The very first industrial, real-life application of RFID in adaptive inventory use case, published as case study in books and articles. All the value levers are very much valid in 2020, almost 15 years later!
RFID technology promises to improve a broad range of processes in logistics and manufacturing. RFID allows better monitoring of the manufacturing processes with expedient material flow and more effective planning and control.
TESCO has been involved with metering for more than 100 years. Our focus has always been on the needs of metering, with a wide range of software, test equipment, and tools.
Meter Manager is the result of more than 20 years of experience creating software for electric and gas utilities. Meter Manager has been designed from the ground up to meet your needs not only today, but in the future as well. It is built with state-of-art tools and modern software architecture. Our software continues to grow, with new and expanded features, all of which are made available to all of our customers.
RFID technology promises to improve a broad range of processes in logistics and manufacturing. RFID allows better monitoring of the manufacturing processes with expedient material flow and more effective planning and control.
TESCO has been involved with metering for more than 100 years. Our focus has always been on the needs of metering, with a wide range of software, test equipment, and tools.
Meter Manager is the result of more than 20 years of experience creating software for electric and gas utilities. Meter Manager has been designed from the ground up to meet your needs not only today, but in the future as well. It is built with state-of-art tools and modern software architecture. Our software continues to grow, with new and expanded features, all of which are made available to all of our customers.
Tapioca Starch Sourcing Case Study by Dragon SourcingJohn William
Here is a case study by Dragon Sourcing on Tapioca Starch Sourcing Case from the Food Additive category of Packaging sector for the year 2018 covering Thailand, Vietnam and Cambodia. For details contact: www.dragonsourcing.com
TESCO has been involved with metering for more than 100 years. We focuses solely on the needs of metering, with a wide range of software, test equipment, and tools.
Meter Manager is the result of more than 20 years of experience creating software for electric and gas utilities. It has been designed from the ground up to meet your needs not only today, but in the future.
Meter Manager is built with state-of-art tools and modern software architecture, which continues to grow with new and expanded features, all of which are made available to all of our customers.
Industrial applications ranging from oil refineries to vending machines require precision flow measurement and control. Electromagnetic Flowmeter or Mag Meters use Faraday’s law of electromagnetic induction to measure the process flow.
The product needs to be within our reach and Flowtech will give you and your company the biggest advantage as we engineer for reliability.
Industrial io t application for conveyor beltMike Brown
Integration of Industrial IoT Solutions with Conveyor Belts will reduce downtime of conveyor systems to almost nil with the help of predictive maintenance. Further, integration with the asset management system allows immediate identification and reorder of faulty components.
Tapioca Starch Sourcing Case Study by Dragon SourcingJohn William
Here is a case study by Dragon Sourcing on Tapioca Starch Sourcing Case from the Food Additive category of Packaging sector for the year 2018 covering Thailand, Vietnam and Cambodia. For details contact: www.dragonsourcing.com
TESCO has been involved with metering for more than 100 years. We focuses solely on the needs of metering, with a wide range of software, test equipment, and tools.
Meter Manager is the result of more than 20 years of experience creating software for electric and gas utilities. It has been designed from the ground up to meet your needs not only today, but in the future.
Meter Manager is built with state-of-art tools and modern software architecture, which continues to grow with new and expanded features, all of which are made available to all of our customers.
Industrial applications ranging from oil refineries to vending machines require precision flow measurement and control. Electromagnetic Flowmeter or Mag Meters use Faraday’s law of electromagnetic induction to measure the process flow.
The product needs to be within our reach and Flowtech will give you and your company the biggest advantage as we engineer for reliability.
Industrial io t application for conveyor beltMike Brown
Integration of Industrial IoT Solutions with Conveyor Belts will reduce downtime of conveyor systems to almost nil with the help of predictive maintenance. Further, integration with the asset management system allows immediate identification and reorder of faulty components.
I am Tyler Walsh. I love exploring new topics. Academic writing seemed an exciting option for me. After working for many years with databasehomeworkhelp.com, I have assisted many students with their homework. I can proudly say, each student I have served is happy with the quality of the solution that I have provided. I acquired my master's from the University of Queensland.
This presentation is the second of a series of three examining how data, the collection of this data and the use of this data have dramatically changed and is continuing to change in our industry as a result of AMI.
We will discuss how Asset Tracking for Metering has changed dramatically over the past dozen years and what the term “asset tracking” will mean for meter services in the future.
This presentation discusses testing protocols, pitfalls and other solutions developed by various utilities who have gone through the stages of AMI Deployment. Equipment and systems used for this type of testing is also covered. 06/25/2019
RFID in PV Solar Manufacturing Industryiaitoinfotech
Government of India had come out with the new mandate guideline under JNNSM that each of the PV modules used under this mission should be attached with the RFID tags to keep its accountability,authenticity & performance measurement.RFID allows better monitoring of the PV manufacturing processes with expedient raw material flow and more effective planning and control.
Similar to IoT Adaptive Inventory in Manufacturing SCM Mahindra and Mahindra (20)
Advanced use cases include IoT based integrated SAP Retail Application, cross-applications built on CAF or an x-APP, or an end to end business process complete business process irrespective of the number of SAP components involved (R3/mySAP, with XI BPM))
A virtual replica of organizations’ physical supply chain, with business context, constraints and optimization models embedded for everyday operating decisions, with alogrithms and tools abstracted for non-statistical operators
Skandsoft Frost & Sullivan Award for Setu RFID/IoT MiddlewareSurendra Kancherla
RFID Emerging Technology of the Year 2006 was awarded in San Diego to Skandsoft in the face of competition from industry big guns, for the product and technology approach.
Physical-Virtual Unison + business context without with just connecting physical and system is meaningless, This was done in 2005-08, industry is catching up now with Digital Twin in an imperfect way but hopefully will correct itself to align with this vision!!
Status of Innovation report by Department of Science and Technology, Govt of India, covering RFID Debit Card based HNI Personalization of Banking services, a first globally.
Commissioned debit card with embedded RFID Chip for the first ever HNI Personalization Retail Banking application, more than a decade ago. The industry is yet to catch up.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
IoT Adaptive Inventory in Manufacturing SCM Mahindra and Mahindra
1. Adaptive SCM RFID Pilot
at
Mahindra and Mahindra,
Farm Equipment Sector,
Kandivili, Mumbai
Phase-I: Standalone RFID
Adaptive SCM Application
on
Setu
2. Confidential. Restricted Circulation Only
- 2 -
Contents
Introduction
Scope
Process
Success Criteria
Execution
Challenges
Implementation
Areas of Impact
Benefits
Remarks
3. Confidential. Restricted Circulation Only
- 3 -
Introduction
Automatic Identification technologies allow organizations to identify objects and capture
information, providing them with much greater degrees of control and flexibility in managing
goods as they move through the supply chain.
One such automatic identification technology is radio frequency identification (RFID).
Accurately seen by many in the industry as the next transformational technology, RFID
promises higher quality information and real-time tracking.
The objective of this exercise is to demonstrate the benefits of using RFID in the supply chain
of Mahindra and Mahindra FES, in terms of tracking accuracy, process automation and
process compliance.
After a detailed study of the existing process, with help of Mr Girish Naik, we understood the
areas where our solutions add value and decided on a representative pilot implementation to
the MTL team.
The pilot was carried on for duration of 27 days, starting from the 1st
of July till the 27th
of
July. The details of the pilot are as presented in the document in later sections.
This document presents all the status of the pilot through various phases of
implementation, issues that were handled and compliance to the success criteria
decided before the pilot began.
4. Confidential. Restricted Circulation Only
- 4 -
Scope and Application Features
Scope: Inbound material movement at Kandivili Farm Equipment Sector plant, starting from
arrivals of the materials till the time they are requisitioned and physically taken for use.
Typical Process Flow: The pilot’s covered the process flow from Point A to Point C as
described below
Point A- Offloading Station: The components off loaded in the factory premises
Point B- Tagging Station: Very close to the location of Point A the components are attached
with RFID tags with the relevant data
Point C- Storage Station: The tagged components are stored in the relevant storing space
allocated for the pilot until they are requisitioned for use at the plant. The storage area,
though simulated for the pilot, represents all the environmental conditions of the actual
storage area.
Components Tagged:
Two types of card board boxes of Spline Shaft metal bearings (Description: Bearing Pilot
Spline Shaft).
Tag Data: Each tagged component refers to 17 different fields of 10 characters each, totaling
to 170 bytes. The data is stored in a database, linked to a unique tag id.
Features:
Process
A. Inbound goods offloading
station
B. Tagging Station – Received
components are tagged here
C. Storage Station – Tagged
components are stored here
and movement tracked, clubbed
with authorized personnel.
Features
System facilitates single point of data entry
on components
PCS created from the tag database
automatically.
Storage database reflects the current
inventory at any point of time
Any requisitions will be matched with
Inventory database
Only authorized quantities and by authorized
persons are allowed to leave the storage.
Any deviation from the above results in a
popup / customized alarm. The event is
stored in an Event DB.
Component critical level stock monitoring –
beyond which the systems sends popup /
customized alarm to relevant destinations
On-demand customized reports on
movement of inventory
System to monitor FIFO based component
movement
5. Confidential. Restricted Circulation Only
- 5 -
Process:
The overall process, after the solution is deployed across the areas that come within the
scope, is presented below:
1. Components of the said type are received at receiving station, along with respective
Physical Count Slips (which carry all the information about the batch received)
2. Each component is tagged with the data on the PCS and a unique serial number. At
this stage, all the details of the received items are stored as Received but not stored.
3. Received items are moved into the binning/storage area. At this stage, the incoming
items are compared with the ‘Received but not stored’ items and any disparity is
reported as ‘Missing’ items in the status window.
4. After successful binning, the status reflects the total stock in terms of the total
received, stored and missing items of the current as well as earlier batches.
5. Issue is done through an issue slip (as is the case in M&M’s existing process) which
carries the employee issues to, quantity and other details.
6. When items are being taken out, the systems checks for the following:
a. Authorized employee is taking the items
b. Authorized quantity of items is being taken out
c. FIFO is being followed.
d. Inventory status, after deducting the outgoing stock is more than the
minimum inventory level
7. If any of the above are not satisfied, the systems generates as event (as pop up )
and stores the event details, with time, items and employee involved.
8. For every successful Issue, the Status window updates the columns – Batch Size,
Current Size, Issued and Missing.
9. Any other movement of items - ie items without employees at the gate etc., results in
a pop-up and updated to the events database.
10. On all the steps of the process, reports can be viewed on-demand for any given date:
Components Received Report, Components Issued Report, Events Report and
Vendor Report. Status report is generated whenever there is a change in the status.
More detailed process with supporting screen shots is presented in Appendix:
Process
6. Confidential. Restricted Circulation Only
- 6 -
Success Criteria:
We have agreed upon the success criteria for the exercise before the implementation
started and the same is benchmarked on a daily basis till satisfactory results were
obtained. The following lists Success Criteria that were agreed upon and demonstrated
(details of our route to achieving the same and the challenges we faced are presented in
the next section).
• Read accuracy to be 100% for through out the duration of the pilot.
• Functionality of the application to be 100% complaint to the defined Features, to be
ensured by our personnel physically crosschecking, in terms of
o Tagging accuracy
o Tracking of the number of items at the storage area
o Tracking of change of number of items
o Tracking of movement of items, along with the workers’ validity
o Alerting in case of erratic movement of goods, by the unauthorized person
and in case of reaching Minimum Quantity
• No more than 1 instance of failure of the application for a duration of maximum 30
minutes due to problems internal to the application (ie., excluding power failure,
network connectivity, force majeure)
7. Confidential. Restricted Circulation Only
- 7 -
Execution:
Challenges
There were a number of challenges we had to address for the fact that the work area is
covered with metal shelves, casings and gates. The trolleys used to move the
components are of thick metal, as is the case in any shop floor. Added to this, electro-
magnetic interference, physical constraints in terms of placement of the gate to
accommodate movement of trolleys, forklifts etc posed additional challenges.
Inertia to Process Change
Post the initial trials and dry runs, the end-users are the work shop personnel who are
used to the existing process of counting and moving the items physically. Though trained
on the RFID system, most of the workers were uncomfortable to adapt to the system and
were reluctant to implement the process. Note here that the new process is EXACTLY
the same as the previous one – with minor changes in the way components are moved
in/out of the store room.
Metal
The components used in the exercise are cardboard boxes containing metal bearings.
The thickness of the box is 1 cm. A number of such boxes are moved in a trolley to the
storage through the gate antennae.
The trolleys are made of hard metal of 3 cm thickness. Presence of metal in the trolley, in
the components and in between the number of tags kept in the trolley posed serious
reading difficulties, besides the presence of metal gates, supporting poles and the bins.
Stray or missed reads
The criticality of accuracy in reading is ensured by incorporating a number of cross
checks – right from the hardware (EAS, identity and data checks) to software (business
process dependencies in terms of ‘expected reads’). The pilot was intended to prove that
the readers could sense all tags that were intended to be read, would not miss any reads,
and would not unintentionally pick up stray reads from units that were passing by.
Interference
The factory floor was filled with radio waves from other sources but the impact was
negligible as active RF was low. Though the aerial distance between the gates was 1.1
meter, the length of the cable connecting the base and the complimentary antennae had
to be 5 meters for allowing heavy trolleys. This posed a serious problem in tuning the
antennae to form a well-coupled zone.
Orientation and placement
Tag orientation (with respect to the reader antenna) and placement on the product had
an affect on tag-reading ability- especially on the components with tags horizontal to the
field.
8. Confidential. Restricted Circulation Only
- 8 -
Implementation
Introduction
This section covers the complete implementation along with the issues that were faced during
the dry and live runs of the pilot.
The initial runs till all the success criteria were satisfactory were conducted as dry runs. After
the expected results are achieved, the same set up was run for 3 weeks. Daily Status Tracker
covers the issues and status of success criteria on a given day during the dry runs – till
satisfactory results were stabilized. These logs are used to summarize the over all
implementation cycle as presented in the last subsection.
Success
Status Tracker
_____________
Date:1st
July’04
Logged By: Chandan R
Results:
Criteria Results Remarks
• Read accuracy
• Functionality of the Application
o Tagging accuracy
o Tracking of the number of items at the
storage area
o Tracking of change of number of items
o Tracking of movement of items, along
with the workers’ validity
o Alerting in case of erratic movement of
goods, by the unauthorized person, FIFO
and in case of reaching Minimum
Quantity
• Number of instances of failure of the application
and duration
Issues:
Handover Status:
summary)
Adaptive SCM Pilot – Learnings
9. Confidential. Restricted Circulation Only
- 9 -
Date Issue
5/07 Gate antenna tuning, positioning of antenna. Failed to generate
uniform field.
6/07 Gate antenna tuning. Reader software giving timeout error due to
serial communication error. Reader serial cable was found to be
faulty.
7/07 Gate Antenna tuning. Reader configuration changed to generate
maximum RF field. But reader was giving RF error.
8/07 Gate antenna tuned with different jumper settings to generate
uniform RF. But required zone is not generated,
9/07 Gate antenna tuned with minimum distance between the
antennae. But noise level increased and reader gave RF
communication error.
10/07 Antenna tuned with maximum distance. RF field has various
blind spots. Tags are not read simultaneously.
12/07 Software throws Invalid Employee exception – as the tags are
not being read simultaneously.
13/07 Added Issue GUI. Issue transaction assumes that issued items
are carried out immediately.
Success Criteria Status:
Criteria Results Remarks
• Read accuracy
• Functionality of the Application
o Tagging accuracy
o Tracking of the number of items at the
storage area
o Tracking of change of number of items
o Tracking of movement of items, along
with the workers’ validity
o Alerting in case of erratic movement of
goods, by the unauthorized person, FIFO
and in case of reaching Minimum
Quantity
• Number of instances of failure of the application
and duration
10. Confidential. Restricted Circulation Only
- 10 -
Appendix: Process
1. Components received at the tagging station with PCS.
2. For a given PCS, all the details are entered into Setu GUI (Access to all GUIs and
reports is through role based authentication).
11. Confidential. Restricted Circulation Only
- 11 -
3. For ‘Invoice Qty’ number of times, the GUI prompts the user to write tag.
End of this process will have tagged all the components with unique ID numbers and
relevant details as above. Please note that the components are only tagged and not yet
put in the binning area. A status window at this stage looks like:
4. Items are moved to the binning area.
12. Confidential. Restricted Circulation Only
- 12 -
5. Status window at this stage looks like:
6. Issue is authorized through a GUI – which resembles the existing process. Only valid
(authorized) employee and authorized quantity (as mentioned in the Issue note) can
be taken out.
7. Any movement of the components without authorized employee results in a pop-up
(e-mail, SMS or Beep features are available).
13. Confidential. Restricted Circulation Only
- 13 -
8. Any movement of the components not conforming to Issued quantity results in a pop-
up.
9. Any movement of the components not confirming the FIFO order results in a pop-up.
Note: points 7,8,9 result in event generation which is stored in a event table.
10. Status window after issue of items looks like:
14. Confidential. Restricted Circulation Only
- 14 -
11. Report on received components on a particular date:
12. Report on a particular vendor:
13. Report on issue details from a particular component:
14. Report on the events occurred on a particular date: