Professional Documents
Culture Documents
CLASS- TY BCOM.H B
Yossi Sheffi has served as the Director of the MIT Center for Transportation and Logistics since 1992. From 2007 to
2012 he was the Director of the MIT Engineering Systems Division. He is the founding Director of MIT's Master of
Supply Chain Management degree, established in 1998. In 2003 he launched the Zaragoza Logistics Center, situated
in PLAZA, the largest logistics park in Europe. In 2008 he launched the Center for Latin-American Logistics Innovation
in Bogota, Colombia. In 2011 he launched the Malaysia Logistics Innovation Institute in Kuala Lumpur. "The Resilient
Enterprise..." was selected by the Financial Times as one of the best Business Books of 2005. “...Sheffi shows
managers how to build flexibility into all areas of their businesses,” the review said. The book received “Book of the
Year” award in the category of Business and Economics from Forward magazine. In the Resilient Enterprise:
Overcoming Vulnerability for Competitive Advantage, Sheffi explores high-impact/ low-probability disruptions,
focusing not only on security but on corporate resilience—the ability to bounce back from such disruptions—and
how resilience investments can be turned into competitive advantage.
I. WHEN THING GO WRONG: DISRUPTIONS AND VULNERABILITY
The figure provides a way of thinking about the confluence of probability and consequences
of events such as a fire outbreak or an earthquake. Vulnerability is highest when both the
likelihood and the impact are high. Correspondingly, rare low- consequences occasions
speak to the most minimal degrees of vulnerability. In any case, what may give off an
impression of being a lot of modest vulnerabilities may share little for all intents and
purpose for business arranging purposes. These include disruptions that consolidate low
likelihood and enormous outcomes, from one perspective, and those described by high
likelihood however low effect, on the other. High-likelihood/low-sway occasions are a part of the extent of daily management
operations, watching out for the generally little irregular varieties popular, surprising low profitability, quality issues, truancy, or
other such moderately normal occasions that are a piece of the "cost of working together." Low-likelihood/high-sway occasions,
then again, call for arranging and a reaction that is outside the domain of day by day activity.
The two-axis framework explains how different organisations have different exposure
to vulnerability in case of terrorist attacks through an example of American airlines and
McDonald’s. The effects of a terrorist attack on a single McDonald’s assets might be
negligible as compared to its effect on American Airlines due to McDonald’s sprawling
chains highly distributed structure. In spite of the fact that it is hard to imagine that
terrorists would invest wholeheartedly in disturbing the progression of ladies' clothing (subsequently the low likelihood), an
attack on Limited Brand's focal dissemination community would have disrupted the organization's activities and, therefore,
could have caused noteworthy losses. On account of the structure and nature of its business, Ace Hardware faces both a low
probability of terrorism and negligible results from an attack. Various organisations will be involved in various quadrants of the
vulnerability map, contingent upon the kind of disruption. At the point when an organisation thinks about the low-
likelihood/high-sway occasions to which it is uncovered, there are a few different ways to group the hazard so as to begin
organising what administrators should concentrate on. To help distinguish these disruptions, GM constructed a four-quadrant
map of vulnerabilities. These categories include financial (macro-economic, currency change fluctuations), strategic (new foreign
competitors etc), operations (supplier business disruption, theft by employees) and hazard (severe weather, earthquake etc)
vulnerabilities. The diagram arranges these vulnerabilities on a radial, internal to external dimension. The vulnerabilities towards
the centre tend to come within the organization while those on the periphery arise from outside of the organization. While the
probability for any one occasion that would affect any one facility or provider is little, the aggregate possibility that some piece
of the supply chain will confront some kind of disturbance is high. Disruptions can happen at any segment of the inbound chain
and outbound chain of organizations and procedures that interface crude materials sources to a definitive end-client of the
completed item. On the supply side organizations should endure the consequences of disruptions not only to its suppliers but
also supplier’s suppliers. Internal disruptions on the other hand might involve company personnel. In addition to the human
cost, such disaster includes the loss of the associations with representatives, clients, and providers that can be vital to
recuperation efforts. The expanding utilisation of information technology makes vulnerability to PC infections, programming
issues, and other innovation blackouts. Demand disruptions include unexpected decline in the demand of the products or
services offered by the company. Technological changes, new competitors, loss of customer confidence are some reasons for
this decline. Normally, demand imbalances can include unusual spikes for demand, prompting lost deals, bad service, and even
lost clients. Such disruptions, notwithstanding, are once in a while calamitous for an organization. Comparative, yet diversely
engaged, enterprise vulnerability maps can be utilized to arrange and organize various potential disruptions for a given
organization. In spite of the fact that it might be very hard for any enterprise to appraise precisely the probability and results of
every disruption, such maps serve to feature the relative vulnerability along these two measurements, driving organizations to
concentrate on the disruptions to which they might be generally vulnerable. There are two different ways to take a look at what
supervisors should concentrate on. The first is to list and organize events, (for example, quake, typhoon, strike, and harm) that
can prompt disruptions. The second is to list disruptions (for instance, diminished creation limit, deficiency of a basic part, or a
cut off transportation interface) and break down their causes (and outcomes). The primary is progressively helpful when
contemplating decreasing the likelihood of a disruption, since the applicable activities include treating the wellspring of the
issue. The second is progressively helpful while thinking about how to recoup from a disruption, since the reason might be less
important than the results and their seriousness by then.
The figure illustrates the notion that a number of unsafe conditions and processes can
result in a large number of minor accidents or close calls. When these are not addressed,
the outcome is probably going to be many incidents including some property harm,
prompting a few significant episodes including enormous property harm and minor
wounds. Furthermore, if nothing is done to address these undeniably genuine
misfortunes, almost certainly, a significant occurrence including genuine wounds and
death toll will follow sooner or later in time. Researchers at the University of Pennsylvanian' have illustrated a seven-step near
miss management process that utilizes information from near misses to forestall huge disruptions. The steps incorporate 1)
identification of disruption 2) disclosure 3) distribution of data 4) root cause analysis 5) solution and improvement
recommendations 6) dissemination 7) follow up. Considering mishaps and near misses gives managers a thought of the
probability of significant disruptions to their own activities and conditions the association to perceive perilous circumstances as
they create. Disruptions can be partitioned into three classifications to facilitate evaluating their probability: natural disasters,
accidents, and attacks. These classifications contrast in the relative roles that individuals and irregular elements play in their
cause. Subsequently, the techniques for evaluating their probability likewise contrast. Statistical methods (rank size law, 80/20
rule, probabilities) can be used to determine the likelihood of occurrence of a natural disaster and their magnitude. Assessing
the likelihood of an accident can be based on variations of near misses’ framework. Companies has incorporated process safety
management systems that verify compliance with safety procedures and helps in reducing the no. of accidents. Purposeful
disruptions comprise versatile dangers in which the culprits look for both to guarantee the accomplishment of the assault and to
augment the harm. Therefore, "solidifying" one potential objective against a given method of assault may improve the
probability that another objective will be assaulted or there will be an alternate kind of assault. It additionally implies that such
assaults are probably going to happen even under the least favourable conditions time and in the most noticeably terrible spot
when the association is generally ill-equipped and defenceless. Managers have to remember that intentional attacks will strike
at the least defended place and at the most unusual time. To help understand the type of attack many companies use “red
team” exercises where a group of experts is tasked to think like an enemy, explore vulnerability of the organization and simulate
various attacks.
Many organizations can quickly recover if they are prepared. The following two effects should be considered while assessing the
possible effects of disruptions 1) cascading effects as a result of government actions.2) competitive position of the company. The
time that a company takes to recover is the company’s resilience, whereas the grace period is the attribute of its market
position. The recovery time for commodity market situation is very less due to switching of customers and suppliers.
The bullwhip effect is the phenomenon that denotes the increased amplitude of orders and increase in fluctuations of inventory
levels. Lack of coordination between the buyers and suppliers is one of the factors leading to this effect. Promotions and
discounts are also one of these factors. Overcoming this effect requires focused coordination and communication between
companies and departments. Lean manufacturing system, VMI programs, just in time delivery system, cross-docking process and
Kanban cards are some of the methods used by the companies to improve coordination.
Rather than projecting a single demand statistic, progressive businesses have switched to forecast a variety of possible
outcomes. The range is used as a guide to terms of supply contracts and contingency plans: what to do when demand is at the
high or low end of the scale. Companies can and do use range forecasting to more than simply predict future amount of
demand. Flexible contracting, procurement strategies, and financial planning employ range forecasts. The goal is to increase the
versatility of the company, as the forecasts of the range prepare the company for changing market conditions.
Many businesses make use of their range forecast as an integral part of their suppliers ' flexible contracts. Such contracts outline
a set of output requirements, providing the client with flexible flexibility to scale up or down production as demand materialises.
The forecast range can usually be divided into an unpredictable portion, and a more reliable portion. Companies should be
assured that they can sell the high end of the range at least at the low end of the projected range while being less assured in, but
willing to sell at.
Generally speaking, the importance of range forecasting is that it can condition all organizations involved in a particular supply
chain to the possibility that demand and therefore orders, staffing rates, capacity utilization and other factors that defer from
the expected number of forecasts. As discussed in the forecasting characteristics, aggregate forecasts are more reliable than
individual forecasts, since random forecast errors appear to cancel each other out.
One of the strategies for the pooling of risks is to reduce the number of components used to produce products. The company
can aggregate the forecasts for the products to create a more accurate forecast for the common components when multiple
products share common components. The use of a portion or part of a great number of finished goods pools the risk of demand.
The demand for each component is the cumulative demand for all the finished goods using it. Since there are several goods,
each facing its own separate demand trend, it is possible that an increase in demand for one product would be offset by a
different rise in demand for another. This aggregation makes forecasting more efficient, allowing companies to have all parts
that they need in stock without high inventory rates. Risk pooling under one technique aggregates a wide number of potential
customers ' preferences into a limited number of product variants. The problem with this approach is to ensure that a more
restricted set of products will accommodate the overwhelming majority of customers.
Reducing the lead time from product design to market launch decreases the time gap that the organization requires to predict
consumer requirements. The main steps involved are- product development- ramp up – production and logistics. Every phase
involves multiple processes. Quick response manufacturing processes include rapid prototyping to speed up product growth,
rapid tooling to speed up the ramp-up process and rapid manufacturing to speed up the production cycle to shorten the lead
time involved. These approaches are based on simultaneous engineering and conduct many of the production tasks in parallel,
to reduce the total lead time by more efficient coordination between the various related departments.
Collaborative projects focused on lean supply chain concepts such as vendor-managed inventory (VMI) and the Kanban program
are mainly aimed at reducing the impact of bullwhip. These all require the exchange of knowledge.
Nevertheless, solving the forecasting problems requires more than data sharing; it needs a mutual mechanism of finding
anomalies and correcting the predictions of trading partners so that their activities can be synchronized. Over the years
numerous such processes have been developed. One of the most detailed of these approaches is the joint preparation,
forecasting, and replenishment process.
When a business resides within its supply chain, considerations of protection and durability are relevant in the selection process
of trading partners, manufacturers, transportation carriers and other providers. The layered security theory is based on a series
of steps, each of which can, say, only work 75 percent of the time. However, the probability of failure of four such separate
layers is less than half of 1 per cent. A defensive scheme must tackle all possibilities of disruption at a degree commensurate
with the company's susceptibility to these disturbances, including any possible natural, unintentional and deliberate attacks.
The vast majority of incidents that businesses face is harmless. Companies need to establish ways to distinguish between risky
and common behaviours and find out which few pose a threat.
Many security experts at the organization cannot deal with malicious attacks across the globe on their own. Since the supply
chains their companies rely on span dozens of countries under a variety of regimes, companies need to work with their local
suppliers, consumers, logistics providers and other trading partners to be successful. Learning from the experience of other
businesses, and from the experience gained in different regulatory and law enforcement agencies, is also important in
minimizing the risk of injuries. Operating in the supply chain with the trading partners provides a stable and secure chain of
shipment custody. Operating with other companies within the same industry, including rivals, leads to benchmarking and
learning from the experiences of others. Government agencies not only provide tools for fighting terrorism, corruption,
vandalism, and other crimes, but also a wealth of information about established processes.
Better cooperation and trust between management and labour is especially essential for flexibility and resilience as it
encourages rapid response. Trust helps any party to contact the right person for support, without the need to establish trust, set
up a chain of command or check authenticity. However, it is not always easy to establish trustworthy relationships between
labour and management. Joint work to build protection and resilience is one method for building trusted relationships that can
spread to other business areas and support them.
Many companies formalized cooperation to prevent disruptions to the supply chain. An employee-based "community watch"
program enlists all company workers to search for and monitor incidents related to health. In the same way, bringing together
several companies in an organization to exchange data leverages every member company's expertise and resources.
Collaboration is a crucial element in the effort to protect the custody of shipments through supply chains that cover several
companies across the world. Suppliers, airlines, consumers, port owners and the government are all interested in preventing
damage. Cooperation guarantees a complex security by instituting numerous shipment checks while being in the possession of
the shipper, the logistics firm, the port operator, or the consignee, using different government entities in the process to
implement safe practices and secure commercial lanes.
The challenge facing companies in effort detection is the difficulty in identifying a trend which would suggest an aberration in
the regular variations of that random events. The method that many organizations use to differentiate between normal highs
and lows of any method (such as industrial boiler temperature, number of chips yielded per wafer, or "chatter" terrorist) and
"outsider" incidents that require special scrutiny is called statistical process control (SPC). With SPC, an organization measures
upper and lower control limits-recording, for example, the usual range of fluctuations in the number of daily and weekly deaths
when considering the method under control. Due to the many ambiguities involved, identifying problems will take time: Is there
a problem? Where's it? And so forth. Searching for a source thus forms part of the process of detection.
Organizations are faced with yet another degree of challenge: bridging the gap between getting disruption data and
"internalizing" the data. Internalizing the data involves processing them and sharing them internally, so that the involved
stakeholders are aware of the situation with adequate clarification to take future actions.
The most difficult to identify and internalize the unknown is that it always requires challenging long-held beliefs about what is
possible and transferring knowledge beyond the usual channels. The cycle of increasing information, including decisions about
what to tell superiors about and when to do so, is one of the keys to identification and rapid response. Many business
environments do it differently than others. The manner in which most organisations are organized, knowledge percolates the
authority chain, and orders percolate down to the people who execute it. This method takes time and is incomplete but it
operates in cases of no emergency. Individuals need to be encouraged to circumvent the usual knowledge system in an
emergency.
Disruptions are unavoidable in many situations, and warnings should be issued forthwith. The proverbial writing is on the wall in
many situations and the task is to internalize the imminent chaos and to take steps to minimize the consequences. Different
surveillance systems have been set up by susceptible organizations to enhance early detection and, in some cases, add
additional capabilities. Monitoring systems may also include data from the past to help spot near misses and establish disruptive
patterns.
A network of early detection set up to prevent low-probability disturbances will regularly alert managers to smaller issues and
negative patterns on a regular basis. Monitoring near-misses will point to issues with structural processes that are likely to
manifest as potential disturbances. Early detection will give companies and government time to conduct containment and
recovery operations and prepare consumers and the general public for the disruption.
The retailers at a particular time every year have to estimate what the customers want and then order the merchandise
accordingly, however forecasting total demand is not sufficient. This problem is not restricted to retailers, many suppliers are
also subject to the same market forces. To avoid disappointing the customers, suppliers and retailers can order in bulk to meet
the increasing demand at the cost of keeping excess inventory. Many companies use variable pricing, after the fact pricing to
satisfy customers. Products that can be benefitted through this strategy are the products that have uncertain demand, short
customer lead times, high inventory carrying costs, and modular product design.
This strategy when applied keeping vulnerability in mind can also increase supply chain resilience. This strategy also adds
flexibility and resilience not only downstream but also upstream. As a benefit of this strategy companies can manufacture their
base products in large quantities regardless the no. of variants. Supply chains designed for this can be helpful in anticipating
potential disruptions.
This figure's upper-right quadrant portrays the condition of close relations with several
suppliers. That's too costly and it's hard to find examples of businesses that employ these
strategies. The top left quadrant depicts the deep single sourcing. The following two sections
provide examples and discuss the supplier relationships which fit in the figure's two lower
quadrants.
Therefore, aligning the procurement plan with the supplier relationships will ensure stability, either reducing the risk of an
unforeseen interruption to a single supplier, or providing the stability that comes with multiple supplier relationships.
Caterpillar Inc. is the world's largest construction and mining equipment manufacturer. In order to improve its durability, it has
provided a unique versatility in its relationships with its suppliers: To adapt to a customer's emergency order, Caterpillar can buy
back and resell parts that have already been sold to suppliers and are in the warehouses of those dealers. Caterpillar will store
copious amounts of spare parts available at a moment's notice to mitigate inconvenience to its customers.
Bringing them as much information as possible is one of the most critical factors of helping clients recover from a disturbance.
Clear and constructive interactions with trading partners and, in particular, consumers will reduce the inevitable ambiguity and
uncertainty that is part of most large-scale disruptions. These communications allow trading partners to concentrate their own
recovery efforts based on up-to-date, reliable data. The first stage of engaging with consumers and trading partners is the
collection of reliable information to fuel the campaign. Timely updates ensure that when news of a disturbance reaches them,
consumers do not expect the worst.
Good long-standing customer and community relationships may help a business recover from a disruption by having customers
able to support the business directly or be flexible in meeting the needs of the business during recovery.
However, if an organization has good and stable consumer and delivery partnerships, after a disruption it will not be able to
please all customers. Setting customer care goals for post disruption operations requires a decision-making process similar to
the triage emergency response procedure. Managers face a triage-like decision in the immediate aftermath of a disruption over
which customers to serve first. These decisions may be based on insecurity of the consumer or on more internal factors such as
how lucrative the consumer is, how costly it will be to service him or how relevant the customer is in the long term. Deciding
which customer is vulnerable, and to what degree, needs a qualitative evaluation of which situation is more critical to customers
than others.
The flexibility-oriented community is based on four principles: (I) result commitment, (ii) coordination and collaboration, (iii)
personal relationship importance, and (iv) leadership at all stages. The key cultural characteristics that lead organizations to
respond rapidly and flexibly can be defined by (I) constant contact between educated workers, (ii) centralized control, (iii)
organizational excitement, and (iv) destructive conditioning.
Company culture can be the true key to the success of the firms mentioned in this book. The foregoing cultural characteristics
also provide these businesses with versatility that gives resistance to high-impact disruptions.
• Organizing for change • identifying risks • reducing the risk of instability • partnering together for protection • building
redundancies • designing robust supply chains and• investing in training and culture.
The traditional sustainability strategy is to provide an "economic continuity plan." Continued attempts to create resilience may
involve redesigning business procedures, changing corporate culture, improvements in product design, systemic improvements
within the company, and different partnerships with clients, vendors, and other stakeholders.
To determine the weakness of the company entity, the following three critical questions are: 1. What might go wrong? 2. How is
the likelihood of that happening? 3. How serious are the possible impacts? Using risk maps helps administrators to put future
disturbances within a matrix of probability / repercussions that focuses on disturbances of the greatest possibility and the most
serious likely consequences. These vulnerability maps should be regularly updated as each major client activity will add or
remove vulnerabilities and change their total probability or potential severity.
Many businesses have been working for a long time to improve protection, thereby raising the risk of incidents and the effects of
unexpected occurrences. Intentional disturbances, which at many companies receive a growing amount of focus, allow for an
expanded collection of resources and solutions. The first task is to easily spot a disturbance and identify it for what it is.
Collaboration makes it easier for businesses to reduce their risk until they emerge from a threat that "brings home the
message," as they benefit about the experience of others. Companies should collaborate with their own workers, making sure
they are empowered and qualified to track and investigate changes in the workplace.
Some of the best ways to construct stability is to invest in redundancy. Clearly, numerous vendors, excess inventory, surplus
room, new staff and low demand will help a company rebound from a disturbance quickly.
Rather than focusing entirely on continuity in the supply chain and its resulting costs, a well-managed company can create
stability by creating versatility that can be used to "bounce back" from shocks, often with minimal redundancies.
Many corporations ' many valuable properties are its workers. Cross training and changing tasks help staff understand vast
organisations ' activities. It also ensures that other workers are able to do their job-a capacity that can be used both during
delays and peak hours.
Critical review
For me, Yossi Sheffi's book was an eye-opener, not so much because of its intellectual importance, but because of its
"entertainment" importance, "entertainment" as in "stop-you-in-your-tracks-and-make-you-think "-value. The Robust
Enterprise: Resolving Economic Disadvantage doesn't automatically have practical remedies for your own company but it
demonstrates how many businesses handled various disaster circumstances, whether effectively or not. Discussion by Sheffi on
how and when things go bad or right is dead on and to the point. This book does not suggest any new technical concepts, initial
algorithms or modern procedures. Rather, the main argument is a two-sided coin: building versatility is the only way to create
supply chain resilience; agile firms are top performers on a regular basis on the market.