Title: Bounded Rationality
1Welcome
- Strategies of Network Companies
- Jonathan Wareham
- Jonathan.wareham_at_esade.edu
-
2Topics
- What are Supply Chain Management Systems?
- How do they work?
- What can they do?
- What can they not do?
- An economic model of virtual organizations The
WS paradigm
3Traditional supply chain obsolescence
Direction of flow of demand
Direction of flow of product
Point of differentiation Distribution
costs Market mediation costs
Manufacturers
Tier-I Suppliers
Distribution Centers
Tier-II Suppliers
Retailers
Customer Zones
Raw Material vendor
4RFID Tags
5What is RFID? -- The Tags
- Tags can be attached to almost anything
- pallets or cases of product
- vehicles
- company assets or personnel
- items such as apparel, luggage, laundry
- people, livestock, or pets
- high value electronics such as computers, TVs,
camcorders
6Are All Tags The Same?
- Basic Types
- Active
- Tag transmits radio signal
- Battery powered memory, radio circuitry
- High Read Range (100 meters)
- Passive
- Tag reflects radio signal from reader
- Reader powered
- Shorter Read Range (10cm 5 meters)
7RFID the Supply Chain
Tag
Reader
Antenna
Middleware
Supply chain execution
- Process information from reader
- Filters data
- Sends data to backend servers
- Backend SCE or ERPsystems receives
Information
- Transmits identification data to a reader
- Transmit data tomiddleware
- Associates tag info with product info
- Coiled antenna ofreader creates magnetic
field with coiled antenna of tag
8How far, how fast, how much, how many, attached
to what?
- Low Frequency
- No regulation
- Penetrate materials (water, wood, tissue well)
- Slow read speed
- Small range
- No penetration of iron and steel
- Medium Frequency
- Little data, small distance
- Thin tags
- Low cost
- High data rates
- Govt regulated
- Non mental penetrating
- High Frequency
- Penetrate materials
- Small tag size
- High data transfer
- Long range
- Non-water or tissue penetrating
9Where can RFID add value?
- Into a Stores Back Room Inventory
- Out the Door as an anti-theft device
10- Top 100 Suppliers
- Suppliers will mark inbound cases and pallets
with RFID - 1 January 2005 - May, 2003
specification calls for 256 bit read/write tag - 1 EPC tag per carton 100 read on conveyor
- 1 EPC tag per pallet 100 read at Inbound dock
- Conveyor speed of up to 600 feet per minute
- 3 Texas Distribution Centers
- January 2005
11Why???
- Stock management /perishables (field to fork)
- In-stock levels
- Invoice reconciliation damaged, deductions,
performance penalties, etc. - Scan Based Trading or VMI
- Improved analytics POS data
- All reads available to suppliers within 30
minutes
12Guidelines for using RFID
- Bar codes cannot be used
- Counting versus identification (reverse
logistics) - Use of 3Party logistics and suppliers
- Data collection is chaotic (battlefields,
hospitals, retails shops) - Exact configuration of the good must be
maintained - Counterfeit protection
- High Risk scenarios, drugs, hospitals
- Collecting data outside of retailer (smart
refrigerators, medicine cabinets, etc)
13Traditional supply chain obsolescence
Direction of flow of demand
Direction of flow of product
Point of differentiation Distribution
costs Market mediation costs
Manufacturers
Tier-I Suppliers
Distribution Centers
Tier-II Suppliers
Retailers
Customer Zones
Raw Material vendor
14Example Problem Space
Credit Service
Consolidate Results
PO Service
Client
Inventory Service
15- Sell 50,000 computers with only 4 days of
inventory - Keep few suppliers very close
- 30 suppliers 75 of materials
- When order is made, signal is sent to supplier,
90 minutes later, supplies are delivered to Dell. - We sell what we have, we dont sell what we
dont have
16Dell From HBR
- Have as few suppliers as possible
- In real time, communicate your inventory levels
and replenishment needs to them - Order from suppliers only when you receive demand
from customers.
17Example Problem Space
Credit Service
Consolidate Results
PO Service
Client
Inventory Service
18(No Transcript)
19Example Self-describing data
20(No Transcript)
21XML Auction Demo
22Web Services Overview Application Model
Partner Web Service
Other Web Services
Partner Web Service
Internet XML
YourCompany.com
End Users
Application Business Logic Tier
Data Access and Storage Tier
Other Applications
23Web Services Overview Portals
Ads
Mail
Other Svcs
Calendar
Weather
Finance
News
24(No Transcript)
25Web Service Demos
- WebMethods.net
- http//www.webservicelist.com/
- http//www.xmlwebservices.cc/index_Samples.htmTop
- http//www.asitis.co.uk/web-services/
26Underlying Technologies Web Services Stack
Directory Publish Find Services UDDI
Inspection Find Services on server DISCO
Description Formal Service Descriptions WSDL
Wire Format Service Interactions SOAP
Universal Data Format XML
Ubiquitous Communications Internet
Simple, Open, Broad Industry Support
27Underlying Technologies Web Services Stack
Directory http//www.uddi.org
UDDI
UDDI or other directory service
Locate a Service
Link to Discovery Document (XML)
Inspection http//www.ibuyspy.com/ibuyspy.disco
DISCO
Request Discovery Document
Return Discovery Document (XML)
Web Service Client
WSDL
Description http//www.ibuyspy.com/ibuyspycs/Insta
ntOrder.asmx?wsdl
Request Service Description
Web Service
Return Service Description (XML)
SOAP
Wire Format
Request Service
Return Service Response (XML)
28SCM Software Who?
29What does SCM software do?
- 2 Main Functions Tracking Optimization
- Factory Scheduling
- Bar Code Warehouse Management
- Transportation Routing and Scheduling
- Inter Organizational Systems
- Collaborative Planning Optimization
- Multi echelon optimization
- E-Procurement Marketplaces
- Supplier Contract Management
- RFID Management Systems
30The Bullwhip Effect
Upstream amplification of demand
variation Progression of a brushfire to an
inferno!
Customer
Retailer
Distributor
Factory
Tier 1 supplier
Equipment
31Machine Tools at Bullwhip Tip
32The Diaper Supply Chain!
Ripples to tidal waves Stockpiles and
stockouts Insufficient or excessive
capacities Higher costs
33Interorganizational Systems CRP
BIG RETAILER
lt 3 stock outs lt 14days inventory
Warehouse 1
PG
Warehouse 2
34Before CRP
Budget
BIG RETAILER
Actual
Warehouse 1
PG
Warehouse 2
- Volume discounts
- New product promos
- Here and now discounts
- Trade marketing
- Bonuses.
35Differences
- Bringing vertical coordination to the network
but how?
3,500 modular parts 30 suppliers
Over 1,000,000 parts in just one car!
36Ronald Coase (1937)
- Why do we have firms?
- there must be some cost in using the price
mechanism. - Price discovery/search costs
- Contract negotiation
- Long term stability of supply sources
(uncertainty) - Ergo, operation of the market costs something,
and by forming and organization and letting some
authority to allocate resources, some costs are
saved
37Basic attributes of transactions
- Specificity
- Frequency
- Duration
- Complexity
- Uncertainty
- Difficulty of measuring performance
- Connectedness
38Asset Specificity
- Investments made to allow two parties to exchange
but has little or no value outside of the
exchange relationship - Site specificity
- Physical-asset specificity
- Dedicated assets
- Human capital
- Lead to higher transaction costs and the problem
of hold-up
39Specificity Frequency
40IT, Complexity Specificity
Hierarchy
Product Complexity
Market
Asset specificity
41Example Problem Space
Credit Service
Consolidate Results
PO Service
Client
Inventory Service
42Traditional supply chain obsolescence
Direction of flow of demand
Direction of flow of product
Point of differentiation Distribution
costs Market mediation costs
Manufacturers
Tier-I Suppliers
Distribution Centers
Tier-II Suppliers
Retailers
Customer Zones
Raw Material vendor