Professional Documents
Culture Documents
SESSION 18
OVERVIEW
Supply chain management (SCM)
For the system to work it needs to be sufficiently liquid at all nodes to ensure
that bottlenecks are avoided and supply can be sustained. There also needs
to be a strong relationship of trust between each party in the chain.
Push and pull supply chain models
Pull model- The pull business model is less product-centric and more directly
focused on the individual consumer – a more marketing-oriented approach.
Planning for a product starts when the customer places the order and
creates firm demand.
Product design is often customer led (a pull system is sometimes referred to
as a Make to Order (MTO system)).
Personalisation of the product by the customer is possible.
Inventory levels are minimised (systems such as JIT and TQM can be used).
Lead times can be much higher.
Set-up costs are higher and economies of scale are not always possible.
Test yourself 1
Upstream SCM - E-procurement
E-sourcing covers electronic methods for finding new suppliers and establishing
contracts.E-sourcing save administrative time and money, it can enable companies to
discover new suppliers and to source more easily from other countries.
E-purchasing covers product selection and ordering.Features of an e-purchasing system
include:
-electronic catalogues for core/standard items
-recurring requisitions/shopping lists for regularly purchased items
-electronic purchase orders despatched automatically through an extranet to suppliers
-detailed management information reporting capabilities.
E-payment includes tools such as electronic invoicing and electronic funds transfers.
Again, e-payment can make the payment processes more efficient for both the
purchaser and supplier, reducing costs and errors that can occur as a result of
information being transferred manually from and into their respective accounting systems.
These efficiency savings can result in cost reductions to be shared by both parties.
Benefits and Risks of E-Procurement
Illustration- E -Procurement
In April 2012, Amazon announced the launch of Amazon Supply: "a new
website dedicated to offering a broad selection of parts and supplies to
business, industrial, scientific and commercial customers at competitive prices."
This is a move away from its typical B2C model to a B2B model. The hope is that Test
businesses may find it more attractive to implement an e-procurement strategy
if they can link systems to a business as large and valued as Amazon. Amazon yourself
Supply "offers more than 500,000 items from leading brands" across a range of 2
categories, including: lab & scientific, test, measure & inspect, occupational
health & safety, janitorial & sanitation, office, fleet & vehicle maintenance,
power & hand tools, cutting tools, abrasives & finishing, materials handling,
materials (e.g., metals), hydraulics pneumatics & plumbing, fasteners and
power transmission. As Amazon adds basic buying controls, workflow,
compliance and analytics capability that are commonly featured in e-
procurement technologies and allow procurement to be automated (and
therefore cheaper and more efficient), it is likely to become a vital part of the
value chain of many businesses in the future.
Big Data- Illustration
Time Warner is using big data to track which types of media customers are
watching and when. This can help to manage bandwidth and therefore
optimise customer experience. The company also uses sophisticated systems to
integrate public data such as voter registration and property records with local
viewing figures. This enables targeted advertising campaigns by Time Warner's
advertising clients.
Netflix has 44 million users worldwide who watch 2 billion hours of programmes
a month. The company uses information gathered from analysis of viewing
habits to inform decisions on which shows to invest in. Analysing past viewing
figures and understanding viewer populations and the shows they are likely to
watch allows the analysts to predict likely viewing figures before a show has
even aired. This can help to determine if the show is a viable investment.
Big Data
Recently , both the sources and volume of data collected have exploded. Much of the
information will be non-transactional such as collecting data from social networks (who likes
your Facebook page? who follows you on Twitter? who else do they follow on Twitter? what
videos do they like on YouTube?), examining reviews that people leave about your products
(on either your own site or on someone else's site ), exploring internet forums to discover what
people are discussing and what they want to see, examining where people are, what they
are doing, where they are checking in, what they are buying elsewhere etc. Most of this data
is out there.
These sources of data have created modern-day treasure troves that can be mined to glean
insights into products, services and customers. While this is conceptually possible, it requires
the implementation of new processes, technology and governance mechanisms that are
collectively being referred to as Big Data
Laney suggested that Big Data has the following characteristics, known as the 3V's:
Volume – there is lots of it
Velocity – it is generated very quickly
Variety – it can take many varied forms
Characteristics of Big Data
Volume
Big Data is characterised by its sheer volume.There are over 5 billion Facebook
status likes per day. Facebook has to store this data on servers, and businesses
would like to use and interpret these links to find patterns.
Test
Velocity
yourself 3
Big Data is created quickly and moves around quickly. There are 300 hours of new
content uploaded and shared to YouTube every minute, for example. For
businesses wishing to exploit Big Data, they will have to obtain the information
quickly, analyse it quickly and exploit it quickly
Variety
Big Data is also characterised by its variety. Consider the data that might exist and
be stored about yourself, for example. You might have banking transactions, you
might be following particular organisations on Twitter, you may have recorded
your interests on LinkedIn, you might have a store card or loyalty card that has
recorded your past transactions, you might have saved photographs in the cloud,
you might have given a thumbs up to a music video on YouTube etc. The types
and sources of Big Data are many fold.
Cloud and mobile computing
Cloud and mobile computing is computing based on the internet. It avoids the needs for
software, applications, servers and services stored on physical computers. Instead it stores
these with cloud service providers who store these things on the internet and grant
access to authorised users.
Benefits of cloud and mobile computing
Sharing data
On-demand self-service
Flexibility
Collaboration
More competitive
Easier scaling
Reduced maintenance
Back-ups
Disaster recovery
Better security
Risks of cloud and mobile computing
whether the software will match the expected organisational and user
requirements
the level of flexibility in adapting the software as these requirements change
the competencies of the organisation in using and exploiting the software
the availability of future updates and ongoing support and maintenance
the compatibility with existing hardware and software
the provision of training, user manuals and/or online help
the interface design and user-friendliness (referred to as the non-functional
requirements)
the cost of the software and the ease of implementation/transfer
security and controls over access to the software
Choosing a supplier- Factors to
consider
It is vital to consider the stages that will be addressed during the migration
process.
Some of the stages include:
Planning
Data mapping
Manual input
Testing the solution
Implementing the solution.
Stages in data migration
Planning – the organisation may need to create a Steering Committee that has
representatives from a number of areas of the organisation including payroll,
personnel, etc.; they may be from various levels, e.g. operational, tactical and
strategic.
Data mapping – this is the stage when the data is moved from one system into
the field heading and file structures of the new system. An evaluation will need
to take place of the structures within the new system and the existing computer
system to ensure that the allocation for field headings is consistent.
Manual input – there may be a requirement to enter some of the data
manually from the old format to the new. This will require the organisation to
consider the method of manual input as there are many issues with this type of
transfer such as the type of input method, e.g. keyboard or scanner. The use of
a keyboard, for example, greatly increases the chances of transposition errors
that will reduce the quality of the input made.
Stages in data migration(cont)
Testing the solution – there will need to be a period of testing after the
conversion process to ensure that all of the data is accurate and that the
system is running properly. A test environment will have to be created by
the team to ensure that all the outputs from the tests made are accurate;
this may include test plans and scripts for the conversion software.
Implementing the solution – once the file conversion has been tested and
accepted it can be run on the live data. Procedures will have to be
specified to test that records are accurately converted.
Training
Training and a strategy for training are crucial. In order for this to be
successful and resources not to be wasted it is vital that there is clarity
about a number of issues. These are:
Who needs to be trained and why.
Whether training takes place on or off the job.
Who will provide the training.
If training should occur in a short period or be ongoing.
What the line management involvement will be.
Methods of training
Parallel running -This is when the new and the old system run side by side for a
period of time, e.g. several weeks, until the analyst is satisfied with the
operations of the new information system. It is known as the high-cost low-risk
approach.
Direct changeover- This approach is when the old system finishes, and the new
system takes over immediately, so requires that there is a high level of
confidence in the effectiveness of the new system. For example, the old finishes
at 8.59.59 seconds and the new starts at 9.00.00 seconds. It is known as the
high-risk low-cost approach.
Phased- This is when the new information system can be introduced part by
part or stage by stage. This may be useful if the organisation is implementing an
information system in a number of departments, as it will help to limit the
impacts of the new system. It must be remembered that the phase can be
either direct or parallel in each of the stages.
Test yourself 4
SUMMARY
ANY QUERIES?