Holste Says: |
 |
IT experts agree that a true, multi-customer architecture will allow for data dependent security controls, so that the logistics service provider can limit access to only pre-authorized employees and/or customer representatives. |
|
What Do You Say?
|
|
|
|
According to HighJump Software Inc. (www.highjump.com) an IT solution with adaptable architecture will allow a company to provide new offerings and workflows inherent with VAS. They claim that a best-in-class supply chain IT solution will enable a company to meet stringent requirements for quality, safety and traceability/genealogy.
Providing Real-Time Order Tracking Status
For many retailers having access to up-to-the minute information about on-hand inventory and customers’ order shipping status is critical to managing their business. For example: did the cartons of snow shovels destined for Minnesota already ship, or can they be redirected to New York. In order to answer this type of inquiry the logistics provider must have real-time visibility into inventory, order fulfillment, shipping, and even billing.
According to HighJump, the best way to do that is through a Web-portal solution. A secure Web portal provides the basis for real-time information sharing and improved inventory visibility. This IT solution enables collaboration throughout the supply chain, giving customers the most accurate and timely view into the status of their orders. Customer can make knowledgeable decisions based on changing demand. So when the radar shows that the snowstorm has shifted to the northeast, they can access up-to-the-minute information to know whether they can re-direct those snow shovels to where the highest demand will be.
Data security issues (of which horror stories are frequently in the news) are of course a major concern. Therefore, the service provider must have the architecture in place to provide the ability to limit access to data and avoid the liability of network security issues. IT experts agree that a true, multi-customer architecture will allow for data dependent security controls, so that the logistics service provider can limit access to only pre-authorized employees and/or customer representatives. Authorized personal can also be limited in their ability to make inquiries and changes through role-based security features.
|