WAL-MART

This essay has a total of 823 words and 4 pages.

WAL-MART

Over the last few years the cost declines of Radio Frequency Identification (RFID)
technology, combined with improvements in sensitivity, range and durability, have enabled
widespread RFID use in the logistical planning and operation segments of supply chain
management processes. Specifically, areas such as security and access control, tracking,
and monitoring/management will strategically be enhanced from the use of this technology.
An RFID tag consists of a microchip and an antenna, often in the form of a tiny ribbon
that can in turn be packaged into many forms, such as a label, or imbedded in between the
cardboard layers in a carton. On the microchip is stored information about the product
that the tag is affixed to, which can then be "read" when the tag passes within proximity
of an RFID "reader". This information is almost instantly relayed back to a computer
system that updates the location status of the associated product. This procedure enables
great efficiencies and cost reductions with respect to inventory management and control in
a physical product environment, and also enables innovative applications in locating and
tracking people and assets in a services environment. (Hagans, Andy, RFID Magazine)

This environment changed dramatically last June when Wal-Mart Stores announced that it
would require its top 100 suppliers to put RFID tags on shipping crates and pallets by
January 1st 2005. Earlier this month, Wal-Mart announced that it will expand its RFID
efforts to its next 200 largest suppliers by January 1st, 2006. Each tag would store an
Electronic Product Code (EPC) which is a bar code that would be used to track products as
they enter Wal-Mart's distribution centers. In turn, these products are then shipped to
individual stores. Being the world's largest company in terms of revenue, Wal-Mart changed
the strategic foundation of many companies in one such decision.

There are four main aspects of strategic impact from this decision by Wal-Mart. They are,
in no particular order: volume and cost, supply chain extensions (upstream), innovation
and supply chain extensions (downstream). Looking from the volume and cost perspectives,
the economies of scale of RFID manufacture will drastically change due to Wal-Mart's move.
As of now, the annual volume of RFID tag shipments from top 100 suppliers is estimated at
1 billion tags. With Wal-Mart being such a powerful company that sets standards for
manufacturers, their entrance into this new market will result in other companies
benchmarking their behavior, which in turn, will result in a significantly lower price per
tag. Current average cost per tag ranges between 25 to 50 cents. With Wal-Mart's entrance,
analysts are expecting the price per tag to drop towards the 5 cent range, which will
consequently allow the expansion of RFID technology into new markets.

In terms of upstream supply chain management extensions, by Wal-Mart requiring its
suppliers to use RFID in its end product packaging, there will likely be an impact of
accelerating the use of RFID into the supplier's own supply chain as well, and eventually
in turn, the supplier's own vendor supply chains. This kind of "ripple" effect will
greatly multiply the numbers of companies affected and the demand for RFID tags, further
enabling lower costs per tag. More so, the demand to track products prior to their arrival
in Wal-Mart's distribution centers will grow. This includes tracking products once they
Continues for 2 more pages >>




  • Planning Information Systems
    Planning Information Systems Planning for Management Information System Planning for Management Information System The biggest challenge and most critical success factor in reengineering projects are persuading the people within the organization to cooperate. When you begin to computerize a legacy system considers the advantages; reduced clerical cost, quicker processing time and improved customer service. Everyone knows that the computer capabilities alone make life a lot easier for all manager
  • Convergence of Internet with other Technologies
    Convergence of Internet with other Technologies Convergence of Internet with Other Technologies The Internet is a significant part of our everyday life. Ever since it was invented by the Department of Defense while the Cold Wars were still raging, during the 1970s, it had been advancing dramatically in its importance in our society (The Dynamics of Mass Communication, by Joseph R. Dominick, p.326-327). The advantages of the Internet, which made it popular, are countless. It provides users easy
  • Convergence of Internet with other Technologies1
    Convergence of Internet with other Technologies1 Convergence of Internet with Other Technologies The Internet is a significant part of our everyday life. Ever since it was invented by the Department of Defense while the Cold Wars were still raging, during the 1970s, it had been advancing dramatically in its importance in our society (The Dynamics of Mass Communication, by Joseph R. Dominick, p.326-327). The advantages of the Internet, which made it popular, are countless. It provides users easy
  • CDPD in Latin America
    CDPD in Latin America MOBILE WIRELESS DATA: A key success factor for business development in Latin American Seven years ago cell phones technologies arrived to the Latin American countries and brought wireless voice communications, with that the develop of a new value-added service like CDPD emerge bringing wireless data transfer. Due to this technology business communities around Latin America had started to perform their productive activities more efficiently. Who does companies work with this
  • TapNet Business Plan
    TapNet Business Plan TAPNET.COM Business Plan December 11, 2000 Peter Bankuti Table of Contents ______________________________________________________________________ 1. TapNet Executive Summary 4 1.1 The Opportunity 4 1.2 The Application 4 1.3 The Need for Additional Capital 5 2. The Industry and TapNets Product(s) or Service(s) 5 2.1 The Trade Association Industry 5 2.2 TapNet Company and the Concept 7 2.2.1 Networking 7 2.2.2 News & Information 8 2.2.3 Ecommerce 8 2.2.4 Meetings 8 2.3 TapNe
  • Business Plan
    Business Plan TAPNET.COM Business Plan December 11, 2000 Peter Bankuti Table of Contents ______________________________________________________________________ 1. TapNet Executive Summary 4 1.1 The Opportunity 4 1.2 The Application 4 1.3 The Need for Additional Capital 5 2. The Industry and TapNets Product(s) or Service(s) 5 2.1 The Trade Association Industry 5 2.2 TapNet Company and the Concept 7 2.2.1 Networking 7 2.2.2 News & Information 8 2.2.3 Ecommerce 8 2.2.4 Meetings 8 2.3 TapNet Prod
  • Electronic Products code
    Electronic Products code Electronic Product Code Project Table of Contents Executive Overview……………………………………………………………………3 Stage 1: Determination of Scope and Objectives……………………………………....4 Stage 2 - Systems Investigation and Feasibility……………………………………….4 Stage 3 - Systems Analysis…………………………………………………………….7 UPC DFD (Legacy System)……………
  • Bank Accounting Information System And Electronic
    Bank Accounting Information System And Electronic Banking Introduction Information technology has had as much impact on our society as the industrial revolution. In the information age, companies are finding that success or failure is increasingly dependent on their management and use of information. Therefore, companies need a good information system that enabled an efficient and effective use of information to give them more competitive advantage (Moscove, Simkin, Bagranoff, 1999). An informat
  • Artificial Neural Networks for Misuse Detection
    Artificial Neural Networks for Misuse Detection Abstract: Misuse detection is the process of attempting to identify instances of network attacks by comparing current activity against the expected actions of an intruder. Most current approaches to misuse detection involve the use of rule-based expert systems to identify indications of known attacks. However, these techniques are less successful in identifying attacks which vary from expected patterns. Artificial neural networks provide the potent
  • Management Information
    Management Information Planning for Management Information System Planning for Management Information System The biggest challenge and most critical success factor in reengineering projects are persuading the people within the organization to cooperate. When you begin to computerize a legacy system considers the advantages; reduced clerical cost, quicker processing time and improved customer service. Everyone knows that the computer capabilities alone make life a lot easier for all managers. The
  • Fingerprinting Kids
    Fingerprinting Kids Should parents voluntarily create detailed identification records(including fingerprints) on their children in anticipation of possiblerunaway problems or abductions? (1) Yes. You can never tell when terriblethings will happen to a child, so its best to be prepared. (2) No. Thevast majority of missing children are not abducted. Whether abducted ornot, fingerprinting will do no good. It wastes time and money and pushesus that much closer to the creation of the Orwellian Nation
  • BT Direct marketing
    BT Direct marketing 1.0 Executive Summary The proposals that we are going to depose are a planning of continuous action in order to confront the challenges, which BT confronts. The most important factor is considered to be the fact that the marketing environment changed rapidly after the deregulation of the telephone industry. Up to then BT was operating as a monopoly, ignoring the competition and ways to face it. Our intention is to achieve the already given targets and also prepare BT for an o
  • Fingerprinting Kids
    Fingerprinting Kids Should parents voluntarily create detailed identification records(including fingerprints) on their children in anticipation of possiblerunaway problems or abductions? (1) Yes. You can never tell when terriblethings will happen to a child, so its best to be prepared. (2) No. Thevast majority of missing children are not abducted. Whether abducted ornot, fingerprinting will do no good. It wastes time and money and pushesus that much closer to the creation of the Orwellian Nation
  • Wachovia
    Wachovia Table of Contents 1. Background 1.1 Company History………………………………………………… 1 1.2 Driving Force……………………………………………….......... 1 1.3 Location…………………………………………………….......... 1 1.4 Quick Summary of: 1.4.1 Employees…………………………………………….. 1 1.4.2 Revenues Growth……………………………………… 2 1.4.3 Income Growth…………………………