Process industries such as steelmaking and chemicals are increasingly focused on customer service, but their supply chain practices are designed for low-cost, efficient operations. To align with today's corporate strategies, they need to match their supply chains to the markets they serve while improving their demand forecasting capabilities.
When the spice and flavoring company adopted a long-term strategy focused on global growth, the procurement team stepped up with a bold plan to reshape their priorities and organizational structure. The initiative has exceeded expectations, with more improvements to come.
The amount of supply chain data is growing exponentially, and companies are struggling to make effective use of available information. New research reveals the strategies they're adopting to help them harness the power of big data.
There's a significant cost associated with taking the backroom for granted. Taking the time to re-evaluate a variety of relevant factors can help companies operate a more efficient, cost-effective backroom.
While it makes sense that an increase in driver turnover would have a negative effect on the carriers' safety, little is known about the exact nature of the relationship and about whether managers can take steps to mitigate those negative effects.
YPs give high marks to their jobs, their employers, and the profession as a whole, but they're always on the lookout for career development and advancement opportunities, a survey of nearly 300 young CSCMP members finds.
Western Michigan University programs will teach unemployed area residents warehousing and inventory control skills while providing management and supervisory opportunities for the university's undergraduates.
While four-fifths of respondents to a new study say they have a "responsible supply chain," only a quarter said their companies are addressing issues such as child labor or climate change in their supply chains.
Cybersecurity experts warn that many robots in factories and distribution centers have outdated software and weak authentication systems, leaving them open to being hacked. An attack could harm companies, products, and even people.