SlideShare una empresa de Scribd logo
1 de 40
1   © 2010 IBM Corporation
2
•

    •
    •

    •

    •

    •

    •

    •
    •


3
© 2010 IBM Corporation
5
Billion




6             Source: Cisco IoT 2011 infographic
340.282.366.920.938.463.463.374.607.431.768.211.456




7                                           © 2010 IBM Corporation
We are moving into a new scenario where the needs to
connect the physical and digital worlds are exponentially
increasing




                                                                “                ”




INSTRUMENTED                                INTERCONNECTED                                    INTELLIGENT
Objects gets sensoring abiliy, technology   Objects are interconnected by networks building   Ccompetitive power comes from the ability to
controls awareness of objects               Internet of Things                                analyse and understand network of things
We are ushering in a new wave of innovation

                                                                                                                                    Age             6th Wave
                                                                                                                    Age            of IT &
                                                                                                                of Oil, Cars      Telecom
                                                                                         Age
                                                                                                                 and Mass
                                                                                       of Steel,
                                                                                                                Production       5th Wave
                                                                                      Electricity
                                                                                      and Heavy
                                                                                     Engineering                 4th Wave
                                                                                                                                                       Smarter
Innovation




                                                           Age
                                                                                      3rd Wave
                                                        of Steam
                                                      and Railways
                                                                                                                                                       Products
                           The
                        Industrial
                       Revolution                      2nd Wave
                                                                                                                                                      Instrumented,
                         1st Wave                                                                                                                      interconnected,
                                                                                                                                                       and intelligent
                                                                                                                                                      Building blocks
                                                                                                                                                       for a smarter planet
                                                                                                                                                      Sustainability



             1770                              1830                            1875                        1920                1970          2010

             *Source: “Next Generation Green: Tomorrow’s Innovation Green Business Leaders”, Business Week, Feb 4, 2008
The ”Internet of things” is one of the most significant opportunities
for business transformation ever, and is relevant for all indstries
SOLUTION EXAMPLES




     Pharmaceuticals     Retail                Transportation        Food                   Manufacturing            Healthcare             Construction

 • Prevent product      • Optimise storage     • Process            • Provide visibility   • Manufactoring          • Control and          • Improve logistics
   counterfeiting         and inventory          improvements due on food history            control processes        visibility of          processes
                          processes              to increased                                                         logistics
 •   Ensure full                                                    • Controlled           • Quality control                               • Improve in-
                                                 visibility                                                           processes
     traceability in    • Improve store                               transports                                                             process quality
                                                                                           • Optimise use of
     product              process              • Route optimisation                                                 • Locate eqipment        control
                                                                    • Quality control        raw materials
     deliverables                                                                                                     in hospitals
                        • Build additional     • Temperature                                                                               • Construction site
                                                                    • Process              • Provide customer
 •   Partner integration customer services       controlled                                                         • Clinical sensoring     security and
                                                                      optimisation           services via item
                          based on item          transports                                                           solutions              access control
 •   Regulatory control                                                                      level identification
                          level identification                      • Control of farming
                                               • Equipment                                                      • Distance medicine • Tool-tagging to
 •   Manifacturing                                                    process              • Real-time location
                        • Product anti-          tracking and                                                                           optimise use and
     optimisation                                                                            services to        • Patient control and
                          counterfeit            control            • Regulatory control                                                prevent theft
                                                                                             improve visibility   services
 •   Item level insight   initiatives
                                               • RFID baggage       • Illness                                                         • Integrate physical
                                                                                           • Improve work       • Integrate analysis
                        • Supply chain           tracking             identification                                                    site with 3D
                                                                                             environment and      and lab equipment
                          optimisation                                                                                                  construction
                                               • Geo-location of    • Consumer               security
                                                                                                                • Sueveillance          model
                                                 transport items      information
                                                                      services                                                             • Improve
                                               • Security
                                                                                                                                             construction
                                                                                                                                             process

10
Tag



Antenna         Reader




                         © 2010 IBM Corporation
12
GROWER: GREENHOUSE      GROWER: PLANT OUT ROBOT       AUCTION: TRADING FLOOR




AUCTION: STORAGE AREA   AUCTION: INTERNAL LOGISTICS   AUCTION: TRANSPORT ROBOT




                                                                          © 2010 IBM Corporation
EXPORTER: REPACKAGING   CC DEPOT: INBOUND/OUTBOUND    CC DEPOT: SHELF STORAGE
The Flower Container is the de facto standard for transports of
flowers and potplants across Europe

      Started in 1976, the Container Centralen
       system was created due to demand for a
       returnable transport item solution
      Based on and exchange and balancing system
       leading to increased efficiency and lower
       number of items needed
      3,5 million containers in use, 22M shelves
      100.000 users across 22 countries in Europe
       and nearby, e.g. growers, auctions,
       transporters, wholesalers, retailers




14                                                           © 2010 IBM Corporation
CC provides an european pool system optimising resources across
the green sector supply chain



      The CC Pool System is in principle
       based on one-for-one exchange
      Empty units are exchanged for full
       units and vice versa
                                            One full unit = one empty unit
      Reduced number of transportation
       units in the entire supply chain
      Higher efficiency – lower costs




                                                                © 2010 IBM Corporation
CC is operating in Europe and US




  10 offices and 60 depots in Europe




                                       © 2010 IBM Corporation
Container Centralen provides several products using same business
model




                                                         © 2010 IBM Corporation
From 2004 and onwards, an industry group have been focusing on
introduction of RFID in the Green Sector

     • Closing of the pool – a fair system with no free-riders
     • Protection of the common industry’ investment (+250 MEUR)
     • Improved quality of the pool
     • Cost reduction on Pool Fee
     • Less sorting of low-quality containers
     • CC is offering the RFID and Collection Service to retailers
     • Common European solution for the industry
     • With a closed pool we can start product development, e.g. shelves, wheels etc.
     • Opportunity for Track/Trace as next step




18                                                                             © 2010 IBM Corporation
19
The problem: Containers are being counterfeited leading to severe
problems for all involved supply chain partners – from grower to
retailer




• Containers are counterfeited       • Low quality clones causes   • Container Centralen
  by 3rd party                         severe problems in supply     responsible for repair &
• Assumed 10%, i.e. 350.000            chain                         maintenance, but counterfeits
  units                              • Primary: Large robots in      does not have associated
                                       auction houses, transport     contracts
• Counterfeit operation very fast,
  competent and until now un-          chain, loss of products
  stoppable




20                                                                                    © 2010 IBM Corporation
However, hardware hackers being one problem, Container
Centralen was faced by a bunch of other issues in regards to
implementation

  To ensure full trust in the supply chain, it is needed to equip
   25.000 customers with advanced RFID-equipment
  To build a business case for the full industry
  The solution needed to be rather open, while maintaining a high
   level of security
  The solution should enforce a high level of security in all levels of
   the supply chain – in an industry not having a tradition for IT-
   systems
  A very sad history of previous anti-counterfeiting organisations


  …how to change behaviours at 100.000 users across 22
   countries and very diverse cultures




21                                                                         © 2010 IBM Corporation
22
TECHNICAL CHALLENGE:
                                  APPROACH:
Make impossible to clone, copy,
break and use as widespread       • Tag all containers with secure
logistics solution at the same      tag to count and authenticate
time. Also support use in very    • Implement CC RFID inhouse
demanding industrial heavy          solution
metal extreeme and high-          • Extend to supply chain
humidity environments.              partners, e.g. Growers, auction
                                    houses, transporters, exporters,
                                    retail
                                  • Prepare for future track & trace
                                    solution across the Green
                                    Sector




                                                      © 2010 IBM Corporation
The overall purpose of the RFID solution is to addres a set of
business problems – but also to initiate a larger vision of improved
efficiency and collaboration in the Green Sector
     THE CHALLENGE
     Containers are being counterfeited   Increased cost to handle repair      Lower quality containers leading to
     and injected into supply chain       and maintenance                      handling problems in Green Sector




     THE PROCESS
                                                                               Deliver framework to allow
     Engage stakeholders in Green         Spread solution to partners to
                                                                               partners to build own applications
     Sector to participate                enable authentication
                                                                               using CC authentication




     THE LONG-TERM VISION
     Extend solution to handle track &    Enable infrastructure to allow for
     trace                                cross-partner integration



24                                                                                                         © 2010 IBM Corporation
The core of the solution provides a mechanism to ensure full trust
  among partners in the Green Sector supply chain

   Authenticate equipment to build trust and ensure genuine equipment in all handover-
    situations in the supply chain
   Deliver solutions and software components to allow for Green Sector partners getting easy
    access to use of RTI authentication
   It is assumed that 25.000 users will require RFID-equipment for authentication

          Checkpoint         Checkpoint              Checkpoint         Checkpoint         Checkpoint     Checkpoint


Growers                Transport          Auctions                Transport      Cross docking      Transport           Retail/DC




                                            Whole-salers
                                                                              Depot/Wash

                                                                                                                Checkpoint




  25                                                                                                               © 2010 IBM Corporation
Various types of RFID-equipment are used


Tags                                                     RFID Readers




    Previous versions have only been housing with
     barcode (not used)
    New version contains RFID tag and barcode
    Encoded with industry standard product codes able
     to be read by all stakeholders
    Additional user memory used by security solution
    Custom housing, only used by CC – ”Secret design”




                                                                        © 2010 IBM Corporation
Internally in the CC depots the solution streamlines and control
processes around handling containers


             1. Customer                                    2. Sales Rep
             Kahlenberg                                     completes
             informs CC                                     booking in Loglink
             about delivery
             of empty
             containers




                                                                                     3. Inbound
                                                                                     Notification created
              Confirmation                                                           in Loglink and sync’d
              Type: Inbound                                 Notification
                                                                                     with PDA in Depot
              Customer: Kahlenberg                          Type: Inbound
              Count: 20                                     Customer: Kahlenberg
                                                            Count: 20
                                 6. Outbound Confirmation
                                 created in PDA and
                                 sync’d with Loglink
                                                                                         If containers cannot be read,
                                                                                         are identified as counterfeits
                                                                                           or other unusual situation
                                                                                        Inbound Exception Process is
                4. Benny                                                                            initiated
                Grower arrives
                at Depot and
                                                            5. Depot Worker select
                hands in
                                                            inbound delivery
                containers
                                                            notification for Benny
                                                            Grower, scans and
                                                            accept containers.

27                                                                                                       © 2010 IBM Corporation
How to spread the solution: The tag can be accessed in several
ways, resulting in several possible usage scenarios

 The tag acts in general as a normal standard          STANDARD RFID DOMAIN
  RFID-tag and identification can be read by
  any standard equipment                                  RFID READ
 Only in the case that secure authentication is          •Read unique tag-identifier
  needed, the security functionalty is used               (EPC-code) from tag
 Possible applications using the tag are                 •Standard Gen2 RFID-reader
                                                          can be used
  therefore not limited to authentication, but the
  tag can be used in any identification situation         •No authentication
                                                          happening


                                                          BARCODE READ
                    CC SOLUTION DOMAIN
                                                          •Read barcode on tag
                        RFID AUTHENTICATION               (containing EPC-code)
                        •Read unique tag-identifier       •Standard barcode readers
                                                          and barcode-aware RFID-
                        •Perform authentication           readers can be used
                        •Requires certified reader or
                        application with
                        Authentication Component

                                                           Note: Illustration does not show final tag design
28                                                                                     © 2010 IBM Corporation
For the supply chain partners the CC RFID Solution provides
several mechanisms to perform authentication and other functions
either out of the box or as custom developed solutions

     Handheld devices                          Fixed gate                                ”Blackbox”
     • Selected standard handheld              • A standard fixed gate-setup             • A software component to
       devices with basic application            containing all components to              provide authentication and
       functionality to perform                  provide authentication and                security update functionality to
       authentication of RTI’s                   counting when RTI’s are                   existing partner applications
     • Currently two models available            passing dock-door or other              • Integrate into inhouse or
       – for small-scale and larger              entry                                     standard applications
       scale use




     All devices, solutions, components delivered via an eco-system of hardware-, software-partners and system integrators

29                                                                                                              © 2010 IBM Corporation
Example: The consequence is that variations of track & trace can be
implemented using the basic CC RFID solution as the foundation
                                  Checkpoint        Checkpoint           Checkpoint


                                                                                               RFID read points to support
                                                                 Auctions                      internal processes or partner
                        Growers                Transport                                       integration – no authentication
                                                                                               needed




     • Trading partners will be able to use means                Whole-salers
       of track & trace
     • Equipment can be tracked and under                   • Provide improved internal visibility
       some restrictions freight also                       • Understand use and location of assets
     • Platform for data capture and integration            • Optimise internal processes
       across partners is required
                                                            • Standard RFID-equipment can be used


     However, it is important to note that the CC RFID solution does not provide track & trace in itself
     today. It is the task of the partner to build applications, integration and infrastructure as needed.

30                                                                                                         © 2010 IBM Corporation
The solution will lead to a variety of benefits across the Green
Sector

                GROWER                      AUCTION                        TRANSPORT/EXPORT              RETAIL
COLLABORATION




                            Improvements in process efficiency by gaining full supply chain visibility

                                                                                                         Ability to connect to
                            Clear responsibilities, increased trust between collaboration partners       existing tracking
                                                                                                         initiatives at low cost
                Increased visibility on      Optimise supply chain         Clear responsibilities
                delivery                     and partner relations         in handling equipment
EFFICIENCY




                                                                           Optimise processes
                                             Improvement potential         by using solution in
                                             by internal supply            own context, e.g.             Improvement potential
                                             chain visibility              logistics systems             in handling
                Avoid handling
                problems by only
                using high quality           Avoid production              Avoid production              Avoid handling
                equipment                    delays and problems           delays and problems           problems by only
                                                                                                         using high quality
COST




                                                                                                         equipment


                            Stable methods, processes and technologies to clean the pool



                                                                                                                      © 2010 IBM Corporation
Worlds largest RFID implementation


 Launched: 10th January 2011


 •   3.5 million RFID tags in a unique
     housing/padlock


 •   25.000 customers have marked their CC Containers
 •   100.000 users in Europe have been informed
 •   Scanners for 60 CC depots and repair shops in whole Europe
 •   IT infrastructure to handle data and flows
 •   Scanner solutions for all users in Europe
 •   Development of an RFID track and trace solution




                                                                  © 2010 IBM Corporation
The suppliers are ready to handle the demand for products
                     Panmobil




     Nordic ID

                                           Alexander & Mielo
33                                                             © 2010 IBM Corporation
The solution was rolled out in January 2011 and was recently
named one of RWW’s ”Top 10 Internet of Things Products of 2009”




34                                                      © 2010 IBM Corporation
35
Remember – this solution was primarily for fighting counterfeiting,
but the vision and the underlying infrastructure are generating a
plentitude of new innovation opportunities
     Ad van de Wijdeven,
     BAAS Plantenservice Managing Director:
     "We immediately   saw the opportunities                        of the RFID tags on the CC
     Containers for further speeding up and improving our logistics. Especially in the peak periods,
     when we process about    12,000 to 14,000 CCs a day, things can easily
     go wrong, and that requires a lot of communication between suppliers,

     transporters and our logistical and financial departments. All of this is no longer

     necessary because we can see at glance exactly what the status of each delivery is.
     Our suppliers and transporters have the same

     information. And it all happens automatically!”
     In conclusion, Baas Plantenservice is proud of these innovative work methods and invites
     other parties in the distribution chain to join in this initiative. "It is in all of
     our interests that together we ensure that we maintain the leading position in the horticultural
     sector," says Ad van de Wijdeven.

36                                                                                                  © 2010 IBM Corporation
37
http://www.rfidjournal.com/article/view/8885




38
Closing remarks



 The project have been significant success – for CC and the green sector
 The basic assumption to fight a specific problem (counterfeiting) but to build a vision towards
  something bigger (track&trace) did succeed and had a positive influence
 The project has a very different benefit profile across Container Centralen and the rest of the
  green sector, but have achived full adoption by the industry
 While deploying new technologies, test and verification have been a significant focus area to
  ensure the best possible customer experience
 Openness in architecture and solutions have initiated industry innovation
 Marketing and communications have been significant focus areas




39                                                                                   © 2010 IBM Corporation
Thank you
Kim Escherich
IBM Global Business Services
escherich@dk.ibm.com
+45 2880 4733

internetofthings.dk
escherich.biz
  @kescherich
  /in/escherich
  /escherich
  kescherich@gmail.com




                               © 2010 IBM Corporation

Más contenido relacionado

Similar a Container Centralen: Transforming the Green Secor with RFID

IBM CIO Forum: Internet of Things
IBM CIO Forum: Internet of ThingsIBM CIO Forum: Internet of Things
IBM CIO Forum: Internet of ThingsKim Escherich
 
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of ThingsIT Innovation @ The Internet of Things
IT Innovation @ The Internet of ThingsKim Escherich
 
Deep impact2013 juliemeyer-slides
Deep impact2013 juliemeyer-slidesDeep impact2013 juliemeyer-slides
Deep impact2013 juliemeyer-slidessocialfoundation
 
Ericsson green ict 100413 a
Ericsson green ict 100413 aEricsson green ict 100413 a
Ericsson green ict 100413 aMaria Boura
 
PSN Summit - Session A1 - Building on PSN
PSN Summit - Session A1 - Building on PSNPSN Summit - Session A1 - Building on PSN
PSN Summit - Session A1 - Building on PSNMikePSNGB
 
Information Technology in Global Trade - “Knowing You & Me, Know Where We Are!”
Information Technology in Global Trade - “Knowing You & Me, Know Where We Are!” Information Technology in Global Trade - “Knowing You & Me, Know Where We Are!”
Information Technology in Global Trade - “Knowing You & Me, Know Where We Are!” Suhaimi Nordin
 
Smart Grid Implementation Summit
Smart Grid Implementation SummitSmart Grid Implementation Summit
Smart Grid Implementation SummitDhaval Thakur
 
Ptcmitwebsitemodelv1
Ptcmitwebsitemodelv1Ptcmitwebsitemodelv1
Ptcmitwebsitemodelv1Tom Loughran
 
2007 Nokia Analysis
2007 Nokia Analysis2007 Nokia Analysis
2007 Nokia AnalysisJin Lee
 
Introduction to wrap technology, a very low cost communication technology for...
Introduction to wrap technology, a very low cost communication technology for...Introduction to wrap technology, a very low cost communication technology for...
Introduction to wrap technology, a very low cost communication technology for...Valerio Aisa
 
Trends in Capability Management Adam Thilthorpe
Trends in Capability Management Adam ThilthorpeTrends in Capability Management Adam Thilthorpe
Trends in Capability Management Adam ThilthorpeSFIA User Forum
 
Convered Voice and Data (tIPicall and Exponential-e)
Convered Voice and Data (tIPicall and Exponential-e)Convered Voice and Data (tIPicall and Exponential-e)
Convered Voice and Data (tIPicall and Exponential-e)Exponential_e
 
Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Mah Khan
 
Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Mah Khan
 
Accenture BeLux - Vlerick | Product Digitization
Accenture BeLux - Vlerick | Product Digitization Accenture BeLux - Vlerick | Product Digitization
Accenture BeLux - Vlerick | Product Digitization Accenture BeLux
 
Industry 4.0 in Supply Chain Management and its Impact on Manufacturing Sectors
Industry 4.0 in Supply Chain Management and its Impact on Manufacturing SectorsIndustry 4.0 in Supply Chain Management and its Impact on Manufacturing Sectors
Industry 4.0 in Supply Chain Management and its Impact on Manufacturing SectorsIRJET Journal
 

Similar a Container Centralen: Transforming the Green Secor with RFID (20)

IBM CIO Forum: Internet of Things
IBM CIO Forum: Internet of ThingsIBM CIO Forum: Internet of Things
IBM CIO Forum: Internet of Things
 
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of ThingsIT Innovation @ The Internet of Things
IT Innovation @ The Internet of Things
 
Deep impact2013 juliemeyer-slides
Deep impact2013 juliemeyer-slidesDeep impact2013 juliemeyer-slides
Deep impact2013 juliemeyer-slides
 
Ericsson green ict 100413 a
Ericsson green ict 100413 aEricsson green ict 100413 a
Ericsson green ict 100413 a
 
PSN Summit - Session A1 - Building on PSN
PSN Summit - Session A1 - Building on PSNPSN Summit - Session A1 - Building on PSN
PSN Summit - Session A1 - Building on PSN
 
Information Technology in Global Trade - “Knowing You & Me, Know Where We Are!”
Information Technology in Global Trade - “Knowing You & Me, Know Where We Are!” Information Technology in Global Trade - “Knowing You & Me, Know Where We Are!”
Information Technology in Global Trade - “Knowing You & Me, Know Where We Are!”
 
Smart Grid Implementation Summit
Smart Grid Implementation SummitSmart Grid Implementation Summit
Smart Grid Implementation Summit
 
Ptcmitwebsitemodelv1
Ptcmitwebsitemodelv1Ptcmitwebsitemodelv1
Ptcmitwebsitemodelv1
 
2007 Nokia Analysis
2007 Nokia Analysis2007 Nokia Analysis
2007 Nokia Analysis
 
Huawei eCtiy solution
Huawei eCtiy solutionHuawei eCtiy solution
Huawei eCtiy solution
 
Introduction to wrap technology, a very low cost communication technology for...
Introduction to wrap technology, a very low cost communication technology for...Introduction to wrap technology, a very low cost communication technology for...
Introduction to wrap technology, a very low cost communication technology for...
 
Trends in Capability Management Adam Thilthorpe
Trends in Capability Management Adam ThilthorpeTrends in Capability Management Adam Thilthorpe
Trends in Capability Management Adam Thilthorpe
 
5g tutorial
5g tutorial5g tutorial
5g tutorial
 
Open Innovation - DigiBiz'09
Open Innovation - DigiBiz'09Open Innovation - DigiBiz'09
Open Innovation - DigiBiz'09
 
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
 
Convered Voice and Data (tIPicall and Exponential-e)
Convered Voice and Data (tIPicall and Exponential-e)Convered Voice and Data (tIPicall and Exponential-e)
Convered Voice and Data (tIPicall and Exponential-e)
 
Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124
 
Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124
 
Accenture BeLux - Vlerick | Product Digitization
Accenture BeLux - Vlerick | Product Digitization Accenture BeLux - Vlerick | Product Digitization
Accenture BeLux - Vlerick | Product Digitization
 
Industry 4.0 in Supply Chain Management and its Impact on Manufacturing Sectors
Industry 4.0 in Supply Chain Management and its Impact on Manufacturing SectorsIndustry 4.0 in Supply Chain Management and its Impact on Manufacturing Sectors
Industry 4.0 in Supply Chain Management and its Impact on Manufacturing Sectors
 

Más de Kim Escherich

Ethics in Tech - Where is the limit?
Ethics in Tech - Where is the limit?Ethics in Tech - Where is the limit?
Ethics in Tech - Where is the limit?Kim Escherich
 
Etik og dannelse i en digital verden
Etik og dannelse i en digital verdenEtik og dannelse i en digital verden
Etik og dannelse i en digital verdenKim Escherich
 
Når bygningen forstår mig og mine behov
Når bygningen forstår mig og mine behovNår bygningen forstår mig og mine behov
Når bygningen forstår mig og mine behovKim Escherich
 
How consulting becomes art
How consulting becomes artHow consulting becomes art
How consulting becomes artKim Escherich
 
The Cognitive Building
The Cognitive BuildingThe Cognitive Building
The Cognitive BuildingKim Escherich
 
The Sustainable Development Goals, Technology ...and IBM
The Sustainable Development Goals, Technology ...and IBMThe Sustainable Development Goals, Technology ...and IBM
The Sustainable Development Goals, Technology ...and IBMKim Escherich
 
Eat Data - How digitization is changing the food chain
Eat Data - How digitization is changing the food chainEat Data - How digitization is changing the food chain
Eat Data - How digitization is changing the food chainKim Escherich
 
Mega Trends in the Food Sector
Mega Trends in the Food SectorMega Trends in the Food Sector
Mega Trends in the Food SectorKim Escherich
 
Når computeren bliver kognitiv
Når computeren bliver kognitivNår computeren bliver kognitiv
Når computeren bliver kognitivKim Escherich
 
Internet of Things - From hype to reality
Internet of Things - From hype to realityInternet of Things - From hype to reality
Internet of Things - From hype to realityKim Escherich
 
What happens in the Innovation of Things?
What happens in the Innovation of Things?What happens in the Innovation of Things?
What happens in the Innovation of Things?Kim Escherich
 
Driving IT: Internet of Things
Driving IT: Internet of ThingsDriving IT: Internet of Things
Driving IT: Internet of ThingsKim Escherich
 
Fremtidens vidensmedarbejder
Fremtidens vidensmedarbejderFremtidens vidensmedarbejder
Fremtidens vidensmedarbejderKim Escherich
 
Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...
Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...
Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...Kim Escherich
 
Future Cities: Upgrading Rio to Smart
Future Cities: Upgrading Rio to SmartFuture Cities: Upgrading Rio to Smart
Future Cities: Upgrading Rio to SmartKim Escherich
 

Más de Kim Escherich (20)

Ethics in Tech - Where is the limit?
Ethics in Tech - Where is the limit?Ethics in Tech - Where is the limit?
Ethics in Tech - Where is the limit?
 
Hello world!
Hello world!Hello world!
Hello world!
 
Etik og dannelse i en digital verden
Etik og dannelse i en digital verdenEtik og dannelse i en digital verden
Etik og dannelse i en digital verden
 
Hvor går grænsen?
Hvor går grænsen?Hvor går grænsen?
Hvor går grænsen?
 
Når bygningen forstår mig og mine behov
Når bygningen forstår mig og mine behovNår bygningen forstår mig og mine behov
Når bygningen forstår mig og mine behov
 
How consulting becomes art
How consulting becomes artHow consulting becomes art
How consulting becomes art
 
The Cognitive Building
The Cognitive BuildingThe Cognitive Building
The Cognitive Building
 
Hvad er Watson?
Hvad er Watson?Hvad er Watson?
Hvad er Watson?
 
The Sustainable Development Goals, Technology ...and IBM
The Sustainable Development Goals, Technology ...and IBMThe Sustainable Development Goals, Technology ...and IBM
The Sustainable Development Goals, Technology ...and IBM
 
Eat Data - How digitization is changing the food chain
Eat Data - How digitization is changing the food chainEat Data - How digitization is changing the food chain
Eat Data - How digitization is changing the food chain
 
Mega Trends in the Food Sector
Mega Trends in the Food SectorMega Trends in the Food Sector
Mega Trends in the Food Sector
 
Cognitive Buildings
Cognitive BuildingsCognitive Buildings
Cognitive Buildings
 
Cognitive Insurance
Cognitive InsuranceCognitive Insurance
Cognitive Insurance
 
Når computeren bliver kognitiv
Når computeren bliver kognitivNår computeren bliver kognitiv
Når computeren bliver kognitiv
 
Internet of Things - From hype to reality
Internet of Things - From hype to realityInternet of Things - From hype to reality
Internet of Things - From hype to reality
 
What happens in the Innovation of Things?
What happens in the Innovation of Things?What happens in the Innovation of Things?
What happens in the Innovation of Things?
 
Driving IT: Internet of Things
Driving IT: Internet of ThingsDriving IT: Internet of Things
Driving IT: Internet of Things
 
Fremtidens vidensmedarbejder
Fremtidens vidensmedarbejderFremtidens vidensmedarbejder
Fremtidens vidensmedarbejder
 
Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...
Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...
Er vi alle vindere når ny teknologi, -arbejdsformer og innovation udfordrer d...
 
Future Cities: Upgrading Rio to Smart
Future Cities: Upgrading Rio to SmartFuture Cities: Upgrading Rio to Smart
Future Cities: Upgrading Rio to Smart
 

Último

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 

Último (20)

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 

Container Centralen: Transforming the Green Secor with RFID

  • 1. 1 © 2010 IBM Corporation
  • 2. 2
  • 3. • • • • • • • • 3
  • 4. © 2010 IBM Corporation
  • 5. 5
  • 6. Billion 6 Source: Cisco IoT 2011 infographic
  • 8. We are moving into a new scenario where the needs to connect the physical and digital worlds are exponentially increasing “ ” INSTRUMENTED INTERCONNECTED INTELLIGENT Objects gets sensoring abiliy, technology Objects are interconnected by networks building Ccompetitive power comes from the ability to controls awareness of objects Internet of Things analyse and understand network of things
  • 9. We are ushering in a new wave of innovation Age 6th Wave Age of IT & of Oil, Cars Telecom Age and Mass of Steel, Production 5th Wave Electricity and Heavy Engineering 4th Wave Smarter Innovation Age 3rd Wave of Steam and Railways Products The Industrial Revolution 2nd Wave  Instrumented, 1st Wave interconnected, and intelligent  Building blocks for a smarter planet  Sustainability 1770 1830 1875 1920 1970 2010 *Source: “Next Generation Green: Tomorrow’s Innovation Green Business Leaders”, Business Week, Feb 4, 2008
  • 10. The ”Internet of things” is one of the most significant opportunities for business transformation ever, and is relevant for all indstries SOLUTION EXAMPLES Pharmaceuticals Retail Transportation Food Manufacturing Healthcare Construction • Prevent product • Optimise storage • Process • Provide visibility • Manufactoring • Control and • Improve logistics counterfeiting and inventory improvements due on food history control processes visibility of processes processes to increased logistics • Ensure full • Controlled • Quality control • Improve in- visibility processes traceability in • Improve store transports process quality • Optimise use of product process • Route optimisation • Locate eqipment control • Quality control raw materials deliverables in hospitals • Build additional • Temperature • Construction site • Process • Provide customer • Partner integration customer services controlled • Clinical sensoring security and optimisation services via item based on item transports solutions access control • Regulatory control level identification level identification • Control of farming • Equipment • Distance medicine • Tool-tagging to • Manifacturing process • Real-time location • Product anti- tracking and optimise use and optimisation services to • Patient control and counterfeit control • Regulatory control prevent theft improve visibility services • Item level insight initiatives • RFID baggage • Illness • Integrate physical • Improve work • Integrate analysis • Supply chain tracking identification site with 3D environment and and lab equipment optimisation construction • Geo-location of • Consumer security • Sueveillance model transport items information services • Improve • Security construction process 10
  • 11. Tag Antenna Reader © 2010 IBM Corporation
  • 12. 12
  • 13. GROWER: GREENHOUSE GROWER: PLANT OUT ROBOT AUCTION: TRADING FLOOR AUCTION: STORAGE AREA AUCTION: INTERNAL LOGISTICS AUCTION: TRANSPORT ROBOT © 2010 IBM Corporation EXPORTER: REPACKAGING CC DEPOT: INBOUND/OUTBOUND CC DEPOT: SHELF STORAGE
  • 14. The Flower Container is the de facto standard for transports of flowers and potplants across Europe  Started in 1976, the Container Centralen system was created due to demand for a returnable transport item solution  Based on and exchange and balancing system leading to increased efficiency and lower number of items needed  3,5 million containers in use, 22M shelves  100.000 users across 22 countries in Europe and nearby, e.g. growers, auctions, transporters, wholesalers, retailers 14 © 2010 IBM Corporation
  • 15. CC provides an european pool system optimising resources across the green sector supply chain  The CC Pool System is in principle based on one-for-one exchange  Empty units are exchanged for full units and vice versa One full unit = one empty unit  Reduced number of transportation units in the entire supply chain  Higher efficiency – lower costs © 2010 IBM Corporation
  • 16. CC is operating in Europe and US 10 offices and 60 depots in Europe © 2010 IBM Corporation
  • 17. Container Centralen provides several products using same business model © 2010 IBM Corporation
  • 18. From 2004 and onwards, an industry group have been focusing on introduction of RFID in the Green Sector • Closing of the pool – a fair system with no free-riders • Protection of the common industry’ investment (+250 MEUR) • Improved quality of the pool • Cost reduction on Pool Fee • Less sorting of low-quality containers • CC is offering the RFID and Collection Service to retailers • Common European solution for the industry • With a closed pool we can start product development, e.g. shelves, wheels etc. • Opportunity for Track/Trace as next step 18 © 2010 IBM Corporation
  • 19. 19
  • 20. The problem: Containers are being counterfeited leading to severe problems for all involved supply chain partners – from grower to retailer • Containers are counterfeited • Low quality clones causes • Container Centralen by 3rd party severe problems in supply responsible for repair & • Assumed 10%, i.e. 350.000 chain maintenance, but counterfeits units • Primary: Large robots in does not have associated auction houses, transport contracts • Counterfeit operation very fast, competent and until now un- chain, loss of products stoppable 20 © 2010 IBM Corporation
  • 21. However, hardware hackers being one problem, Container Centralen was faced by a bunch of other issues in regards to implementation  To ensure full trust in the supply chain, it is needed to equip 25.000 customers with advanced RFID-equipment  To build a business case for the full industry  The solution needed to be rather open, while maintaining a high level of security  The solution should enforce a high level of security in all levels of the supply chain – in an industry not having a tradition for IT- systems  A very sad history of previous anti-counterfeiting organisations  …how to change behaviours at 100.000 users across 22 countries and very diverse cultures 21 © 2010 IBM Corporation
  • 22. 22
  • 23. TECHNICAL CHALLENGE: APPROACH: Make impossible to clone, copy, break and use as widespread • Tag all containers with secure logistics solution at the same tag to count and authenticate time. Also support use in very • Implement CC RFID inhouse demanding industrial heavy solution metal extreeme and high- • Extend to supply chain humidity environments. partners, e.g. Growers, auction houses, transporters, exporters, retail • Prepare for future track & trace solution across the Green Sector © 2010 IBM Corporation
  • 24. The overall purpose of the RFID solution is to addres a set of business problems – but also to initiate a larger vision of improved efficiency and collaboration in the Green Sector THE CHALLENGE Containers are being counterfeited Increased cost to handle repair Lower quality containers leading to and injected into supply chain and maintenance handling problems in Green Sector THE PROCESS Deliver framework to allow Engage stakeholders in Green Spread solution to partners to partners to build own applications Sector to participate enable authentication using CC authentication THE LONG-TERM VISION Extend solution to handle track & Enable infrastructure to allow for trace cross-partner integration 24 © 2010 IBM Corporation
  • 25. The core of the solution provides a mechanism to ensure full trust among partners in the Green Sector supply chain  Authenticate equipment to build trust and ensure genuine equipment in all handover- situations in the supply chain  Deliver solutions and software components to allow for Green Sector partners getting easy access to use of RTI authentication  It is assumed that 25.000 users will require RFID-equipment for authentication Checkpoint Checkpoint Checkpoint Checkpoint Checkpoint Checkpoint Growers Transport Auctions Transport Cross docking Transport Retail/DC Whole-salers Depot/Wash Checkpoint 25 © 2010 IBM Corporation
  • 26. Various types of RFID-equipment are used Tags RFID Readers  Previous versions have only been housing with barcode (not used)  New version contains RFID tag and barcode  Encoded with industry standard product codes able to be read by all stakeholders  Additional user memory used by security solution  Custom housing, only used by CC – ”Secret design” © 2010 IBM Corporation
  • 27. Internally in the CC depots the solution streamlines and control processes around handling containers 1. Customer 2. Sales Rep Kahlenberg completes informs CC booking in Loglink about delivery of empty containers 3. Inbound Notification created Confirmation in Loglink and sync’d Type: Inbound Notification with PDA in Depot Customer: Kahlenberg Type: Inbound Count: 20 Customer: Kahlenberg Count: 20 6. Outbound Confirmation created in PDA and sync’d with Loglink If containers cannot be read, are identified as counterfeits or other unusual situation Inbound Exception Process is 4. Benny initiated Grower arrives at Depot and 5. Depot Worker select hands in inbound delivery containers notification for Benny Grower, scans and accept containers. 27 © 2010 IBM Corporation
  • 28. How to spread the solution: The tag can be accessed in several ways, resulting in several possible usage scenarios  The tag acts in general as a normal standard STANDARD RFID DOMAIN RFID-tag and identification can be read by any standard equipment RFID READ  Only in the case that secure authentication is •Read unique tag-identifier needed, the security functionalty is used (EPC-code) from tag  Possible applications using the tag are •Standard Gen2 RFID-reader can be used therefore not limited to authentication, but the tag can be used in any identification situation •No authentication happening BARCODE READ CC SOLUTION DOMAIN •Read barcode on tag RFID AUTHENTICATION (containing EPC-code) •Read unique tag-identifier •Standard barcode readers and barcode-aware RFID- •Perform authentication readers can be used •Requires certified reader or application with Authentication Component Note: Illustration does not show final tag design 28 © 2010 IBM Corporation
  • 29. For the supply chain partners the CC RFID Solution provides several mechanisms to perform authentication and other functions either out of the box or as custom developed solutions Handheld devices Fixed gate ”Blackbox” • Selected standard handheld • A standard fixed gate-setup • A software component to devices with basic application containing all components to provide authentication and functionality to perform provide authentication and security update functionality to authentication of RTI’s counting when RTI’s are existing partner applications • Currently two models available passing dock-door or other • Integrate into inhouse or – for small-scale and larger entry standard applications scale use All devices, solutions, components delivered via an eco-system of hardware-, software-partners and system integrators 29 © 2010 IBM Corporation
  • 30. Example: The consequence is that variations of track & trace can be implemented using the basic CC RFID solution as the foundation Checkpoint Checkpoint Checkpoint RFID read points to support Auctions internal processes or partner Growers Transport integration – no authentication needed • Trading partners will be able to use means Whole-salers of track & trace • Equipment can be tracked and under • Provide improved internal visibility some restrictions freight also • Understand use and location of assets • Platform for data capture and integration • Optimise internal processes across partners is required • Standard RFID-equipment can be used However, it is important to note that the CC RFID solution does not provide track & trace in itself today. It is the task of the partner to build applications, integration and infrastructure as needed. 30 © 2010 IBM Corporation
  • 31. The solution will lead to a variety of benefits across the Green Sector GROWER AUCTION TRANSPORT/EXPORT RETAIL COLLABORATION Improvements in process efficiency by gaining full supply chain visibility Ability to connect to Clear responsibilities, increased trust between collaboration partners existing tracking initiatives at low cost Increased visibility on Optimise supply chain Clear responsibilities delivery and partner relations in handling equipment EFFICIENCY Optimise processes Improvement potential by using solution in by internal supply own context, e.g. Improvement potential chain visibility logistics systems in handling Avoid handling problems by only using high quality Avoid production Avoid production Avoid handling equipment delays and problems delays and problems problems by only using high quality COST equipment Stable methods, processes and technologies to clean the pool © 2010 IBM Corporation
  • 32. Worlds largest RFID implementation Launched: 10th January 2011 • 3.5 million RFID tags in a unique housing/padlock • 25.000 customers have marked their CC Containers • 100.000 users in Europe have been informed • Scanners for 60 CC depots and repair shops in whole Europe • IT infrastructure to handle data and flows • Scanner solutions for all users in Europe • Development of an RFID track and trace solution © 2010 IBM Corporation
  • 33. The suppliers are ready to handle the demand for products Panmobil Nordic ID Alexander & Mielo 33 © 2010 IBM Corporation
  • 34. The solution was rolled out in January 2011 and was recently named one of RWW’s ”Top 10 Internet of Things Products of 2009” 34 © 2010 IBM Corporation
  • 35. 35
  • 36. Remember – this solution was primarily for fighting counterfeiting, but the vision and the underlying infrastructure are generating a plentitude of new innovation opportunities Ad van de Wijdeven, BAAS Plantenservice Managing Director: "We immediately saw the opportunities of the RFID tags on the CC Containers for further speeding up and improving our logistics. Especially in the peak periods, when we process about 12,000 to 14,000 CCs a day, things can easily go wrong, and that requires a lot of communication between suppliers, transporters and our logistical and financial departments. All of this is no longer necessary because we can see at glance exactly what the status of each delivery is. Our suppliers and transporters have the same information. And it all happens automatically!” In conclusion, Baas Plantenservice is proud of these innovative work methods and invites other parties in the distribution chain to join in this initiative. "It is in all of our interests that together we ensure that we maintain the leading position in the horticultural sector," says Ad van de Wijdeven. 36 © 2010 IBM Corporation
  • 37. 37
  • 39. Closing remarks  The project have been significant success – for CC and the green sector  The basic assumption to fight a specific problem (counterfeiting) but to build a vision towards something bigger (track&trace) did succeed and had a positive influence  The project has a very different benefit profile across Container Centralen and the rest of the green sector, but have achived full adoption by the industry  While deploying new technologies, test and verification have been a significant focus area to ensure the best possible customer experience  Openness in architecture and solutions have initiated industry innovation  Marketing and communications have been significant focus areas 39 © 2010 IBM Corporation
  • 40. Thank you Kim Escherich IBM Global Business Services escherich@dk.ibm.com +45 2880 4733 internetofthings.dk escherich.biz @kescherich /in/escherich /escherich kescherich@gmail.com © 2010 IBM Corporation

Notas del editor

  1. CC logos: CC officesRed dots: CC depots