CeBIT 2012: Will NBN speed up freight delivery times?
- 24 May, 2012 16:11
The National Broadband Network (NBN) is vital for the Australian logistics industry as it will cut delays in business to business data exchange and speed up freight delivery times, according to DB Schenker Australia and New Zealand chief executive, Ron Koehler.
Speaking at CeBIT, Koehler told delegates that the logistics company currently faces challenges when customers attempt to transmit very large client order files, including high resolution images, to its online exchange, leading to delays in order processing.
“Customers have to stop all other data processing activities in order to ensure sufficient network bandwidth when transmitting to the company,” he said.
“We are a heavy user of bandwidth and some of those high speed broadband services are not currently available where we have our warehouse locations around Australia."
Koehler cited a report from Forrester Consulting, Australian E-commerce 2010, conducted with 54 Australian online retailers which found that 20 per cent of respondents identified logistics and delivery delays as the single biggest barrier to retail growth.
“In the age of shopping online and promises of fast delivery turn around, we need to make sure the supply chain is engineered towards meeting expectations,” he said.
According to Koehler, the NBN will allow it to deliver full electronic monitoring and reporting of goods to all of Australia which would reduce the need for order paper work.
DB Schenker currently tracks goods online and sends SMS messages to retail customers when their order has left the factory. On the day of the delivery another SMS will be sent with the estimated delivery time.
Koehler said Australian corporations have “extremely high” benchmarks when it comes to the supply chain.
“These benchmarks are often in the high 90 per cent. We meet these benchmarks now, but the speed and capacity of the NBN will allow us to take those metrics up another notch,” he said.
“The outcomes [of the NBN] for clients and consumers should mean cost savings throughout the supply chain network and greater efficiencies and profitability.”
DB Schenker Australia operates out of 17 locations including Sydney, Melbourne, Perth and Brisbane.
Follow Hamish Barwick on Twitter: @HamishBarwick
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Expanding Your Gross Margin in Distribution
- Business Continuity Planning IT Survival Guide
- Unified Recovery Management - Reducing Risk and Cost by Simplifying the Recovery Infrastructure
- Leading Through Connections – Insights from the Global Chief Executive Officer Study
- Cloud Computing: Consolidating Databases onto Private Clouds
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Batten Down the Hatches! A Guide to Protecting Data in Motion
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.
How the Cloud Changes the Game for Line of Business Managers in Midsize Companies
It can be argued that what distinguishes midsize businesses most from large and small companies is not size, but attitude. While attitude alone cannot mitigate the challenges faced by midsize businesses, technology can help. And no technology offers more promise than the cloud. This paper, explores midsize business challenges from the perspective, not of the IT department, but of the line of business managers they support. Read on.
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.