• <المزيد على Intel.com

Capital Markets: Supply Chain Technology

Moving the Supply Chain into the 21st Century

Imagine an electronic world where information in the physical and financial supply chains is automated and merged into one transparent system. It would lead to shorter trade cycles, faster cash flow, lower operational costs, and higher profitability for everyone involved.

For decades, the industry has recognized the potential benefits this kind of world would bring, but finding the technologies to build it has remained an unmet challenge—until now. To make it a reality, three of Intel’s latest processor families are helping merge the physical and financial supply chains:

  • Intel® Xeon® processors: Accelerate the performance of physical and financial supply chain applications.
  • Intel® Core™ i5 vPro™ processors: Reduce total cost of ownership with advanced security and management capabilities.
  • Intel® Atom™ processors: Enable a range of mobile devices embedded in the supply chain for logistics and transport.
Supply Chain

View the full image >

Understanding today’s supply chain

With fewer paper-based purchase orders, receipts of shipment, notices, and invoices, we can now automate them electronically using a multitude of devices. From moving goods to financial transactions, online systems can monitor progress and inject a new level of efficiency into slow, centuries-old practices that cost world trade trillions of dollars each year.

Technologies like RFID chips and sensors track goods in transit, creating data that can be matched with trade documentation and streamline supply-chain functions such as payments, working capital, lending, and certification. At any time in the process, absolutely anyone along the supply chain, from financial service providers to their customers, can immediately and securely see all relevant information—and identify exceptions that demand attention to avoid costly delays.

Supplying the power behind all these innovations is the latest generation of Intel Xeon processors, which provide the energy-efficient, reliable performance the 21st century supply chain demands.

Intel® Atom™ processors: enabling a mobile fleet

Merging the physical and financial supply chains will be much more efficient with mobile technology that manages and displays data on the move. With a compact design, Intel® Atom™ processors enable a broad range of devices, including netbooks, tablets, handhelds, and smartphones, as well as logistics and transport devices embedded in the supply chain.

Learn more about the Intel® Atom™ processor family>

 

Register for financial services electronic updates:

Intel® Xeon® processor family: accelerated performance and throughput

Intel® Xeon® processor family: accelerated performance and throughput

With its many built-in features, the Intel® Xeon® processor family offers the reliability, availability, and serviceability you need to accelerate both performance and throughput.

Scalability: The Intel® Xeon® processor E7 family can scale to handle vast volumes of trade data and provide mainframe-class computing with industry-standard benefits. This is ideal for ports, freight forwarders, and countless service providers in the chain.

Performance: The entire Intel Xeon processor family offers a host of features that accelerate performance and throughput of financial and physical supply-chain applications such as enterprise resource planning (ERP) systems. Best of all, it does all this while reducing the cost of power and cooling. Intel® Virtualization Technology (Intel® VT)1 can also enhance the performance of ERP systems to help make the most of widely distributed server resources.

Learn more about the Intel Xeon processor family >

Intel® Core™ i5 vPro™ processor: advanced security and management

Intel's newest processor for PCs, the Intel® Core™ i5 vPro™ processor2 offers advanced security and management capabilities3 that can reduce total cost of ownership with enhanced security for all functions across the physical and financial supply chain. Features include:

Intel® Anti-Theft Technology 2.04: Allows laptops to be remotely disabled if they are lost or stolen—a real threat in the non-office environments of world trade.

Intel® AES New Instructions: Acceleration encryption and decryption of business-critical data.

Remote management capabilities3: Helps cut the cost of PC maintenance by allowing IT managers to remotely diagnose and repair machines from anywhere in the world.

Learn more about the Intel® Core™ i5 vPro™ processor >

Moving forward

In today’s world of social media and mobility, the business processes of world trade are under more scrutiny than ever before. Business and regulatory pressures are leading both buyers and suppliers to demand a more efficient and transparent system. Merging the physical and financial supply chains is the obvious solution, and with the powerful new Intel technologies, it’s happening today.

معلومات المنتج والأداء

open

1. تتطلب "تقنية التمثيل الافتراضي" (Intel® Virtualization Technology) حاسوباً مجهزاً بمعالج ونظام BIOS وبرنامج مراقبة الآلات الافتراضية (VMM) تدعم كلها هذه التقنية، وفي بعض الاستخدامات يجب توافر برمجيات خاصة للمنصة تدعم هذه التقنية أيضاً. ستختلف الوظائف والأداء وغيرها من المزايا حسب تشكيلات العتاد والبرمجيات، وقد يتطلب الأمر تحديث نظام BIOS قد لا تكون التطبيقات البرمجية متوافقة مع جميع أنظمة التشغيل. يرجى التأكد من منتج التطبيقات الذي تتعامل معه.

2. إن تقنية Intel® vPro™ متطورة وتتطلب عملية إعداد وتنشيط. يتوقف توفر الميزات والنتائج على عملية إعداد الأجهزة والبرامج وبيئة تكنولوجيا المعلومات وتكوينها. لمعرفة المزيد، يُرجى زيارة موقع: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html. 

3. تتطلب تفعيلاً ونظاماً حاسوبياً متصلاً بشبكة شركة، كما يتطلب دعم تقنية الإدارة النشطة Intel AMT على مستوى كل من طقم الرقاقات وتجهيزات الشبكة والبرمجيات. بالنسبة للحواسيب المحمولة، قد لا تتوافر تقنية الإدارة الفعالة من إنتل، أو ربما تكون بعض إمكاناتها محدودة على الشبكات الافتراضية الخاصة المضيفة المرتكزة إلى نظام التشغيل، أو عند الاتصال لاسلكياً، أو عند التشغيل على البطارية أو في وضع النوم أو السبات أو عند إيقاف التشغيل. تعتمد النتائج على على تكوينات العتاد وعلى الإعدادات والتركيب. لمزيد من المعلومات، قم بزيارة . http://www.intel.com/technology/vpro/index.htm

4. لا يستطيع أي نظام توفير الأمان المطلق في كافة الظروف. تتطلب مجموعة شرائح ممكّنة وBIOS وبرنامجاً ثابتاً مزود بتسفير البيانات وتنشيط الخدمة واشتراكاً مع موفر خدمة كفوء. راجع الشركة المصنعة للنظام وموفر الخدمة للحصول على معلومات حول التوفر والوظائف. قد لا تتوافر الخدمة في كافة البلدان. لا تتحمل Intel أي مسؤولية في حالة فقدان البيانات و/أو الأنظمة أو سرقتها أو أي أضرار أخرى ناتجة عن ذلك. لمزيد من المعلومات، يُرجى زيارة www.intel.com/content/www/us/en/architecture-and-technology/anti-theft/anti-theft-general-technology.html.