Skip to main content

Currently Skimming:

2 Freight Information System Technologies
Pages 19-38

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 19...
... Electronic commerce of all kinds uses the Internet because of its wide accessibility and its flexibility in allowing companies to link various kinds of Web, client-server, and legacy systems. These properties make it easier for companies to develop distributed applications that can exchange various types of formatted data (Kiely 1999)
From page 20...
... Freight transportation planning and operation decisions are often assisted by software that is designed to help analyze and determine how, where, when, and in what quantity materials should be transported. These systems also compare different carriers, modes, routes, and freight plans; include supply chain man agement software; and rely on sophisticated algorithms to analyze options and generate solutions that increase profitability.
From page 21...
... Shippers and freight companies often desire to track the progress of their shipments. A vari ety of processes and technologies -- depending on the transportation modes- can be used for this purpose, including GPS satellites, digital or analog wireless telephones, and bar code scanning.
From page 22...
... Trucking companies and freight brokers increasingly use the Internet to match loads with the most appropriate carriers. Both independent brokers and some larger truck freight companies have websites on which drivers can bid for loads or use EDI, which is also commonly used by railroads and waterborne freight companies.
From page 23...
... In arranging transfers to and from other modes, railroads have long used EDI. To help track shipments, nearly all locomotives and rail cars are tagged with automatic identification transponders, which automatically record car locations.
From page 24...
... They also must share information with truckers and rail carriers to ensure effi cient intermodal transfers. The EDI protocol or Web tools, or both, are gener ally used with "house" truckers or railroads; with smaller trucking companies, the transactions are handled by fax or e-mail.
From page 25...
... AMS and the Customs' Automated Targeting System are becoming the preeminent central ized government data management system for security prescreening of import cargoes to the United States. In addition, many ocean carriers and shippers are participating in Customs' Automated Export System for electronic submission of Box 2-1 NEW CARGO SECURITY REGULATIONS FROM CUSTOMS AND BORDER PROTECTION The U.S.
From page 26...
... The Advanced Passenger Information System, which has been used by airlines since 1986 to report airline passengers, has now become manda tory for other modes, under the Enhanced Border Security Act of 2002. It will soon require mandatory advance electronic crew member information from ves sels.
From page 27...
... , real-time video feeds to monitor congestion at seaport entry gates and road conditions on arterial roads leading to the port, and enhanced intermodal connectivity by improving the in-transit visibility of cargo. INTERCONNECTIONS OF SYSTEMS ACROSS LARGE SECTORS The interconnection of systems across the freight transportation sector, properly implemented, significantly increases the ability of participants to communicate effectively and efficiently by reducing mundane tasks and increasing accuracy.
From page 28...
... Customs is likely to propose that similar electronic sub mission requirements for cargo descriptions be implemented for the other trans portation modes. Many of the economic, business, policy, and regulatory forces described above have existed for quite some time, although the pace of development in many of these areas has quickened as a result of homeland security initiatives.
From page 29...
... such as Operation Safe Commerce, Sim-Tag, Cargo Handling Cooperative Program, and Smart and Secure Trade Lanes involve the testing of, and comparison between, different monitoring and identification systems of shipments as well as the handling of those shipments through the intermodal transportation chain. Each pilot pro gram is intended to provide insights that may be relevant to determining future economic, policy, and regulatory priorities and requirements.
From page 30...
... Support for digital certificates, which were first developed in a widespread manner in the mid-1990s with the Netscape Web browser, has since been added to most e-mail software for the authentication and encryption of e-mail, although it is not yet widely used. Digital certificates and signatures are often used in conjunction with hardware devices such as smart cards and smart tokens to further strengthen the authen tication scheme used by a system.
From page 31...
... For example, temperature sensors can be used on refrigerated containers to detect whether the internal temperature was maintained within proper limits over the entire route. Certain types of sensors have been used for some time in various applications in the transportation sector but are now, to some degree, being integrated with embedded processors.
From page 32...
... It will be important to closely monitor ongoing and planned pilot programs (e.g., Operation Safe Commerce and Smart and Secure Trade Lanes) intended to test these technologies to determine what role, if any, they might have in enhancing supply chain security.
From page 33...
... Mature EDI standards exist for the transportation sector, and operational systems are already in use by large and small organizations within the sector. The first electronic documents to be exchanged were those directly related to money, such as purchase orders, work orders, invoices, and payments.
From page 34...
... The productivity enhancements provided by electronic documents come at a price. Widespread use of electronic documents would require development of an electronic infrastructure to support the authentication of individuals and orga nizations, document standards across a range of transportation sectors, and a set of auditing processes to ensure that the system is working properly.
From page 35...
... For example, attacks on the Domain Name Service and Sendmail servers have demonstrated the susceptibility of these wide spread components. As stated previously, the most difficult security aspect of any large networked system such as the Internet is that the attacks can come from virtually anywhere in a nearly anonymous manner (using current authentication methods)
From page 36...
... 2001. Supply Chain Management: Strategy Planning and Operation.
From page 37...
... 1999. XML: More Than Just a Quick Fix, Extensible Markup Language Is Seen as a Universal Object Model That Will Enhance Web Development and Simplify Application Integration.
From page 38...
... 1601-03 Ch02 9/10/03 9:36 AM Page 38


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.