Network strategies and objectives differ depending on the job. The IT department must place data integrity first. On the other hand, JIT production facilities live and die by keeping manufacturing lines up and running in order to meet production quantity, quality and delivery driven by electronic order requests sent by the customer. By maintaining separate networks, each group can operate at optimum potential.
With more news about food and beverage recalls, there’s a growing concern that the industry won’t be able to keep up with new regulation that allows the FDA to trigger mandatory recalls at food distributors. In order to get some more details on the rules, and how companies are going to deal with the changes, we got in touch with Joe Scioscia, vice president of sales for VAI.
Sean Rollings, Vice President of Product Marketing at E2open, answers some questions about supply chain management, globalization, data management, and continuity and contingency planning.
We find that many plants are now undergoing expensive retrofits because future needs were not appropriately considered. Not only are retrofits expensive, but if new equipment is not sized and sequenced effectively, it can significantly affect your energy costs.
Perhaps one of the largest barriers to aggressively tackling legal expenditures is that failure is not an option. The relationships formed between corporate attorneys and outside firms often span multiple decades, forged on a foundation of trust.
Over time, business has gotten a lot smarter when it comes to protecting enterprise technology from the hackers and viruses that are constantly fighting to get in. At the same time, though, we sometimes forget to account for a key vulnerability in the security perimeter — the many data links maintained with suppliers and service providers. The oversight is potentially serious.
With the Affordable Care Act pushing more long-term treatment to be done at home, and patients demanding an increased level of autonomy when it comes to treating their conditions, many devices that were once only operated by skilled, educated technicians or physicians are now in the hands of relatively inexperienced patients.
In Walt Disney's Fantasia, the fate of the enchanted broom, the tale’s forgotten hero, is a rich allegory with modern flavors. It provides a helpful departing point for a reflection on the surging Internet of Things (IoT).
Seeing China’s manufacturing sector shrink is a trend that excites Americans, although it may not actually alleviate much of the pressure around a U.S. unemployment rate of 7.3 percent. The reality, according to many experts, is that the phenomenon is more one of nearshoring than reshoring, as many of these businesses – along with their jobs – head to Mexico.
Have you been having problems with your electrical equipment but haven’t found the cause? For many users it turns out to be a very common, widespread problem called ground loop feedback — an electrical phenomenon which occurs when different electrical circuits are powering a system and its peripherals.
The awful disasters that have struck the Philippines in the last few months, the devastating tsunami in Japan, and general violent weather effects have caused Supply Management to plan for continuity of supply down to the third tier of suppliers.
Routine, structured tasks such as monitoring equipment or production processes – tasks that have traditionally required human intervention by onsite technicians – are becoming increasingly automated. This creates the potential not just to optimize existing production and service delivery models but to transform them.
Low voltage lighting has gained popularity over the last several years due in large part to the generally safer operation it presents. In many cases, low voltage lighting is indicated for use in specific locations according to OSHA regulations and NEC recommendations.
Coatings can play a role in reducing energy loads, especially peak energy loads in many buildings, but they also offer benefits in terms of service life extension, fire retardancy, reducing the heat-history of the underlying membrane and insulation, improve traffic resistance, increase friction for safety, preserve impact resistance, help shed water or even be part of a waterproofing system.
New manufacturing techniques, such as M2M, have recently begun to rely on remote wireless monitoring to improve safety and reliability conditions. Gone are the days of maintenance pros climbing ladders or placing their hands in turbines to collect machinery health information — instead, information is sent to a central repository and analyzed by analysts 24/7 so maintenance personnel fix only the equipment that needs attention.
R&D activities need to be intimately linked to a company product strategy. This will lay out the future customer changes and needs, when these are likely to occur, and highlight what technologies are coming along that may provide breakthroughs.
In response to the rapid ROI that Manufacturing Operations Management (MOM) software applications have delivered, it’s not surprising to see organizations planning for additional investments. But the current landscape of manufacturing software applications is vast, and technology decision makers face challenges around where to start.
The world has changed a lot since 1929 and so has the way Silver Spring Foods runs its business. The company recognized that its current Enterprise Resource Management (ERP) system could not handle its current business requirements and would be unable to evolve as the company continued to grow.
To kick-off the holiday shopping season, American Made Matters® has declared November 19, 2013 the first annual American Made Matters® Day. On this day, American Made Matters® is encouraging consumers to buy at least one American-made product to show their support for American manufacturing.
As the CEO of a supply chain management, e-procurement, and financial productivity solutions company, Tim Garcia draws on real-life experiences to provide four tips for incorporating web security into companies’ overall risk management strategies. Lax procedures that fail to protect critical data leave businesses vulnerable to attacks that threaten customers and damage brands.