Extreme automation: FedEx Ground hubs speed deliveries

Computerworld - To someone standing outside the FedEx Ground distribution hub in Hagerstown, Md., the package delivery business appears deceptively simple.

On one side of the building, workers unload trucks full of boxes and parcels that have been picked up from businesses and various regional drop-off points. On the opposite side of the building, they load the same packages -- now sorted by ZIP code -- onto more trucks. The outbound vehicles then head for points north, south, east and west to deliver their time-sensitive loads of small packages on a specified date -- FedEx Ground's specialty -- to destinations anywhere in the continental United States and Canada.

But if you venture inside the cavernous, warehouse-like facility, it's a different story. First, there's the noise -- a loud and steady hum from the network of whizzing conveyor belts that speed up to 7,500 packages an hour through a highly complex and thoroughly automated categorizing and tracking process that involves a primary sort, a secondary sort and no fewer than 12 scans before packages reach their destinations.

The scans record each package's physical dimensions, weight and destination ZIP code, plus other information, such as where the package is at any given moment, whether in the hub or en route to its destination.

At the hub, "after a package is unloaded from a trailer, the next time it is touched by human hands is at the loading dock," says Ken Spangler, a senior vice president and CIO at FedEx Ground, a $7 billion unit of FedEx Corp. "Everything in between is automated."

And "everything in between" -- such as the routing of the package -- can also be changed on the fly. But it all happens at lightning speed, and that's critical because winning market share in the ultra-competitive $31 billion domestic ground package-delivery business comes down to a matter of milliseconds.

"Over the last five years, we have been on a mission to get faster and faster," Spangler says. "We re-engineer and speed up our lanes an average of twice a year, and sometimes more frequently than that. Over 80,000 ZIP-code-to-ZIP-code lanes are at least a day faster now." As a result, the company's ground service is able to deliver in a single business day almost a quarter of the 3.5 million packages it handles daily. Most packages -- about 85% -- are delivered within three business days.

In the past six years, FedEx Ground has fully automated 53 of its terminals and opened nine new hubs, such as the 600,000-plus-square-foot Hagerstown facility, which has been expanded twice since it opened in 2005. The business result: FedEx Ground has gained market share for 25 consecutive quarters, notes Spangler.

Options for Protecting against Web ThreatsThis independent paper from senior analyst Jon Collins at FreeForm Dynamics considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could potentially increase the attack surface of the companies. It defines the scale and types of threat, what to look for in a corporate web security solution and compares the different types of technological approach available to companies and the processes that need to be considered for effective protection.

Read now.

Security KnowledgeVaultSecurity is not an option. This KnowledgeVault Series offers professional advice how to be proactive in the fight against cybercrimes and multi-layered security threats; how to adopt a holistic approach to protecting and managing data; and how to hire a qualified security assessor. Make security your Number 1 priority.

Read now.

Social Networking - Brave New World or Revolution from Hell?Social-networking sites have revolutionized how businesses use the Internet. Instead of relying on faltering newspapers to find job candidates, companies can access thousands of potential employees through Facebook and Twitter. But social-networking sites have also left businesses vulnerable to new security threats. So are they tools to be used or security traps to be avoided?

Read now.

No comments:

Post a Comment