Remove Document Remove Exercises Remove Presentation Remove Tools
article thumbnail

How to Protect Supply Chain from Cyber Attacks

3PL Links

Image source: Flickr | How to Protect Supply Chain from Cyber Attacks The management of data intelligence in the supply chain presents an enormous challenge to those involved. As a result, you must exercise extreme caution when selecting each partner, making sure they have sufficient security procedures and resources in place.

article thumbnail

Fleet Route Optimisation in the Past, Present, and Future

Logistics Bureau

Indeed, the transition has taken place so swiftly that some companies may still need to fully grasp the present or future possibilities to exploit distribution performance as a competitive advantage. In reality, it would take several rounds of fine-tuning to get all the orders sorted into routes without leaving any vehicles underutilised.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Reality check

Automotive Logistics

Jan Cirullies, head of logistics at the Fraunhofer Institute for Software and Systems Engineering (ISST) in Germany, says one of the main applications for AR in warehouses is to support operational processes, either as a permanent tool or a temporary aid. Support in documentation processes. Online stock and inventory control.

article thumbnail

Supply Chain Management:Importance of Proactive Master Data.

Infosys Supply Chain Management

This exercise was done before the monthly planning cycle start. This exercise yield positive results, in terms of planning community getting their confidence back in APO system & overall solution, over a period of time. I like the way you guys developed the tools - MDM report, queries etc. Very good article Pushkar.

article thumbnail

Navigating unchartered waters

Automotive Logistics

NotPetya used versions of hacking tools stolen from the US National Security Agency. Dharmani also points out that it would be a mistake for companies to assume that their smaller suppliers present higher cybersecurity risks than large ones. It has to become part of the organisation’s DNA. But the best defence is really awareness.

article thumbnail

Vendor Managed Inventory Model for Supply Chain Cost Reductions

GlobalTranz

Each Supplier gives a presentation about their company’s expertise, and overview of how they have worked with you. Now that you know how to get a supplier day conference and are collaborating with your suppliers better, it’s time to have a value analysis exercise. Ask for copies of documents. What is Value Analysis?