Item |
Question: What does a Business Continuity Plan have in common with a parachute?
Answer: When you find out that either doesn't work, it may be too late.
... (more information)
by By Michael J. Corby, CCP, PMP, CISSP
|
|
For some companies, managing only their immediate suppliers is not sufficient. Brand owners whose reputation and competitiveness is on the line for the performance and social compliance of the whole c... (more information)
by By Bill McBeath
|
|
One important way that Supply Chain Orchestrators manage multiple tiers is sourcing and buying on behalf of their suppliers. Learn how and why that is done.
... (more information)
by By Bill McBeath
|
|
We report the findings of our survey, answering questions such as the level of investments being made in resilience, the scope of responsibility for supply chain organizations, and assessment of how w... (more information)
by By Bill McBeath
|
|
Findings from our research on Supply Chain Risk
... (more information)
by By Bill McBeath
|
|
2012 opens with a higher than usual number of 'balls in the air' and dramas at play across the world stage. Although the recovery seems to be taking hold, there are some scary scenarios for how world ... (more information)
by Bill McBeath
|
|
How can businesses deal with the uncertainties we face for 2012? We explore a broad array of very concrete strategies and practices for creating adaptable enterprises that can cope with extreme potent... (more information)
by Bill McBeath
|
|
The publication of the Industrial Internet Security Framework by the IIC is a vital early step towards creating security in the Industrial IoT. Strong security becomes increasingly crucial as more and... (more information)
by Bill McBeath
|
|
The hot market for Mergers and Acquisitions continues; and these deals are pretty big, overall.
Last month we more information)
by Ann Grackin
|
|
Managing Risk in the Supply Chain continues to be a key issue in all industries. Lack of product on the shelf causes a drop in valuation and revenues across the whole chain. Originally published in Jo... (more information)
by Corey Billington, Blake Johnson, Alex Triantis
|
|
Supply Chain complexity, outsourcing, and the complexity and speed of business processes, enhance the need for real-time visibility across the chain. This makes companies like Acsis an indispensable c... (more information)
by By Ann Grackin
|
|
B. Braun's implementation of SAP SRM 7.0 demonstrates that results need not take a long time when you allow opportunities for contribution wherever the talent exists across the organization.... (more information)
by By Bill McBeath
|
|
In an outsourced and virtual world many critical operations and data are outside our control. However, supply chain managers need to gain control in order to ensure better outcomes.... (more information)
by Ann Grackin
|
|
Unpredictability of events misses the point in Risk Management.
... (more information)
by By Ann Grackin
|
|
Managing the risks imposed by suppliers and third party service providers has become increasingly difficult and expensive. In part one of this series we explore the reasons why. In part two we'll look... (more information)
by Bill McBeath
|
|
A new approach offers the potential to manage risk across your entire supply base without breaking the bank. Your most highly paid resources can focus on strategic high-value work, while tactical task... (more information)
by Bill McBeath
|
|
Tsunamis, hurricanes, landslides -- in responding to the needs of the victims of these natural disasters, the effective delivery of food, pharmaceuticals and life saving products are now in the spotli... (more information)
by Carla Reed
|
|
Ultimately collaboration exists to serve the customer. Here we discuss new ways to bring the customer's voice into collaborative processes.... (more information)
by By Bill McBeath
|
|
Highlights from Fusion, Concur's annual conference, including Risk Messaging, Hipmunk's travel bot (Hello Hipmunk), Concur's SMB business, and more.... (more information)
by Bill McBeath
|
|
The job is not done for Supply Chain Network Optimization unless it moves from the theoretical to the actual physical supply chain, and designs the supply chain from the country of origin through tran... (more information)
by By Lucy West
|
|
Time-critical decisions in transportation, risk management, security, disaster response, manufacturing, and other operational domains require continuous real-time situational awareness and intelligenc... (more information)
by Bill McBeath
|
|
Counterfeiting increases in a down economy, since it has so many audiences in the general population. However, the loss to the economy as well as the public welfare, due to the use of unsafe counterfe... (more information)
by By Ann Grackin
|
|
CNBC's Counterfeit Goods program estimates the cost to the US at $600 billion...... (more information)
by By Ann Grackin
|
|
The complexity of business today--working a myriad of partnerships with both the channel side and the transportation partners, as well as dealing with the challenges of fickle and surprising
markets-... (more information)
by Ann Grackin
|
|
With increasing globalization and additional tiers in the food supply chain, more and more hands are providing and/or touching the ingredients in our "farm-to-fork" food supply chain. As this happens,... (more information)
by Bill McBeath
|
|
Social networking in the enterprise is on the rise in surprising and obvious places.... (more information)
by Ann Grackin
|
|
A recent study estimates the cost from sicknesses due to contaminated food in the U.S. to be $152B/year. Meanwhile, food safety legislation is making its way through congress, containing new guideline... (more information)
by By Bill McBeath
|
|
|
The Next Generation of Transportation Applications.... (more information)
by Ann Grackin
|
|
As enterprises focus on perceived "core functions," more activities are outsourced to third party providers of goods and services. This extended supply chain of manufacturers of products-- from raw ma... (more information)
by Carla Frances Reed
|
|
GS1, HP and Microsoft enter product recall space - but GS1 enters as a nonprofit. What is the impact to industry?... (more information)
by By Ann Grackin
|
|
Hacking reaches into every aspect of consumer data&.... (more information)
by Ann Grackin
|
|
DocuSign's 2015 MOMENTUM conference showed us how they are transforming companies (and lives). There were numerous customer examples to learn from. ... (more information)
by Bill McBeath
|
|
The theft of pharmaceuticals has gone down dramatically in the past few years. Learn how they made such strides.... (more information)
by Bill McBeath
|
|
Whether you are an individual or a corporation, you can make a difference. Aidmatrix offers us a creative way to take part in the relief effort. ... (more information)
|
|
While Enterprise Risk Management (ERM) continues to gain acceptance in the financial services industry as a means to address credit, market and operational risks, and improve performance of business o... (more information)
by Debra Elkins, Devadatta Kulkarni, Jeffrey Tew
|
|
While Enterprise Risk Management (ERM) continues to gain acceptance in the financial services industry as a means to address credit, market and operational risks, and improve performance of business o... (more information)
by Debra Elkins, Devadatta Kulkarni, Jeffrey Tew
|
|
Harvard appoints ethics expert as the new Dean of the Harvard Business School, raising the question - are we finally putting ethics on the business agenda?... (more information)
by By Ann Grackin
|
|
The Russo-Ukrainian war has put into focus the question of the proper role for responsible enterprises in response to abuses by authoritarian regimes. Here we look at some of the challenges and soluti... (more information)
by Bill McBeath
|
|
Ford is able to predict its overall vehicle sales with reasonable accuracy, but faces much greater uncertainty about the sales volumes of individual models and model options. It is at this level of sp... (more information)
by Blake Johnson, Mark Everson
|
|
Sourcing and procurement spend-reduction strategies are frequently a central part of business cost-cutting initiatives. Most buyers understand that the lowest price option does not always yield the lo... (more information)
by By Bill McBeath
|
|
Here we discuss applications of Trade DaaS including ERP/GTM integration, supply chain risk management, sourcing optimization, supplier discovery, price discovery, total landed cost, compliant duty op... (more information)
by Bill McBeath
|
|
New types of challenges confront technology users. These challenges call for new and effective technologies to identify, authenticate, and protect people, assets and information. ... (more information)
by Ann Grackin
|
|
A Federated Enterprise has a Federated Global Footprint. This means that your Federated Global Footprint is a result of your supplier and sourcing network decisions, your manufacturing network decisi... (more information)
by By Laura Faught
|
|
Both B2C and B2B companies need to focus on risk.... (more information)
by Ann Grackin
|
|
Supply chain professionals are used to thinking about demand risk. Sophisticated tools are widely available for optimizing inventory and supply flexibility to manage demand uncertainty-but how about p... (more information)
by Thomas Olavson, Ph.D
|
|
Over the course of a product life-cycle there are at least six decision points where big bets must be made despite very poor forecast data.... (more information)
by Colin Kessinger
|
|
After Cheung Shu-hung (appropriately named by unsuspecting parents) was found hung in the warehouse where tainted Mattel products were made, one realizes the high stakes in managing a global supply ch... (more information)
by Ann Grackin
|
|
In this webinar, we probe beneath the surface on securing the supply chain and reducing risk to understand the real issues, how to address them, and what technologies are most effective.
You... (more information)
by Speakers: Ann Grackin and Mike Corby
|
|
Learn from one company's strategy and their approaches to hedging. And a discussion of financial instruments for hedging.... (more information)
by By Bill McBeath
|
|
How companies ensure continuous affordable supply by measuring supplier risk and anticipating potential supplier problems. Early warning gives companies a much broader range of options to deal with po... (more information)
by By Bill McBeath
|
|
Global dynamics ensure that commodity prices will remain volatile, with huge price spikes, for decades to come. Good hedging strategies are increasingly critical. Cross-functional teams are a great wa... (more information)
by By Bill McBeath
|
|
Do your key suppliers have a working disaster recovery/business continuity plan if one of their plants or critical IT systems goes down? If you don't know, you are inviting disaster.... (more information)
by By Bill McBeath
|
|
Lessons from American Eagle's devastating e-commerce site failure.
... (more information)
by By Bill McBeath
|
|
Running a supply chain network optimization may save you money on inventory or transportation costs, but does it help you make money and reduce risk? Companies need to think in terms of Market-Driven... (more information)
by By Lucy West - Contributing Author
|
|
Every enterprise-private sector, government or non-profit-depends on a number of suppliers who can be deemed "critical" to the enterprise mission-if these suppliers do not provide the components or se... (more information)
by K. Dunlop Scott
|
|
We've all heard about the Pandemic - and every day another news story breaks as it looms closer on our horizon. However, most of the focus has been on the response of the government and individuals.... (more information)
by Laura Faught, Mary Lynne Seay
|
|
|
David Goldstone, former prosecutor for the Justice Department and now at Goodwin Procter, in a recent speech at Secure World, highlighted the threats, challenges and responsibilities that firms now ha... (more information)
by By Ann Grackin
|
|
Estimates on the effects of counterfeit trade exceed two hundred billion dollars (US), and inspections across the world cost billions. Yet only a very few shipments are actually inspected. This issue ... (more information)
by Ann Grackin
|
|
Intelleflex and The Hartford recently formed an alliance to use RFID and temperature monitoring technologies to tackle the multi-billion dollar spoilage problem in the world's food supply chains. ... (more information)
by By Bill McBeath
|
|
There is a perpetual battle between pro and anti-regulatory advocates. But that tug-of-war misses the point. We need efficient, effective regulation—or alternative mechanisms—that actually work, to en... (more information)
by Bill McBeath
|
|
Creating cost-effective, gaming-resistant, outcome-achieving regulations is really hard to do. Outside-of-the-box approaches may be our best hope to solving many of the issues.... (more information)
by Bill McBeath
|
|
Advances in leaner and faster supply chains have, in many cases, come at the price of increased brittleness. It is time to make supply chains more resilient, and deal with risk more intelligently, to ... (more information)
by Bill McBeath
|
|
This report contains research into current and planned use of RFID in Maritime. In discussion with shippers, carriers, port operators and technology providers, the report covers these areas: ... (more information)
by Ann Grackin
|
|
Authorities across the globe recognize the value of sharing patient and remedy data across a network of expert medical practitioners. The concept of "tele-medicine" has been positively received in sev... (more information)
by Carla Frances Reed
|
|
The recent RFID Journal Live conference had an interesting new attendee profile: members of the legal community, anxious to learn what was new and valuable in the world of RFID and other auto-identifi... (more information)
by Carla Reed
|
|
Cyber Security, Compliance, Privacy, Supply Chain, Import Security, Anti-Counterfeiting, Critical Infrastructures and scary threats like fraud and piracy, ID theft, fraudulent checks, skimmers, phishi... (more information)
by By Grackin, West, and the ChainLink Team
|
|
Cisco and ImpactFactor, leaders in SCRM, provide insights into risk management.... (more information)
by By Ann Grackin
|
|
With the current level of security concern, it is interesting that there is not more focus on applications security. Numerous articles cite chilling statistics about security breaches, with the majori... (more information)
by By Contributing Author Stephen Primost
|
|
In the months to come, we promise to delve more into the issues associated with supply chain vulnerability and risk - how to mitigate it.
But contemplate these examples. These are not wild... (more information)
by Ann Grackin
|
|
Among the many sessions from SAP's annual conference, we highlight SAP's new Supplier InfoNet and one of their customer's implementation of SRM 7.0.... (more information)
by By Bill McBeath
|
|
Quite a few companies are focused on mining public social media data for consumer sentiment indicators. However, there are many other insights and information of value that can be gleaned from Tweets,... (more information)
by Bill McBeath
|
|
Sourcing and procurement professionals are used to dealing with large swings in demand and supply. But the highs and lows created by the recent bubble and recession were difficult for even the most ad... (more information)
by Bill McBeath
|
|
The ability to manage supplier risk and compliance has become a critical competence for organizations. Our research shows why and how to manage and reduce supplier risk--what actually works in practic... (more information)
by Bill McBeath
|
|
We look at supplier risk standards, monitoring, and how to do supplier risk and compliance under tight budget constraints.... (more information)
by Bill McBeath
|
|
In their definitive research, Kevin B. Hendricks, Professor of Operations and Information Technology in the School of Business and Economics at Wilfrid Laurier University, and Vinod R. Singhal, DuPree... (more information)
by By Kevin Hendricks and Vinod Singhal
|
|
We have gone through a revolution in supply chain, reducing cycle times, greatly reducing inventories, and outsourcing manufacturing to lower-cost regions resulting in tremendous improvements to perfo... (more information)
|
|
The supply chain business community now includes Risk Management as a business priority and cites it as a key area in need of improvement. Are solution providers ready?... (more information)
by Ann Grackin
|
|
In the fall of 2000 Agilent was faced with one of the steepest ramps in demand for test equipment ever encountered in the semiconductor industry. As markets heated up, unforeseen supply constraints pu... (more information)
by Chuck VanDam
|
|
New regulations across the globe are coming into effect, requiring pharmaceutical manufacturers, distributors, dispensers, and others up and down the chain to build serialization, verification, and tr... (more information)
by Bill McBeath
|
|
This paper documents the effect of demand-supply mismatches on long-run equity volatility by
examining the volatility changes associated with three different types of supply chain risks: production
... (more information)
by Kevin B. Hendricks, Vinod R. Singhal*
|
|
We continue to provide perspective on supply chain risks and their impact on shareholder value in this third report by Professors Singhal and Hendricks, who are the leaders in this aspect of supply ch... (more information)
by By Kevin Hendricks and Vinod Singhal
|
|
Supply chain practitioners and executives are in a unique position to help change the world for the better by their influence over global supply chains' labor conditions, environmental footprint, and ... (more information)
by Bill McBeath
|
|
A look at how to ensure that suppliers are treating their workers fairly, paying living wages, not using forced labor, providing a safe working environment, allowing collective bargaining, have non-di... (more information)
by Bill McBeath
|
|
With continued Supply Chain outsourcing to low cost producers, piracy and counterfeiting loom large. So I went to meet with Paul Fox, who is the Chairman of the Coalition Against Counterfeiting and Pi... (more information)
by Ann Grackin
|
|
With the current state of IoT security, we might call it the Internet-of-Vulnerable-Things. It's all the more alarming because of the types of physical machines/systems that are increasingly ne... (more information)
by Bill McBeath
|
|
Control over physical devices is what makes IoT different, and more dangerous, than traditional IT software. Here we look at device-level security requirements for makers of IoT-enabled products and s... (more information)
by Bill McBeath
|
|
IoT platforms, outside of the devices themselves, comprise the bulk of the intellectual property, infrastructure, and complexity in IoT. We examine requirements that are needed to ensure security in t... (more information)
by Bill McBeath
|
|
The ability to manage supplier risk and compliance has become a critical competence for organizations.... (more information)
|
|
Stealing trade secrets, patent infringements, piracy, counterfeiting and product tampering damage companies, make people ill, and deflate honest competition. And if financial and trade hacks are not e... (more information)
by Ann Grackin
|
|
Over the last few years, we have evolved supply chain practices and systems from industrial age concepts to the information age; an age rich with connectivity and data. This has allowed us to change t... (more information)
by Ann Grackin
|
|
We explore various strategies for obtaining supply chain resilience, including mapping and monitoring the multi-tier supply chain, the use of supply chain finance, and building adaptability into physi... (more information)
by Bill McBeath
|
|
Recent workplace disasters shine the spotlight on worker safety and supply chain risk.... (more information)
by Ann Grackin
|
|
After July 1, 2010, the CBP (Customs and Border Patrol) will start issuing significant financial penalties and increasing holds and inspections on shipments not complying with ISF (10+2). This article... (more information)
by By Matt Gersper, contributing author
|
|
In today's twenty-first century global outsourced business world, the traditional and somewhat simplistic approaches used to measure cost for sourcing decisions of direct materials fall short.... (more information)
by Bill McBeath, Colin Kessinger
|
|
Once in a while a business book cuts through all the noise and really has something important to say. After decades of 'greed is good' and downsizing and outsourcing, Kate Vitasek and Vested Outsourci... (more information)
by By Ann Grackin
|
|
The planning, execution and partner collaboration processes of nearly all companies today are driven by a "plan", itself typically part forecast, part performance target. Together, the plan and these ... (more information)
by Blake Johnson
|
|
The planning, execution and partner collaboration processes of nearly all companies today are driven by a "plan", itself typically part forecast, part performance target. Together, the plan and these ... (more information)
by Blake Johnson
|
|
Certainty principles can be leveraged to significantly improve your inventory optimization and customer service levels: A simple approach to isolating uncertainty.... (more information)
by By Lucy West
|
|
3PL warehouses have unique challenges that should drive their purchase of WMS software.... (more information)
by By Ann Grackin
|
|
With the maturing of global trade relationships, Open Accounts are replacing Letters of Credit as the dominant approach to enabling financial transactions between importers and exporters. We explore s... (more information)
by By Bill McBeath
|
|