8 resultados para Business information services

em Cambridge University Engineering Department Publications Database


Relevância:

90.00% 90.00%

Publicador:

Resumo:

RFID technology can be used to its fullest potential only with software to supplement the hardware with powerful capabilities for data capture, filtering, counting and storage. The EPCglobal Network architecture encourages minimizing the amount of business logic embedded in the tags, readers and middleware. This creates the need for a Business Logic Layer above the event filtering layer that enhances basic observation events with business context - i.e. in addition to the (what, when, where) information about an observation, it adds context information about why the object was there. The purpose of this project is to develop an implementation of the Business Logic Layer. This application accepts observation event data (e.g. from the Application Level Events (ALE) standard interface), enriches them with business context and provides these enriched events to a repository of business-level events (e.g. via the EPC Information Services (EPCIS) capture interface). The strength of the application lies in the automatic addition of business context. It is quick and easy to adapt any business process to the framework suggested and equally easy to reconfigure it if the business process is changed. A sample application has been developed for a business scenario in the retail sector.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

There is growing interest in Discovery Services for locating RFID and supply chain data between companies globally, to obtain product lifecycle information for individual objects. Discovery Services are heralded as a means to find serial-level data from previously unknown parties, however more realistically they provide a means to reduce the communications load on the information services, the network and the requesting client application. Attempts to design a standardised Discovery Service will not succeed unless security is considered in every aspect of the design. In this paper we clearly show that security cannot be bolted-on in the form of access control, although this is also required. The basic communication model of the Discovery Service critically affects who shares what data with whom, and what level of trust is required between the interacting parties. © 2009 IEEE.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This book provides you with all fundamental concepts, guidelines and tools to ensure core business information is identified, protected and used effectively, written in a language that is clear and easy to understand for non-technical ...

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This book provides you with all the fundamental concepts, guidelines and tools to ensure core business information is identified, protected and used effectively, and written in a language that is clear and easy to understand for non ...

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper will provide a rationale for developing control systems based on the availability of automated identification (Auto ID) information provision. Much of the Auto-ID research has to date focussed on developing the essential infrastructure for dynamically extracting, networking and storing product data. These developments will help to revolutionise the accuracy, quality and timeliness of data acquired by Business Information Systems and should lead to major cost savings and performance improvements as a result. This paper introduces an additional phase of Auto ID research and development in which the nature of control system decisions is reconsidered in the light of the availability of ubiquitous, unique, item-level information. The paper will: (i) Indicate why the availability of ubiquitous, unique, item-level data can enable enhanced and fundamentally different control approaches and highlight potential benefits from control systems incorporating this Auto ID data (ii) Demonstrate what is required to develop control systems based around the availability of Auto ID data. (iii) Outline the research challenges in determining how such systems will be developed.