News
Reverse logistics is growing beyond just dealing with returns. It's helping brands and retailers to stand out, changing how ...
We visited three Target stores across the US to get a sense of what the retail chain could be doing better as sales growth stalls.
America’s supply chain is under attack. From coast to coast, organized criminal groups are hitting trucks on the road, breaking into warehouses and pilfering expensive items from train cars ...
After all, as we learned the hard way throughout the Covid pandemic, global supply chain disruptions can strain access to critical goods and services, including lifesaving medicines. Few people need ...
The global supply chains assembled and organised to optimise profit and speed for over two decades were flipped upside-down by the Covid-19 pandemic and are now a thing of the past, according to a ...
This paper studies the ordering control problem of multi-stage multi-item supply chain (MSMISC). We construct a MSMISC model under demand uncertainty derived from reality steelmaking. To control the ...
The White House has boasted that its initiatives have helped “re-normalize the flow of goods” after the Covid-19 pandemic. Private sector leaders offer a less rosy assessment.
Now, Temu was “leveraging the efficiency gains that Shein has given the supply chain”, he said, while Shein itself tried to diversify its business outside of female fashion.
Activists claim Japanese industrial robots are being used to build military equipment for Israel. The robot maker denies the claims, but the episode reveals the complex ethics of global manufacturing.
Boost your business efficiency with the Traceability add-in for Dynamics 365 Supply Chain Management. Built on the Microsoft platform, this intuitive tool connects you to any source of traceability ...
While customer-centric supply chains sound nice in theory, asking an organization to rethink its supply chain to put the customer at the center of the operation is not an easy sell to the C-suite.
Software supply chain attacks are proving to be a winning strategy for cybercriminals looking to compromise large organizations and wreak havoc across their IT infrastructure, new research has said.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results