Perakendede RFID İle Konteyner Takibi

Auchan-Fransız süpermarketleri 1,8 milyon ürün konteynerini RFID ile takip ediyor


Nov. 4, 2011—Fransız süpermarketler zinciri  Auchan Group, üreticiden dağıtıcılara, dükkana gelişlerinden yıkama süreçlerine kadar olan tüm tedarik zincirinde RF teknolojilerini kullanıyor.

Son iki yıldır kullanılan RFID çözümü hem konteyner takibi, hem bu konteynerlerin varış zamanlarını hem de AB normlarına göre yıkanıp yıkanmadığının takibi için konumlandırılmış durumda.

Yaklaşık 1,317 dükkanıyla  Auchan Group dünyanın 12. büyük gıda perakendecisi konumunda. 2007 yılında o zamanlar kullanılan kartlı sistem ve tahta palletlerin kullanımı durduruldu ve tekrar kullanılabilir plastik konteyner kullanımına geçildi. Bu sayede depolama alanlarında verimlilik, ürün ve sebzelerin daha iyi korunması ve ürünler dükkanda sergilenirken daha ilgi çekici bir sunumla müşteriye sunulması sağlanmıştır.

Hangi konteyner ne zaman geldiğinin bilgisini alabilmek için daha önce gelen her konteyner üzerindeki barkod görevli personel tarafından tek tek okutuluyordu. RFID teknolojisi ile birlikte gelen konteynerler ve içeriklerini tanımlama ve geliş zamanlarını öğrenme işi otomatize olmuştur. Auchan, konteynerlerini  Cogit LGCden kiralıyor ve bu konteynerler Fransa ve İspanya genelindeki birçok dağıtım merkezi ve dükkana gönderiliyor. Bu karışık gönderim sırasında konteynerlar kaybolabildiği gibi çalınadabiliyor. Buna ek olarak AB standartları gereği , her konteyner kullanıldıktan sonra dezenfekte edilmelei ve yıkanmalı. Otomatize edilmiş bir takip sistemi olmadan, her bir konteynerin bu süreçten geçip geçmediğinin takibi pek mümkün değildi.

Auchan, yükleme kapılarına RFID okuyuclar takarak mal kabulu ve sevkiyat süreçlerini otomatik olarak kayıt altına almış oldu.
RFID sistemi hayata geçirilmeden önce 100% okuma oranına en yakın konumlandırmaları test etti ve şu anda sistem yaklaşık %98 doğruluk oranı ile çalışmaktadır. Her bir okuyucu her geçişte  paletler veya forkliftler içinde  12km/s hıza kadar geçen yaklaşık 200 kadar konteyneri okuyabilme kapasitesine sahip. 2011 yılı sonuna dek 130 dükkanında bu sisteme geçen Auchan, 2012 yılı içinde üreticlere de el terminalleri vererek ve konteyner kiralaması yapılan Cogit şirketinin yıkama ünitelerende de okuyucular yerleştirerek sistemin otomazisayon oranını arttırmayı planlamaktadır.

Ek olarak yazılım sayesinde perakendeciler istatistiksel verilere bakarak konteynerlerin hangi hızlarda üretici, dağıtım merkezi, dükkan   ve yıkama istasyonlarından geçtiği bilgisini alabiliyorlar. Bu sayede olası gecikmelere karşı sistemde değişikliklere gitme şansı doğmuş oluyor.

Reklamlar

RFID Park Çözümleri

IBM RFID li Park Çözümlerini Daha Akıllı Bir Dünya İçin Kullanıyor

IBM, Streetline şirketi ile birlikte  belediyelerin park yöneticilerine kendi işlerine odaklanma şansı tanırken, sürücülere de boş park yerlerini daha kolay bulduruyor. 

Streetline’ın ParkSight çözümü manyetik sensörler ile bir park alanında bir aracın var olup olmadığını belirleyebiliyor. IBM ise kendi yazılım platformu Cognos üzerinden Streetline sisteminden gelen istatistiksel verilere dayanarak  değişik park lokasyonlarında parketme alışkanlıkları hakkında analizler yapıyor.

IBM’in”Akıllı Dünya” konsepti dahilindeki “Akıllı Şehirler” açılımı, özellikle kentsel yerleşim alanlarında verilecek olan servislerin ve altyapının iyileştirilmesi konusuna odaklanıyor.  Bu iyileştirme servisleri arasında akıllı elektrik şebekeleri, su yönetim sistemleri, yeşil binalar ve trafik  sıkışıklığı çözümleri bulunuyor.  Stokholm’de trafik akışını IBM sensörler, kamerlar ve lazerler ile çözmüş bulunuyor. Şimdi de Streetline ortaklığı ile park yönetimi konusunda ki çözümlerde bu “Akıllı Şehirler” çözümlerine eklenmiş oluyor.

IBM son zamanlarda yaptırdığı anketler doğrultusunda şehirlerdekiş tarfik sıkışıklığının %30’unun boş park yeri bulmak için tur atan araçlar tarafından yaratıldığı sonucuna ulaştı.  Yetersiz park sistemleri sadece sürücüleri değil, dükkanlarına müşteri çekmek isteyen iş sahiplerinide etkilemektedir.

Streetline bugüne kadar ParkSight çözümünü San Fransico’nun da dahil olduğu birçok kentte kurdu (bu çözümün detayları için SF Uses Wireless Sensors to Help Manage Parking).
Çözüm, 2.4 GHz frekansında pille çalışna kablosuz sensörlerin mesh network üzerinden IEEE 802.15.4 air-interface  protokolu üzerinden haberleşmesi üzerine inşaa edilmiştir. Streetline’ın kendi RF etiketlerine sahip sensörler park yerine yerleştirilmekte ve sinyalleri yakınlardaki bir ışıklandırma direği veya kalıcı yapılar üzerindeki okuyucu-tekrarlayıcılar tarafından alınır. Her sensör park yerinin boş olup olmadığını belirler ve bu bilgiyi tekrarlayıcıya iletir. Bu tekrarlayıcılar ise bu bilgiyi bir gateway cihazına iletir, Bu cihaz da bu bilgiyi bir internet bağlantısına yönlendirir. Bu sayede bilgi merkezi bir veritabanına işlenir.
Streetline Sensor
Tipik bir park çözümünde Streetline yaklaşık 120 ila 200 sensör, 15-20 tekrarlayıcı ve bir gateway cihazı  yerleştirmektedir.Son 12 ay içinde 14 yeni müşteri bu sistemi kullanmaya başladı.  Yeni müşteriler arasında Kaliforniya şehrindeki sürücüler Streetline’ın ücretsiz akıllı telefon uyuglaması olan “Parker” i kullanarak hangi park yerinin boş olduğunu öğrenebilmektedir.ParkSight verilerine şehir yöneticileri de ulaşabiliyor ve örneğin hangi yerde hangi aracın park süresini aştığını ve bu sayede park elemanlarının araca gerekli ücretlendirmeleri zamanında ve eksiksiz yapmasını sağlayabilmektedir.
IBM’in analiz çözümü sayesinde belediye park çözümleri yöneticileri hangi park görevlisinin verimli çalıştığını, en çok ücret verimliliğinin hangi bölgede olduğunu  ve belirle alanlarda park sürelerinin uzunluğunu hızlı, ve doğru olarak ölçebilmektedirler.
Streetline sensor

Havayolları ve Raylı Sistem Sektörlerinde RFID Kullanımı Yaygınlaşıyor

RFID GAINS TRACTION IN AIRLINE AND RAIL SECTORS

OCTOBER 13, 2011

The transportation sector continues to be a hotbed of activity for RFID. This week Avery Dennison announced that it has been awarded a three-year contract by McCarran International Airport in Las Vegas, Nev., to continue to supply RFID tags for its baggage handling system.

Although McCarran doesn’t represent a new deployment, additional airports are lining up for rollouts. Alien Technology shipped product to five major international airports in 2011. While most are pilots, two of them represent long-term contracts.

The rail sector is also seeing increased activity, especially in Europe where TagMaster announced a deal to deliver its UHF track-side readers to the Swedish Transport Administration.

VDC Research says the RFID solutions market in transportation was worth more than $1.1 billion in 2010, and is expected to expand 17 percent this year. Nearly one billion tags were consumed globally in 2010, and that number could exceed 15 billion by 2015.

The uptick in baggage handling follows several years of inactivity after airports in Hong Kong, Lisbon, Italy and Las Vegas — the U.S. pioneer for bag tagging — all experienced great success with RFID. In Hong Kong, handling costs per bag have declined from $7 to less than $4.

The major benefit of RFID use at airports is for baggage tagging, thereby reducing the amount of bags that go missing each year. Eventually, customers will benefit additionally from RFID-enabled check in at airports, which is currently being piloted by Qantas Airways in Australia. Other consumer facing use cases, like using RFID to track the progress of trips from start to finish, are longer term projects.

The International Air Transport Association (IATA) says that RFID bag tags could save the aviation industry more than $700 million each year. IATA estimates that the ROI for these systems is about 12 months. Typically, it costs about $100 to recover a lost bag, and mishandled bags are a key issue affecting customer satisfaction.

At the Lisbon airport in Portugal, misplaced bags have been reduced by more than 50 percent, and the time it takes for customers to receive their bags has been reduced by two-thirds. The primary reason for the increased efficiencies is the near 100 percent read rates offered by RFID, as opposed to the bar code systems that often misread three out of every 10 bags.

Airports are discovering interesting use cases for RFID. This summer, Copenhagen Airport deployed RFID to handle large volumes of baggage from passengers on cruise ships. When passengers depart a cruise ship in Copenhagen to fly home, the airport must process a large volume of baggage in a short period of time. During the peak of tourist season this summer, 16 RFID-enabled check-in positions were installed to receive the baggage, where an RFID tag is attached before the bag proceeds to the carousel. Once a piece of baggage reaches the right chute, the RFID system visually alerts the operator to confirm which flight the bag is on.

The airport is considering expanding the system to the entire airport in the future.

“The RFID solution has proven to be so robust that we have not had a single day of interruption in operations,” Søren Elkjær, department manager for baggage administration, CPH, said in a press release. “For CPH, the spin-off benefit from the project is that the RFID technology has now been tested in a limited, but live production environment.

Shifting from Demark to Sweden and the rail industry, TagMaster, has been awarded a supply contract to deliver its new UHF track-side readers to the Swedish Transport Administration. The readers will be used to automatically identify both Swedish and international goods wagons as they pass detection sites on the Swedish mainline rail network.

The STA, along with several other infrastructure owners in Europe, are implementing wagon tracking systems conforming to the EPC Gen2 standard, paving the way for the introduction of a European wide system where interoperability is a the primary requirement.

While it could take years to nail down standards, leaders in the European rail community are working hard to set EPC as the de-facto standard. Earlier this year at an RFID in rail meeting in Stockholm, most participants agreed that UHF 18006-C should be the European standard for the identification of wagons.

“There is a need for a European standard if RFID in Rail projects are to maximize their benefits,” says Alice Mukaru, business manager for AIDC?at GS1 Sweden. “If a standard is not used, each infrastructure manager will have to install readers capable of reading the different tags on  wagons that it wants to get information from, which would make implementation complex and expensive.”

Sweden has elevated the need for rail car tracking due to the fact that 60 percent of the cars travelling on the 10,00 kilometers (about 6,200 miles) of rail in the country are from other European countries. The STA has identified the need to track goods wagons both on its own network and those of other European networks due to requests from train operators who want to know where their cars are, and from freight shippers seeking accurate and timely information about wagon movements and inventory tracking, as well as the need to link information from their detector systems to the right wagon.

Complicating the task is the fact that some rail projects currently operating in Sweden and the EU were in place long before EPC technology was developed.

“This is part of an ongoing project within Europe to adopt the UHF Gen 2 standards for identifying goods in wagons,” said Richard Holt, director of transportation at TagMaster AB. “Previously there hasn’t been a standard in Europe, so we are working closely with GS1 on standards. It is quite a complex process especially in Europe because you have so many interested parties.”

According to GSA, estimates that they will need approximately 700 readers to cover all tracks at stations hubs and marshalling yards. The initial pilot will begin by deploying 30 readers, and will be expanded to include 200 more readers in 2012-13. The remaining readers will be rolled out the following year.

In addition to using RFID to track rail cars and their contents, several companies in Europe are already evaluating the use of AIDC technologies such as barcode and RFID to enable automatic data capture of their MRO processes. Some of these companies have identified the need to coordinate these activities so as to standardize how to identify critical parts and which technologies to use.

RFID_Kasa Kuyruklarına Son

Share
Friday, October 28, 2011

ShelfX announced the debut of its self-checkout and inventory management solution. Using the combination of RFID and NFC technology, the self-titled ShelfX system enables retailers improved inventory management, real-time pricing updates and enhanced customer loyalty.

When a shopper approaches the ShelfX Smart Shelf with an RFID-enabled ShelfX Card the ShelfX system greets them by name, offers discounts and makes additional suggestions based on their customer profile. It then processes their payment and, on the back-end, the inventory is automatically updated.


Retailers no longer have to send inventory personnel through aisles to check stock levels. The ShelfX Smart Shelf tracks stock and knows the exact item and quantity of the item being stocked. The real-time solution also broadcasts an alert if items are running low and require re-stocking.

Similarly, since shopper checkout is processed automatically, retailers are able to optimize staffing levels and avoid the time-consuming practice of scanning bar codes and manually entering SKUs. [end]

RELATED ARTICLES

Android’in Kurumsal Uygulamalar İçin Adreslemesi Gereken Beş Madde

Marko Gargenta

Five things Android needs to address on the enterprise side

Android in the enterprise requires improvements in security, management and app stores.

by | @marakana | Comments: 1 | 25 August 2011

My lovely cubicle by ashley_dryden, on FlickrAndroid has the foundation to support enterprise use, but there’s a handful of missing pieces that need to be addressed if it’s going to fully catch on in the corporate world. Below I look at five enterprise areas that Google and third-party developers need to work on.

Managing the device fleet

A typical enterprise needs to have a way of managing a fleet of devices, whether personal or company owned. There are currently a number of vendors providing solutions to this problem, including3LM, Good Technology, MobileIron, and Sybase.

What needs to happen: Google needs to help create a standard for a complete enterprise Android solution, or it must support one from a third party. Until recently, the closest candidates were the Motorola Droid Pro and Photon lines, but Google’s planned acquisition of Motorola could yield a full enterprise option. Keep in mind that Motorola already owns 3LM, one of the leaders in Android security solutions.

Enforcing security policies

CIOs need to enforce their security policies, and they also want to be able to wipe a lost or stolen device. Android does provide the plumbing for most of this work and third-party vendors are starting to create solutions on top of it, such as Motorola’s Enterprise Device Policy Management API and related MotoBlur solutions.

What needs to happen: This market is getting fragmented, and CIOs will need to do their own research for the right solution for their particular enterprise.

Securing connections to enterprise networks

Most corporate networks are secured with either SSL or VPN solutions. Android supports both, at least on paper. The problem is that corporate America typically uses proprietary VPN solutions from vendors like Cisco and Juniper. That means that most Android devices do not offer any useful VPN options to corporate users. This is a big issue that is slowly being addressed by device manufacturers. Companies like Samsung are entering into licensing agreements with the Ciscos of the world to make sure enterprise-grade VPN is part of their Android product lines.

What needs to happen: Carriers or OEMs need to bundle the right VPN solutions with their devices. We’re starting to see this with certain Motorola models on the Verizon and Sprint networks.

Sandboxing apps

I often hear IT people say they want to control the types of applications and content users can download to their company phones. While it’s possible to wall off a company-issued device, it’s an expensive strategy that creates a false sense of security. A better approach may be to allow coexistence of both corporate and personal applications on the same device. Android already provides solid application sandboxing, which isolates data so each app has its own data privacy.

What needs to happen: IT departments need to provide enterprise-grade apps for enterprise data. Those departments must also get used to corporate apps coexisting on devices with consumer apps. A good example of enterprise apps is Google’s Apps for Enterprise cloud solution and its mobile counterparts, such as GMail, GTalk, and Docs.

Trusted markets for business apps

Google’s Android Market is based on reactive testing that basically crowd sources quality assurance. That model won’t cut it for corporate clients. The rise of enterprise-friendly boutique markets, like Cisco AppHQ, could provide the needed alternatives for enterprise adoption.

What needs to happen: The free market needs to work its magic. Multiple app stores are a good thing, and eventually consumers will know which brand to trust for certain types of applications. Google could help the process by allowing other stores to list their apps on Google’s Android Market. Carriers could also pre-load multiple store apps.

The future of Android in the enterprise

While Android doesn’t come with all the enterprise bells and whistles, it’s built on a strong and secure foundation. And while Google needs to do more to provide the missing pieces, the company has created the infrastructure for other companies to step in and fill out Android’s enterprise offerings. The strategy appears to be working, asresearch has found Android to be gaining adoption within corporate IT departments. As more employees bring Android devices into their offices, and as Android’s corporate offerings mature, I expect enterprise acceptance to accelerate in the years ahead.

Augmented Reality QR Kod u Öldürüyor

Augmented Reality Kills The QR Code Star

BY KIT EATONThu Aug 4, 2011

LAYAR

Augmented reality leader Layar just took its system to a whole new level by installing a real-world object recognition protocol that’s a little like Google’s Goggles. In one swoop it may have turned AR apps from intriguing, inspiring, and occasionally useful toys into serious tools for information discovery and, of course, advertising. Let’s call it hacking the real world.

AR was a tech that really grabbed the headlines over the last couple of years, propelled by increasing ubiquity of smartphones with always-on Net connections, sensors, and high-quality rear-facing cameras. This tech trinity allowed clever apps to work out where the phone was in the world, what direction it was looking at and then deliver useful information to the phone user, such as where the nearest Metro station was, and how to get there. But creating digital “events” in the AR world required developers or users to tag reality with geo-located flags–actual fixed positions in space–which limited its usefulness for more spontaneous access to data.

Which is where Layar Vision changes everything: What if you could hold your AR-enabled iPhone up to something in real life that you just came across–say the cover of Fast Company magazine–and get an overlay of data about it, perhaps an option to click to this web page or a special offer of subscriptions? That’s something Maarten Lens-Fitzgerald, founder of Layar, suggested to us is one of the most powerful exploits of the new tech. Vision really does behave like Google Goggles does: When Layar “sees” an item it recognizes, wherever it may be, it returns data to your phone immediately. In Google’s case it’s just its traditional search result list, accessed in a very visual way. In Layar, it results in whatever action has been associated with the object. All it takes, Maarten explains, is for the developer to choose the planar object they’d like to be recognizable, upload it to Layar’s servers to act as a fingerprint, and then the app does all the rest.

The object can be anything from a poster to a magazine to a small item, and the action can be anything from overlaying a 3-D graphic to playing a video file to sending you to a web page. Maarten was careful to note “I really think that for the publishing industry it’ll work best” at first: “Say you just wrote a book and want to market it. Upload a picture of the cover to our server” and then you can “link a bio, a photo of the author, a video or you can show a 3-D object, for instance a spaceship if it’s a sci-fi novel.” And from there, for the user who sees the AR effect, it’s “so easy then to say ‘I Like this’ or ‘I’ll Tweet this or comment on this,'” perhaps meaning the “real world can now be very easily linked to the digital world.”

Instantly there’s the power of this system, laid bare. Layar developers really can “hack reality” now. Imagine, Lens-Fitzgerald suggests, that there are really practical uses: “Say you’re buying chicken in the supermarket, and you hold your phone over it–then you can see there’re antibiotics in the meat” for this particular package, because a developer has made a food facts database, and uploaded an image of the typical store chicken label, linking it perhaps “to an article by Reuters about it.” That’s one way to circumvent, or subvert, advertising, but of course advertising may be one of the earliest beneficiaries of this development, alongside publishing. As a magazine, you could upload your next cover art to Layar, and give the first 1,000 visitors who click on the Layar-discovered hyperlink a prize or gift of some sort. Meanwhile advertizers could plop a 3-D image of the latest sleek concept car onto the flat 2-D image in a two-page newspaper ad, adding in all sorts of interactivity and detailed specs.

You may recognize this kind of function: It’s what QR codes have been used for until now, on everything from advertising to business cards to Sony’s EyePet interactive PlayStation game. A QR code is basically a machine-recognizable system that contains short snippets of text, a phone number, or a web link–but to access it you need a compatible app, and you have to plaster the QR code in a clearly readable way onto the object, be it a mag advert or a website. This is powerful, but clumsy.

And Layar’s made it a little irrelevant–the object itself is now the real world “tag,” and because Layar is a browser, it lets the data associated with the tag be much richer and more dynamic than a QR code could manage.

There’s just one sticking point: How do you know a random real-world item is actually an AR tag? QR codes define themselves as a tag, but a random magazine page doesn’t, unless it’s labeled as such. Until AR becomes more ubiquitous, this may be a problem.

But the utility of this kind of trick can’t be overlooked. Using a different AR system (Junaio) an anti-public advertising group just released an app that blanks out ad billboards, suppressing their message for an artistic end…essentially an attempt to declutter your life. As Lens-Fitzgerald notes, one of the biggest lessons Layar learned for Vision was “at MOMA in New York when an artist put up different art pieces on every floor using just geo-located AR,” and with the new system “this is much easier because you can put what you want wherever you want.” This kind of novel use of AR object-recognition tech will only emerge as more people use it, and the object-recognition power is one way that developers may be tempted to build richer and more rewarding AR experiences because of it.

In fact, there are use cases that extend from security and anti-terrorism right down to, thanks to object-recognition, apps that show you how to program your newly purchased microwave oven with dynamic, interactive graphics. And with giant players like hardware manufacturer Qualcomm getting into the AR game, and predictions that the industry could be worth over $1.5 billion by 2015, it’s a tech that’s only going to get more ubiquitous. Augmented reality is essentially growing up, moving from toy status to genuine utility, and bringing big money-earning potential with it.

Dominos_Digital Signage & Sosyal Medya Uygulaması

PIE IN THE SKY? DOMINO’S FLIPS SWITCH ON TIMES SQUARE INSTANT REVIEWS, TAKES TRANSPARENCY TO NEW LEVEL

Domino’s Pizza, which, for the past two years has based its marketing efforts around a very public self-improvement initiative, is taking transparency to (quite literally) new levels. The company is allowing customers to post their unvarnished reviews on a Times Square billboard. This is what happens, apparently, when you take your marketing philosophy from Sun Tzu and his Art of War.

The company, America’s largest pizza delivery chain, has commandeered a giant digital billboard at the famous intersection of 44th Street and Broadway and, starting today, is letting any customer who orders food using the Domino’s Pizza Tracker app the opportunity to share their feedback with hundreds of thousands of Manhattan pedestrians, tourists from around the world, and, well, pretty much everyone else via a web video feed. Barring profanity and irrelevant rants, no comments will be excluded, no matter how negative.

“We’ve had this tracker for about three years, but we felt it was time for a coming out party,” says Domino’s chief marketing officer Russell Weiner. Created by Domino’s agency Crispin Porter + Bogusky, the Domino’s Tracker allows customers who submit their orders online (over 40% now do) to track their food from the oven to their front door, and will even give them the names of the cook and delivery driver. Once the order is received, customers can rate their experience and can leave comments for restaurant staff.

The Times Square ad will run for two hours and 54 minutes per day, and will pull in approximately 700 comments, at a rate of four per minute.

It’s the latest component in a public reinvention campaign that kicked off at the end of 2009 with Pizza Turnaround, which saw Domino’s acknowledging its bad reviews and setting about changing its recipe.

“We were a pizza company, and our pizza needed to be better,” says Weiner. “That’s a tough thing to address.”
Subsequent iterations included “Show Us Your Pizza,” wherein Domino’s asked customers to upload photos of actual pizzas to ShowUsYourPizza.com, with the chance to win cash and an opportunity to have their images used in an ad campaign; the company was also eschewing fancy food photography in favor of undoctored pizza pics. More than 30,000 images of actual pizzas have been uploaded.

But this may be the riskiest gambit yet; disgruntled customers will doubtless take the opportunity to broadcast their displeasure in such a public venue, and the venue itself may in fact spur negativity. “Domino’s has confidence in what they’ve been doing,” says CP+B VP, creative group director Tony Calcao. Negative feedback Calcao, says, gives Domino’s a chance to up its game. “They have a competitive spirit, and anything that gives them a chance to get better, they’re into.”

Weiner says the campaign strategy was inspired by the book, The Art of War, in which Sun Tzu says the best way to win a war on an island is to blow up the bridge. With death or victory as the only options, troops have to fight for their lives, because there is no other way out.

“By saying what we said about the pizza, we blew up the bridge,” says Weiner. “That’s what made it so much more powerful. If it didn’t work out, there was no place to retreat to. There was no going back.”

Perhaps because Domino’s has experienced, firsthand, the power of social media in informing consumers’ opinions of a brand–a video of Domino’s employees abusing customers’ food went viral in April of 2009. Lately, the company has been one of the industry’s most notable case studies in transparency in marketing. And the approach has paid off. Domino’s dough has risen. Same-store sales growth increased 10.4% between 2009 and 2010, according to company financial disclosures. During the first quarter of 2011, same-store earnings were up 2.3%.

Weiner says that the biggest lesson from Domino’s pizza turnaround is one that would apply at most big companies; as a brand you already know your biggest weakness, and no outsider needs to tell you what it is. “I hope that what people have taken away from this is not just that transparency works, it’s that figuring out what your core issue is, and taking it on is the way to do it,” says Weiner. “There’s no magic in this, there’s no magic.”

Bir TV Reklamı Dijital Signage Sistemi Üzerinde Çalışır mı?

Would A Broadcast TV Commercial Work On A Digital Signage System?
Around 80% of the time the answer would be no.  Television Advertisements are largely audio based with visuals as a supporting feature.  The audio tells the story while the visuals support the story.  TV ads are meant to be viewed when people are focused on one thing, watching TV.  Digital signage is typically set in an environment where viewers are focused on doing something other than looking at a TV; such as shopping, gaming, walking, exercising, eating lunch, etc.If you want to use your TV commercial on a digital signage system, here is a good test to see if it will be effective or just noise.  Play the commercial with the audio off.  Does it still make sense?  Ask someone that has not seen the commercial to see if it makes sense to them when viewed without audio?  The bigger question is will it get the attention of someone who is walking by or not focused on the screen.

The majority of the time when broadcast Commercials are being used on a Digital Signage system, they are not effective.  They are simply noise.

To re-use a TV commercial on a digital signage systems have the creator, a trusted digital signage production house, or an experienced internal creative staff member alter the message for optimal playback for the unique medium that is Digital Signage.

 

 

Java 8_ Bulut Bilişim İçin Vites Artışı

Now that Java 7 SE (Standard Edition) has officially been released, Oracle and members of the JCP (Java Community Process) have started mulling over what features to include in the next version of the programming language, Java SE 8. On the agenda for this new release: engineering Java for the cloud.

“Java 8 is supposed to set the scene for the cloud, for a wider deployment arena,” said Mark Little, senior director of engineering for Red Hat’s middleware business, as well as Red Hat’s primary liaison for the JCP. Oracle left out many of the advanced features planned for Java 7 in order not to further delay the release, he noted. Those releases may very well be included in Java 8.

At least two of those features will prove instrumental in making the next version of Java ready for wide-scale cloud deployment, Little said. One is multitenancy, or the ability for the Java Virtual Machine (JVM) to safely run multiple applications. The other is modularity, or a reorganization of the JDK (Java Development Kit) into a set of cleanly defined though interdependent modules.

“Modularity and true multitenancy within the JVM will be critical for 8 if Java will be dominant in the cloud,” Little said.

Modularity is what Red Hat would most like to see in Java 8, Little said. Modularity would cut the size of most Java deployments, because not all deployments need all of Java’s core libraries. It would also help developers more easily interact with Java, allowing them to only use the parts they need rather than grapple with the entire codebase.

Modularity would also help with a developer problem that Little describes as “classloader hell.”

Developers experience classloader hell when a Java program accesses multiple JARs (Java Archives), or collections of commonly used routines. An app may use a class from one JAR when it actually needs a different version of that class that resides in another JAR. Or it may use a JAR used by another program, and once that other program terminates, the JAR is removed, causing the first application to stop working.

“In order to have modules swapped in and out at will without screwing up the whole environment, you need to have support in the JVM as well,” Little said.

One effort, Project Jigsaw, has been working on this goal. When Sun Microsystems controlled Java (Oracle purchased Sun in 2010), that company’s engineers preferred Jigsaw over another approach, OSGi (Open Services Gateway initiative), overseen by the OSGI initiative.

Project Jigsaw was slated for Java 7, though it got pulled in 2010 in order to ship Java by 2011, Little said. Nonetheless, either the work from Jigsaw or OSGi should be folded into Java 8, Little predicted. “There will be some modularity present in Java SE 8,” he said.

In addition to modularity, Java 8 may also feature multitenancy, or the ability to safely run multiple applications from one JVM.

Such a feature would be essential for Java to be used in cloud computing, where multiple parties may share the same infrastructure.

Today the Java Enterprise Edition offers a work-around for this problem, however. “If the JVM itself isn’t offering multitenancy, then there is only so much we can do before the whole thing can potentially get screwed up by rogue tenants in the same JVM,” Little said.

Little advocated adding to the JVM the ability to give each application its own memory space, or zone. By doing this, “a rogue app will not [spill over into] a memory space you saved for another app running in the same JVM,” he said.

Little is not alone in cheering on this idea.

“Adding multitenancy to JVM is important,” agreed Forrester Research analyst John Rymer. “Today, each vendor must come with its own way of virtualizing its application server.”

Building multitenancy into the JVM would ease the training burden that comes with supporting each unique approach. It would cut back on vendor lock-in as well as “allow vendors to invest in robustness and performance more than base function,” Rymer said.

Another feature that many have long championed for inclusion in Java is closures, or the ability to create a function within another function and have them share variables. Closures would be helpful in running Java more efficiently across multiple processor cores.

While Oracle chief Java architect Mark Reinhold has been enthusiastic about including closures within Java, he did not feel the proposed implementations were ready for Java 7. The fight will begin anew for closures’ inclusion in Java 8.

If included, closures would put Java on par with other languages that already include this capability, such as JavaScript and Scala.

“The work on closures looks like it will be a compatible, more restricted version to what we already have in Scala,” boasted Martin Odersky, Scala creator and co-founder of Scala tools vendor Typesafe.

Beyond the technology itself, many are closely watching how Oracle shepherds Java 8 going forward.

Oracle has not yet established an official timeline for a Java 8 release, but members of the JCP seem eager to avoid another long interval before the next release,unofficially pegging the release by the end of 2012. “We don’t want to wait another four years or five years between 7 and 8,” Little said.

Oracle itself has been coming under increasing scrutiny for how it handles Java. Various parties have pointed out that it shipped Java 7 with known bugs.

“At times I think Oracle speaks with multiple tongues,” Little said. “Sometimes the Oracle people I talk with really want to do the right thing, not trying to run an open-source project like a closed-source project.”

Other times, however, Little has found Oracle will conduct itself in a way that goes against these principles. He pointed to how in 2010 Oracle changed, without input, the governing bylaws for the OpenJDK project, which maintains an open-source version of the JDK. As a result, Red Hat lost its place on the steering committee, “despite the fact we were contributing so much code,” Little said.

“We’re involved with quite a few open-source projects. The whole way in which that way was handled was not very open source to us,” Little said. Oracle declined to comment for this article.

In many ways, Java 8 will be the true test of how Oracle manages a complex open-source project, one with many contributors from so many competing interests.

Veri Depolama:Yoğun Dijital Medya Talebi

PCIe Going Mainstream

Solid-state storage analyst Jim Handy of Objective Analysis told eWEEK his firm is forecasting that the PCIe interface will become dominant in the enterprise SSD market in 2012, with unit shipments greater than the combined shipments of its SAS and Fibre Channel counterparts. PCIe (peripheral component interconnect express) is a computer expansion-card standard based on point-to-point serial links rather than shared parallel bus architecture. It is designed to replace the older PCI, PCI-X and AGP standards.

Virtual Machine Image Cloning

Oracle has a leg up on this one. Its new VirtualBox 4.1 includes a new virtual machine cloning facility — one of the first on the market. A regular VM snapshot is a child of the current virtual machine, but that’s not something that can independently grow afterwards. With a clone, you have a new entity that can then have its own life and, subsequently, its own data snapshots, said Wim Coekaerts, Oracle’s senior vice president of Linux and Virtualization Engineering.

Automated Disaster Recovery

Getting data stores reconnected with systems and getting those systems back up and running after a power outage is a bear that can take days. Whereas in the past this process was manually done, the software now is smart enough to get large portions of a virtualized system back online much faster and with less effort. So enterprises are checking this out very closely. The ability to have automated, fully tested disaster recovery is one of the key drivers for many organizations to virtualize their most important applications.

Storage Pooling

This came to the fore in 2010 at Sepaton and is now gaining momentum. Pooling is an approach to storage virtualization that delineates specific areas of the storage system to be dedicated to specific data flows to enable more efficient multitenant service deployments. Virtualized storage systems break files into chunks of data that are dispersed into numerous data center or storage locations and reassemble them on demand. Keeping data file chunks closer together in pools is said to provide faster reassembly of file chunks.

Simplified Manageability of Cloud Storage

As different vendors clamor to be part of the cloud, unified management of the entire technology stack is critical. Whether public or private, tying together the different infrastructure layers—including applications, VMs, systems, networks and storage—with a comprehensive set of management tools reduces complexity by providing end-to-end service visibility, performance monitoring and automated provisioning.

Unexpected Storage Issues in Virtual Environments

Users discover that server virtualization can actually drive up higher storage costs, due to the fact that I/O patterns in servers that host VMs are significantly more random—and write-intensive than in the dedicated physical application servers. Increased randomness causes HDDs to run slower in terms of IOPS. This is why a storage configuration that seemed to perform fine when it was attached to physical servers all of a sudden appears to slow down when it’s attached to VMs. So you start adding more spindles and storage costs go up. (Thanks to storage analyst Eric Burgener for this one.)

Increased Need for New DR Packages

The number of applications and amount of data in virtual environments will grow significantly in 2011, increasing the need for disaster recovery systems that protect these applications. A recent survey found little more than half of the data within virtual systems is regularly backed up, leaving plenty of room for improvement.

Deleting Unimportant Data Becoming Critical

Storage administrators must lose their “pack rat” mentality and categorize what information is most important. The near-infinite level of data retention is causing storage costs to skyrocket. This factor vastly increases data recovery times and causes e-discovery nightmares across enterprises of all sizes. Enterprises are re-evaluating their retention needs and automate their information management strategy to keep backups for 30 to 60 days, archive for long-term storage and delete everything else.

Cloud Storage Is Growing Up

The cloud is greatly changing the way services are now delivered. More enterprises will leverage public and private clouds as they become highly available. As we get deeper into the year, enterprises will require the ability to manage storage resources, whether they’re local, campus-wide, multi-campus, global or in the cloud.

Hybrid Cloud Archiving Models Becoming Common

The hybrid cloud archiving model is being adopted to allow enterprises to use hosted messaging services while keeping their archives on-premises to drive cost out of the discovery process, maintain strict access to data and define who is searching it and where they are sending requests.

%d blogcu bunu beğendi: