundane technical issues in
the development of RFID. However, the flow of information and
the distribution of power in supply chains will be largely
influenced by these architectural issues, and, ultimately, by those
enterprises and individuals crafting architectures for RFID system
deployments. An example of the effects that architecture can
have on the strategic composition of an industry is the way that
Auto-ID Center standards could affect diverting operations or the
way retail POS data is collected and sold (see "Auto-ID Center
Addresses Privacy, but There's Work to Do"). Even enterprises
not yet interested in deploying RFID should be involved in the
creation of standards and architectures for RFID. Involvement
will ensure that the standards reflect the strategic interests of the
enterprise.
Acronym Key
ADC
B2B CCommerce
CPG
POS
RF
RFID
SCE
SCM
SCP
UPC
WMS
Automated data collection
Business-to-business
collaborative commerce
Consumer packaged
goods
Point of sale
Radio frequency
Radio frequency
identification
Supply chain execution
Supply chain
management
Supply chain planning
Universal Product Code
Warehouse management
system
Bottom Line: Radio frequency identification (RFID) will
fundamentally shape the supply chain landscape for years to
come. RFID will develop through 2007 in the context of
augmenting established business processes and applications.
Assuming this maturation happens by 2007, enterprises will have
to struggle to reform their businesses between 2007 and 2012,
as fundamental assumptions about process and strategy
evaporate, because maturing RFID applications change the way
that enterprises collect, use and distribute data about goods in
the supply chain. Enterprises should begin to understand how
they will form and re-form information-sharing strategies,
business processes and applications, and cost-sharing strategies
as RFID applications begin to mature in 2007.
© 2003 Gartner, Inc. and/or its Affiliates. All Rights Reserved.
SPA-19-0971
30 January 2003
6
Download