Archive

Want to Avoid a Trade War? Let Firms Do What Comes Naturally

By Morris A. Cohen We are in a period of intense global economic warfare. The U.S. is engaged in trade disputes with China, the European Union, Mexico, and Canada. We have been told that trade is a zero-sum game with one country’s gain coming at the expense of another country’s loss, and that a trade…

Understanding Raw Materials Risks in Automotive and Electronics Supply Chains

By Michèle Brülhart, Director of Innovations, Responsible Business Alliance Worldwide, businesses increasingly seek solutions to shared development problems and are responding to calls from regulatory bodies, investors, consumers and civil society stakeholders to transparently address adverse impacts associated with their supply chains. However, assessing environmental, social and governance (ESG) risks in raw material extraction and…

2019 Supply Chain Resolutions

Joe DiIorio Director, Supply Chain, Global Workforce Development, Seagate Technology “Slow down to speed up. In 2019, I am going to make a more concerted effort to take time to dispense with certain tactical, non-value-add type chores that will free up time to focus on more strategic opportunities. For example, when I get solicitor emails that…

Follow the Money

Aligning financial and physical flows key to true supply chain optimization There are three basic elements that define the core strength of every supply chain – big or small, local or global – the product or service being bought/sold; the insights from information that is generated and shared through the source-make-deliver lifecycle; and the actual…

Character Counts

Innovative Scoring Tool Uses Behavioral Cues to Assess Credit Risk Editor’s Note: Entrepreneurial Finance Lab (now LenddoEFL) first pioneered psychometric credit scoring through research at the Harvard Center for International Development in 2006. The project aims to stimulate entrepreneurial finance in emerging markets by developing low-cost credit screening tools that address the information asymmetry which…

Why Blockchain Needs to be Part of Your Supply Chain Strategy

By Renée Ure, Vice President, Global Supply Chain for Lenovo If business is about creating customer value, then the supply chain is about delivering that value to the customer in the most efficient and effective manner. At Lenovo, we work with numerous component manufacturers and suppliers to produce our servers. We enter into an agreement…

Yossi Sheffi, Professor, Author and Director of the MIT Center for Transportation and Logistics

One-on-One Profile Education: B.Sc, Technion (Israel Institute of Technology), 1975; M.Sc, MIT, 1977; PhD, MIT 1978 Current Research Focus: Supply Chain Management: Past, Present and Future Hobbies: Reading spy novels Favorite Book: “Thinking, Fast and Slow” by Daniel Kahneman Honors/Recognitions: International Society of Logistics “Eccles Medal” recipient; Syracuse University’s Whitman School of Management Salzberg Mediallion lifetime…

From the Desk of Lynn Torrel

Welcome to the January 2019 edition of Supply Chain Navigator. I am not sure when, but somewhere along the line, it seems as if people have become conditioned to think of change as an obstacle. It’s ironic really. The tech sector was built on the shoulders of individuals motivated by the unknown; pioneers who ate…

Cyber Risks in Additive Manufacturing Threaten to Unravel the Digital Thread

By Simon Goldenberg and Mark Cotteleer Wherever data and information are transmitted, used, or accessed, companies must anticipate that someone, somewhere may try to exploit those data and information for personal gain, or to inflict harm or damage. For organizations deploying additive manufacturing (AM) technology, acknowledging this sad reality is not just a business imperative,…

Securing the Keys to the Kingdom

Hardening the IoT-connected supply chain In the IT community, it is often said that the best defense against a cyber-attack is to “think like a hacker.” This tactic may work when an attack is directed at network infrastructure, and the goal is to protect technical information from exfiltration or exploitation. But, when the threat reaches…