Remove Conference Remove Data Remove Exercises Remove Presentation
article thumbnail

The water in the well – how much readiness is enough?

Logistics in War

Firstly, it recommended conducting realistic wargames and exercises to reflect threats and the capability of the ‘logistics enterprise’ to respond. Thirdly, it articulated the need to protect logistics data which is particularly vulnerable to espionage and manipulation. At present, they aren’t. 1] See Eccles, H.,

article thumbnail

Cyber-attacks: not a question of if, but when

Automotive Logistics

As industry becomes ever more connected, the risk of cyber-attacks is getting greater all the time, delegates at this year’s Automotive Logistics Supply Chain Conference in Atlanta were warned. Technology mismatch. Know exactly what you need to do and who to do it with, because it is hard to make friends in a foxhole,” said Walker.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Supply Chain & Logistics Education: Ask the Professors

The Logistics Academy

Other ways we support experiential learning include hosting external student case competitions, touring logistics facilities, and attending industry conferences. They not only have to present the models to demonstrate their understanding, but they also have to relate the models to real companies.

article thumbnail

Vendor Managed Inventory Model for Supply Chain Cost Reductions

GlobalTranz

The manufacturer has access to the distributor’s inventory data and is responsible for generating purchase orders. Vendor Managed Inventory Model : The manufacturer receives electronic data ( usually via EDI or the Internet) that tells him the distributor’s sales and stock levels. The distributor maintains the inventory plan.