remote management - supply chain

5
Remote Management The term remote management is used to describe any process in which the controlling device is not physically attached to the actual unit. There are four aspects to this process: i) Communication method The communication method used in a remote management system is dependent upon the intended application. For example, communication with a drilling machine in a mine cannot be based on a clear line of sight between the operator and the machine. Instead, a dedicated radio frequency or wireless communication channel is needed. The number of other machines and units controlled via a remote management system has a huge impact on the effectiveness of the communication method. Each unit must be controlled separately, with no interference from other devices. ii) Level of control The level of control provided via remote management is very important. Initially, most of the equipment was very large, and the technology was used to get close enough for manual control. However, operators now require a high degree of precision and control. The tools used to control the equipment are extremely sophisticated dashboards that can be used to create a program or to move the machine in very small increments. iii) Operator training The remote management operator typically sits in a separate location and is responsible for controlling the equipment based on a video feed and similar information. The training required to work with this type of equipment usually is provided by the employer, because each system is different. The increased use of these tools has resulted in the development of short courses and training programs designed specifically to increase the level of skill of the operator. iv) Performance issues

Upload: nicole-rodriguez

Post on 24-Dec-2015

5 views

Category:

Documents


2 download

DESCRIPTION

Remote Management - Supply Chain

TRANSCRIPT

Page 1: Remote Management - Supply Chain

Remote Management

The term remote management is used to describe any process in which the controlling device is not physically attached to the actual unit. There are four aspects to this process:

i) Communication method The communication method used in a remote management system is dependent upon the intended application. For example, communication with a drilling machine in a mine cannot be based on a clear line of sight between the operator and the machine. Instead, a dedicated radio frequency or wireless communication channel is needed. The number of other machines and units controlled via a remote management system has a huge impact on the effectiveness of the communication method. Each unit must be controlled separately, with no interference from other devices.

ii) Level of control The level of control provided via remote management is very important. Initially, most of the equipment was very large, and the technology was used to get close enough for manual control. However, operators now require a high degree of precision and control. The tools used to control the equipment are extremely sophisticated dashboards that can be used to create a program or to move the machine in very small increments.

iii) Operator training The remote management operator typically sits in a separate location and is responsible for controlling the equipment based on a video feed and similar information. The training required to work with this type of equipment usually is provided by the employer, because each system is different. The increased use of these tools has resulted in the development of short courses and training programs designed specifically to increase the level of skill of the operator.

iv) Performance issues One of the challenges of remote management is related to overall performance. Operator expectations can be unduly influenced by images in the media of remote-controlled robots that can be easily manipulated with great precision. In fact, a significant amount of programming and effort is required to complete a process with a remote-controlled device. Most of the adjustments that an operator would make require additional time to execute in this model.

The primary reasons for implementing a remote management system are to improve safety and increase productivity. Remote Management involves the usage of wireless LANs to track warehouse and factory assets. It is an example of how a mainstream IT resource has been adapted to benefit industrial environments. Some of the examples of remote management are as follows:

1. Powerful remote management systems have been developed specifically to configure, monitor and troubleshoot bar code readers and printers, RFID equipment, ruggedized computers and other industrial. In this case the end users having one scanner that reads codes in any orientation dramatically improves productivity.

Page 2: Remote Management - Supply Chain

2. RFID-enabled forklifts offer an opportunity for end-users to reduce investment in reader infrastructure without compromising capability.

3. The U.S. Social Security Administration (SSA) implemented RFID systems in a warehouse to track inventory and facilitate more efficient shipping to branch offices. The SSA realized productivity improvements and incremental annual savings. Network administrators have typically had little visibility or control over these remote devices because enterprise IT asset and network management systems are made for common PCs, servers, and network equipment and don’t address the configurations and usage conditions specific to data collection and computing in industrial environments.

Here are a few examples of why general-purpose management systems have limited effectiveness for preserving uptime and managing equipment used in supply chain operations.

a. Ruggedized computers are like office PCs in that they periodically require software updates and security patches, and should be monitored to ensure consistency in configurations and software versions.

b. Bar code and RFID smart label printers periodically need to be updated with new label templates and bar code formats, and use thermal print technology, which sometimes requires heat setting adjustments. Bar code printers have specialized command languages, so they are largely incompatible with print monitors and other applications made for office laser and inkjet printers.

c. RFID readers can be optimized for their immediate environment by changing power output and making other tuning adjustments.

Device management software is available to meet all these needs plus provide real-time monitoring and notification if devices go offline, and if implemented with open systems standards, it can be accessed through enterprise network management solution (e.g. Tivoli). Companies use such software to improve reliability and uptime in mission-critical production, distribution and service operations. Such software is also extremely valuableduring rollouts and upgrades, because system administrators can use it to set configurations and install software remotely and across groups of devices, instead of having to handle eachdevice individually. These features take a lot of the time and cost out of managing devices, making it much more cost efficient to keep systems up-to-date with new software and security enhancements.

Wireless and device Security

Stronger security is another mainstream business trend and requirement that is supported in supply chain technology. Securing mobile devices has become increasingly important in recent years as the numbers of the devices in operation and the uses to which they are put have expanded dramatically. The problem is compounded within the enterprise as the ongoing trend toward IT consumerization is resulting in more and more employee-owned devices connecting to the corporate network.Top five mobile security concerns are:

Page 3: Remote Management - Supply Chain

1. Device lossIf an employee leaves a tablet or smartphone in a taxi cab or at a restaurant, for example, sensitive data, such as customer information or corporate intellectual property, can be put at risk.

2. Application security One problem is mobile apps that request too many privileges, which allows them to access various data sources on the device. Many mobile apps especially free ones are built with ties to advertising networks, which makes contacts, browsing history and geolocation data extremely valuable to application developers. "Developers want to monetize, consumers want free apps and then ad networks will pay developers to get all of that juicy data from their users." Leaked corporate contacts, calendar items and even the location of certain executives could put the company at a competitive disadvantage.Another concern is malicious or Trojan-infected applications that are designed to look like they perform normally, but secretly upload sensitive data to a remote server.

3. Device data leakageNearly all of the chief concerns identified in the mobile security survey, from data loss and theft to malicious applications and mobile malware, are sources of data leakage. While most corporate access privileges on mobile devices remain limited to calendar items and email, new mobile business applications can tap into a variety of sources, if the enterprise accepts the risks. Increased corporate data on devices increases the draw of cybercriminals who can target both the device and the back-end systems they tap into with mobile malware.

4. Malware attacks The vast majority of mobile malware are SMS Trojans, designed to charge device owners premium text messages.

5. Device theft Smartphone theft is a common problem for owners of highly coveted smartphones such as the iPhone or high-end Android devices. The danger of corporate data, such as account credentials and access to email, falling into the hands of a tech-savvy thief, makes the issue a major threat to the IT security pros who took the survey.

Mobile computers can be locked down so customer information and other data can’t be accessed if the device is lost or stolen. Rugged wireless computers and data collection equipment also support many of the leading securities used to protect enterprise wireless networks. Wireless data collection devices that support Cisco Compatible Extensions (CCX) can be fully included in a Cisco Unified Wireless Network and take advantage of all the associated management, reliability and security features, including hacker and rogue access point detection, authentication and encryption, integrated firewalls and more.Business needs for security, real-time visibility, and up-to-date information don’t stop at the office door. These needs extend throughout supply chain operations, so reliable information systems must extend just as far. Developments in mobile computing, wireless communication, RFID, bar code and other data collection and communications technologies are helping businesses extend visibility and control over more areas of their operations.