Remove Document Remove Events Remove Exercises Remove Tools
article thumbnail

How to Protect Supply Chain from Cyber Attacks

3PL Links

People who operate in the supply chain ultimately communicate through alternative channels, even in the presence of dependable systems, applications, and other tools at their disposal. As a result, you must exercise extreme caution when selecting each partner, making sure they have sufficient security procedures and resources in place.

article thumbnail

A Lean Leadership Pocket Card

The Lean Thinker

It was our job to teach our continuous improvement people how to do that coaching and assisting – beyond just running kaizen events that implement tools. Do you have “standard work” documents that are rarely followed? PDCA Thinking. Today we would use Toyota Kata to teach this. Four Rules: 1. Safety First.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How Seniors Can Access Care from Home: A Guide to Remote Healthcare Options

WorkWave

In this mode of telehealth the provider will acquire all of a patient’s necessary medical documents, and then send those to a specialist to follow up when convenient. . A patient with heart disease on a strict diet and exercise regimen, for instance, could be routinely monitored to confirm they are following treatment guidelines.

article thumbnail

Navigating unchartered waters

Automotive Logistics

NotPetya arrived hot on the heels of other major cybersecurity events. NotPetya used versions of hacking tools stolen from the US National Security Agency. Under protection and detection, you are talking about policies, procedures, software tools and services, security partners, that kind of thing,” he says.

article thumbnail

Fleet Route Optimisation in the Past, Present, and Future

Logistics Bureau

So that’s the route we’re taking in this article, exploring the evolution of fleet route optimisation from a time-consuming pen-and-paper exercise to a high-tech process that, in some cases, can be completed in minutes. I guess that’s why we called it route planning and not route optimisation.” Book a free consultation.

article thumbnail

Supply Chain Management:Importance of Proactive Master Data.

Infosys Supply Chain Management

News & Events. |. This exercise was done before the monthly planning cycle start. This exercise yield positive results, in terms of planning community getting their confidence back in APO system & overall solution, over a period of time. I like the way you guys developed the tools - MDM report, queries etc.

article thumbnail

Intelligent Logistics or Just Good Old Common Sense?

Blog on Log

However, in reality most strategic planning exercises neither embed foresight, nor create responsive networks. Visibility Visibility refers to true understanding of the customer demand, real-time track and trace of inventory at item level, and track and trace of shipments as well as alerting when events deviate from expectations.