Promote industrial chain and supply chain through identification
The first key task of the Action Plan is proposed to penetrate the industrial chain and supply chain. Jin Jian, director of the Institute of Industrial Internet and Internet of Things of the China Academy of S406AM-CA Information and Communications Technology and chairman of Tel Yingfu, believes that the identification is not only a breakthrough in the technical system, but also represents a deep service model and industrial innovation, and is the embodiment of the data breakthrough and application of the full stack service ability. “Logo penetration can promote the penetration of the industrial chain and supply chain. It enables enterprises to better manage and utilize data, provides enterprises with a broader scope for application expansion and service extension, and realizes the efficient circulation and use of data.” The golden key said.
Identification analysis system can provide unique identification, information association, data sharing and other services for each link of the industrial chain and supply chain, and is a key technology to S406AM-CA open up the industrial chain and supply chain. “The identification analysis system needs to be widely used in the industrial chain and supply chain to maximize its value.” Connecting the industrial chain and supply chain is conducive to promoting the large-scale application of the identification analysis system.” Zeng Xiping said.
Focusing on the identification, Zeng Xiping believes that we should make efforts from four aspects: policy, technology, application and ecology.
In terms of policy penetration, he suggested that relevant policies should accurately focus on demand-side enterprises, and implement graded policies in terms of policy and financial support to form regional characteristics.
S406AM-CA In terms of technical connectivity, he believes that the current main problems are focused on governance data and trust management, which can solve the problem of data governance through data standardization, solve the problem of trust management through the integration of the chain network, and further improve the identification and collection technology through active identification.
In terms of application penetration, we should focus on serving the construction of new industrialization, combine key industries, unite industry leaders and chain main enterprises, give full play to the advantages of identification in the whole industrial chain, the whole value chain, and the whole life cycle of products, such as information correlation, accurate positioning, query and traceability, and encourage enterprises to apply the identification analysis system in various links such as production, circulation and consumption, and expand the scope of application.
In terms of ecological connectivity, activities such as policy promotion meetings should be actively carried out, good experience and good practices should be deeply explored, benchmarking demonstration cases should be created, and mature and effective business operation models should be explored.