US20140019471A1 - Method and system for managing multiple supply chains - Google Patents

Method and system for managing multiple supply chains Download PDF

Info

Publication number
US20140019471A1
US20140019471A1 US13/935,209 US201313935209A US2014019471A1 US 20140019471 A1 US20140019471 A1 US 20140019471A1 US 201313935209 A US201313935209 A US 201313935209A US 2014019471 A1 US2014019471 A1 US 2014019471A1
Authority
US
United States
Prior art keywords
query
request
command
requestor
supply chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/935,209
Inventor
Thomas K. Linton
Mark Whipple
Marni Berger
Glenn Jones
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ELEMENTUM SCM (CAYMAN) Ltd
Flextronics International Ltd
Flextronics Sales and Marketing AP Ltd
Original Assignee
ELEMENTUM SCM (CAYMAN) Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ELEMENTUM SCM (CAYMAN) Ltd filed Critical ELEMENTUM SCM (CAYMAN) Ltd
Priority to US13/935,209 priority Critical patent/US20140019471A1/en
Assigned to FLEXTRONICS AP, LLC reassignment FLEXTRONICS AP, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BERGER, Marni, JONES, GLENN, LINTON, THOMAS K., WHIPPLE, MARK
Assigned to FLEXTRONICS SALES AND MARKETING (A-P), LTD. reassignment FLEXTRONICS SALES AND MARKETING (A-P), LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FLEXTRONICS AP, LLC
Assigned to FLEXTRONICS INTERNATIONAL LIMITED reassignment FLEXTRONICS INTERNATIONAL LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FLEXTRONICS SALES AND MARKETING (A-P), LTD.
Assigned to ELEMENTUM SCM (CAYMAN) LTD. reassignment ELEMENTUM SCM (CAYMAN) LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FLEXTRONICS INTERNATIONAL LIMITED
Publication of US20140019471A1 publication Critical patent/US20140019471A1/en
Assigned to FLEXTRONICS SALES & MARKETING (A-P) LTD. reassignment FLEXTRONICS SALES & MARKETING (A-P) LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FLEXTRONICS AP, LLC
Assigned to FLEXTRONICS INTERNATIONAL LTD. reassignment FLEXTRONICS INTERNATIONAL LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FLEXTRONICS SALES & MARKETING (A-P) LTD.
Assigned to ELEMENTUM SCM (CAYMAN) LTD. reassignment ELEMENTUM SCM (CAYMAN) LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FLEXTRONICS INTERNATIONAL LTD.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G06F17/30389
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS], computer integrated manufacturing [CIM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06315Needs-based resource requirements planning or analysis
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS], computer integrated manufacturing [CIM]
    • G05B19/41865Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS], computer integrated manufacturing [CIM] characterised by job scheduling, process planning, material flow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0637Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P80/00Climate change mitigation technologies for sector-wide applications
    • Y02P80/40Minimising material used in manufacturing processes

Definitions

  • the disclosure relates generally to automated systems for product management and particularly to automated systems for controlling and/or managing supply chains.
  • the present disclosure discloses a supply chain management system that can estimate manufactured item delivery times at a facility, manufactured item costs or prices, and dynamically control supply chain performance.
  • a system for monitoring multiple supply chains for different products can include a microprocessor executable security module, method, and/or instructions to receive a query, command and/or request from a requestor to perform an operation with respect to a set of data and/or data structures in the database, modify the query, command and/or request to conform to a security definition, and use the modified query, command and/or request to perform the operation.
  • the database is commonly not partitioned logically into distinct and independent parts corresponding to different monitored supply chains, and the data and/or data structures for different monitored supply chains are commonly commingled in the database.
  • the query, command and/or request can be modified by the security module, method, and/or instructions to reflect a supply chain role and/or an identity of an enterprise and/or organization associated with the requestor, whereby the data and/or data structures impacted by the query, command, and/or request are limited to those relating to the supply chain role and/or identity of the enterprise and/or organization associated with the requestor.
  • the security module, method, and/or instructions can determine whether the requestor has permission to use an application associated with the operation and, when the requestor is without permission to use the application, deny the query, command, and/or request.
  • the query, command, and/or request can be required to pass through an application programming interface prior to performance of the operation.
  • the security module, method, and/or instructions can determine whether the requestor has permission to use the application programming interface and/or whether the query, command and/or request conforms to the requirements of the application programming interface and, when the requestor is without permission to use the application programming interface and/or when the query, command, and/or request fails to conform to the requirements of the application programming interface, deny the query, command, and/or request.
  • the requestor can be required to have a specified role and relationship to a selected monitored supply chain enterprise and/or organization before the operation can be performed.
  • a datum and/or datum structure of the set of data and/or data structures can have different states, wherein an action must be performed to change the state of the datum and/or datum structure, each action can only be performed when the requestor has a permission to perform the action, and one of the different states has plural sub-states that must be performed before the state can change.
  • the supply chain management system can perform one or more of the following tasks, functions, and/or operations:
  • Supply chain performance metrics are commonly not calculated, in substantial real time, based on the performance information collected from the monitored supply chains.
  • All or parts of the supply chain management system can be executed on one or more computers and typically is stored as microprocessor executable instructions on a computer readable medium.
  • the present disclosure can provide a number of advantages depending on the particular aspect, embodiment, and/or configuration.
  • the supply chain management system can, particularly for vertically integrated supply chains, more effectively and efficiently control suppliers, prices, product supply, and other terms, generate faster material turns or velocities, increase profit, enable leaner manufacturing and logistics operations, and reduce waste when compared to a supply chain without the supply chain management system. It can more effectively consider the impact of unanticipated or “black swan” events, including natural and manmade disasters, by monitoring news sources, law enforcement and military authorities, among others, and precisely mapping tier 1, 2, 3, and 4 facilities. It can effectively assess the sensitivity of the supply chain to various internal and external events.
  • each of the expressions “at least one of A, B and C”, “at least one of A, B, or C”, “one or more of A, B, and C”, “one or more of A, B, or C” and “A, B, and/or C” means A alone, B alone, C alone, A and B together, A and C together, B and C together, or A, B and C together.
  • Advanced planning and scheduling (also referred to as APS and advanced manufacturing) refers to a manufacturing management process by which raw materials and production capacity are substantially optimally allocated to meet demand. APS is especially well-suited to environments where simpler planning methods cannot adequately address complex trade-offs between competing priorities. Production scheduling can be very difficult due to the (approximately) factorial dependence of the size of the solution space on the number of items/products to be manufactured.
  • Computer-readable medium refers to any tangible and non-transient storage and/or transmission medium that participate in providing instructions to a processor for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media and includes without limitation random access memory (“RAM”), read only memory (“ROM”), and the like. Non-volatile media includes, for example, NVRAM, or magnetic or optical disks. Volatile media includes dynamic memory, such as main memory.
  • Computer-readable media include, for example, a floppy disk (including without limitation a Bernoulli cartridge, ZIP drive, and JAZ drive), a flexible disk, hard disk, magnetic tape or cassettes, or any other magnetic medium, magneto-optical medium, a digital video disk (such as CD-ROM), any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, a solid state medium like a memory card, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
  • a floppy disk including without limitation a Bernoulli cartridge, ZIP drive, and JAZ drive
  • a flexible disk including without limitation a Bernoulli cartridge, ZIP drive, and JAZ drive
  • hard disk hard disk
  • magnetic tape or cassettes or any other magnetic medium
  • magneto-optical medium such as CD-ROM
  • CD-ROM digital video disk
  • any other optical medium punch cards, paper
  • a digital file attachment to e-mail or other self-contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium.
  • the computer-readable media is configured as a database, it is to be understood that the database may be any type of database, such as relational, hierarchical, object-oriented, and/or the like. Accordingly, the disclosure is considered to include a tangible storage medium or distribution medium and prior art-recognized equivalents and successor media, in which the software implementations of the present disclosure are stored.
  • Computer-readable storage medium excludes transient storage media, particularly electrical, magnetic, electromagnetic, optical, magneto-optical signals.
  • Critical path method refers to an algorithm for scheduling a set of project activities.
  • CPM constructs a model of the project that includes the following: (a) a list of all activities required to complete the project (typically categorized within a work breakdown structure), (b) the time (duration) that each activity will take to completion, and (c) the dependencies between the activities. Using these values, CPM calculates the longest path of planned activities to the end of the project, and the earliest and latest that each activity can start and finish without making the project longer. This process determines which activities are “critical” (i.e., on the longest path) and which have “total float” (i.e., can be delayed without making the project longer).
  • a critical path is the sequence of project network activities which add up to the longest overall duration. This determines the shortest time possible to complete the project. Any delay of an activity on the critical path directly impacts the planned project completion date (i.e. there is no float on the critical path).
  • a project can have several, parallel, near critical paths. An additional parallel path through the network with the total durations shorter than the critical path is called a sub-critical or non-critical path.
  • a “database” is an organized collection of data held in a computer.
  • the data is typically organized to model relevant aspects of reality (for example, the availability of specific types of inventory), in a way that supports processes requiring this information (for example, finding a specified type of inventory).
  • the organization schema or model for the data can, for example, be hierarchical, network, relational, entity-relationship, object, document, XML, entity-attribute-value model, star schema, object-relational, associative, multidimensional, multivalue, semantic, and other database designs.
  • Database types include, for example, active, cloud, data warehouse, deductive, distributed, document-oriented, embedded, end-user, federated, graph, hypertext, hypermedia, in-memory, knowledge base, mobile, operational, parallel, probabilistic, real-time, spatial, temporal, terminology-oriented, and unstructured databases.
  • DBMSs Database management systems
  • a general-purpose database management system is a software system designed to allow the definition, creation, querying, update, and administration of databases.
  • Well-known DBMSs include MySQLTM, PostgreSQLTM, SQLiteTM, Microsoft SQL ServerTM Microsoft AccessTM, OracleTM, SAPTM, dBASETM, FoxProTM, and IBM DB2TM.
  • a database is not generally portable across different DBMS, but different DBMSs can inter-operate by using standards such as SQL and ODBC or JDBC to allow a single application to work with more than one database.
  • An “enterprise” refers to a business and/or governmental organization, such as a corporation, partnership, joint venture, agency, military branch, and the like.
  • ERP systems integrate internal and external management information across an entire organization, embracing finance/accounting, manufacturing, sales and service, customer relationship management, and the like. ERP systems automate this activity with an integrated software application.
  • the purpose of ERP is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders.
  • MPM Manufacturing process management
  • ERP/MRP which is used to plan the ordering of materials and other resources, set manufacturing schedules, and compile cost data.
  • a cornerstone of MPM is the central repository for the integration of all these tools and activities aids in the exploration of alternative production line scenarios; making assembly lines more efficient with the aim of reduced lead time to product launch, shorter product times and reduced work in progress (WIP) inventories as well as allowing rapid response to product or product changes.
  • MRP Manufacturing requirements planning
  • MRP is a production planning and inventory control system used to manage manufacturing processes. Most MRP systems are software-based. An MRP system is intended to simultaneously meet three objectives, namely ensure materials are available for production and products are available for delivery to customers, maintain the lowest possible material and product levels in store, and plan manufacturing activities, delivery schedules and purchasing activities.
  • Module refers to any known or later developed hardware, software, firmware, artificial intelligence, fuzzy logic, or combination of hardware and software that is capable of performing the functionality associated with that element. Also, while the disclosure is presented in terms of exemplary embodiments, it should be appreciated that individual aspects of the disclosure can be separately claimed.
  • OEM manufactures product or components that are purchased by another enterprise and retailed under that purchasing enterprise's brand name. OEM refers to an enterprise that originally manufactured the product. When referring to automotive parts for instance, OEM designates a replacement part made by the manufacturer of the original part.
  • Queueing theory refers to algorithms for characterizing or defining the behavior of queues. Queueing theory is generally considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide service.
  • a queueing model based on the Poisson process and its companion exponential probability distribution often meets these two requirements.
  • a Poisson process models random events (such as a customer arrival, a request for action from a web server, or the completion of the actions requested of a web server) as emanating from a memoryless process. That is, the length of the time interval from the current time to the occurrence of the next event does not depend upon the time of occurrence of the last event. In the Poisson probability distribution, the observer records the number of events that occur in a time interval of fixed length.
  • Stochastic scheduling algorithms refer to production scheduling and includes forward and/or backward scheduling. Forward scheduling is planning the tasks from the date resources become available to determine the shipping date or the due date. Backward scheduling is planning the tasks from the due date or required-by date to determine the start date and/or any changes in capacity required. Stochastic scheduling algorithms include economic lot scheduling problem (which is concerned with scheduling the production of several products on a single machine in order to minimize the total costs incurred (which include setup costs and inventory holding costs) and the economic production quantity model (which determines the quantity a enterprise and/or organization and/or retailer should order to minimize the total inventory costs by balancing the inventory holding cost and average fixed ordering cost).
  • heuristic algorithms include the modified due date scheduling heuristic (which assumes that the objective of the scheduling process is to minimize the total amount of time spent on tasks after their due dates) and shifting bottleneck heuristic (which minimize the time it takes to do work, or specifically, the makespan in a job shop, wherein the makespan is defined as the amount of time, from start to finish, to complete a set of multi-machine jobs where machine order is pre-set for each job, the jobs are assumed to be actually competing for the same resources (machines) resulting in one or more resources acting as a ‘bottleneck’ in the processing, whereby the heuristic, or ‘rule of thumb’ procedure substantially minimizes the effect of the bottleneck).
  • the modified due date scheduling heuristic which assumes that the objective of the scheduling process is to minimize the total amount of time spent on tasks after their due dates
  • shifting bottleneck heuristic which minimize the time it takes to do work, or specifically, the makespan in a job shop, wherein the makespan is defined as the amount of
  • a “server” is a computational system (e.g., having both software and suitable computer hardware) to respond to requests across a computer network to provide, or assist in providing, a network service.
  • Servers can be run on a dedicated computer, which is also often referred to as “the server”, but many networked computers are capable of hosting servers.
  • a computer can provide several services and have several servers running.
  • Servers commonly operate within a client-server architecture, in which servers are computer programs running to serve the requests of other programs, namely the clients. The clients typically connect to the server through the network but may run on the same computer.
  • IP Internet Protocol
  • a server is often a program that operates as a socket listener.
  • An alternative model, the peer-to-peer networking module enables all computers to act as either a server or client, as needed. Servers often provide essential services across a network, either to private users inside a large organization or to public users via the Internet.
  • Simulation modeling refers both to discrete and continuous simulations.
  • Discrete simulations are also known as discrete event simulations, and are event-based dynamic stochastic systems.
  • the system contains a number of states, and is modeled using a set of variables. If the value of a variable changes, this represents an event, and is reflected in a change in the system's state.
  • the system is dynamic, it is constantly changing, and because it is stochastic, there is an element of randomness in the system.
  • Representation of discrete simulations is performed using state equations that contain all the variables influencing the system.
  • Continuous simulations also contain state variables; these however change continuously with time. Continuous simulations are usually modeled using differential equations that track the state of the system with reference to time.
  • the simulation's output data will only produce a likely estimate of real-world events.
  • Methods to increase the accuracy of output data include: repeatedly performing simulations and comparing results, dividing events into batches and processing them individually, and checking that the results of simulations conducted in adjacent time periods “connect” to produce a coherent holistic view of the system.
  • Normal analytical techniques make use of extensive mathematical models which require assumptions and restrictions to be placed on the model. This can result in an avoidable inaccuracy in the output data. Simulations avoid placing restrictions on the system and also take random processes into account; in fact in some cases simulation is the only practical modeling technique applicable.
  • Transfer Function (also known as the system function or network function) is a mathematical representation, in terms of spatial or temporal frequency, of the relation between the input and output of a linear time-invariant system with zero initial conditions and zero-point equilibrium. Transfer functions are commonly used in the analysis of systems such as single-input single-output filters. The term is often used to refer to linear, time-invariant systems (LTI). Most real systems have non-linear input/output characteristics, but many systems, when operated within nominal parameters (not “over-driven”) have behavior that is close enough to linear that LTI system theory is an acceptable representation of the input/output behavior. While any LTI system can be described by some transfer function or another, there are certain families of special transfer functions that are commonly used.
  • Typical infinite impulse response filters are designed to implement one of these special transfer functions.
  • Some common transfer function families and their particular characteristics are: Butterfield filter—maximally flat in passband and stopband for the given order; Chebyshev filter (Type I)—maximally flat in stopband, sharper cutoff than Butterworth of same order; Chebyshev filter (Type II)—maximally flat in passband, sharper cutoff than Butterworth of same order; Bessel filter—best pulse response for a given order because it has no group delay ripple; Elliptic filter—sharpest cutoff (narrowest transition between pass band and stop band) for the given order; Optimum “L” filter; Gaussian filter—minimum group delay and gives no overshoot to a step function; Hourglass filter; and Raised-cosine filter.
  • Transport theory refers to the study of optimal transportation and allocation of resources. The transportation problem as it is stated in modern or more technical literature looks somewhat different because of the development of Riemannian geometry and measure theory. Examples of transportation theory functions or principals include Wassertein metric, transport function, and the Hungarian algorithm.
  • FIG. 1 is a block diagram of an exemplary three-dimensional supply chain
  • FIG. 2 is a block diagram of an exemplary supply chain management system
  • FIG. 3 is a block diagram of an exemplary tier 1 control tower
  • FIG. 4 is a flow chart of an exemplary data collection module
  • FIG. 5 is a flow chart of an exemplary scheduling module
  • FIG. 6 is a flow chart of an exemplary analytical engine
  • FIG. 7 is a flow chart of an exemplary risk manager
  • FIG. 8 is a block diagram of an exemplary supply chain management system
  • FIG. 9 is a flow chart of an exemplary security module
  • FIG. 10 is a flow chart of an exemplary pricing monitoring module
  • FIG. 11 depicts a screenshot according to an embodiment
  • FIG. 12 depicts a screenshot according to an embodiment
  • FIG. 13 depicts a screenshot according to an embodiment
  • FIG. 14 depicts a screenshot according to an embodiment
  • FIG. 15 depicts a screenshot according to an embodiment
  • FIG. 16 depicts a screenshot according to an embodiment.
  • the tier 1 control tower supply chain management system will be discussed with reference to FIG. 1 .
  • parts and components are made from materials and/or other parts and components, and products are made from material, parts, and/or components.
  • Materials are generally considered to be raw materials, or crude or processed materials or substances.
  • a tier 1 control tower 100 in a brand level, typically corresponds to a retail and/or wholesale vendor, supplier, distributor, or other business that provides its branded products to end users. These businesses typically invest in research and development, product design, marketing, and brand development. Examples include AppleTM, AmazonTM, Cisco Systems, Inc.TM, and Microsoft CorporationTM.
  • the control tower 100 monitors (and collects information regarding) the product distribution chain, product inventory levels, product demand, and/or prices of competitive products and, based on the collected information and product demand and price projections, dictates to second tier partners, prices, supply requirements, and other material terms, and accesses performance information of such second and third tier partners to monitor supply chain performance.
  • a tier 2 product assembler 104 in an integration level, assembles parts and/or components received from tier 3 part and/or component manufacturers into products, which are shipped to the tier 1 vendor, supplier, distributor, or other business for sale.
  • An OEM is an example of a Tier 2 product assembler 104 .
  • Tier 2 product assembler(s) 104 provide, to the tier 1 control tower 100 , its respective performance information and performance information received from tier 3 part and/or component manufacturers.
  • the first, second, . . . nth tier 3 part and/or component manufacturers 108 a - n at the device level, manufacture parts and/or components for assembly by the tier 2 product assembler 104 into products.
  • the first, second, . . . nth tier 3 part and/or component manufacturers 108 a - n provide, to the tier 2 product assembler 104 , its respective performance information and performance information received from tier 4 material suppliers.
  • the first, second, third, . . . mth tier 4 material suppliers 112 a - m at the raw material level, manufacture and supply to the first, second, . . . nth their 3 part and/or component manufacturers 108 a - n materials for use in manufacturing components.
  • the first, second, third, . . . mth tier 4 material suppliers 112 a - m provide, to the tier 3 part and/or component manufacturers, its respective performance information.
  • Each of the tier 1 control tower 100 , tier 2 product assembler 104 , first, second, third, . . . nth tier 3 part and/or component manufacturer, and first, second, third, . . . mth tier 4 material suppliers 112 a - m correspond to an enterprise and/or organization, which may or may not be related to or affiliated with another enterprise and/or organization in the supply chain of FIG. 1 .
  • air, land, and sea logistics providers such as FedEx, UPS, DHL, other trucking companies, other air freight companies, and other ocean freight carriers, link the various tier partners with an integrated network of air, sea, and ground capabilities to enable effective movement of materials, components, and products from sources to destinations.
  • “Performance information” typically includes any information relative to supply chain performance, including, without limitation, one or more of manufactured item output projections over a specified time period, production facility sizes and/or locations, raw material, work-in-process, and/or manufactured part, component, and/or product inventory levels, order cycle times, days of supply in inventory, manufacturing resource type, availability, reliability, and/or productivity (e.g., human and automated resource levels and resulting output levels), unit operations (e.g., manufacturing steps, functions, or operations, unloading raw materials, packaging parts, components, and/or products, loading parts, components, and/or products, and the like), financial factors (e.g., labor rates and costs, energy rates and costs, raw materials costs, freight costs, tax rates, administrative and overhead costs, contractual and/or current spot market part, component, and/or product prices (from lower tier components), and the like), number of on time shipments, number of late shipments, order mismatch count, service quality (e.g., repair returns, repeat repair, no fault found, etc.), repair
  • the performance information can be associated with a date, month, and/or season-of-year. Metrics can be generated from the performance information, such as on time shipment rate or percentage, late shipment rate or percentage, product rejection rate based on nonconformance with one or more restrictions, specifications, and/or requirements, parts, components, and/or product acceptance rate based on conformance with one or more restrictions, specifications, and/or requirements, and the like.
  • FIG. 2 depicts a communications networked architecture 200 according to an embodiment.
  • the tier 1 control tower 100 comprises a tier 1 control tower server 204 and associated database management system (not shown) and database 208 .
  • the tier 1 control tower server 204 can be any computerized process that shares a resource with one or more client processes. It may run one or more services (typically as a host), to service the needs of other computers on the network. Typically, the tier 1 control tower server 204 is a computer program running to serve the requests of other programs.
  • the database 208 can be any organized collection of data and their supporting data structures.
  • the database can be based on any data model, including the relational model, entity-relationship model, object model, object relational model, XML, or other database model.
  • the database 204 can include, for each enterprise and/or organization in the supply chain, not only performance information but also transactional documents (e.g., purchase order, material safety data sheets, bill of materials, supply and/or manufacturing agreements, or RMAs, and the like), name, geographical location, geopolitical location, part and/or component and/or product and/or material type and/or identity supplied by the enterprise and/or organization, current spot market and/or contractual sales price of the part and/or component and/or product and/or material type supplied by the enterprise and/or organization, respective performance metrics of the enterprise and/or organization, part and/or component and/or product and/or material supply and/or purchase commitment with another enterprise and/or organization in the supply chain, specifications and requirements for part(s) and/or component(s) and
  • Each enterprise and/or organization is normally assigned a role identifier, such as buyer, seller, supplier, manufacturer, material supplier, and the like, to describe the nature of the relationship of the enterprise and/or organization to each of the associated enterprise(s) and/or organization(s) in the supply chain.
  • role identifier such as buyer, seller, supplier, manufacturer, material supplier, and the like
  • the tier 2 assembler has a corresponding server 212 to provide performance and other information, directly or indirectly, to the tier 1 control tower server 204 .
  • Each of the first, second, . . . nh tier 3 part/component manufacturers has a corresponding server 216 a - n to provide performance and other information, directly or indirectly, to the tier 1 control tower server 204 .
  • Each of the first, second, third, . . . mth tier 4 material suppliers has a corresponding server 220 a - m to provide performance and other information, directly or indirectly, to the tier 1 control tower server 204 .
  • the shipment enterprise and/or organization server 250 represents the freight enterprises or organizations handling shipments between nodes of the supply chain.
  • the freight enterprises and organizations can be any entity providing shipping services.
  • Exemplary freight enterprises and organizations include railway companies, short and long haul trucking companies, freight company servers (to provide freight tracking information, freight movement projections between two locations, and the like), shipping lines, maritime shipping companies, container shipping companies, Ro-ro shipping companies, transoceanic shipping companies, logistics services or courier companies, and the like.
  • the shipment enterprise and/or organization server 250 can provide to the tier 1 control tower server 204 provide freight tracking information, freight movement projections between two locations, and the like.
  • the accessible information source(s) 224 include any source of information relevant to supply chain performance, including, without limitation, news sources and/or aggregators (to provide news on current events that may impact positively or negatively the supply chain performance, such as political coup d'etates, changes or upheavals, environmental conditions and events (e.g., storms, floods, earthquakes, tsunamis, typhoons, volcanic eruptions, forest fires, and other natural disasters, and the like), criminal acts (e.g., piracy, hijacking, theft, arson, vandalism, and the like), acts of violence (e.g., terrorism, war, political upheaval, military action, and the like), news reports on and announcements by a partner or competitor, scheduled events or holidays (e.g., religious, political, or other holidays), freight disruptions (e.g., train derailment, oceangoing vessel sinking, airplane crash, freight embargos, naval blockades, and the like), energy shortages, disruptions, or blackouts,
  • Such information sources can be monitored using word cloud techniques, which graphically represent word usage frequency. Generally, the more frequent a word or group of words is used the greater the likelihood that the fact or event described by the words or group of words exists.
  • the words or group of words can further be weighted for reliability by the source, with law enforcement and military authorities being given a higher or more reliable weighting than news sources.
  • the various servers and sources are connected by a circuit and/or packet switched wide area network (“WAN”) that covers a broad area (e.g., any telecommunications network that links across metropolitan, regional, or national boundaries) using private and/or public network transports.
  • WAN wide area network
  • An exemplary WAN is the Internet.
  • FIG. 3 depicts an example of a supply chain monitoring system 302 maintained by the tier 1 control tower 100 .
  • the supply chain monitoring system can be maintained by any one of the tier 1, 2, 3, and/or 4 entities or an entity independent of the foregoing.
  • the supply chain monitoring system 302 includes a data collection module 300 , a scheduling module 304 , a historical state module 308 , an analytical engine 312 , a risk manager 316 , and a reporting module 320 , connected by a local area network or bus 324 .
  • the data collection module 300 collects performance information from tier 2, 3, and/or 4 entities and freight companies in the supply chain and from accessible information source(s) 224 . It further collects information regarding product inventory levels currently on hand at the tier 1 control tower. The data collection module 300 can parse the collected information, extract relevant information items, and optionally tag the extracted information items with an information type tag. The data collection module 300 can include a database management function that stores, updates and otherwise manages the data in the database 208 in accordance with a selected data model.
  • the data structures are typically associated with one or more enterprises and/or organizations in the supply chain.
  • Transactional documents such as purchase orders, material safety data sheets, and bills of material, contain references to all owners down the organization level, have corresponding role types and functions specified (e.g., only a buyerRole can change requestQuantity field), and include preferences and settings referenced to an appropriate level (e.g., enterprise, organization (or the part of the enterprise involved in the supply chain transaction), user, etc.).
  • an appropriate level e.g., enterprise, organization (or the part of the enterprise involved in the supply chain transaction), user, etc.
  • Events stored in the database 208 typically include event category, event type, event subtype and event severity tags.
  • Event categories include, for example, natural disaster (e.g., natural disaster event and wherein the natural disaster is one or more of an earthquake, tsunami, volcanic eruption, fire, flood, avalanche, and landslide), weather (e.g., storm, typhoon, hurricane, cyclone, tornado, wind, and blizzard), political (e.g., coup d'etat, sabotage, terrorism, act of war, military action, police action, embargo, and blockade), and business (e.g., a maritime vessel sinking, train derailment, freight vehicle wreck, device or system malfunction, criminal activity, airplane crash, labor disruption, lawsuit, financial insolvency, and bankruptcy).
  • natural disaster e.g., natural disaster event and wherein the natural disaster is one or more of an earthquake, tsunami, volcanic eruption, fire, flood, avalanche, and landslide
  • weather e.g., storm
  • Event types include, for example, geologic event, atmospheric event, geo-political, labor, and insolvency.
  • Event subtypes include, for geologic, earthquake, volcanic eruption, tsunami, flood, and landslide; for atmospheric, storm, hurricane, cyclone, tornado, wind, and blizzard; for geo-political coup d'etates, sabotage, terrorism, and piracy; for labor, strike; and for insolvency, bankruptcy.
  • the severity tag can include one or more of emergency, advisory, watch, and warning. Other tags will be obvious to those of ordinary skill in the art based on the teachings of this disclosure.
  • a start and end time can be associated with the temporal impact of the event on the supply chain.
  • the collected information generally falls into two categories, namely static supply chain information (information items that generally do not change or change infrequently such as sites, enterprise and/or organization names, and the like) and dynamic supply chain data (information items that change frequently such as purchase orders, forecasts, and the like).
  • the scheduling module 304 provides scheduling information, including projected shipment arrival dates for products from the tier 2 product assembler 104 and required shipment departure dates for branded products to customers, wholesalers, and/or retailers.
  • Each of the shipment arrival and departure dates can be linked to a set of data structures describing the shipment, including shipment source and destination, freight carrier, freight tracking information, current shipment status, shipment contents (by product type and number), date of shipment, and the like).
  • the projected shipment arrival dates can be received from the tier 2 product assembler 104 and/or freight carrier.
  • the shipment departure dates are determined by the tier 1 control tower based on contractual requirements, retailer and/or wholesaler current or projected inventory levels, retainer and/or wholesaler order, and the like.
  • the historical state module 308 tracks past performance for each entity and/or entity facility in the tier 2-4 and freight carriers (e.g., compares the actual product shipment arrival date against a selected date (received from the entity, required by contract or order, and/or projected by the tier 1 control tower 100 )) and distribution chain demands (to identity seasonal trends).
  • the past performance for an entity can be used to determine and assign a level of confidence in product deliveries from the entity being received by a selected date (received from the entity, required by contract or order, and/or projected by the tier 1 control tower 100 ).
  • the level of confidence when low, may provide a basis to order additional product from a more reliable source.
  • the level of confidence can be based on past performance of each supplier or each different facility of a common supplier.
  • the analytical engine 312 receives performance and other data from the data collection module 300 , scheduling information from the scheduling module 304 , and historical information (such as a level of confidence) from the historical state module 308 and, based on the information, forecasts incoming shipment arrival times and outgoing shipment departure times and identifies any inability to meet distribution chain requirements, commitments or objectives (e.g., orders, contractual commitments, policies, objectives, etc.) (a “noncompliant event”). This information is provided, by the analytical engine 312 to the risk manager 316 .
  • the analytical engine 312 can be a type of situational awareness application that looks at aspects of the current state of the supply chain as well as the structural relationships and considers the effect of both internal and external events on the supply chain. Both past events and forecasted events can be considered by the analytical engine 312 .
  • the application can determine not only what happened to the supply chain but also what may happen to the supply chain, thereby providing not only a reactive but also proactive model for problem resolution.
  • the analytical engine 312 relies primarily on reported performance information received from tier 2 assembler(s) 212 , tier 3 component manufacturer(s), tier 4 raw material supplier(s) and/or freight carrier(s) in estimating compliance with product distribution chain requirements. Disruptive events received from an accessible information source 224 are used as the basis of a query to the potentially impacted tier 2 assembler(s) 212 , tier 3 part/component manufacturer(s), tier 4 material supplier(s) and/or freight carrier(s) for updated performance information.
  • the query may be generated automatically or manually by tier 1 management.
  • the analytical engine 312 determines, based on performance information received from the historical state module 308 , a performance rating for each enterprise and/or organization in the supply chain.
  • the performance rating can be based on a scale from lowest performance level to highest performance level.
  • the analytical engine 312 relies not only on reported performance information but also internally generated projections in estimating compliance with distribution chain requirements.
  • the compliance determination is based one or more comparisons, including a comparison of the material and/or part and/or component and/or product shipment delivery date based on the reported performance information against the material and/or part and/or component and/or product distribution chain shipment requirement(s) (as in the prior paragraph), a comparison of the material and/or part and/or component and/or product shipment delivery date based on the reported performance information against the internally generated projected material and/or part and/or component and/or product shipment delivery date, and a comparison of the material and/or part and/or component and/or product shipment delivery date based on the reported performance information against the internally generated projected material and/or part and/or component and/or product shipment delivery date.
  • the estimated or projected delivery date for an order can include an associated probability or likelihood and, optionally, an associated range of arrival dates that the items in the order will be timely received by the selected arrival date or within the range of arrival dates.
  • the range of arrival dates can be selected using a standard deviation of arrival times based on current and/or historic performance information and/or other relevant information. For example, a historic reliability or probability of timely receipt at a destination facility from the selected lower tier facility, and optionally associated standard deviation of historic receipt dates relative to a target date, can be used to provide the probability and optionally standard deviation of the destination facility receiving a current shipment from the selected lower tier facility.
  • the probability and/or standard deviation can be used by the risk manager to determine whether or not to order additional material and/or part and/or component and/or product from an alternate facility. This determination can use a probability threshold, for instance, that would require or recommend order placement to an alternative facility if the probability of the order timely arriving is too low or no order placement to the alternative facility if the probability of the order timely arriving is acceptable (e.g., exceeds the probability threshold).
  • the probability could be the sum or other mathematical combination of probabilities for each upstream facility in lower tiers in a direct or indirect supply relationship with a selected facility. For example, if a third part/component manufacturing facility in tier 3 has a 50% probability of receiving timely raw material from a fourth and/or alternative facility in tier 4, a second product manufacturing facility or assembler in tier 2 has a 50% probability of receiving timely a necessary product part and/or component from the third facility and/or an alternative tier 3 facility, and the first facility in tier 1 has a 25% probability of receiving the product timely.
  • the probability of a third tier 1 facility receiving the product timely from the selected product manufacturing or assembling facility is the lower of the two or 25%.
  • a number of algorithms may be used in generating the internal estimates.
  • CPM critical path method
  • CPM constructs a model, at each supply chain facility and/or manufacturer, supplier, and/or assembler and/or for the overall supply chain, that includes one or more of the following: (a) a list of all activities required to deliver the product shipment to the tier 1 control tower, (b) the time (duration) that each activity or operation in the supply chain will take to completion, and (c) the dependencies between the activities. Using these values, CPM calculates the longest path of planned activities to the end of the product delivery cycle, and the earliest and latest that each activity can start and finish without making the product delivery cycle longer.
  • a critical path is the sequence of supply chain network activities which add up to the longest overall duration. This determines the shortest time possible to complete the product delivery cycle. Any delay of an activity on the critical path directly impacts the planned product delivery cycle completion date (i.e. there is no float on the critical path).
  • a product delivery cycle can have several, parallel, near critical paths. An additional parallel path through the network with the total durations shorter than the critical path is called a sub-critical or non-critical path.
  • queueing theory is generally considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide service.
  • the queueing model can be based on a Poisson process and its companion exponential probability distribution.
  • a Poisson process models random or pseudo-random events (such as a work piece arrival from a lower tier partner, a supply chain disruptive event, or the completion of an action requested of a resource over which the servicing tier has no control) as emanating from a memoryless process.
  • the length of the time interval from the current time to the occurrence of the next event does not depend upon the time of occurrence of the last event.
  • the observer records the number of events that occur in a time interval of fixed length.
  • the observer records the length of the time interval between consecutive events.
  • the underlying physical process is memoryless. Examples of queueing theory functions or principals include BCMP network, Buzen's algorithm, Ehrenfest model, fork join queue, Gordon-Newell network, Jackson network, Little's law, Markovian arrival processes, Pollaczek-Khinchine formula, quasireversibility, random early detection, renewal theory, the Poisson process, and the like.
  • Models based on the Poisson process often respond to inputs from the environment in a manner that mimics the response of the system being modeled to those same inputs.
  • the analytically tractable models that result yield both information about the system being modeled and the form of their solution.
  • Even a queueing model based on the Poisson process that does a relatively poor job of mimicking detailed system performance can be useful.
  • the fact that such models often give “worst-case” scenario product cycle evaluations can support the risk manager including a safety factor in supply chain changes and modifications, including product delivery requirements. Queueing models are frequently modeled as Poisson processes through the use of an exponential distribution.
  • One algorithm is a scheduling algorithm, which considers product production scheduling and shipping and includes forward and/or backward scheduling.
  • Forward scheduling is planning the tasks from the date resources become available to determine the shipping date or the due date.
  • Backward scheduling is planning the tasks from the due date or required-by date to determine the start date and/or any changes in capacity required.
  • Stochastic scheduling algorithms can include economic lot scheduling problem (which is concerned with scheduling the production of several products on a single machine in order to minimize substantially the total costs incurred (which include setup costs and inventory holding costs) and the economic production quantity model (which determines the quantity a enterprise and/or organization and/or retailer should order to minimize the total inventory costs by balancing the inventory holding cost and average fixed ordering cost).
  • heuristic algorithms include the modified due date scheduling heuristic (which assumes that the objective of the scheduling process is to minimize substantially the total amount of time spent on tasks after their due dates) and shifting bottleneck heuristic (which minimize the time it takes to do work, or specifically, the makespan in a job shop, wherein the makespan is defined as the amount of time, from start to finish, to complete a set of multi-machine jobs where machine order is pre-set for each job, the jobs are assumed to be actually competing for the same resources (machines) resulting in one or more resources acting as a ‘bottleneck’ in the processing, whereby the heuristic, or ‘rule of thumb’ procedure substantially minimizes the effect of the bottleneck).
  • the modified due date scheduling heuristic which assumes that the objective of the scheduling process is to minimize substantially the total amount of time spent on tasks after their due dates
  • shifting bottleneck heuristic which minimize the time it takes to do work, or specifically, the makespan in a job shop, wherein the makespan is defined as the
  • Discrete simulations are also known as discrete event simulations, and are event-based dynamic stochastic systems.
  • the system, or supply chain contains a number of states, and is modeled using a set of variables. If the value of a variable changes, this represents an event, and is reflected in a change in the system's state.
  • the system is dynamic, it is constantly changing, and because it is stochastic, there is an element of randomness in the system.
  • Representation of discrete simulations is performed using state equations that contain all the variables influencing the system or supply chain. Continuous simulations also contain state variables; these however change continuously with time.
  • Continuous simulations are usually modeled using differential equations that track the state of the system, or supply chain, with reference to time.
  • the simulation's output data will only produce a likely estimate of real-world events (i.e., product shipment delivery).
  • Methods to increase the accuracy of output data include: repeatedly performing simulations and comparing results, dividing events into batches and processing them individually, and checking that the results of simulations conducted in adjacent time periods “connect” to produce a coherent holistic view of the system.
  • Normal analytical techniques make use of extensive mathematical models which require assumptions and restrictions to be placed on the model. This can result in an avoidable inaccuracy in the output data. Simulations avoid placing restrictions on the system and also take random processes into account; in fact in some cases simulation is the only practical modeling technique applicable.
  • the analytical engine 312 can use pattern or template matching to determine internal estimates.
  • the patterns or templates can be based on historical data patterns and observed shipment times and/or on patterns or templates predetermined or predefined by system administrators.
  • the analytical engine 312 can search by one or more of the time, location and setting. For example, for an earthquake in Asia having a specified severity level, the analytical engine 312 can search for other earthquake events in Asia over the last three years having a similar severity level and determine the actual shipment times and/or administrator shipping estimates or projections made for the currently selected or other supply chain to determine a current estimate or projection.
  • the analytical engine 312 can detect unreported events by identifying unexpected varations in collected performance information. For example, where one or more selected nodes of the supply chain experience a sudden drop in rate of on-time shipments or rise in rate of late shipments and the drop is sustained over a selected period, the analytical engine 312 can deduce that a disruptive event has occurred. The possibility of an occurrence of an unreported disruptive event can be reported to a system or supply chain enterprise and/or organization administrator. Likewise, the severity of an event and/or shipment projections can be changed and rendered more accurate by observing actual behavior following creation of the event or estimate or projection. This information can also be used to refine temporally proximate estimates or projections.
  • the analytical engine 312 and risk manager 316 can use other variables and/or algorithms to determine the relative health of the supply chain.
  • the analytical engine 312 can employ a metric—CpX, which can be a measure of risk and capable of substantially optimizing the supply chain.
  • the metric can be determined through the collection, aggregation, and transformation of supply chain data, including performance information, and, when optimized, can modify system parameters of the logistic or supply chain system to reduce and/or optimize risk profiles for any selected supply chain parameter or object, typically a given product, a selected product line, and/or a customer account.
  • Risk can be determined given a time series of data collected by the data collection module. This data can be presented either as a first linear array (1 ⁇ N) where N is the number of factors collected.
  • the factors can include one or more of the factors, parameters, or supply chain characteristics identified herein.
  • the factors can include risk factors, such as economic risk, environmental risk, geopolitical risk, societal risk, and technological risk.
  • a transfer function (N ⁇ M) can relate the collection of such (risk) factors to variability (risk) of critical factors, (be they cost, time to delivery, the same or another risk factor, etc.), which is the (1 ⁇ M) linear array.
  • the (1 ⁇ N) linear array can also be transformed into a single number or factor or given a coloration indicative of an “overall” metric of risk (variability).
  • the overall metric of risk can be a supply chain health index or risk.
  • the transfer function (N ⁇ M) can be substantially optimized—and it can represent the operational parameters of the supply chain (for better or worse).
  • risk protection can be set, configured, or determined at various levels by setting the scalar (high, medium, low) and changing the various offerings to meet the customer need—as some customers can deal with risk better than others).
  • a multitude or plurality of transfer functions can be determined, particularly where state or situational differences exist among one or more of business segments, product portfolios, customers profiles, etc.
  • the 1 ⁇ M (minimum) linear array would likely be different, as would the substantially optimal 1 ⁇ N linear array.
  • the risk manager 316 applies a rule or policy set or template to the information or output received from the analytical engine 312 and provides reporting information to the reporting module 320 for presentation to a (human) manager.
  • the reporting information may include not only a warning (with an associated probability and/or level of confidence) that a noncompliant event will occur and optionally a recommendation on how to mitigate and/or avoid the noncompliant event.
  • Mitigation recommendations include, for example, ordering products from a different facility of the tier 2 product assembler 104 and/or from a different tier 2 product assembler 104 , using a type of freight company or specific freight company to provide faster incoming and/or outgoing product shipment, cancelling or altering an existing order (e.g., increase or decrease product quantity and/or delay or expedite product shipment date) with a tier 2 product assembler 104 and/or downstream distribution chain entity, shipping product from a different tier 1 facility to the selected destination in the distribution chain to offset the noncompliant event, and ship a different product to the selected destination in the distribution chain to offset the noncompliant event.
  • the recommendation can be performed automatically by the risk manager 316 .
  • the risk manager 316 can identify problems or choke points or bottlenecks in the supply chain, generate alerts and/or notifications to administrators of predetermined events (such as a monitored parameter falling below or exceeding a selected threshold), and/or provide recommended changes to the supply chain to provide greater reliability, more reliable and faster material and/or part and/or component and/or product manufacture and delivery cycles, more material turns, and reduced waste.
  • the risk manager 316 at the tier 1 control tower 100 can do this, for example, by analyzing the reported performance information using advanced planning and scheduling techniques by which raw materials and production capacity are optimally allocated to meet demand.
  • Recommendations could include restructuring tier 1, 2, 3 and 4 relationships, using differently located facilities for lesser or greater production, using different freight modes and/or carriers, and reconfiguring the layout and/or production unit operations within a selected facility.
  • a performance risk can be associated with each recommendation based on factors, such as performance rating, geographic location of the recommended enterprise and/or organization relative to the geographic locations of the upstream enterprise and/or organization (if any) supplying the recommended enterprise and/or organization and of the downstream enterprise and/or organization (if any) receiving material and/or product from the recommended enterprise and/or organization, and/or the likelihood of a disruptive event impacting the recommended enterprise and/or organization and/or a shipment line associated therewith.
  • the risk manager 316 can determine a possible or potential financial impact on the enterprise or organization associated with each recommendation or, in the absence of any action, simply as a result of the event.
  • the possible or potential financial impact can be done on one or more affected product lines and/or for the enterprise or organization as a whole.
  • a risk or probability can be assigned to each possible or potential financial impact to form a type of risk portfolio.
  • Pricing input from a price monitoring module can assist in determining product price increases as a result of the event. Decreases in demand for the product can be projected based on the price increase. The decreased demand can then be converted into a projected gross sales revenue to be used in the financial forecast.
  • the possible or potential financial impact can be determined for an instance of an event or proactively if a selected event were to occur. Electronic manufacturing services, in particular, would benefit from this type of financial impact analysis.
  • the risk manager 316 can apply manufacturing process management or MPM and/or enterprise resource planning (“ERP”) and/or materials requirement planning (“MRP”) techniques.
  • MPM is a collection of technologies and methods used to define how products are to be manufactured. MPM differs from ERP/MRP, which is used to plan the ordering of materials and other resources, set manufacturing schedules, and compile cost data. MPM can provide the central repository for the integration of all these tools and activities and aid in the exploration of alternative production line or sequence or cycle scenarios; making assembly lines more efficient with the aim of reduced lead time to product launch, shorter product times and reduced work in progress (WIP) inventories as well as allowing rapid response to product or product changes.
  • WIP work in progress
  • the risk manager can use scheduling algorithms to determine and/or identify recommended changes to the supply chain.
  • the risk manager can use pattern or template matching to determine and/or identify recommended changes to the supply chain.
  • the patterns or templates can be based on historical data patterns and observed administrator responses and/or on patterns or templates predetermined or predefined by system administrators.
  • the risk manager can search by one or more of the time, location and setting. For example, for an earthquake in Asia having a specified severity level, the risk manager can search for other earthquake events in Asia within the last three years having a similar severity level and determine the changes to the currently selected or other supply chain to determine a currently recommended set of changes.
  • the risk manager can use simulation modeling to determine and/or identify recommended changes to the supply chain.
  • the risk manager can use transportation theory to determine the optimal transportation and/or allocation of supply chain resources.
  • transportation theory functions or principals include Wassertein metric, transport function, and the Hungarian algorithm.
  • the risk manager can use capacity planning, which is the process of determining the production capacity needed by the supply chain to meet changing demands for the branded products.
  • capacity planning is the process of determining the production capacity needed by the supply chain to meet changing demands for the branded products.
  • design capacity is the maximum amount of work that the supply chain is capable of completing in a given period
  • effective capacity is the maximum amount of work that the supply chain is capable of completing in a given period due to constraints such as quality problems, delays, material handling, etc.
  • the risk manager can intelligently relate the geographical location of each facility in each tier with a partner facility in a higher tier and/or the relative shipping costs and/or standard deviation thereof from a facility in one tier to a partner facility in a higher tier and control relationships to reduce or substantially minimize transportation costs.
  • This mapping which can be in the form of a unit shipping cost from each facility in a lower tier to each facility in the adjacent higher tier, can also be used to intelligently order materials and/or components and/or products from a lower tier facility to an upper tier facility experiencing a supply constraint so as to maintain lower transportation or shipping costs.
  • the risk manager can intelligently relate the geographical location of each facility in each tier with a partner facility in a higher tier and/or the relative shipping time and/or standard deviation thereof from a facility in one tier to a partner facility in a higher tier and control relationships to reduce or substantially minimize transportation time.
  • This mapping which can be in the form of a shipping time from a point of loading at each facility in a lower tier to arrival at each facility in the adjacent higher tier, can also be used to intelligently order materials and/or components and/or products from a lower tier facility to an upper tier facility experiencing a supply constraint so as to maintain lower transportation or shipping times to substantially minimize disruptions in the distribution chain.
  • the risk manager can intelligently relate the rate of turnover or unit manufacturing time and standard deviation thereof from time of receipt of an order for a manufactured item to the time of shipping of the manufactured item for each facility in each tier, optionally associated with a shipping time required to ship the manufactured item to a partner facility in a higher tier and/or standard deviation thereof and control relationships to reduce or substantially minimize unit product manufacturing time.
  • This mapping can also be used to intelligently order materials and/or components and/or products from a lower tier facility to an upper tier facility experiencing a supply constraint so as to maintain lower product manufacturing and transportation or shipping times to substantially minimize disruptions in the distribution chain.
  • the risk manager can intelligently relate the unit manufacturing cost, or price, of material and/or component and/or product and/or standard deviation thereof from each facility in each tier and optionally unit shipping costs from the facility in a lower tier to a partner facility in a higher tier and/or standard deviation thereof, and control supply and facility relationships to reduce or substantially minimize unit costs and/or prices at the lower tier facility or as delivered at the destination partner facility in the adjacent higher tier.
  • This mapping which can be in the form of a unit cost or price, optionally unit shipping cost from each facility in a lower tier to each facility in the adjacent higher tier, and total unit cost or price as delivered, can be used to intelligently order materials and/or components and/or products from a lower tier facility to an adjacent upper tier facility so as to maintain lower transportation or shipping costs.
  • each facility can have, in the adjacent lower tier and adjacent higher tier, order of partner facility preferences in the event of a need to order additional material and/or component and/or product to an upper tier facility experiencing a supply constraint so as to maintain lower unit costs and/or prices at the source facility and/or unit transportation or shipping costs and/or total unit costs and/or prices as delivered.
  • the risk manager can easily select a next preferred supplier and forward the order or unsatisfied portion of the order to the next preferred facility.
  • any of the other estimates or projections described herein can include a level of confidence or probability that the estimate or projection is true or false (as appropriate).
  • the reporting module 320 provides the reporting information to tier 1 management.
  • the reporting module 320 can not only provide reports containing performance information but also generate map displays.
  • FIGS. 11-17 are a series of screen shots demonstrating reporting information provided by the reporting module 320 .
  • the display 1700 shows locations of various supply chain nodes, including the tier 2 product assembler 104 , first, second, . . . nth tier 3 part/component manufacturers 108 a - n , and first, second, third, . . . mth tier 4 material suppliers 112 a - m .
  • Material and/or part and/or component and/or product shipment lines 1704 a - g between the various related nodes can be shown. Different colors or shades of a common color can be assigned to each shipment line to indicate on-time shipments, slightly delayed shipments, moderately delayed shipments, and heavily delayed shipments.
  • a disruptive event such as a weather event, earthquake event, business disruption event, geo-political event, and financial disruption event
  • a range of disruption 1712 is also assigned to the event indicating a likely spatial range impacted by the event.
  • different event types and events for a given event type can have differing assigned spatial ranges of disruption. For example, an earthquake may have a larger spatial range of disruption than a storm, and an 8.0 earthquake on the Richter scale would have a larger spatial range of disruption than a 5.5 earthquake on the Richter scale.
  • a range can be modeled by many techniques, such as by using a shape file.
  • relevant information about the node can include enterprise and/or organization name, materials and/or part and/or component and/or products supplied by the enterprise and/or organization, and one-hop related enterprises and/or organizations (e.g., the supplier to the selected node and the purchaser from the selected node).
  • Relevant information about the shipment line can include the name of the freight carrier, number, type, and value of material and/or part and/or component and/or product currently being shipped, and the current status of the shipment.
  • Relevant information for the event can include the event category, type and subtype and severity, number of materials and/or part and/or component and/or products impacted, number of downstream parts and/or components and/or products impacted (such as the parts and/or products supplied to the tier 2 product assembler 104 ), potential financial impact on the tier 1 control tower 100 , and number of supply chain sites affected.
  • the boxes in FIG. 16 show relevant shipment information including a number and value of products, parts, and/or components currently en route along the corresponding shipment line.
  • the reporting module provides a display 1100 showing a location 1104 and impacted range 1108 of an event (a 4.9 earthquake) and locations 1112 and descriptions 1116 of various enterprises and/or organizations in the supply chain, namely companies 1-4 with relevant information provided about each enterprise and/or organization (e.g., role, location, and products, parts, and/or components provided to the supply chain).
  • a box 1120 appears providing event information, including a description and location of the event, number of products impacted by the event, number of parts impacted by the event, potential financial impact of the event, and supply chain sites affected by the event.
  • a message 1124 is also provided at the upper part of the display 1100 indicating a number of events (e.g., 4) potentially impacting the supply chain at the present time.
  • the reporting module provides a display 1200 showing an administrator input box 1204 to provide event information to the data collection module.
  • the input box 1204 includes fields for event type 1208 , event subtype 1212 , event epicenter 1216 (which lets the administrator elect whether to have the data collection module locate the epicenter or provide latitude and longitude of the epicenter), country of epicenter location 1220 , postal code of epicenter location 1224 , radius impacted by the event 1226 , current risk (or severity) level 1228 , event expiration date and time 1232 , and event description 1236 .
  • the reporting module provides a display 1300 providing information about the impact of a selected event on the supply chain.
  • the display 1300 includes a picture 1304 showing the epicenter and impact radius of the event and supply chain sites affected within the impact radius, a description of the event 1308 , products potentially affected by the event 1312 , parts and/or components potentially affected by the event 1316 , and other potential supply chain impacts 1320 .
  • the reporting module provides a display 1400 showing events occurring over a selected time period.
  • Each event description 1404 shows event type, event date, event severity, number of products, parts, or components affected, and revenue impact on the selected enterprise and/or organization.
  • the reporting module provides a display 1500 showing a product, part, or component supplier description for a selected company (e.g., enterprise or organization).
  • the description includes a supplier risk category 1504 (e.g., low, moderate, and high) and the various factors used in developing the risk category. These factors are: supplier performance score 1508 (based on historical supplier performance information), supplier location score 1512 (the degree to which the supplier site location can positively or negatively impact supply chain performance), supplier financial score 1516 (the degree to which the supplier financial condition can positively or negatively impact supply chain performance), and supplier geo-political score 1520 (the degree to which the geo-political location of the supplier can positively or negatively impact supply chain performance).
  • supplier performance score 1508 based on historical supplier performance information
  • supplier location score 1512 the degree to which the supplier site location can positively or negatively impact supply chain performance
  • supplier financial score 1516 the degree to which the supplier financial condition can positively or negatively impact supply chain performance
  • supplier geo-political score 1520 the degree to which the geo-political location of the supplier can positively
  • the risk category is determined by the risk manager for each tier 1 control tower server 204 , tier 2 assembler server 212 , first, second, . . . nth tier 3 component manufacturer server 216 a - n , and first, second, third, . . . mth tier 4 material (e.g., part and/or component) supplier server 220 a - m , and the performance, location, financial, and geo-political scores are determined by the analytical engine, for each tier 1 control tower server 204 , tier 2 assembler server 212 , first, second, . . . nth tier 3 component manufacturer server 216 a - n , and first, second, third, . . .
  • the performance, location, financial, and geo-political scores can be assigned by the analytical engine and/or administrators.
  • the supplier risk category and performance, location, financial, and geo-political scores are not limited to suppliers but may be assigned not only to the tier 1 control tower 100 , tier 2 assembler 104 , first, second, . . . nth tier 3 component manufacturer 108 a - n , and first, second, third, . . . mth tier 4 material supplier 112 a - m but also freight carriers between and among two or more of the foregoing.
  • the data collection module 300 receives a stimulus.
  • Stimuli include, for example, a request from a tier 1 manager, reported performance information received from a lower tier partner, a request from the risk manager 316 and/or scheduling module 304 and/or analytical engine 312 , passage of time, and the like.
  • step 404 the data collection module 300 selects a (next) supply chain node to query for performance information.
  • step 408 the data collection module 300 accesses, or receives, the performance information.
  • the data collection module 300 determines whether there is a next supply chain node to be considered for performance information. If so, the data collection module 300 returns to step 404 . If not, the data collection module 300 returns to step 400 and awaits the next stimulus instance.
  • the scheduling module 304 receives a stimulus.
  • Stimuli include, for example, a request from a tier 1 manager, notification by the data collection module 300 of newly received and/or updated reported performance information, a request from the risk manager 316 and/or analytical engine 312 , passage of time, and the like.
  • the scheduling module 304 updates supply chain node-supplied scheduling information, or product delivery estimates, based on the reported performance information and/or the internally generated product delivery estimates.
  • the scheduling information includes, for example, projected shipment arrival dates for products from the tier 2 product assembler 104 and required shipment departure dates for branded products to customers, wholesalers, and/or retailers.
  • Each of the shipment arrival and departure dates can be linked to a set of data structures describing the shipment, including shipment source and destination, freight carrier, freight tracking information, current shipment status, shipment contents (by product type and number), date of shipment, and the like).
  • the scheduling module 304 updates the delivery commitment material and/or part and/or component and/or product scheduling information based on distribution chain performance or scheduling information, supply chain requirements, and/or projections.
  • the scheduling module 304 compares the results of steps 504 and 508 and determines whether there is a product delivery scheduling problem.
  • the scheduling module 304 in step 516 , notifies the risk manager.
  • the scheduling module 304 updates the database and returns to step 500 to await the next stimulus instance.
  • FIG. 7 depicts operation of the analytical engine.
  • the analytical engine Upon detection of stimulus in step 500 , the analytical engine, in step 600 , retrieves current performance data for each supply chain node.
  • step 604 the analytical engine, for each tier 1 supply chain node or facility, determines a likely product shipping and/or receipt date from each tier 2 node or facility.
  • step 608 the analytical engine, using the results of step 604 and other data, determines, for each tier 2 supply chain node, a likely component shipping and/or receipt date from each tier 3 node or facility.
  • step 612 the analytical engine, using the results of step 608 and other data, determines, for each tier 3 supply chain node, a likely component shipping and/or receipt date from each tier 4 node or facility.
  • the analytical engine 312 compares the results of steps 604 , 608 and 612 and determines whether there is a material and/or part and/or component and/or product delivery scheduling problem at any tier.
  • a material and/or part and/or component and/or product delivery scheduling problem is not limited to material and/or part and/or component and/or product delivery shortfalls relative to distribution chain demands or requirements.
  • a material and/or part and/or component and/or product delivery scheduling problem can also exist when too much product inventory is on hand at a tier 1 facility. In that event, supply chain requirements may need to be decreased to delay or reduce material and/or part and/or component and/or product delivery.
  • This determination can be made by comparing on-hand product inventory to distribution chain demands or requirements. When at least a first threshold level but no more than a second threshold level of inventory is on hand (after projected product delivery), a correct inventory level is present at a tier 1 facility. When more than the second threshold level of inventory is on hand (after projected product delivery), an over-inventory condition exists and a modification to the supply chain requirements is appropriate.
  • the analytical engine in step 620 , notifies the risk manager.
  • the analytical engine updates the database and returns to step 500 to await the next stimulus instance.
  • FIG. 7 depicts the operation of the risk manager.
  • the risk manager receives a stimulus.
  • Stimuli include, for example, a request from a tier 1 manager, a notification received from the analytical engine, passage of time, and the like.
  • the risk manager queries the analytical engine for an analysis of performance information.
  • step 704 the risk manager retrieves the appropriate rule or policy set or template from the database.
  • the risk manager determines, based on a comparison of the material and/or part and/or component and/or product delivery scheduling problem with the appropriate rule or policy set or template, an appropriate action to be taken.
  • a first appropriate action 712 is to notify tier 1 management of the material and/or part and/or component and/or product delivery scheduling problem.
  • a second appropriate action 716 is to notify management of each of the responsible lower tier node(s) of the product delivery scheduling problem and request a proposed mitigation measure to obviate the material and/or part and/or component and/or product delivery scheduling problem.
  • a third appropriate action 720 is to identify an alternate lower tier node(s) to resolve the material and/or part and/or component and/or product delivery scheduling problem and/or query an alternative node(s) for availability in assisting in mitigating and/or rectifying the material and/or part and/or component and/or product delivery scheduling problem.
  • an alternative facility of a tier partner can be queried to assist in increasing or decreasing production to mitigate and/or rectify the product delivery scheduling problem at a companion facility of the tier partner.
  • An alternative tier partner can be queried to assist in increasing or decreasing production to mitigate and/or rectify the material and/or part and/or component and/or product delivery scheduling problem at a competitive tier partner.
  • Other appropriate action(s) 724 include providing a recommendation to tier 1 management of mitigation measure(s) to address and/or rectify the material and/or part and/or component and/or product delivery scheduling problem, a combination of any of the foregoing actions, ship on-hand product inventory from a different tier 1 facility to the demand chain partner, and the like.
  • the system 800 includes first, second, . . . xth communication devices 804 a - x , shipment enterprise and/or organization server(s) 250 , supply chain server(s) 808 , the accessible information source(s) 812 , shipment enterprise and/or organization server 250 , and supply chain management platform 816 , interconnected by the wide area network 228 .
  • the first, second, . . . xth communication devices 804 a - x can be personal communication devices, such as laptops, personal computers, tablet computers, personal digital assistants, and cellular phones, and/or enterprise or organization communication devices, such as servers.
  • the supply chain server(s) correspond to multiple different and independent supply chains.
  • Each supply chain includes, with reference to FIG. 1 , a tier 1 control tower 100 and accompanying server 204 , tier 2 assembler 104 and accompanying server 212 , first, second, . . . nth tier 3 part/component manufacturer 108 a - n and accompanying servers 216 a - n , and first, second, third, . . . mth tier 4 material supplier 112 a - m and accompanying servers 220 a - m.
  • the supply chain management platform 816 comprises not only the data collection module 300 , risk manager 316 , scheduling module 304 , reporting module 320 , analytical engine 312 , and historical state module 308 but also a gateway 820 , application programming interface(s) 824 (one of which typically corresponds to each of the data collection module 300 , risk manager 316 , scheduling module 304 , reporting module 320 , analytical engine 312 , and historical state module 308 ), security module 828 , and pricing monitoring module 850 . All of the components are interconnected by a trusted local area network 832 .
  • the gateway 820 is a network point (e.g., a router) that acts as an entrance to the local area network 832 .
  • the gateway node can also act as a proxy server and/or a firewall to provide security to the local area network 832 .
  • the application programming interface(s) 824 define or specify how software components interact with one another.
  • each API is a library that includes specification for routines, data structures, object classes, and variables.
  • the API may be implemented in a procedural language or object-oriented language.
  • An API specification can take many forms, including an International Standard such as POSIX, vendor documentation such as the Microsoft WindowsTM API and/or the libraries of a programming language, e.g., Standard Template Library in C++ or Java API.
  • An API differs from an application binary interface (ABI) in that an API is source code based while an ABI is a binary interface.
  • ABSI application binary interface
  • the data collection module 300 , risk manager 316 , scheduling module 304 , reporting module 320 , analytical engine 312 , and historical state module 308 commonly use a common API or different APIs that are configured substantially the same. Generally, all internal and external signaling, including inter-application, intra-application, and/or inter-device messages, pass through APIs.
  • the security module 828 enforces access privileges and thereby maintains data security for each enterprise, organization, and supply chain. This can be important as supply chains of competitors may be simultaneously using the platform 816 for supply chain management.
  • the security module 828 can employ a variety of techniques.
  • One technique is application-based, which determines whether the user has permission to access one or more of the data collection module 300 , risk manager 316 , scheduling module 304 , reporting module 320 , analytical engine 312 , and historical state module 308 . This can be determined using licensing techniques, whereby the user is subjected to access and/or feature restrictions depending on payments made to the platform operator.
  • API-based determines whether the user has permission to access one or more of the APIs.
  • Permission can also be determined using licensing techniques, whereby the user is subjected to access and/or feature restrictions depending on payments made to the platform operator, or enforcement of privileges.
  • the query, command, and/or request is typically further required to conform to the requirements of the application programming interface and, when the query, command, and/or request fails to conform to the requirements of the application programming interface, the security module can deny the query, command, and/or request even though the requestor has permission to use the API.
  • Another technique is data entity or role-based, whereby specified roles can create, read, update, and delete specified objects.
  • a system 816 administrator role can create, read, update and delete enterprise and/or organization, administrator, organization, site, item, and user objects.
  • An administrator for an enterprise and/or organization in a particular supply chain by contrast, can create, read, update, and delete administrators, users, organizations, sites, and items but only for the particular enterprise and organization.
  • An event manager for an enterprise and/or organization can create site, item, item-site relationships, item-item relationships, and supply chain events but only for the particular enterprise and organization.
  • Yet another technique is field level-based, which determines whether or not the user has permission to view or change the field. This technique can also be role-based.
  • data objects can have different states (e.g., a purchase order can have different states) and be viewed as state machines, whereby a state of a data object is changed by an action.
  • states can have sub-states for a particular role type. For example, a seller may have a requirement to approve a sell price by a manager before committing the order.
  • all actions can update an artifact except the first one (create).
  • the security module or API checks the permissions for the state. When permitted, the update is executed and the the artifact assigned a next state or the artifact deleted.
  • Yet another technique is to control the structure of, or restructure, database queries, commands or requests to comply with relevant sets of permissions.
  • a requestor can write any database query, command, or request desired.
  • the security module receives and applies a security definition to the query, command, or request. If required, the security module edits the query, command, or request consistent with the security definition.
  • the revised or restructured query, command, or request is then passed onto the API of the data collection module.
  • the tier 1 control tower on one supply chain being associated with Hewlett PackardTM laptops and the tier 1 control tower on the other supply chain being associated with DellTM laptops. They each share a common tier 3 component manufacturer, namely IntelTM, which supplies integrated circuit boards to each supply chain.
  • a Dell employee provides the following query to the platform 800 :
  • the security module is discussed with reference to information involving only a particular enterprise or organization, it is to be understood that the enterprises and organizations within a supply chain can agree to provide information to other enterprises and organizations located upstream of downstream in the supply chain, such as to the tier 1 control tower. In such cases, the security definition takes such expanded information access into consideration.
  • the security module can enable the collected information to be maintained in one data location (and common database) without the use of a partitioned database.
  • the database is not partitioned logically (horizontally or vertically) into distinct and independent parts corresponding to different monitored supply chains, and the data and/or data structures for different monitored supply chains can be commingled and/or conform to a common data model in the database.
  • This can enable the use of a simpler data model that enables ease of constructing relationships between enterprises and organizations, provide stability, and provide scalability.
  • Each data row of the model can have a different schema.
  • the data model can also enable sharing of information across and among different supply chains.
  • the pricing monitoring module 850 monitors long term contract and spot market prices on materials and/or parts and/or components and/or products and generates alarms or notifications when the monitored prices change upwards or downwards beyond specified thresholds. This can be done effectively by identifying all materials and/or parts and/or components within a selected product. For example, a bill of materials can provide visibility into the various materials and/or parts and/or components of a selected product.
  • An integrated circuit board for instance, includes a broad number of raw materials, such as silicon, dopants, conductive metals for traces and other conductive structures, and device subcomponents, such as microprocessors, memory modules, etc., and is itself a device used in many end products.
  • the pricing module 850 would monitor prices not only for the raw materials but also for the subcomponents and the device itself. Sudden changes in raw materials prices can provide an advance indication of price changes in the device. This can be used by the pricing monitoring module 850 not only to estimate the resulting device price but also indicate to administrators that additional inventory of the device should be acquired before the price changes.
  • An example of a price estimation algorithm is to determine how much of the raw material is used in the device and the net total increase in cost for the device manufacturer. This net cost increase can be added to the current price to provide a fairly reliable cost estimate.
  • the analytical engine 320 can also calculate and update performance measures as information is collected by the data collection module 300 . In other words, the calculation and updating of performance measures is done substantially in real time. Alternatively, the analytical engine 320 can calculate the performance measures when and as requested by a user. In other words, the performance measures are not precalculated. This can obviate the need for an analytics database altogether.
  • the supply chain management platform 816 receives an access request, such as a query, command, or request.
  • the access request can be from a platform administrator or user or from an administrator or member of an enterprise or organization in a supply chain monitored by the platform 816 (hereinafter “requestor”).
  • the security process begins in decision diamond 904 , in which the security module 828 determines whether the requestor has permission to use the application to which the access request is directed and the API associated with the application or function or feature of the application to process the access request.
  • the security module 828 determines whether the requestor is privileged to interact with the data entity. As noted, this query determines whether the requestor has a specified role privileged to create, read, update, and delete the specified data object.
  • the security module 828 proceeds to step 928 and denies the request.
  • the security module 828 proceeds to step 912 and applies a security definition to the access request and, if required, edits or reconfigures the access request consistent with the applied security definition.
  • the security module 828 forwards the edited request to the application, e.g., the data collection module 300 , risk manager 316 , scheduling module 304 , reporting module 320 , analytical engine 312 , and/or historical state module 308 , for processing.
  • the application e.g., the data collection module 300 , risk manager 316 , scheduling module 304 , reporting module 320 , analytical engine 312 , and/or historical state module 308 , for processing.
  • the security module 828 receives the response and filters out any information that the requestor is not privileged to access. This is a precautionary step in the event that a database error has caused information to be retrieved improperly.
  • step 924 the security module 828 routes the response to the requestor optionally through the appropriate API.
  • the operation of the pricing monitoring module 850 will now be discussed with reference to FIG. 10 .
  • the pricing monitoring module 850 detects a stimulus.
  • the stimulus can be, for example, expiration of a selected time period.
  • the pricing monitoring module 850 selects a next product for consideration. This step can be done on a supply chain-by-supply chain basis and, for a given supply chain, for one or more selected enterprises or organizations within the supply chain.
  • the product can be a product sold by one or more of a tier 1 control tower server 204 , tier 2 assembler server 212 , first, second, . . . nth tier 3 component manufacturer server 216 a - n , and first, second, third, . . . mth tier 4 material supplier server 220 a - m.
  • the pricing monitoring module 850 selects a next component(I) of the selected product.
  • the component can be a raw or processed material, formulation, device, or other component.
  • the pricing monitoring module 850 determines a current pricing information for the selected component. This is typically done using one or more accessible information source(s) 224 , such as by browsing the Web.
  • the pricing monitoring module 850 determines whether the current pricing information for the selected component differs materially from a previously determined or currently realized pricing for the component. “Materially” is typically determined by one or more thresholds. If the price rises or falls in excess of a predetermined threshold, the pricing change is deemed to be material.
  • the pricing monitoring module 850 in step 1020 , generates an alarm and/or notification to an administrator of the pertinent enterprise and/or organization.
  • the pricing monitoring module 850 determines whether all components for the selected product have been considered.
  • the pricing monitoring module 850 returns to step 1008 and selects a next component for pricing analysis.
  • the pricing monitoring module 850 determines a new price for the selected product.
  • the pricing monitoring module 850 then returns to step 1004 and selects a next product for analysis.
  • the pricing monitoring module 850 and analytical engine can determine a financial impact on a supplier of the product and/or downstream user of the product.
  • the financial impact analysis can be done for the selected product or across all product lines of the supplier and/or downstream user and/or for the supply chain as a whole.
  • certain components of the system can be located remotely, at distant portions of a distributed network, such as a LAN and/or the Internet, or within a dedicated system.
  • a distributed network such as a LAN and/or the Internet
  • the components of the system can be combined in to one or more devices, such as a server, or collocated on a particular node of a distributed network, such as an analog and/or digital telecommunications network, a packet-switch network, or a circuit-switched network.
  • the components of the system can be arranged at any location within a distributed network of components without affecting the operation of the system.
  • the various components can be located in a switch such as a PBX and media server, gateway, in one or more communications devices, at one or more users' premises, or some combination thereof.
  • a switch such as a PBX and media server, gateway, in one or more communications devices, at one or more users' premises, or some combination thereof.
  • one or more functional portions of the system could be distributed between a telecommunications device(s) and an associated computing device.
  • the various links connecting the elements can be wired or wireless links, or any combination thereof, or any other known or later developed element(s) that is capable of supplying and/or communicating data to and from the connected elements.
  • These wired or wireless links can also be secure links and may be capable of communicating encrypted information.
  • Transmission media used as links can be any suitable carrier for electrical signals, including coaxial cables, copper wire and fiber optics, and may take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
  • the techniques discussed herein are applied to animate objects, such as processing people, particularly at a check point.
  • the Department of Homeland Security can use the management systems to process people more effectively at airport security checkpoints and the Immigration and Naturalization Service can use the management systems to process more effectively at border crossings.
  • the techniques discussed herein can be applied to inanimate objects, such as mail or packages, such as by a postal, courier or freight service.
  • the systems and methods of this disclosure can be implemented in conjunction with a special purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device or gate array such as PLD, PLA, FPGA, PAL, special purpose computer, any comparable means, or the like.
  • a special purpose computer a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device or gate array such as PLD, PLA, FPGA, PAL, special purpose computer, any comparable means, or the like.
  • any device(s) or means capable of implementing the methodology illustrated herein can be used to implement the various aspects of this disclosure.
  • Exemplary hardware that can be used for the disclosed embodiments, configurations and aspects includes computers, handheld devices, telephones (e.g., cellular, Internet enabled, digital, analog, hybrids, and others), and other hardware known in the art. Some of these devices include processors (e.g., a single or multiple microprocessors), memory, nonvolatile storage, input devices, and output devices.
  • processors e.g., a single or multiple microprocessors
  • memory e.g., a single or multiple microprocessors
  • nonvolatile storage e.g., a single or multiple microprocessors
  • input devices e.g., input devices
  • output devices e.g., input devices, and output devices.
  • alternative software implementations including, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.
  • the disclosed methods may be readily implemented in conjunction with software using object or object-oriented software development environments that provide portable source code that can be used on a variety of computer or workstation platforms.
  • the disclosed system may be implemented partially or fully in hardware using standard logic circuits or VLSI design. Whether software or hardware is used to implement the systems in accordance with this disclosure is dependent on the speed and/or efficiency requirements of the system, the particular function, and the particular software or hardware systems or microprocessor or microcomputer systems being utilized.
  • the disclosed methods may be partially implemented in software that can be stored on a storage medium, executed on programmed general-purpose computer with the cooperation of a controller and memory, a special purpose computer, a microprocessor, or the like.
  • the systems and methods of this disclosure can be implemented as program embedded on personal computer such as an applet, JAVA® or CGI script, as a resource residing on a server or computer workstation, as a routine embedded in a dedicated measurement system, system component, or the like.
  • the system can also be implemented by physically incorporating the system and/or method into a software and/or hardware system.
  • the present disclosure in various aspects, embodiments, and/or configurations, includes components, methods, processes, systems and/or apparatus substantially as depicted and described herein, including various aspects, embodiments, configurations embodiments, subcombinations, and/or subsets thereof.
  • the present disclosure in various aspects, embodiments, and/or configurations, includes providing devices and processes in the absence of items not depicted and/or described herein or in various aspects, embodiments, and/or configurations hereof, including in the absence of such items as may have been used in previous devices or processes, e.g., for improving performance, achieving ease and ⁇ or reducing cost of implementation.

Abstract

The present disclosure discloses a supply chain management system that can estimate manufactured item delivery times at a facility, manufactured item costs or prices, and dynamically control supply chain performance.

Description

    CROSS REFERENCE TO RELATED APPLICATION
  • The present application claims the benefits of U.S. Provisional Application Ser. Nos. 61/668,282, filed Jul. 5, 2012; 61/716,960, filed Oct. 22, 2012, and 61/750,184, filed Jan. 8, 2013, all entitled “Method and System for Controlling Supply Chains”, and 61/800,197, filed Mar. 15, 2013, entitled “Method and System for Managing Supply Chains”, each of which is incorporated herein by this reference in its entirety.
  • FIELD
  • The disclosure relates generally to automated systems for product management and particularly to automated systems for controlling and/or managing supply chains.
  • BACKGROUND
  • The traditional structure of the business supply chain, which viewed supply chain management as a chain of events, is evolving, in response to the ever-complicated logistics of modern trade, commerce and communications, towards viewing supply chain management as a three-dimensional model. In other words, organizations no longer view supply networks as a linear relationship between raw materials and distributors. Rather, today's supply web resembles a three-dimensional construct, complete with a variety of suppliers, tiers and intermediaries that serve to fill in for one another in the event of a disruption.
  • Increasingly, how well a supply web creates and shares information not only defines how well the web holds together, how efficiently it operates, and how much value it adds but also determines the success or failure—as a group—of the manufacturing venture. Companies need to share supply metrics, timelines, demand and capacity data to enable the supply network to develop a common and aligned set of objectives, which can protect it against commodity pressures, volatility and individual failures. Sharing information can speed up supply chains while mitigating the inherent risks in doing so. This new model, with cost management at its core, can capture decades of best practices in a unified strategy for a new generation of companies and managers.
  • Essential to the practices of supply chains is the establishment of material control through a combination of material control towers that dictate, to suppliers, price, terms, and supply requirements.
  • Although significant advances have been made towards establishing a three-dimensional supply chain by companies such as E2open™, GT Nexus™, and Resilinc™, problems remain. Many three-dimensional supply chains are fairly rigid and unable to respond dynamically to, let alone anticipate, adverse events. This can cause disruption in the supply chain and concomitant interruptions in the product distribution chain.
  • SUMMARY
  • These and other needs are addressed by the various aspects, embodiments, and/or configurations of the present disclosure. The present disclosure discloses a supply chain management system that can estimate manufactured item delivery times at a facility, manufactured item costs or prices, and dynamically control supply chain performance.
  • A system for monitoring multiple supply chains for different products (with performance information collected for each monitored supply chain being confidential to the respective monitored supply chain and being stored in a common database) can include a microprocessor executable security module, method, and/or instructions to receive a query, command and/or request from a requestor to perform an operation with respect to a set of data and/or data structures in the database, modify the query, command and/or request to conform to a security definition, and use the modified query, command and/or request to perform the operation.
  • The database is commonly not partitioned logically into distinct and independent parts corresponding to different monitored supply chains, and the data and/or data structures for different monitored supply chains are commonly commingled in the database.
  • The query, command and/or request can be modified by the security module, method, and/or instructions to reflect a supply chain role and/or an identity of an enterprise and/or organization associated with the requestor, whereby the data and/or data structures impacted by the query, command, and/or request are limited to those relating to the supply chain role and/or identity of the enterprise and/or organization associated with the requestor.
  • The security module, method, and/or instructions can determine whether the requestor has permission to use an application associated with the operation and, when the requestor is without permission to use the application, deny the query, command, and/or request.
  • The query, command, and/or request can be required to pass through an application programming interface prior to performance of the operation.
  • The security module, method, and/or instructions can determine whether the requestor has permission to use the application programming interface and/or whether the query, command and/or request conforms to the requirements of the application programming interface and, when the requestor is without permission to use the application programming interface and/or when the query, command, and/or request fails to conform to the requirements of the application programming interface, deny the query, command, and/or request.
  • The requestor can be required to have a specified role and relationship to a selected monitored supply chain enterprise and/or organization before the operation can be performed.
  • A datum and/or datum structure of the set of data and/or data structures can have different states, wherein an action must be performed to change the state of the datum and/or datum structure, each action can only be performed when the requestor has a permission to perform the action, and one of the different states has plural sub-states that must be performed before the state can change.
  • The supply chain management system can perform one or more of the following tasks, functions, and/or operations:
  • (a) Track historic performance of a supply chain;
  • (b) Anticipate and/or quickly identify potentially disruptive event(s) and mitigate the adverse impact of the potentially disruptive event(s) on the supply chain;
  • (c) Analyze supply chains to identify cost inefficiencies, bottlenecks, and unnecessary performance delays;
  • (d) Recommend and/or implement solutions for the identified cost inefficiencies, bottlenecks, and unnecessary performance delays;
  • (e) Monitor the performance of a supply chain in light of distribution chain requirements or objectives to identify potential violations or shortfalls; and
  • (f) Recommend and/or implement solutions to avoid or mitigate the identified potential violations or shortfalls.
  • Supply chain performance metrics are commonly not calculated, in substantial real time, based on the performance information collected from the monitored supply chains.
  • All or parts of the supply chain management system can be executed on one or more computers and typically is stored as microprocessor executable instructions on a computer readable medium.
  • The present disclosure can provide a number of advantages depending on the particular aspect, embodiment, and/or configuration. The supply chain management system can, particularly for vertically integrated supply chains, more effectively and efficiently control suppliers, prices, product supply, and other terms, generate faster material turns or velocities, increase profit, enable leaner manufacturing and logistics operations, and reduce waste when compared to a supply chain without the supply chain management system. It can more effectively consider the impact of unanticipated or “black swan” events, including natural and manmade disasters, by monitoring news sources, law enforcement and military authorities, among others, and precisely mapping tier 1, 2, 3, and 4 facilities. It can effectively assess the sensitivity of the supply chain to various internal and external events. It can assess the risk of having a particular product or product component available at a selected location at a selected price or cost. It can enable greater levels of collaboration not only among the various tiers but also within tiers. It can enable more effective management of multiple sources, within a given tier, even for legally distinct, competitive entities. The system's combination of cloud tools, operating models, and risk management logic can create new, more profitable and effective business practices in three-dimensional supply chains.
  • These and other advantages will be apparent from the disclosure.
  • The phrases “at least one”, “one or more”, and “and/or” are open-ended expressions that are both conjunctive and disjunctive in operation. For example, each of the expressions “at least one of A, B and C”, “at least one of A, B, or C”, “one or more of A, B, and C”, “one or more of A, B, or C” and “A, B, and/or C” means A alone, B alone, C alone, A and B together, A and C together, B and C together, or A, B and C together.
  • The term “a” or “an” entity refers to one or more of that entity. As such, the terms “a” (or “an”), “one or more” and “at least one” can be used interchangeably herein. It is also to be noted that the terms “comprising”, “including”, and “having” can be used interchangeably.
  • “Advanced planning and scheduling” (also referred to as APS and advanced manufacturing) refers to a manufacturing management process by which raw materials and production capacity are substantially optimally allocated to meet demand. APS is especially well-suited to environments where simpler planning methods cannot adequately address complex trade-offs between competing priorities. Production scheduling can be very difficult due to the (approximately) factorial dependence of the size of the solution space on the number of items/products to be manufactured.
  • “Automatic” and variations thereof, as used herein, refers to any process or operation done without material human input when the process or operation is performed. However, a process or operation can be automatic, even though performance of the process or operation uses material or immaterial human input, if the input is received before performance of the process or operation. Human input is deemed to be material if such input influences how the process or operation will be performed. Human input that consents to the performance of the process or operation is not deemed to be “material”.
  • “Computer-readable medium” as used herein refers to any tangible and non-transient storage and/or transmission medium that participate in providing instructions to a processor for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media and includes without limitation random access memory (“RAM”), read only memory (“ROM”), and the like. Non-volatile media includes, for example, NVRAM, or magnetic or optical disks. Volatile media includes dynamic memory, such as main memory. Common forms of computer-readable media include, for example, a floppy disk (including without limitation a Bernoulli cartridge, ZIP drive, and JAZ drive), a flexible disk, hard disk, magnetic tape or cassettes, or any other magnetic medium, magneto-optical medium, a digital video disk (such as CD-ROM), any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, a solid state medium like a memory card, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read. A digital file attachment to e-mail or other self-contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium. When the computer-readable media is configured as a database, it is to be understood that the database may be any type of database, such as relational, hierarchical, object-oriented, and/or the like. Accordingly, the disclosure is considered to include a tangible storage medium or distribution medium and prior art-recognized equivalents and successor media, in which the software implementations of the present disclosure are stored. Computer-readable storage medium excludes transient storage media, particularly electrical, magnetic, electromagnetic, optical, magneto-optical signals.
  • “Critical path method” refers to an algorithm for scheduling a set of project activities. CPM constructs a model of the project that includes the following: (a) a list of all activities required to complete the project (typically categorized within a work breakdown structure), (b) the time (duration) that each activity will take to completion, and (c) the dependencies between the activities. Using these values, CPM calculates the longest path of planned activities to the end of the project, and the earliest and latest that each activity can start and finish without making the project longer. This process determines which activities are “critical” (i.e., on the longest path) and which have “total float” (i.e., can be delayed without making the project longer). In project management, a critical path is the sequence of project network activities which add up to the longest overall duration. This determines the shortest time possible to complete the project. Any delay of an activity on the critical path directly impacts the planned project completion date (i.e. there is no float on the critical path). A project can have several, parallel, near critical paths. An additional parallel path through the network with the total durations shorter than the critical path is called a sub-critical or non-critical path.
  • A “database” is an organized collection of data held in a computer. The data is typically organized to model relevant aspects of reality (for example, the availability of specific types of inventory), in a way that supports processes requiring this information (for example, finding a specified type of inventory). The organization schema or model for the data can, for example, be hierarchical, network, relational, entity-relationship, object, document, XML, entity-attribute-value model, star schema, object-relational, associative, multidimensional, multivalue, semantic, and other database designs. Database types include, for example, active, cloud, data warehouse, deductive, distributed, document-oriented, embedded, end-user, federated, graph, hypertext, hypermedia, in-memory, knowledge base, mobile, operational, parallel, probabilistic, real-time, spatial, temporal, terminology-oriented, and unstructured databases.
  • “Database management systems” (DBMSs) are specially designed applications that interact with the user, other applications, and the database itself to capture and analyze data. A general-purpose database management system (DBMS) is a software system designed to allow the definition, creation, querying, update, and administration of databases. Well-known DBMSs include MySQL™, PostgreSQL™, SQLite™, Microsoft SQL Server™ Microsoft Access™, Oracle™, SAP™, dBASE™, FoxPro™, and IBM DB2™. A database is not generally portable across different DBMS, but different DBMSs can inter-operate by using standards such as SQL and ODBC or JDBC to allow a single application to work with more than one database.
  • “Determine”, “calculate” and “compute,” and variations thereof, as used herein, are used interchangeably and include any type of methodology, process, mathematical operation or technique.
  • An “enterprise” refers to a business and/or governmental organization, such as a corporation, partnership, joint venture, agency, military branch, and the like.
  • “Enterprise resource planning” or ERP systems integrate internal and external management information across an entire organization, embracing finance/accounting, manufacturing, sales and service, customer relationship management, and the like. ERP systems automate this activity with an integrated software application. The purpose of ERP is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders.
  • “Manufacturing process management” or MPM is a collection of technologies and methods used to define how products are to be manufactured. MPM differs from ERP/MRP, which is used to plan the ordering of materials and other resources, set manufacturing schedules, and compile cost data. A cornerstone of MPM is the central repository for the integration of all these tools and activities aids in the exploration of alternative production line scenarios; making assembly lines more efficient with the aim of reduced lead time to product launch, shorter product times and reduced work in progress (WIP) inventories as well as allowing rapid response to product or product changes.
  • “Material requirements planning” or MRP is a production planning and inventory control system used to manage manufacturing processes. Most MRP systems are software-based. An MRP system is intended to simultaneously meet three objectives, namely ensure materials are available for production and products are available for delivery to customers, maintain the lowest possible material and product levels in store, and plan manufacturing activities, delivery schedules and purchasing activities.
  • “Means” as used herein shall be given its broadest possible interpretation in accordance with 35 U.S.C., Section 112, Paragraph 6. Accordingly, a claim incorporating the term “means” shall cover all structures, materials, or acts set forth herein, and all of the equivalents thereof. Further, the structures, materials or acts and the equivalents thereof shall include all those described in the summary of the invention, brief description of the drawings, detailed description, abstract, and claims themselves.
  • “Module” as used herein refers to any known or later developed hardware, software, firmware, artificial intelligence, fuzzy logic, or combination of hardware and software that is capable of performing the functionality associated with that element. Also, while the disclosure is presented in terms of exemplary embodiments, it should be appreciated that individual aspects of the disclosure can be separately claimed.
  • An “original equipment manufacturer”, or OEM, manufactures product or components that are purchased by another enterprise and retailed under that purchasing enterprise's brand name. OEM refers to an enterprise that originally manufactured the product. When referring to automotive parts for instance, OEM designates a replacement part made by the manufacturer of the original part.
  • “Queueing theory” refers to algorithms for characterizing or defining the behavior of queues. Queueing theory is generally considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide service. A queueing model based on the Poisson process and its companion exponential probability distribution often meets these two requirements. A Poisson process models random events (such as a customer arrival, a request for action from a web server, or the completion of the actions requested of a web server) as emanating from a memoryless process. That is, the length of the time interval from the current time to the occurrence of the next event does not depend upon the time of occurrence of the last event. In the Poisson probability distribution, the observer records the number of events that occur in a time interval of fixed length. In the (negative) exponential probability distribution, the observer records the length of the time interval between consecutive events. In both, the underlying physical process is memoryless. Examples of queueing theory functions or principals include BCMP network, Buzen's algorithm, Ehrenfest model, fork join queue, Gordon-Newell network, Jackson network, Little's law, Markovian arrival processes, Pollaczek-Khinchine formula, quasireversibility, random early detection, renewal theory, the Poisson process, and the like. Models based on the Poisson process often respond to inputs from the environment in a manner that mimics the response of the system being modeled to those same inputs. The analytically tractable models that result yield both information about the system being modeled and the form of their solution. Even a queueing model based on the Poisson process that does a relatively poor job of mimicking detailed system performance can be useful. The fact that such models often give “worst-case” scenario evaluations appeals to system designers who prefer to include a safety factor in their designs. The form of the solution of models based on the Poisson process often provide insight into the form of the solution to a queueing problem whose detailed behavior is poorly mimicked. As a result, queueing models are frequently modeled as Poisson processes through the use of the exponential distribution.
  • “Scheduling algorithms” refer to production scheduling and includes forward and/or backward scheduling. Forward scheduling is planning the tasks from the date resources become available to determine the shipping date or the due date. Backward scheduling is planning the tasks from the due date or required-by date to determine the start date and/or any changes in capacity required. Stochastic scheduling algorithms include economic lot scheduling problem (which is concerned with scheduling the production of several products on a single machine in order to minimize the total costs incurred (which include setup costs and inventory holding costs) and the economic production quantity model (which determines the quantity a enterprise and/or organization and/or retailer should order to minimize the total inventory costs by balancing the inventory holding cost and average fixed ordering cost). Examples of heuristic algorithms include the modified due date scheduling heuristic (which assumes that the objective of the scheduling process is to minimize the total amount of time spent on tasks after their due dates) and shifting bottleneck heuristic (which minimize the time it takes to do work, or specifically, the makespan in a job shop, wherein the makespan is defined as the amount of time, from start to finish, to complete a set of multi-machine jobs where machine order is pre-set for each job, the jobs are assumed to be actually competing for the same resources (machines) resulting in one or more resources acting as a ‘bottleneck’ in the processing, whereby the heuristic, or ‘rule of thumb’ procedure substantially minimizes the effect of the bottleneck).
  • A “server” is a computational system (e.g., having both software and suitable computer hardware) to respond to requests across a computer network to provide, or assist in providing, a network service. Servers can be run on a dedicated computer, which is also often referred to as “the server”, but many networked computers are capable of hosting servers. In many cases, a computer can provide several services and have several servers running. Servers commonly operate within a client-server architecture, in which servers are computer programs running to serve the requests of other programs, namely the clients. The clients typically connect to the server through the network but may run on the same computer. In the context of Internet Protocol (IP) networking, a server is often a program that operates as a socket listener. An alternative model, the peer-to-peer networking module, enables all computers to act as either a server or client, as needed. Servers often provide essential services across a network, either to private users inside a large organization or to public users via the Internet.
  • “Simulation modeling” refers both to discrete and continuous simulations. Discrete simulations are also known as discrete event simulations, and are event-based dynamic stochastic systems. In other words, the system contains a number of states, and is modeled using a set of variables. If the value of a variable changes, this represents an event, and is reflected in a change in the system's state. As the system is dynamic, it is constantly changing, and because it is stochastic, there is an element of randomness in the system. Representation of discrete simulations is performed using state equations that contain all the variables influencing the system. Continuous simulations also contain state variables; these however change continuously with time. Continuous simulations are usually modeled using differential equations that track the state of the system with reference to time. The simulation's output data will only produce a likely estimate of real-world events. Methods to increase the accuracy of output data include: repeatedly performing simulations and comparing results, dividing events into batches and processing them individually, and checking that the results of simulations conducted in adjacent time periods “connect” to produce a coherent holistic view of the system. Normal analytical techniques make use of extensive mathematical models which require assumptions and restrictions to be placed on the model. This can result in an avoidable inaccuracy in the output data. Simulations avoid placing restrictions on the system and also take random processes into account; in fact in some cases simulation is the only practical modeling technique applicable.
  • “Transfer Function” (also known as the system function or network function) is a mathematical representation, in terms of spatial or temporal frequency, of the relation between the input and output of a linear time-invariant system with zero initial conditions and zero-point equilibrium. Transfer functions are commonly used in the analysis of systems such as single-input single-output filters. The term is often used to refer to linear, time-invariant systems (LTI). Most real systems have non-linear input/output characteristics, but many systems, when operated within nominal parameters (not “over-driven”) have behavior that is close enough to linear that LTI system theory is an acceptable representation of the input/output behavior. While any LTI system can be described by some transfer function or another, there are certain families of special transfer functions that are commonly used. Typical infinite impulse response filters are designed to implement one of these special transfer functions. Some common transfer function families and their particular characteristics are: Butterfield filter—maximally flat in passband and stopband for the given order; Chebyshev filter (Type I)—maximally flat in stopband, sharper cutoff than Butterworth of same order; Chebyshev filter (Type II)—maximally flat in passband, sharper cutoff than Butterworth of same order; Bessel filter—best pulse response for a given order because it has no group delay ripple; Elliptic filter—sharpest cutoff (narrowest transition between pass band and stop band) for the given order; Optimum “L” filter; Gaussian filter—minimum group delay and gives no overshoot to a step function; Hourglass filter; and Raised-cosine filter.
  • “Transportation theory” refers to the study of optimal transportation and allocation of resources. The transportation problem as it is stated in modern or more technical literature looks somewhat different because of the development of Riemannian geometry and measure theory. Examples of transportation theory functions or principals include Wassertein metric, transport function, and the Hungarian algorithm.
  • The preceding is a simplified summary of the disclosure to provide an understanding of some aspects of the disclosure. This summary is neither an extensive nor exhaustive overview of the disclosure and its various aspects, embodiments, and/or configurations. It is intended neither to identify key or critical elements of the disclosure nor to delineate the scope of the disclosure but to present selected concepts of the disclosure in a simplified form as an introduction to the more detailed description presented below. As will be appreciated, other aspects, embodiments, and/or configurations of the disclosure are possible utilizing, alone or in combination, one or more of the features set forth above or described in detail below.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings are incorporated into and form a part of the specification to illustrate several examples of the present disclosure. These drawings, together with the description, explain the principles of the disclosure. The drawings simply illustrate preferred and alternative examples of how the disclosure can be made and used and are not to be construed as limiting the disclosure to only the illustrated and described examples. Further features and advantages will become apparent from the following, more detailed, description of the various aspects, embodiments, and configurations of the disclosure, as illustrated by the drawings referenced below.
  • FIG. 1 is a block diagram of an exemplary three-dimensional supply chain;
  • FIG. 2 is a block diagram of an exemplary supply chain management system;
  • FIG. 3 is a block diagram of an exemplary tier 1 control tower;
  • FIG. 4 is a flow chart of an exemplary data collection module;
  • FIG. 5 is a flow chart of an exemplary scheduling module;
  • FIG. 6 is a flow chart of an exemplary analytical engine;
  • FIG. 7 is a flow chart of an exemplary risk manager;
  • FIG. 8 is a block diagram of an exemplary supply chain management system;
  • FIG. 9 is a flow chart of an exemplary security module;
  • FIG. 10 is a flow chart of an exemplary pricing monitoring module;
  • FIG. 11 depicts a screenshot according to an embodiment;
  • FIG. 12 depicts a screenshot according to an embodiment;
  • FIG. 13 depicts a screenshot according to an embodiment;
  • FIG. 14 depicts a screenshot according to an embodiment;
  • FIG. 15 depicts a screenshot according to an embodiment; and
  • FIG. 16 depicts a screenshot according to an embodiment.
  • DETAILED DESCRIPTION The Tier 1 Control Tower Supply Chain Management System
  • The tier 1 control tower supply chain management system will be discussed with reference to FIG. 1. Generally, parts and components are made from materials and/or other parts and components, and products are made from material, parts, and/or components. Materials are generally considered to be raw materials, or crude or processed materials or substances.
  • A tier 1 control tower 100, in a brand level, typically corresponds to a retail and/or wholesale vendor, supplier, distributor, or other business that provides its branded products to end users. These businesses typically invest in research and development, product design, marketing, and brand development. Examples include Apple™, Amazon™, Cisco Systems, Inc.™, and Microsoft Corporation™. The control tower 100 monitors (and collects information regarding) the product distribution chain, product inventory levels, product demand, and/or prices of competitive products and, based on the collected information and product demand and price projections, dictates to second tier partners, prices, supply requirements, and other material terms, and accesses performance information of such second and third tier partners to monitor supply chain performance.
  • A tier 2 product assembler 104, in an integration level, assembles parts and/or components received from tier 3 part and/or component manufacturers into products, which are shipped to the tier 1 vendor, supplier, distributor, or other business for sale. An OEM is an example of a Tier 2 product assembler 104. Tier 2 product assembler(s) 104 provide, to the tier 1 control tower 100, its respective performance information and performance information received from tier 3 part and/or component manufacturers.
  • The first, second, . . . nth tier 3 part and/or component manufacturers 108 a-n, at the device level, manufacture parts and/or components for assembly by the tier 2 product assembler 104 into products. The first, second, . . . nth tier 3 part and/or component manufacturers 108 a-n provide, to the tier 2 product assembler 104, its respective performance information and performance information received from tier 4 material suppliers.
  • The first, second, third, . . . mth tier 4 material suppliers 112 a-m, at the raw material level, manufacture and supply to the first, second, . . . nth their 3 part and/or component manufacturers 108 a-n materials for use in manufacturing components. The first, second, third, . . . mth tier 4 material suppliers 112 a-m provide, to the tier 3 part and/or component manufacturers, its respective performance information.
  • Each of the tier 1 control tower 100, tier 2 product assembler 104, first, second, third, . . . nth tier 3 part and/or component manufacturer, and first, second, third, . . . mth tier 4 material suppliers 112 a-m correspond to an enterprise and/or organization, which may or may not be related to or affiliated with another enterprise and/or organization in the supply chain of FIG. 1.
  • As shown by the arrows, air, land, and sea logistics providers, such as FedEx, UPS, DHL, other trucking companies, other air freight companies, and other ocean freight carriers, link the various tier partners with an integrated network of air, sea, and ground capabilities to enable effective movement of materials, components, and products from sources to destinations.
  • While the above example assumes that performance information is supplied to the nearest downstream partner (or the party with whom the subject entity is in privity of contract), it is possible that one or more of the tier 2, 3, and 4 partners and/or logistic providers provide performance information directly to the tier 1 control tower 100. It is further to be understood that any number of entities, factories, plants, or other facilities may exist at each of the brand, integration, device, and raw material levels.
  • “Performance information” typically includes any information relative to supply chain performance, including, without limitation, one or more of manufactured item output projections over a specified time period, production facility sizes and/or locations, raw material, work-in-process, and/or manufactured part, component, and/or product inventory levels, order cycle times, days of supply in inventory, manufacturing resource type, availability, reliability, and/or productivity (e.g., human and automated resource levels and resulting output levels), unit operations (e.g., manufacturing steps, functions, or operations, unloading raw materials, packaging parts, components, and/or products, loading parts, components, and/or products, and the like), financial factors (e.g., labor rates and costs, energy rates and costs, raw materials costs, freight costs, tax rates, administrative and overhead costs, contractual and/or current spot market part, component, and/or product prices (from lower tier components), and the like), number of on time shipments, number of late shipments, order mismatch count, service quality (e.g., repair returns, repeat repair, no fault found, etc.), repair cost per unit (e.g., material cost per unit, average repair time, pieces consumed per unit, etc.), inventory value (e.g., spare parts stock, or SWAP stock, inventory turnover, days of supply of spare parts, days of supply of SWAP, days sales inventory spare parts, excess spare parts, excess SWAP stock, return to vendor rate, defective or OHB, and return to vendor or TAT, etc.), historic, current, and/or projected compliance with price, supply requirements, and/or other material terms, historic, current, and/or projected parts, components, and/or product output levels, mean, median and/or average, mode, historic, and/or projected freight transportation times, delays, or requirements, and the like. The performance information can be associated with a date, month, and/or season-of-year. Metrics can be generated from the performance information, such as on time shipment rate or percentage, late shipment rate or percentage, product rejection rate based on nonconformance with one or more restrictions, specifications, and/or requirements, parts, components, and/or product acceptance rate based on conformance with one or more restrictions, specifications, and/or requirements, and the like.
  • FIG. 2 depicts a communications networked architecture 200 according to an embodiment.
  • The tier 1 control tower 100 comprises a tier 1 control tower server 204 and associated database management system (not shown) and database 208.
  • The tier 1 control tower server 204 can be any computerized process that shares a resource with one or more client processes. It may run one or more services (typically as a host), to service the needs of other computers on the network. Typically, the tier 1 control tower server 204 is a computer program running to serve the requests of other programs.
  • The database 208 can be any organized collection of data and their supporting data structures. The database can be based on any data model, including the relational model, entity-relationship model, object model, object relational model, XML, or other database model. The database 204 can include, for each enterprise and/or organization in the supply chain, not only performance information but also transactional documents (e.g., purchase order, material safety data sheets, bill of materials, supply and/or manufacturing agreements, or RMAs, and the like), name, geographical location, geopolitical location, part and/or component and/or product and/or material type and/or identity supplied by the enterprise and/or organization, current spot market and/or contractual sales price of the part and/or component and/or product and/or material type supplied by the enterprise and/or organization, respective performance metrics of the enterprise and/or organization, part and/or component and/or product and/or material supply and/or purchase commitment with another enterprise and/or organization in the supply chain, specifications and requirements for part(s) and/or component(s) and/or product(s) and/or material(s) supplied and/or purchased by the enterprise and/or organization, part and/or component and/or product and/or material quantity and shipment dates and expected arrival dates at the next enterprise and/or organization in the supply chain, order cycle and/or turnaround times, shipment and/or order volume, total number of shipments, number of on time shipments, number of late shipments, order mismatch count, repair details, and each enterprise and/or organization is associated with one or more other enterprise and/or organizations in the supply chain to indicate a contractual or other supply relationship. Each enterprise and/or organization is normally assigned a role identifier, such as buyer, seller, supplier, manufacturer, material supplier, and the like, to describe the nature of the relationship of the enterprise and/or organization to each of the associated enterprise(s) and/or organization(s) in the supply chain.
  • The tier 2 assembler has a corresponding server 212 to provide performance and other information, directly or indirectly, to the tier 1 control tower server 204.
  • Each of the first, second, . . . nh tier 3 part/component manufacturers has a corresponding server 216 a-n to provide performance and other information, directly or indirectly, to the tier 1 control tower server 204.
  • Each of the first, second, third, . . . mth tier 4 material suppliers has a corresponding server 220 a-m to provide performance and other information, directly or indirectly, to the tier 1 control tower server 204.
  • The shipment enterprise and/or organization server 250 represents the freight enterprises or organizations handling shipments between nodes of the supply chain. The freight enterprises and organizations can be any entity providing shipping services. Exemplary freight enterprises and organizations include railway companies, short and long haul trucking companies, freight company servers (to provide freight tracking information, freight movement projections between two locations, and the like), shipping lines, maritime shipping companies, container shipping companies, Ro-ro shipping companies, transoceanic shipping companies, logistics services or courier companies, and the like. The shipment enterprise and/or organization server 250 can provide to the tier 1 control tower server 204 provide freight tracking information, freight movement projections between two locations, and the like.
  • The accessible information source(s) 224 include any source of information relevant to supply chain performance, including, without limitation, news sources and/or aggregators (to provide news on current events that may impact positively or negatively the supply chain performance, such as political coup d'etates, changes or upheavals, environmental conditions and events (e.g., storms, floods, earthquakes, tsunamis, typhoons, volcanic eruptions, forest fires, and other natural disasters, and the like), criminal acts (e.g., piracy, hijacking, theft, arson, vandalism, and the like), acts of violence (e.g., terrorism, war, political upheaval, military action, and the like), news reports on and announcements by a partner or competitor, scheduled events or holidays (e.g., religious, political, or other holidays), freight disruptions (e.g., train derailment, oceangoing vessel sinking, airplane crash, freight embargos, naval blockades, and the like), energy shortages, disruptions, or blackouts, and labor disruptions (e.g., strikes or threatened strikes)), weather data sources (e.g., the National Weather Service, national and local news sources, the Weather Channel™, Weather Source™, worldweatheronline.com, and the like), governmental entities (such as courts, law enforcement authorities, geological surveys, disaster relief agencies, and the like to provide legal or regulatory changes or requirements, lawsuits, bankruptcy filings, and the like, and other information), law enforcement or military authorities (e.g., to provide information on criminal acts (e.g., piracy, hijacking, theft, arson, vandalism, and the like), and acts of violence (e.g., terrorism, war, revolution, political upheaval, military action, and the like). Such information sources can be monitored using word cloud techniques, which graphically represent word usage frequency. Generally, the more frequent a word or group of words is used the greater the likelihood that the fact or event described by the words or group of words exists. The words or group of words can further be weighted for reliability by the source, with law enforcement and military authorities being given a higher or more reliable weighting than news sources.
  • The various servers and sources are connected by a circuit and/or packet switched wide area network (“WAN”) that covers a broad area (e.g., any telecommunications network that links across metropolitan, regional, or national boundaries) using private and/or public network transports. An exemplary WAN is the Internet.
  • FIG. 3 depicts an example of a supply chain monitoring system 302 maintained by the tier 1 control tower 100. As will be appreciated, the supply chain monitoring system can be maintained by any one of the tier 1, 2, 3, and/or 4 entities or an entity independent of the foregoing. The supply chain monitoring system 302 includes a data collection module 300, a scheduling module 304, a historical state module 308, an analytical engine 312, a risk manager 316, and a reporting module 320, connected by a local area network or bus 324.
  • The data collection module 300 collects performance information from tier 2, 3, and/or 4 entities and freight companies in the supply chain and from accessible information source(s) 224. It further collects information regarding product inventory levels currently on hand at the tier 1 control tower. The data collection module 300 can parse the collected information, extract relevant information items, and optionally tag the extracted information items with an information type tag. The data collection module 300 can include a database management function that stores, updates and otherwise manages the data in the database 208 in accordance with a selected data model. The data structures are typically associated with one or more enterprises and/or organizations in the supply chain. Transactional documents, such as purchase orders, material safety data sheets, and bills of material, contain references to all owners down the organization level, have corresponding role types and functions specified (e.g., only a buyerRole can change requestQuantity field), and include preferences and settings referenced to an appropriate level (e.g., enterprise, organization (or the part of the enterprise involved in the supply chain transaction), user, etc.).
  • Events stored in the database 208 typically include event category, event type, event subtype and event severity tags. Event categories include, for example, natural disaster (e.g., natural disaster event and wherein the natural disaster is one or more of an earthquake, tsunami, volcanic eruption, fire, flood, avalanche, and landslide), weather (e.g., storm, typhoon, hurricane, cyclone, tornado, wind, and blizzard), political (e.g., coup d'etat, sabotage, terrorism, act of war, military action, police action, embargo, and blockade), and business (e.g., a maritime vessel sinking, train derailment, freight vehicle wreck, device or system malfunction, criminal activity, airplane crash, labor disruption, lawsuit, financial insolvency, and bankruptcy). Event types include, for example, geologic event, atmospheric event, geo-political, labor, and insolvency. Event subtypes include, for geologic, earthquake, volcanic eruption, tsunami, flood, and landslide; for atmospheric, storm, hurricane, cyclone, tornado, wind, and blizzard; for geo-political coup d'etates, sabotage, terrorism, and piracy; for labor, strike; and for insolvency, bankruptcy. The severity tag can include one or more of emergency, advisory, watch, and warning. Other tags will be obvious to those of ordinary skill in the art based on the teachings of this disclosure. A start and end time can be associated with the temporal impact of the event on the supply chain.
  • The collected information generally falls into two categories, namely static supply chain information (information items that generally do not change or change infrequently such as sites, enterprise and/or organization names, and the like) and dynamic supply chain data (information items that change frequently such as purchase orders, forecasts, and the like).
  • The scheduling module 304 provides scheduling information, including projected shipment arrival dates for products from the tier 2 product assembler 104 and required shipment departure dates for branded products to customers, wholesalers, and/or retailers. Each of the shipment arrival and departure dates can be linked to a set of data structures describing the shipment, including shipment source and destination, freight carrier, freight tracking information, current shipment status, shipment contents (by product type and number), date of shipment, and the like). The projected shipment arrival dates can be received from the tier 2 product assembler 104 and/or freight carrier. The shipment departure dates are determined by the tier 1 control tower based on contractual requirements, retailer and/or wholesaler current or projected inventory levels, retainer and/or wholesaler order, and the like.
  • The historical state module 308 tracks past performance for each entity and/or entity facility in the tier 2-4 and freight carriers (e.g., compares the actual product shipment arrival date against a selected date (received from the entity, required by contract or order, and/or projected by the tier 1 control tower 100)) and distribution chain demands (to identity seasonal trends). The past performance for an entity can be used to determine and assign a level of confidence in product deliveries from the entity being received by a selected date (received from the entity, required by contract or order, and/or projected by the tier 1 control tower 100). The level of confidence, when low, may provide a basis to order additional product from a more reliable source. The level of confidence can be based on past performance of each supplier or each different facility of a common supplier.
  • The analytical engine 312 receives performance and other data from the data collection module 300, scheduling information from the scheduling module 304, and historical information (such as a level of confidence) from the historical state module 308 and, based on the information, forecasts incoming shipment arrival times and outgoing shipment departure times and identifies any inability to meet distribution chain requirements, commitments or objectives (e.g., orders, contractual commitments, policies, objectives, etc.) (a “noncompliant event”). This information is provided, by the analytical engine 312 to the risk manager 316. The analytical engine 312 can be a type of situational awareness application that looks at aspects of the current state of the supply chain as well as the structural relationships and considers the effect of both internal and external events on the supply chain. Both past events and forecasted events can be considered by the analytical engine 312. The application can determine not only what happened to the supply chain but also what may happen to the supply chain, thereby providing not only a reactive but also proactive model for problem resolution.
  • In one application, the analytical engine 312 relies primarily on reported performance information received from tier 2 assembler(s) 212, tier 3 component manufacturer(s), tier 4 raw material supplier(s) and/or freight carrier(s) in estimating compliance with product distribution chain requirements. Disruptive events received from an accessible information source 224 are used as the basis of a query to the potentially impacted tier 2 assembler(s) 212, tier 3 part/component manufacturer(s), tier 4 material supplier(s) and/or freight carrier(s) for updated performance information. The query may be generated automatically or manually by tier 1 management.
  • In one application, the analytical engine 312 determines, based on performance information received from the historical state module 308, a performance rating for each enterprise and/or organization in the supply chain. The performance rating can be based on a scale from lowest performance level to highest performance level.
  • In one application, the analytical engine 312 relies not only on reported performance information but also internally generated projections in estimating compliance with distribution chain requirements. The compliance determination is based one or more comparisons, including a comparison of the material and/or part and/or component and/or product shipment delivery date based on the reported performance information against the material and/or part and/or component and/or product distribution chain shipment requirement(s) (as in the prior paragraph), a comparison of the material and/or part and/or component and/or product shipment delivery date based on the reported performance information against the internally generated projected material and/or part and/or component and/or product shipment delivery date, and a comparison of the material and/or part and/or component and/or product shipment delivery date based on the reported performance information against the internally generated projected material and/or part and/or component and/or product shipment delivery date.
  • The estimated or projected delivery date for an order can include an associated probability or likelihood and, optionally, an associated range of arrival dates that the items in the order will be timely received by the selected arrival date or within the range of arrival dates. The range of arrival dates can be selected using a standard deviation of arrival times based on current and/or historic performance information and/or other relevant information. For example, a historic reliability or probability of timely receipt at a destination facility from the selected lower tier facility, and optionally associated standard deviation of historic receipt dates relative to a target date, can be used to provide the probability and optionally standard deviation of the destination facility receiving a current shipment from the selected lower tier facility. The probability and/or standard deviation can be used by the risk manager to determine whether or not to order additional material and/or part and/or component and/or product from an alternate facility. This determination can use a probability threshold, for instance, that would require or recommend order placement to an alternative facility if the probability of the order timely arriving is too low or no order placement to the alternative facility if the probability of the order timely arriving is acceptable (e.g., exceeds the probability threshold).
  • For any facility in a tier, the probability could be the sum or other mathematical combination of probabilities for each upstream facility in lower tiers in a direct or indirect supply relationship with a selected facility. For example, if a third part/component manufacturing facility in tier 3 has a 50% probability of receiving timely raw material from a fourth and/or alternative facility in tier 4, a second product manufacturing facility or assembler in tier 2 has a 50% probability of receiving timely a necessary product part and/or component from the third facility and/or an alternative tier 3 facility, and the first facility in tier 1 has a 25% probability of receiving the product timely. When a selected facility, such as a product assembler, has a 50% probability of receiving timely a first necessary component from a first tier 3 part/component manufacturer and a 25% probability of receiving timely a second necessary component from a second tier 3 part/component manufacturer, the probability of a third tier 1 facility receiving the product timely from the selected product manufacturing or assembling facility is the lower of the two or 25%.
  • A number of algorithms may be used in generating the internal estimates.
  • One algorithm uses a critical path method (“CPM”), or an algorithm for scheduling a set of project activities. CPM constructs a model, at each supply chain facility and/or manufacturer, supplier, and/or assembler and/or for the overall supply chain, that includes one or more of the following: (a) a list of all activities required to deliver the product shipment to the tier 1 control tower, (b) the time (duration) that each activity or operation in the supply chain will take to completion, and (c) the dependencies between the activities. Using these values, CPM calculates the longest path of planned activities to the end of the product delivery cycle, and the earliest and latest that each activity can start and finish without making the product delivery cycle longer. This process determines which activities are “critical” (i.e., on the longest path) and which have “total float” (i.e., can be delayed without making the product delivery cycle longer). In project management, a critical path is the sequence of supply chain network activities which add up to the longest overall duration. This determines the shortest time possible to complete the product delivery cycle. Any delay of an activity on the critical path directly impacts the planned product delivery cycle completion date (i.e. there is no float on the critical path). A product delivery cycle can have several, parallel, near critical paths. An additional parallel path through the network with the total durations shorter than the critical path is called a sub-critical or non-critical path.
  • One algorithm uses queueing theory by characterizing the supply chain as one or more queues of work pieces being “serviced” at each tier and thereby defining supply chain behavior based on queue behavior. As will be appreciated, queueing theory is generally considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide service. The queueing model can be based on a Poisson process and its companion exponential probability distribution. A Poisson process models random or pseudo-random events (such as a work piece arrival from a lower tier partner, a supply chain disruptive event, or the completion of an action requested of a resource over which the servicing tier has no control) as emanating from a memoryless process. That is, the length of the time interval from the current time to the occurrence of the next event does not depend upon the time of occurrence of the last event. In the Poisson probability distribution, the observer records the number of events that occur in a time interval of fixed length. In the (negative) exponential probability distribution, the observer records the length of the time interval between consecutive events. In both, the underlying physical process is memoryless. Examples of queueing theory functions or principals include BCMP network, Buzen's algorithm, Ehrenfest model, fork join queue, Gordon-Newell network, Jackson network, Little's law, Markovian arrival processes, Pollaczek-Khinchine formula, quasireversibility, random early detection, renewal theory, the Poisson process, and the like. Models based on the Poisson process often respond to inputs from the environment in a manner that mimics the response of the system being modeled to those same inputs. The analytically tractable models that result yield both information about the system being modeled and the form of their solution. Even a queueing model based on the Poisson process that does a relatively poor job of mimicking detailed system performance can be useful. The fact that such models often give “worst-case” scenario product cycle evaluations can support the risk manager including a safety factor in supply chain changes and modifications, including product delivery requirements. Queueing models are frequently modeled as Poisson processes through the use of an exponential distribution.
  • One algorithm is a scheduling algorithm, which considers product production scheduling and shipping and includes forward and/or backward scheduling. Forward scheduling is planning the tasks from the date resources become available to determine the shipping date or the due date. Backward scheduling is planning the tasks from the due date or required-by date to determine the start date and/or any changes in capacity required. Stochastic scheduling algorithms can include economic lot scheduling problem (which is concerned with scheduling the production of several products on a single machine in order to minimize substantially the total costs incurred (which include setup costs and inventory holding costs) and the economic production quantity model (which determines the quantity a enterprise and/or organization and/or retailer should order to minimize the total inventory costs by balancing the inventory holding cost and average fixed ordering cost). Examples of heuristic algorithms include the modified due date scheduling heuristic (which assumes that the objective of the scheduling process is to minimize substantially the total amount of time spent on tasks after their due dates) and shifting bottleneck heuristic (which minimize the time it takes to do work, or specifically, the makespan in a job shop, wherein the makespan is defined as the amount of time, from start to finish, to complete a set of multi-machine jobs where machine order is pre-set for each job, the jobs are assumed to be actually competing for the same resources (machines) resulting in one or more resources acting as a ‘bottleneck’ in the processing, whereby the heuristic, or ‘rule of thumb’ procedure substantially minimizes the effect of the bottleneck).
  • One algorithm is simulation modeling using discrete or continuous simulations. Discrete simulations are also known as discrete event simulations, and are event-based dynamic stochastic systems. In other words, the system, or supply chain, contains a number of states, and is modeled using a set of variables. If the value of a variable changes, this represents an event, and is reflected in a change in the system's state. As the system is dynamic, it is constantly changing, and because it is stochastic, there is an element of randomness in the system. Representation of discrete simulations is performed using state equations that contain all the variables influencing the system or supply chain. Continuous simulations also contain state variables; these however change continuously with time. Continuous simulations are usually modeled using differential equations that track the state of the system, or supply chain, with reference to time. The simulation's output data will only produce a likely estimate of real-world events (i.e., product shipment delivery). Methods to increase the accuracy of output data include: repeatedly performing simulations and comparing results, dividing events into batches and processing them individually, and checking that the results of simulations conducted in adjacent time periods “connect” to produce a coherent holistic view of the system. Normal analytical techniques make use of extensive mathematical models which require assumptions and restrictions to be placed on the model. This can result in an avoidable inaccuracy in the output data. Simulations avoid placing restrictions on the system and also take random processes into account; in fact in some cases simulation is the only practical modeling technique applicable.
  • The analytical engine 312 can use pattern or template matching to determine internal estimates. The patterns or templates can be based on historical data patterns and observed shipment times and/or on patterns or templates predetermined or predefined by system administrators. The analytical engine 312 can search by one or more of the time, location and setting. For example, for an earthquake in Asia having a specified severity level, the analytical engine 312 can search for other earthquake events in Asia over the last three years having a similar severity level and determine the actual shipment times and/or administrator shipping estimates or projections made for the currently selected or other supply chain to determine a current estimate or projection.
  • The analytical engine 312 can detect unreported events by identifying unexpected varations in collected performance information. For example, where one or more selected nodes of the supply chain experience a sudden drop in rate of on-time shipments or rise in rate of late shipments and the drop is sustained over a selected period, the analytical engine 312 can deduce that a disruptive event has occurred. The possibility of an occurrence of an unreported disruptive event can be reported to a system or supply chain enterprise and/or organization administrator. Likewise, the severity of an event and/or shipment projections can be changed and rendered more accurate by observing actual behavior following creation of the event or estimate or projection. This information can also be used to refine temporally proximate estimates or projections.
  • The analytical engine 312 and risk manager 316 can use other variables and/or algorithms to determine the relative health of the supply chain. For example, the analytical engine 312 can employ a metric—CpX, which can be a measure of risk and capable of substantially optimizing the supply chain. The metric can be determined through the collection, aggregation, and transformation of supply chain data, including performance information, and, when optimized, can modify system parameters of the logistic or supply chain system to reduce and/or optimize risk profiles for any selected supply chain parameter or object, typically a given product, a selected product line, and/or a customer account.
  • Risk can be determined given a time series of data collected by the data collection module. This data can be presented either as a first linear array (1×N) where N is the number of factors collected. The factors can include one or more of the factors, parameters, or supply chain characteristics identified herein. The factors can include risk factors, such as economic risk, environmental risk, geopolitical risk, societal risk, and technological risk. A transfer function (N×M) can relate the collection of such (risk) factors to variability (risk) of critical factors, (be they cost, time to delivery, the same or another risk factor, etc.), which is the (1×M) linear array. The (1×N) linear array can also be transformed into a single number or factor or given a coloration indicative of an “overall” metric of risk (variability). The overall metric of risk can be a supply chain health index or risk.
  • After optimization of the collected factors and comparing real data, the transfer function (N×M) can be substantially optimized—and it can represent the operational parameters of the supply chain (for better or worse).
  • To optimize the supply chain (or substantially minimize the magnitude of the 1×M scalar), one can apply a reverse transform function and fine tune the factors in the (1×N) linear array to effect the change—meaning for each optimal element 1 to . . . N, actual operations (e.g., order cycle, warehouse sizing, assembly line capacity, order aggregation, price, etc.) will be changed or modified to achieve the desired risk profile. Alternatively, risk protection can be set, configured, or determined at various levels by setting the scalar (high, medium, low) and changing the various offerings to meet the customer need—as some customers can deal with risk better than others).
  • Alternatively, given a multiple set of (1×N) and (1×M), a multitude or plurality of transfer functions can be determined, particularly where state or situational differences exist among one or more of business segments, product portfolios, customers profiles, etc. In such cases, the 1×M (minimum) linear array would likely be different, as would the substantially optimal 1×N linear array.
  • In cases where each supply chain situation or state is mutually exclusive, the solutions themselves will be likewise, mutually exclusive. In new scenarios, the linear combination of such solution would be applicable in direct proportion to their contribution, provided that there is no correlation between the solutions.
  • The risk manager 316 applies a rule or policy set or template to the information or output received from the analytical engine 312 and provides reporting information to the reporting module 320 for presentation to a (human) manager. The reporting information may include not only a warning (with an associated probability and/or level of confidence) that a noncompliant event will occur and optionally a recommendation on how to mitigate and/or avoid the noncompliant event. Mitigation recommendations include, for example, ordering products from a different facility of the tier 2 product assembler 104 and/or from a different tier 2 product assembler 104, using a type of freight company or specific freight company to provide faster incoming and/or outgoing product shipment, cancelling or altering an existing order (e.g., increase or decrease product quantity and/or delay or expedite product shipment date) with a tier 2 product assembler 104 and/or downstream distribution chain entity, shipping product from a different tier 1 facility to the selected destination in the distribution chain to offset the noncompliant event, and ship a different product to the selected destination in the distribution chain to offset the noncompliant event. The recommendation can be performed automatically by the risk manager 316.
  • The risk manager 316 can identify problems or choke points or bottlenecks in the supply chain, generate alerts and/or notifications to administrators of predetermined events (such as a monitored parameter falling below or exceeding a selected threshold), and/or provide recommended changes to the supply chain to provide greater reliability, more reliable and faster material and/or part and/or component and/or product manufacture and delivery cycles, more material turns, and reduced waste. The risk manager 316 at the tier 1 control tower 100 can do this, for example, by analyzing the reported performance information using advanced planning and scheduling techniques by which raw materials and production capacity are optimally allocated to meet demand. Recommendations could include restructuring tier 1, 2, 3 and 4 relationships, using differently located facilities for lesser or greater production, using different freight modes and/or carriers, and reconfiguring the layout and/or production unit operations within a selected facility. A performance risk can be associated with each recommendation based on factors, such as performance rating, geographic location of the recommended enterprise and/or organization relative to the geographic locations of the upstream enterprise and/or organization (if any) supplying the recommended enterprise and/or organization and of the downstream enterprise and/or organization (if any) receiving material and/or product from the recommended enterprise and/or organization, and/or the likelihood of a disruptive event impacting the recommended enterprise and/or organization and/or a shipment line associated therewith.
  • The risk manager 316 can determine a possible or potential financial impact on the enterprise or organization associated with each recommendation or, in the absence of any action, simply as a result of the event. The possible or potential financial impact can be done on one or more affected product lines and/or for the enterprise or organization as a whole. A risk or probability can be assigned to each possible or potential financial impact to form a type of risk portfolio. Pricing input from a price monitoring module (discussed below) can assist in determining product price increases as a result of the event. Decreases in demand for the product can be projected based on the price increase. The decreased demand can then be converted into a projected gross sales revenue to be used in the financial forecast. The possible or potential financial impact can be determined for an instance of an event or proactively if a selected event were to occur. Electronic manufacturing services, in particular, would benefit from this type of financial impact analysis.
  • The risk manager 316 can apply manufacturing process management or MPM and/or enterprise resource planning (“ERP”) and/or materials requirement planning (“MRP”) techniques. MPM is a collection of technologies and methods used to define how products are to be manufactured. MPM differs from ERP/MRP, which is used to plan the ordering of materials and other resources, set manufacturing schedules, and compile cost data. MPM can provide the central repository for the integration of all these tools and activities and aid in the exploration of alternative production line or sequence or cycle scenarios; making assembly lines more efficient with the aim of reduced lead time to product launch, shorter product times and reduced work in progress (WIP) inventories as well as allowing rapid response to product or product changes.
  • The risk manager can use scheduling algorithms to determine and/or identify recommended changes to the supply chain.
  • The risk manager can use pattern or template matching to determine and/or identify recommended changes to the supply chain. The patterns or templates can be based on historical data patterns and observed administrator responses and/or on patterns or templates predetermined or predefined by system administrators. The risk manager can search by one or more of the time, location and setting. For example, for an earthquake in Asia having a specified severity level, the risk manager can search for other earthquake events in Asia within the last three years having a similar severity level and determine the changes to the currently selected or other supply chain to determine a currently recommended set of changes.
  • The risk manager can use simulation modeling to determine and/or identify recommended changes to the supply chain.
  • The risk manager can use transportation theory to determine the optimal transportation and/or allocation of supply chain resources. Examples of transportation theory functions or principals include Wassertein metric, transport function, and the Hungarian algorithm.
  • The risk manager can use capacity planning, which is the process of determining the production capacity needed by the supply chain to meet changing demands for the branded products. In the context of capacity planning, “design capacity” is the maximum amount of work that the supply chain is capable of completing in a given period, “effective capacity” is the maximum amount of work that the supply chain is capable of completing in a given period due to constraints such as quality problems, delays, material handling, etc.
  • The risk manager can intelligently relate the geographical location of each facility in each tier with a partner facility in a higher tier and/or the relative shipping costs and/or standard deviation thereof from a facility in one tier to a partner facility in a higher tier and control relationships to reduce or substantially minimize transportation costs. This mapping, which can be in the form of a unit shipping cost from each facility in a lower tier to each facility in the adjacent higher tier, can also be used to intelligently order materials and/or components and/or products from a lower tier facility to an upper tier facility experiencing a supply constraint so as to maintain lower transportation or shipping costs.
  • The risk manager can intelligently relate the geographical location of each facility in each tier with a partner facility in a higher tier and/or the relative shipping time and/or standard deviation thereof from a facility in one tier to a partner facility in a higher tier and control relationships to reduce or substantially minimize transportation time. This mapping, which can be in the form of a shipping time from a point of loading at each facility in a lower tier to arrival at each facility in the adjacent higher tier, can also be used to intelligently order materials and/or components and/or products from a lower tier facility to an upper tier facility experiencing a supply constraint so as to maintain lower transportation or shipping times to substantially minimize disruptions in the distribution chain.
  • The risk manager can intelligently relate the rate of turnover or unit manufacturing time and standard deviation thereof from time of receipt of an order for a manufactured item to the time of shipping of the manufactured item for each facility in each tier, optionally associated with a shipping time required to ship the manufactured item to a partner facility in a higher tier and/or standard deviation thereof and control relationships to reduce or substantially minimize unit product manufacturing time. This mapping can also be used to intelligently order materials and/or components and/or products from a lower tier facility to an upper tier facility experiencing a supply constraint so as to maintain lower product manufacturing and transportation or shipping times to substantially minimize disruptions in the distribution chain.
  • The risk manager can intelligently relate the unit manufacturing cost, or price, of material and/or component and/or product and/or standard deviation thereof from each facility in each tier and optionally unit shipping costs from the facility in a lower tier to a partner facility in a higher tier and/or standard deviation thereof, and control supply and facility relationships to reduce or substantially minimize unit costs and/or prices at the lower tier facility or as delivered at the destination partner facility in the adjacent higher tier. This mapping, which can be in the form of a unit cost or price, optionally unit shipping cost from each facility in a lower tier to each facility in the adjacent higher tier, and total unit cost or price as delivered, can be used to intelligently order materials and/or components and/or products from a lower tier facility to an adjacent upper tier facility so as to maintain lower transportation or shipping costs.
  • In either of the prior cost mappings, each facility can have, in the adjacent lower tier and adjacent higher tier, order of partner facility preferences in the event of a need to order additional material and/or component and/or product to an upper tier facility experiencing a supply constraint so as to maintain lower unit costs and/or prices at the source facility and/or unit transportation or shipping costs and/or total unit costs and/or prices as delivered. In this manner, when a disruptive event adversely impacts supply from a facility or a facility is otherwise unable to meet an existing or new order for material and/or component and/or product the risk manager can easily select a next preferred supplier and forward the order or unsatisfied portion of the order to the next preferred facility.
  • As will be appreciated, any of the other estimates or projections described herein can include a level of confidence or probability that the estimate or projection is true or false (as appropriate).
  • The reporting module 320 provides the reporting information to tier 1 management. The reporting module 320 can not only provide reports containing performance information but also generate map displays. FIGS. 11-17 are a series of screen shots demonstrating reporting information provided by the reporting module 320.
  • With reference to FIG. 16, the display 1700 shows locations of various supply chain nodes, including the tier 2 product assembler 104, first, second, . . . nth tier 3 part/component manufacturers 108 a-n, and first, second, third, . . . mth tier 4 material suppliers 112 a-m. Material and/or part and/or component and/or product shipment lines 1704 a-g between the various related nodes can be shown. Different colors or shades of a common color can be assigned to each shipment line to indicate on-time shipments, slightly delayed shipments, moderately delayed shipments, and heavily delayed shipments. A disruptive event, such as a weather event, earthquake event, business disruption event, geo-political event, and financial disruption event, can be shown on the map at a location 1708 impacted by the event. A range of disruption 1712 is also assigned to the event indicating a likely spatial range impacted by the event. As will be appreciated, different event types and events for a given event type can have differing assigned spatial ranges of disruption. For example, an earthquake may have a larger spatial range of disruption than a storm, and an 8.0 earthquake on the Richter scale would have a larger spatial range of disruption than a 5.5 earthquake on the Richter scale. A range can be modeled by many techniques, such as by using a shape file. Additionally, moving a cursor over a node, shipment line, or event can cause a box or icon, such as shown by boxes 1722 and 1726, to appear providing relevant information about the associated one of the node, shipment line, or event. For example, relevant information about the node can include enterprise and/or organization name, materials and/or part and/or component and/or products supplied by the enterprise and/or organization, and one-hop related enterprises and/or organizations (e.g., the supplier to the selected node and the purchaser from the selected node). Relevant information about the shipment line can include the name of the freight carrier, number, type, and value of material and/or part and/or component and/or product currently being shipped, and the current status of the shipment. Relevant information for the event can include the event category, type and subtype and severity, number of materials and/or part and/or component and/or products impacted, number of downstream parts and/or components and/or products impacted (such as the parts and/or products supplied to the tier 2 product assembler 104), potential financial impact on the tier 1 control tower 100, and number of supply chain sites affected. The boxes in FIG. 16 show relevant shipment information including a number and value of products, parts, and/or components currently en route along the corresponding shipment line.
  • With reference to FIG. 11, the reporting module provides a display 1100 showing a location 1104 and impacted range 1108 of an event (a 4.9 earthquake) and locations 1112 and descriptions 1116 of various enterprises and/or organizations in the supply chain, namely companies 1-4 with relevant information provided about each enterprise and/or organization (e.g., role, location, and products, parts, and/or components provided to the supply chain). By moving the cursor over the location of the event, a box 1120 appears providing event information, including a description and location of the event, number of products impacted by the event, number of parts impacted by the event, potential financial impact of the event, and supply chain sites affected by the event. A message 1124 is also provided at the upper part of the display 1100 indicating a number of events (e.g., 4) potentially impacting the supply chain at the present time.
  • With reference to FIG. 12, the reporting module provides a display 1200 showing an administrator input box 1204 to provide event information to the data collection module. The input box 1204 includes fields for event type 1208, event subtype 1212, event epicenter 1216 (which lets the administrator elect whether to have the data collection module locate the epicenter or provide latitude and longitude of the epicenter), country of epicenter location 1220, postal code of epicenter location 1224, radius impacted by the event 1226, current risk (or severity) level 1228, event expiration date and time 1232, and event description 1236.
  • With reference to FIG. 13, the reporting module provides a display 1300 providing information about the impact of a selected event on the supply chain. The display 1300 includes a picture 1304 showing the epicenter and impact radius of the event and supply chain sites affected within the impact radius, a description of the event 1308, products potentially affected by the event 1312, parts and/or components potentially affected by the event 1316, and other potential supply chain impacts 1320.
  • With reference to FIG. 14, the reporting module provides a display 1400 showing events occurring over a selected time period. Each event description 1404 shows event type, event date, event severity, number of products, parts, or components affected, and revenue impact on the selected enterprise and/or organization.
  • With reference to FIG. 15, the reporting module provides a display 1500 showing a product, part, or component supplier description for a selected company (e.g., enterprise or organization). The description includes a supplier risk category 1504 (e.g., low, moderate, and high) and the various factors used in developing the risk category. These factors are: supplier performance score 1508 (based on historical supplier performance information), supplier location score 1512 (the degree to which the supplier site location can positively or negatively impact supply chain performance), supplier financial score 1516 (the degree to which the supplier financial condition can positively or negatively impact supply chain performance), and supplier geo-political score 1520 (the degree to which the geo-political location of the supplier can positively or negatively impact supply chain performance). The risk category is determined by the risk manager for each tier 1 control tower server 204, tier 2 assembler server 212, first, second, . . . nth tier 3 component manufacturer server 216 a-n, and first, second, third, . . . mth tier 4 material (e.g., part and/or component) supplier server 220 a-m, and the performance, location, financial, and geo-political scores are determined by the analytical engine, for each tier 1 control tower server 204, tier 2 assembler server 212, first, second, . . . nth tier 3 component manufacturer server 216 a-n, and first, second, third, . . . mth tier 4 material supplier server 220 a-m. The performance, location, financial, and geo-political scores can be assigned by the analytical engine and/or administrators. The supplier risk category and performance, location, financial, and geo-political scores are not limited to suppliers but may be assigned not only to the tier 1 control tower 100, tier 2 assembler 104, first, second, . . . nth tier 3 component manufacturer 108 a-n, and first, second, third, . . . mth tier 4 material supplier 112 a-m but also freight carriers between and among two or more of the foregoing.
  • Operation of the Tier 1 Control Tower Supply Chain Management System
  • Referring to FIG. 4, the operation of the data collection module 300 will be discussed.
  • In step 400, the data collection module 300 receives a stimulus. Stimuli include, for example, a request from a tier 1 manager, reported performance information received from a lower tier partner, a request from the risk manager 316 and/or scheduling module 304 and/or analytical engine 312, passage of time, and the like.
  • In step 404, the data collection module 300 selects a (next) supply chain node to query for performance information.
  • In step 408, the data collection module 300 accesses, or receives, the performance information.
  • In decision diamond 412, the data collection module 300 determines whether there is a next supply chain node to be considered for performance information. If so, the data collection module 300 returns to step 404. If not, the data collection module 300 returns to step 400 and awaits the next stimulus instance.
  • Referring to FIG. 5, the operation of the scheduling module 304 will be discussed. In step 500, the scheduling module 304 receives a stimulus. Stimuli include, for example, a request from a tier 1 manager, notification by the data collection module 300 of newly received and/or updated reported performance information, a request from the risk manager 316 and/or analytical engine 312, passage of time, and the like.
  • In step 504, the scheduling module 304 updates supply chain node-supplied scheduling information, or product delivery estimates, based on the reported performance information and/or the internally generated product delivery estimates. The scheduling information includes, for example, projected shipment arrival dates for products from the tier 2 product assembler 104 and required shipment departure dates for branded products to customers, wholesalers, and/or retailers. Each of the shipment arrival and departure dates can be linked to a set of data structures describing the shipment, including shipment source and destination, freight carrier, freight tracking information, current shipment status, shipment contents (by product type and number), date of shipment, and the like).
  • In step 508, the scheduling module 304 updates the delivery commitment material and/or part and/or component and/or product scheduling information based on distribution chain performance or scheduling information, supply chain requirements, and/or projections.
  • In decision diamond 512, the scheduling module 304 compares the results of steps 504 and 508 and determines whether there is a product delivery scheduling problem.
  • When there is a scheduling problem, the scheduling module 304, in step 516, notifies the risk manager.
  • When no scheduling problem exists, the scheduling module 304 updates the database and returns to step 500 to await the next stimulus instance.
  • FIG. 7 depicts operation of the analytical engine.
  • Upon detection of stimulus in step 500, the analytical engine, in step 600, retrieves current performance data for each supply chain node.
  • In step 604, the analytical engine, for each tier 1 supply chain node or facility, determines a likely product shipping and/or receipt date from each tier 2 node or facility.
  • In step 608, the analytical engine, using the results of step 604 and other data, determines, for each tier 2 supply chain node, a likely component shipping and/or receipt date from each tier 3 node or facility.
  • In step 612, the analytical engine, using the results of step 608 and other data, determines, for each tier 3 supply chain node, a likely component shipping and/or receipt date from each tier 4 node or facility.
  • In step 616, the analytical engine 312 compares the results of steps 604, 608 and 612 and determines whether there is a material and/or part and/or component and/or product delivery scheduling problem at any tier. As will be appreciated, a material and/or part and/or component and/or product delivery scheduling problem is not limited to material and/or part and/or component and/or product delivery shortfalls relative to distribution chain demands or requirements. A material and/or part and/or component and/or product delivery scheduling problem can also exist when too much product inventory is on hand at a tier 1 facility. In that event, supply chain requirements may need to be decreased to delay or reduce material and/or part and/or component and/or product delivery. This determination can be made by comparing on-hand product inventory to distribution chain demands or requirements. When at least a first threshold level but no more than a second threshold level of inventory is on hand (after projected product delivery), a correct inventory level is present at a tier 1 facility. When more than the second threshold level of inventory is on hand (after projected product delivery), an over-inventory condition exists and a modification to the supply chain requirements is appropriate.
  • When there is a scheduling problem, the analytical engine, in step 620, notifies the risk manager.
  • When no scheduling problem exists, the analytical engine updates the database and returns to step 500 to await the next stimulus instance.
  • FIG. 7 depicts the operation of the risk manager.
  • In step 700, the risk manager receives a stimulus. Stimuli include, for example, a request from a tier 1 manager, a notification received from the analytical engine, passage of time, and the like. When necessary, the risk manager queries the analytical engine for an analysis of performance information.
  • In step 704, the risk manager retrieves the appropriate rule or policy set or template from the database.
  • In step 708, the risk manager determines, based on a comparison of the material and/or part and/or component and/or product delivery scheduling problem with the appropriate rule or policy set or template, an appropriate action to be taken.
  • A first appropriate action 712 is to notify tier 1 management of the material and/or part and/or component and/or product delivery scheduling problem.
  • A second appropriate action 716 is to notify management of each of the responsible lower tier node(s) of the product delivery scheduling problem and request a proposed mitigation measure to obviate the material and/or part and/or component and/or product delivery scheduling problem.
  • A third appropriate action 720 is to identify an alternate lower tier node(s) to resolve the material and/or part and/or component and/or product delivery scheduling problem and/or query an alternative node(s) for availability in assisting in mitigating and/or rectifying the material and/or part and/or component and/or product delivery scheduling problem. For example, an alternative facility of a tier partner can be queried to assist in increasing or decreasing production to mitigate and/or rectify the product delivery scheduling problem at a companion facility of the tier partner. An alternative tier partner can be queried to assist in increasing or decreasing production to mitigate and/or rectify the material and/or part and/or component and/or product delivery scheduling problem at a competitive tier partner.
  • Other appropriate action(s) 724 include providing a recommendation to tier 1 management of mitigation measure(s) to address and/or rectify the material and/or part and/or component and/or product delivery scheduling problem, a combination of any of the foregoing actions, ship on-hand product inventory from a different tier 1 facility to the demand chain partner, and the like.
  • Multi-Supply Chain Management System
  • With reference to FIG. 8, a multi-supply chain management system 800 is depicted. The system 800 includes first, second, . . . xth communication devices 804 a-x, shipment enterprise and/or organization server(s) 250, supply chain server(s) 808, the accessible information source(s) 812, shipment enterprise and/or organization server 250, and supply chain management platform 816, interconnected by the wide area network 228.
  • The first, second, . . . xth communication devices 804 a-x can be personal communication devices, such as laptops, personal computers, tablet computers, personal digital assistants, and cellular phones, and/or enterprise or organization communication devices, such as servers.
  • The supply chain server(s) correspond to multiple different and independent supply chains. Each supply chain includes, with reference to FIG. 1, a tier 1 control tower 100 and accompanying server 204, tier 2 assembler 104 and accompanying server 212, first, second, . . . nth tier 3 part/component manufacturer 108 a-n and accompanying servers 216 a-n, and first, second, third, . . . mth tier 4 material supplier 112 a-m and accompanying servers 220 a-m.
  • The supply chain management platform 816 comprises not only the data collection module 300, risk manager 316, scheduling module 304, reporting module 320, analytical engine 312, and historical state module 308 but also a gateway 820, application programming interface(s) 824 (one of which typically corresponds to each of the data collection module 300, risk manager 316, scheduling module 304, reporting module 320, analytical engine 312, and historical state module 308), security module 828, and pricing monitoring module 850. All of the components are interconnected by a trusted local area network 832.
  • The gateway 820 is a network point (e.g., a router) that acts as an entrance to the local area network 832. The gateway node can also act as a proxy server and/or a firewall to provide security to the local area network 832.
  • The application programming interface(s) 824 define or specify how software components interact with one another. Typically, each API is a library that includes specification for routines, data structures, object classes, and variables. The API may be implemented in a procedural language or object-oriented language. An API specification can take many forms, including an International Standard such as POSIX, vendor documentation such as the Microsoft Windows™ API and/or the libraries of a programming language, e.g., Standard Template Library in C++ or Java API. An API differs from an application binary interface (ABI) in that an API is source code based while an ABI is a binary interface. The data collection module 300, risk manager 316, scheduling module 304, reporting module 320, analytical engine 312, and historical state module 308 commonly use a common API or different APIs that are configured substantially the same. Generally, all internal and external signaling, including inter-application, intra-application, and/or inter-device messages, pass through APIs.
  • The security module 828 enforces access privileges and thereby maintains data security for each enterprise, organization, and supply chain. This can be important as supply chains of competitors may be simultaneously using the platform 816 for supply chain management.
  • The security module 828 can employ a variety of techniques.
  • One technique is application-based, which determines whether the user has permission to access one or more of the data collection module 300, risk manager 316, scheduling module 304, reporting module 320, analytical engine 312, and historical state module 308. This can be determined using licensing techniques, whereby the user is subjected to access and/or feature restrictions depending on payments made to the platform operator.
  • Another technique is API-based, which determines whether the user has permission to access one or more of the APIs. Although the user may be licensed to use an application, he or she may not be licensed or privileged to use one or more APIs within that application. Permission can also be determined using licensing techniques, whereby the user is subjected to access and/or feature restrictions depending on payments made to the platform operator, or enforcement of privileges. The query, command, and/or request is typically further required to conform to the requirements of the application programming interface and, when the query, command, and/or request fails to conform to the requirements of the application programming interface, the security module can deny the query, command, and/or request even though the requestor has permission to use the API.
  • Another technique is data entity or role-based, whereby specified roles can create, read, update, and delete specified objects. For example, a system 816 administrator role can create, read, update and delete enterprise and/or organization, administrator, organization, site, item, and user objects. An administrator for an enterprise and/or organization in a particular supply chain, by contrast, can create, read, update, and delete administrators, users, organizations, sites, and items but only for the particular enterprise and organization. An event manager for an enterprise and/or organization can create site, item, item-site relationships, item-item relationships, and supply chain events but only for the particular enterprise and organization.
  • Yet another technique is field level-based, which determines whether or not the user has permission to view or change the field. This technique can also be role-based.
  • In either of the data entity or field level-based techniques, data objects can have different states (e.g., a purchase order can have different states) and be viewed as state machines, whereby a state of a data object is changed by an action. Stated another way, actions cause transitions between states. Each state has a collection of actions that are allowed and permissions associated with performing an action. States can have sub-states for a particular role type. For example, a seller may have a requirement to approve a sell price by a manager before committing the order. Basically, all actions can update an artifact except the first one (create). When an update or delete request is received, the security module or API checks the permissions for the state. When permitted, the update is executed and the the artifact assigned a next state or the artifact deleted.
  • Yet another technique is to control the structure of, or restructure, database queries, commands or requests to comply with relevant sets of permissions. A requestor can write any database query, command, or request desired. The security module receives and applies a security definition to the query, command, or request. If required, the security module edits the query, command, or request consistent with the security definition. The revised or restructured query, command, or request is then passed onto the API of the data collection module. By way of example, assume that there are two supply chains, with the tier 1 control tower on one supply chain being associated with Hewlett Packard™ laptops and the tier 1 control tower on the other supply chain being associated with Dell™ laptops. They each share a common tier 3 component manufacturer, namely Intel™, which supplies integrated circuit boards to each supply chain. A Dell employee provides the following query to the platform 800:
  • Q: Select * from order where Seller=* and Buyer=*, where “*” is a wildcard. This query, if executed, would provide the Dell™ employee with all rows and fields in both the Hewlett Packard™ and Dell™ supply chains. To provide the Dell employee with the supply chain information to which he or she is entitled, the security module can restructure the query as follows:
  • Q: Select * from order where Seller=Dell or Buyer=Dell. This query provides the requestor with only rows and fields in which Dell is either seller or buyer. Because Intel™ is common to both supply chains, the following query “Q:Select * from order where Seller=Intel or Buyer=Intel will retrieve rows and fields from both supply chains in which Intel is either seller or buyer. In this manner, the security module can implement both row-based and field-based access restrictions, in a readily scalable format, without requiring users associated with enterprises and organizations in the supply chain to voluntarily restrict database queries, commands, and requests in accordance with a particular grammar or language.
  • While the security module is discussed with reference to information involving only a particular enterprise or organization, it is to be understood that the enterprises and organizations within a supply chain can agree to provide information to other enterprises and organizations located upstream of downstream in the supply chain, such as to the tier 1 control tower. In such cases, the security definition takes such expanded information access into consideration.
  • The security module can enable the collected information to be maintained in one data location (and common database) without the use of a partitioned database. In other words, the database is not partitioned logically (horizontally or vertically) into distinct and independent parts corresponding to different monitored supply chains, and the data and/or data structures for different monitored supply chains can be commingled and/or conform to a common data model in the database. This can enable the use of a simpler data model that enables ease of constructing relationships between enterprises and organizations, provide stability, and provide scalability. Each data row of the model can have a different schema. The data model can also enable sharing of information across and among different supply chains.
  • The pricing monitoring module 850 monitors long term contract and spot market prices on materials and/or parts and/or components and/or products and generates alarms or notifications when the monitored prices change upwards or downwards beyond specified thresholds. This can be done effectively by identifying all materials and/or parts and/or components within a selected product. For example, a bill of materials can provide visibility into the various materials and/or parts and/or components of a selected product. An integrated circuit board, for instance, includes a broad number of raw materials, such as silicon, dopants, conductive metals for traces and other conductive structures, and device subcomponents, such as microprocessors, memory modules, etc., and is itself a device used in many end products. The pricing module 850 would monitor prices not only for the raw materials but also for the subcomponents and the device itself. Sudden changes in raw materials prices can provide an advance indication of price changes in the device. This can be used by the pricing monitoring module 850 not only to estimate the resulting device price but also indicate to administrators that additional inventory of the device should be acquired before the price changes. An example of a price estimation algorithm is to determine how much of the raw material is used in the device and the net total increase in cost for the device manufacturer. This net cost increase can be added to the current price to provide a fairly reliable cost estimate.
  • The analytical engine 320 can also calculate and update performance measures as information is collected by the data collection module 300. In other words, the calculation and updating of performance measures is done substantially in real time. Alternatively, the analytical engine 320 can calculate the performance measures when and as requested by a user. In other words, the performance measures are not precalculated. This can obviate the need for an analytics database altogether.
  • Operation of the Security Module 828
  • With reference to FIG. 9, the operation of the security module 828 will be discussed.
  • In step 900, the supply chain management platform 816 receives an access request, such as a query, command, or request. The access request can be from a platform administrator or user or from an administrator or member of an enterprise or organization in a supply chain monitored by the platform 816 (hereinafter “requestor”).
  • The security process begins in decision diamond 904, in which the security module 828 determines whether the requestor has permission to use the application to which the access request is directed and the API associated with the application or function or feature of the application to process the access request.
  • When the requestor has permission to use the application and API, the security module 828, in decision diamond 908, determines whether the requestor is privileged to interact with the data entity. As noted, this query determines whether the requestor has a specified role privileged to create, read, update, and delete the specified data object.
  • When the requestor does not have permission to use either the application or the specific API of the application involved in processing the access request or is not privileged to interact with the data entity or object, the security module 828 proceeds to step 928 and denies the request.
  • When the requestor is privileged to interact with the data entity or object, the security module 828 proceeds to step 912 and applies a security definition to the access request and, if required, edits or reconfigures the access request consistent with the applied security definition.
  • In step 916, the security module 828 forwards the edited request to the application, e.g., the data collection module 300, risk manager 316, scheduling module 304, reporting module 320, analytical engine 312, and/or historical state module 308, for processing.
  • In optional step 920, the security module 828 receives the response and filters out any information that the requestor is not privileged to access. This is a precautionary step in the event that a database error has caused information to be retrieved improperly.
  • In step 924, the security module 828 routes the response to the requestor optionally through the appropriate API.
  • Operation of the Pricing Monitoring Module 850
  • The operation of the pricing monitoring module 850 will now be discussed with reference to FIG. 10.
  • In step 1000, the pricing monitoring module 850 detects a stimulus. The stimulus can be, for example, expiration of a selected time period.
  • In step 1004, the pricing monitoring module 850 selects a next product for consideration. This step can be done on a supply chain-by-supply chain basis and, for a given supply chain, for one or more selected enterprises or organizations within the supply chain. For example and with reference to FIG. 1, the product can be a product sold by one or more of a tier 1 control tower server 204, tier 2 assembler server 212, first, second, . . . nth tier 3 component manufacturer server 216 a-n, and first, second, third, . . . mth tier 4 material supplier server 220 a-m.
  • In step 1008, the pricing monitoring module 850 selects a next component(I) of the selected product. As noted, the component can be a raw or processed material, formulation, device, or other component.
  • In step 1012, the pricing monitoring module 850 determines a current pricing information for the selected component. This is typically done using one or more accessible information source(s) 224, such as by browsing the Web.
  • In decision diamond 1016, the pricing monitoring module 850 determines whether the current pricing information for the selected component differs materially from a previously determined or currently realized pricing for the component. “Materially” is typically determined by one or more thresholds. If the price rises or falls in excess of a predetermined threshold, the pricing change is deemed to be material.
  • When a price change is material, the pricing monitoring module 850, in step 1020, generates an alarm and/or notification to an administrator of the pertinent enterprise and/or organization.
  • In decision diamond 1024, the pricing monitoring module 850 determines whether all components for the selected product have been considered.
  • When there is no material pricing change (decision diamond 1016) or all components have not been considered, the pricing monitoring module 850 returns to step 1008 and selects a next component for pricing analysis.
  • When all components have been considered, the pricing monitoring module 850, in step 1028, determines a new price for the selected product.
  • The pricing monitoring module 850 then returns to step 1004 and selects a next product for analysis.
  • The pricing monitoring module 850 and analytical engine can determine a financial impact on a supplier of the product and/or downstream user of the product. The financial impact analysis can be done for the selected product or across all product lines of the supplier and/or downstream user and/or for the supply chain as a whole.
  • The exemplary systems and methods of this disclosure have been described in relation to a computer network. However, to avoid unnecessarily obscuring the present disclosure, the preceding description omits a number of known structures and devices. This omission is not to be construed as a limitation of the scopes of the claims. Specific details are set forth to provide an understanding of the present disclosure. It should however be appreciated that the present disclosure may be practiced in a variety of ways beyond the specific detail set forth herein.
  • Furthermore, while the exemplary aspects, embodiments, and/or configurations illustrated herein show the various components of the system collocated, certain components of the system can be located remotely, at distant portions of a distributed network, such as a LAN and/or the Internet, or within a dedicated system. Thus, it should be appreciated, that the components of the system can be combined in to one or more devices, such as a server, or collocated on a particular node of a distributed network, such as an analog and/or digital telecommunications network, a packet-switch network, or a circuit-switched network. It will be appreciated from the preceding description, and for reasons of computational efficiency, that the components of the system can be arranged at any location within a distributed network of components without affecting the operation of the system. For example, the various components can be located in a switch such as a PBX and media server, gateway, in one or more communications devices, at one or more users' premises, or some combination thereof. Similarly, one or more functional portions of the system could be distributed between a telecommunications device(s) and an associated computing device.
  • Furthermore, it should be appreciated that the various links connecting the elements can be wired or wireless links, or any combination thereof, or any other known or later developed element(s) that is capable of supplying and/or communicating data to and from the connected elements. These wired or wireless links can also be secure links and may be capable of communicating encrypted information. Transmission media used as links, for example, can be any suitable carrier for electrical signals, including coaxial cables, copper wire and fiber optics, and may take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
  • Also, while the flowcharts have been discussed and illustrated in relation to a particular sequence of events, it should be appreciated that changes, additions, and omissions to this sequence can occur without materially affecting the operation of the disclosed embodiments, configuration, and aspects.
  • A number of variations and modifications of the disclosure can be used. It would be possible to provide for some features of the disclosure without providing others.
  • For example in one alternative embodiment, the techniques discussed herein are applied to animate objects, such as processing people, particularly at a check point. The Department of Homeland Security can use the management systems to process people more effectively at airport security checkpoints and the Immigration and Naturalization Service can use the management systems to process more effectively at border crossings.
  • In another alternative embodiment, the techniques discussed herein can be applied to inanimate objects, such as mail or packages, such as by a postal, courier or freight service.
  • In yet another embodiment, the systems and methods of this disclosure can be implemented in conjunction with a special purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device or gate array such as PLD, PLA, FPGA, PAL, special purpose computer, any comparable means, or the like. In general, any device(s) or means capable of implementing the methodology illustrated herein can be used to implement the various aspects of this disclosure. Exemplary hardware that can be used for the disclosed embodiments, configurations and aspects includes computers, handheld devices, telephones (e.g., cellular, Internet enabled, digital, analog, hybrids, and others), and other hardware known in the art. Some of these devices include processors (e.g., a single or multiple microprocessors), memory, nonvolatile storage, input devices, and output devices. Furthermore, alternative software implementations including, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.
  • In yet another embodiment, the disclosed methods may be readily implemented in conjunction with software using object or object-oriented software development environments that provide portable source code that can be used on a variety of computer or workstation platforms. Alternatively, the disclosed system may be implemented partially or fully in hardware using standard logic circuits or VLSI design. Whether software or hardware is used to implement the systems in accordance with this disclosure is dependent on the speed and/or efficiency requirements of the system, the particular function, and the particular software or hardware systems or microprocessor or microcomputer systems being utilized.
  • In yet another embodiment, the disclosed methods may be partially implemented in software that can be stored on a storage medium, executed on programmed general-purpose computer with the cooperation of a controller and memory, a special purpose computer, a microprocessor, or the like. In these instances, the systems and methods of this disclosure can be implemented as program embedded on personal computer such as an applet, JAVA® or CGI script, as a resource residing on a server or computer workstation, as a routine embedded in a dedicated measurement system, system component, or the like. The system can also be implemented by physically incorporating the system and/or method into a software and/or hardware system.
  • Although the present disclosure describes components and functions implemented in the aspects, embodiments, and/or configurations with reference to particular standards and protocols, the aspects, embodiments, and/or configurations are not limited to such standards and protocols. Other similar standards and protocols not mentioned herein are in existence and are considered to be included in the present disclosure. Moreover, the standards and protocols mentioned herein and other similar standards and protocols not mentioned herein are periodically superseded by faster or more effective equivalents having essentially the same functions. Such replacement standards and protocols having the same functions are considered equivalents included in the present disclosure.
  • The present disclosure, in various aspects, embodiments, and/or configurations, includes components, methods, processes, systems and/or apparatus substantially as depicted and described herein, including various aspects, embodiments, configurations embodiments, subcombinations, and/or subsets thereof. Those of skill in the art will understand how to make and use the disclosed aspects, embodiments, and/or configurations after understanding the present disclosure. The present disclosure, in various aspects, embodiments, and/or configurations, includes providing devices and processes in the absence of items not depicted and/or described herein or in various aspects, embodiments, and/or configurations hereof, including in the absence of such items as may have been used in previous devices or processes, e.g., for improving performance, achieving ease and\or reducing cost of implementation.
  • The foregoing discussion has been presented for purposes of illustration and description. The foregoing is not intended to limit the disclosure to the form or forms disclosed herein. In the foregoing Detailed Description for example, various features of the disclosure are grouped together in one or more aspects, embodiments, and/or configurations for the purpose of streamlining the disclosure. The features of the aspects, embodiments, and/or configurations of the disclosure may be combined in alternate aspects, embodiments, and/or configurations other than those discussed above. This method of disclosure is not to be interpreted as reflecting an intention that the claims require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed aspect, embodiment, and/or configuration. Thus, the following claims are hereby incorporated into this Detailed Description, with each claim standing on its own as a separate preferred embodiment of the disclosure.
  • Moreover, though the description has included description of one or more aspects, embodiments, and/or configurations and certain variations and modifications, other variations, combinations, and modifications are within the scope of the disclosure, e.g., as may be within the skill and knowledge of those in the art, after understanding the present disclosure. It is intended to obtain rights which include alternative aspects, embodiments, and/or configurations to the extent permitted, including alternate, interchangeable and/or equivalent structures, functions, ranges or steps to those claimed, whether or not such alternate, interchangeable and/or equivalent structures, functions, ranges or steps are disclosed herein, and without intending to publicly dedicate any patentable subject matter.

Claims (24)

What is claimed is:
1. A system for monitoring multiple supply chains for different products, performance information collected for each monitored supply chain being confidential to the respective monitored supply chain and being stored in a common database, comprising:
a microprocessor executable security module operable to receive a query, command and/or request from a requestor to perform an operation with respect to a set of data and/or data structures in the database, modify the query, command and/or request to conform to a security definition, and use the modified query, command and/or request to perform the operation.
2. The system of claim 1, wherein the database is not partitioned logically into distinct and independent parts corresponding to different monitored supply chains and wherein the data and/or data structures for different monitored supply chains are commingled in the database.
3. The system of claim 1, wherein the query, command and/or request is modified by the security module to reflect a supply chain role and/or an identity of an enterprise and/or organization associated with the requestor, whereby the data and/or data structures impacted by the query, command, and/or request are limited to those relating to the supply chain role and/or identity of the enterprise and/or organization associated with the requestor.
4. The system of claim 1, wherein the security module determines whether the requestor has permission to use an application associated with the operation and, when the requestor is without permission to use the application, denies the query, command, and/or request.
5. The system of claim 1, wherein the query, command, and/or request is required to pass through an application programming interface prior to performance of the operation and wherein the security module determines whether the requestor has permission to use the application programming interface and/or whether the query, command and/or request conforms to the requirements of the application programming interface and, when the requestor is without permission to use the application programming interface and/or when the query, command, and/or request fails to conform to the requirements of the application programming interface, denies the query, command, and/or request.
6. The system of claim 1, wherein the requestor is required to have a specified role and relationship to a selected monitored supply chain enterprise and/or organization before the operation can be performed.
7. The system of claim 1, wherein a datum and/or datum structure of the set of data and/or data structures has different states, wherein an action must be performed to change the state of the datum and/or datum structure, wherein each action can only be performed when the requestor has a permission to perform the action, and wherein one of the different states has plural sub-states that must be performed before the state can change.
8. The system of claim 1, wherein supply chain performance metrics are not calculated, in substantial real time, based on the performance information collected from the monitored supply chains.
9. A method, comprising:
monitoring multiple supply chains for different products, performance information collected for each monitored supply chain being confidential to the respective monitored supply chain and stored in a common database;
a microprocessor executable security module receiving a query, command and/or request from a requestor to perform an operation with respect to a set of data and/or data structures in the database;
the security module modifying the query, command and/or request to conform to a security definition; and
the security module using the modified query, command and/or request to perform the operation.
10. The method of claim 9, wherein the database is not partitioned logically into distinct and independent parts corresponding to different monitored supply chains and wherein the data and/or data structures for different monitored supply chains are commingled in the database.
11. The method of claim 9, wherein the query, command and/or request is modified by the security module to reflect a supply chain role and/or an identity of an enterprise and/or organization associated with the requestor, whereby the data and/or data structures impacted by the query, command, and/or request are limited to those relating to the supply chain role and/or identity of the enterprise and/or organization associated with the requestor.
12. The method of claim 9, wherein the security module determines whether the requestor has permission to use an application associated with the operation and, when the requestor is without permission to use the application, denies the query, command, and/or request.
13. The method of claim 9, wherein the query, command, and/or request is required to pass through an application programming interface prior to performance of the operation and wherein the security module determines whether the requestor has permission to use the application programming interface and/or whether the query, command and/or request conforms to the requirements of the application programming interface and, when the requestor is without permission to use the application programming interface and/or when the query, command, and/or request fails to conform to the requirements of the application programming interface, denies the query, command, and/or request.
14. The method of claim 9, wherein the requestor is required to have a specified role and relationship to a selected monitored supply chain enterprise and/or organization before the operation can be performed.
15. The method of claim 9, wherein a datum and/or datum structure of the set of data and/or data structures has different states, wherein an action must be performed to change the state of the datum and/or datum structure, wherein each action can only be performed when the requestor has a permission to perform the action, and wherein one of the different states has plural sub-states that must be performed before the state can change.
16. The method of claim 9, wherein supply chain performance metrics are not calculated, in substantial real time, based on the performance information collected from the monitored supply chains.
17. A tangible and non-transient computer readable medium comprising microprocessor executable instructions that, when executed, perform tasks comprising:
monitoring multiple supply chains for different products, performance information collected for each monitored supply chain being confidential to the respective monitored supply chain and stored in a common database;
receive a query, command and/or request from a requestor to perform an operation with respect to a set of data and/or data structures in the database;
modify the query, command and/or request to conform to a security definition; and
use the modified query, command and/or request to perform the operation.
18. The computer readable medium of claim 17, wherein the database is not partitioned logically into distinct and independent parts corresponding to different monitored supply chains and wherein the data and/or data structures for different monitored supply chains are commingled in the database.
19. The computer readable medium of claim 17, wherein the query, command and/or request is modified by the instructions to reflect a supply chain role and/or an identity of an enterprise and/or organization associated with the requestor, whereby the data and/or data structures impacted by the query, command, and/or request are limited to those relating to the supply chain role and/or identity of the enterprise and/or organization associated with the requestor.
20. The computer readable medium of claim 17, wherein the instructions determine whether the requestor has permission to use an application associated with the operation and, when the requestor is without permission to use the application, denies the query, command, and/or request.
21. The computer readable medium of claim 17, wherein the query, command, and/or request is required to pass through an application programming interface prior to performance of the operation and wherein the instructions determine whether the requestor has permission to use the application programming interface and/or whether the query, command and/or request conforms to the requirements of the application programming interface and, when the requestor is without permission to use the application programming interface and/or when the query, command, and/or request fails to conform to the requirements of the application programming interface, denies the query, command, and/or request.
22. The computer readable medium of claim 17, wherein the requestor is required to have a specified role and relationship to a selected monitored supply chain enterprise and/or organization before the operation can be performed.
23. The computer readable medium of claim 17, wherein a datum and/or datum structure of the set of data and/or data structures has different states, wherein an action must be performed to change the state of the datum and/or datum structure, wherein each action can only be performed when the requestor has a permission to perform the action, and wherein one of the different states has plural sub-states that must be performed before the state can change.
24. The computer readable medium of claim 17, wherein supply chain performance metrics are not calculated, in substantial real time, based on the performance information collected from the monitored supply chains.
US13/935,209 2012-07-05 2013-07-03 Method and system for managing multiple supply chains Abandoned US20140019471A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/935,209 US20140019471A1 (en) 2012-07-05 2013-07-03 Method and system for managing multiple supply chains

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201261668282P 2012-07-05 2012-07-05
US201261716960P 2012-10-22 2012-10-22
US201361750184P 2013-01-08 2013-01-08
US201361800197P 2013-03-15 2013-03-15
US13/935,209 US20140019471A1 (en) 2012-07-05 2013-07-03 Method and system for managing multiple supply chains

Publications (1)

Publication Number Publication Date
US20140019471A1 true US20140019471A1 (en) 2014-01-16

Family

ID=49882607

Family Applications (5)

Application Number Title Priority Date Filing Date
US13/935,209 Abandoned US20140019471A1 (en) 2012-07-05 2013-07-03 Method and system for managing multiple supply chains
US13/935,161 Abandoned US20140018950A1 (en) 2012-07-05 2013-07-03 Method and system for identifying events adversely impacting supply chain performance
US13/935,114 Active 2035-01-12 US10146214B2 (en) 2012-07-05 2013-07-03 Method and system for collecting supply chain performance information
US13/935,198 Abandoned US20140018951A1 (en) 2012-07-05 2013-07-03 Method and system for determining and managing supply chain risk
US13/935,224 Abandoned US20140019189A1 (en) 2012-07-05 2013-07-03 Method and system for controlling supply chain pricing

Family Applications After (4)

Application Number Title Priority Date Filing Date
US13/935,161 Abandoned US20140018950A1 (en) 2012-07-05 2013-07-03 Method and system for identifying events adversely impacting supply chain performance
US13/935,114 Active 2035-01-12 US10146214B2 (en) 2012-07-05 2013-07-03 Method and system for collecting supply chain performance information
US13/935,198 Abandoned US20140018951A1 (en) 2012-07-05 2013-07-03 Method and system for determining and managing supply chain risk
US13/935,224 Abandoned US20140019189A1 (en) 2012-07-05 2013-07-03 Method and system for controlling supply chain pricing

Country Status (5)

Country Link
US (5) US20140019471A1 (en)
EP (2) EP2852922A4 (en)
JP (1) JP2015528946A (en)
CN (4) CN104412283B (en)
WO (1) WO2014008386A2 (en)

Cited By (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140019189A1 (en) * 2012-07-05 2014-01-16 Flextronics Ap, Llc Method and system for controlling supply chain pricing
US20140278706A1 (en) * 2009-12-01 2014-09-18 Jochen Lothar Leidner Methods and systems for generating supply chain representations
US20150088585A1 (en) * 2013-09-26 2015-03-26 International Business Machines Corporation Supply chain management using problem and remediation propagation modeling
US20150120373A1 (en) * 2013-10-25 2015-04-30 Jabil Circuit, Inc. Systems and methods for risk processing and visualization of supply chain management system data
US20150142500A1 (en) * 2013-11-15 2015-05-21 International Business Machines Corporation Decision support system for inter-organizational inventory transshipment
US20150178645A1 (en) * 2013-12-20 2015-06-25 The Dun & Bradstreet Corporation Discovering a business relationship network, and assessing a relevance of a relationship
US20150193566A1 (en) * 2012-06-29 2015-07-09 Jerome Rolia Capacity planning system
US20150235171A1 (en) * 2014-02-17 2015-08-20 United Parcel Service Of America, Inc. Systems, methods, and computer program products for providing intelligent visibility across an outcome-based service cycle infrastructure
US20150242778A1 (en) * 2014-02-24 2015-08-27 Bank Of America Corporation Vendor Management System
US20150310021A1 (en) * 2014-04-28 2015-10-29 International Business Machines Corporation Big data analytics brokerage
US20150347941A1 (en) * 2014-05-30 2015-12-03 General Electric Company Method and system for complex dynamic supply chain systems modeling management and optimization
US20150370890A1 (en) * 2014-06-24 2015-12-24 International Business Machines Corporation Providing a visual and conversational experience in support of recommendations
US20150379958A1 (en) * 2014-06-30 2015-12-31 Microsoft Corporation Compound application presentation across multiple devices
US20160104089A1 (en) * 2014-10-08 2016-04-14 Deutsche Post Ag Handling data about a company specific supply chain network
US20160148153A1 (en) * 2014-11-21 2016-05-26 International Business Machines Corporation Optimizing network yield during freight booking
US9356913B2 (en) 2014-06-30 2016-05-31 Microsoft Technology Licensing, Llc Authorization of joining of transformation chain instances
US20160321609A1 (en) * 2015-04-30 2016-11-03 International Business Machines Corporation Decision support tool for business rules management in a booking system
US20160352841A1 (en) * 2015-05-28 2016-12-01 At&T Intellectual Property I Lp Facilitating dynamic establishment of virtual enterprise service platforms and on-demand service provisioning
US20170007403A1 (en) * 2015-07-08 2017-01-12 AdjuCor GmbH Implantable device for the locationally accurate delivery and administration of substances into the pericardium or onto the surface of the heart
US20170017909A1 (en) * 2015-07-14 2017-01-19 Tata Consultancy Services Limited System and method for risk management in a supply chain
US20170071494A1 (en) * 2015-09-14 2017-03-16 Biosense Webster (Israel) Ltd. Dual multiray electrode catheter
US20170109675A1 (en) * 2015-10-16 2017-04-20 Mastercard International Incorporated Systems and methods for identifyhing and monitoring a supply network using a payment processing network
US9659394B2 (en) 2014-06-30 2017-05-23 Microsoft Technology Licensing, Llc Cinematization of output in compound device environment
US9773070B2 (en) 2014-06-30 2017-09-26 Microsoft Technology Licensing, Llc Compound transformation chain application across multiple devices
US20170344933A1 (en) * 2016-05-27 2017-11-30 Caterpillar Inc. Method and system for managing supply chain with variable resolution
US9860339B2 (en) 2015-06-23 2018-01-02 At&T Intellectual Property I, L.P. Determining a custom content delivery network via an intelligent software-defined network
US9880549B2 (en) 2014-11-14 2018-01-30 International Business Machines Corporation Dynamic batch size and internal transportation
US10074142B1 (en) * 2014-08-18 2018-09-11 Algonyx LLC Computational architecture and method for a time-varying control system
US20180293685A1 (en) * 2017-04-05 2018-10-11 Thomson Reuters Global Resources Unlimited Company Systems, methods and machine readable programs for value chain analytics
WO2018217694A1 (en) * 2017-05-22 2018-11-29 Jabil Inc. Systems and methods for interfaces to a supply chain management system
WO2019032714A1 (en) * 2017-08-09 2019-02-14 Walmart Apollo, Llc Systems and methods for task execution based on automatically generated user input requests
US10296857B2 (en) 2014-08-15 2019-05-21 Elementum Scm (Cayman) Ltd. Method for determining and providing display analyzing of impact severity of event on a network
US20190207807A1 (en) * 2015-04-02 2019-07-04 Elementum Scm (Cayman) Ltd. Method and system for determining and locating nodal weaknesses in a network
US10460332B1 (en) * 2014-02-20 2019-10-29 Amazon Technologies, Inc. Predicting performance for providing an item
US10565537B1 (en) * 2017-06-14 2020-02-18 William Spencer Askew Systems, methods, and apparatuses for optimizing outcomes in a multi-factor system
US10664799B2 (en) 2018-06-29 2020-05-26 OMNY, Inc. Supply mesh platform
US20200209811A1 (en) * 2018-12-31 2020-07-02 Noodle Analytics, Inc. Controlling production resources in a supply chain
US20200311668A1 (en) * 2019-03-27 2020-10-01 Accenture Global Solutions Limited Cognitive procurement
US10887130B2 (en) 2017-06-15 2021-01-05 At&T Intellectual Property I, L.P. Dynamic intelligent analytics VPN instantiation and/or aggregation employing secured access to the cloud network device
US10915844B2 (en) * 2017-12-26 2021-02-09 International Business Machines Corporation Validation of supply chain data structures
US11094013B2 (en) 2018-11-01 2021-08-17 OMNY, Inc. Private currency and trade engine
US11188909B2 (en) 2017-12-07 2021-11-30 Bank Of America Corporation Automated event processing computing platform for handling and enriching blockchain data
US11196747B2 (en) 2017-12-07 2021-12-07 Bank Of America Corporation Automated event processing computing platform for handling and enriching blockchain data
US11209553B2 (en) 2016-05-24 2021-12-28 Flex Ltd. Systems and methods for active supply chain monitoring
US11216761B2 (en) * 2018-07-09 2022-01-04 Societe Enkidoo Technologies System and method for supply chain optimization
US11222293B2 (en) * 2020-01-24 2022-01-11 Registrar Corp Systems and methods for analyzing product movement information and generating compliance profiles
US20220036302A1 (en) * 2019-11-05 2022-02-03 Strong Force Vcn Portfolio 2019, Llc Network and data facilities of control tower and enterprise management platform with adaptive intelligence
US11321649B1 (en) * 2014-04-29 2022-05-03 Blue Yonder Group, Inc. System and method of a supply chain retail process manager
US20220172139A1 (en) * 2019-03-15 2022-06-02 3M Innovative Properties Company Operating a supply chain using causal models
EP4063979A1 (en) * 2016-01-26 2022-09-28 Basf Se System and method for risk based control of a process performed by production equipment
US11475401B2 (en) 2019-12-03 2022-10-18 International Business Machines Corporation Computation of supply-chain metrics
WO2022266362A1 (en) * 2021-06-18 2022-12-22 Jabil Inc. Systems and methods for risk processing of supply chain management system data
US11556895B2 (en) * 2019-08-28 2023-01-17 One Network Enterprises, Inc. System and computer program for providing high delivery performance in a value chain
US11676088B2 (en) 2018-10-31 2023-06-13 Walmart Apollo, Llc Systems and methods for distributed risk analysis
US11809462B2 (en) * 2022-01-26 2023-11-07 Dealerware, Llc Organization hierarchy systems and methods
US11943357B2 (en) 2020-12-14 2024-03-26 International Business Machines Corporation Mitigating risk in business networks in a privacy preserving manner

Families Citing this family (70)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104981823B (en) * 2012-09-24 2019-01-22 西门子公司 For in a manufacturing environment according to the method for personalized customer order production product
US9639595B2 (en) * 2013-07-12 2017-05-02 OpsVeda, Inc. Operational business intelligence system and method
US10467550B1 (en) * 2013-07-12 2019-11-05 OpsVeda, Inc. Operational business intelligence measurement and learning system
US9870548B1 (en) * 2013-08-06 2018-01-16 Amazon Technologies, Inc. Off network order operations for pickup locations
US9934483B1 (en) 2013-08-06 2018-04-03 Amazon Technologies, Inc. Off network return operations for pickup locations
CN104951982A (en) * 2014-03-28 2015-09-30 株式会社日立制作所 Risk avoidance system
KR102230394B1 (en) * 2014-09-24 2021-03-22 삼성에스디에스 주식회사 Method and apparatus for logistics risk prediction
EP3007115A1 (en) * 2014-10-08 2016-04-13 Deutsche Post AG Generating data relating to a supply chain network
EP3007112A1 (en) * 2014-10-08 2016-04-13 Deutsche Post AG Handling of information on incidents
US9992219B1 (en) * 2014-11-13 2018-06-05 National Technology & Engineering Solutions Of Sandia, Llc Framework and methodology for supply chain lifecycle analytics
US20160300171A1 (en) * 2015-04-09 2016-10-13 International Business Machines Corporation Risk-based order management with heterogeneous variables in a constrained environment
CN106447416A (en) * 2015-08-11 2017-02-22 上海合印包装服务有限公司 Printing order system with task associating function
WO2017109863A1 (en) * 2015-12-22 2017-06-29 株式会社日立製作所 Resource accommodation device, schedule management device, and resource accommodation system
US10373131B2 (en) 2016-01-04 2019-08-06 Bank Of America Corporation Recurring event analyses and data push
US20170193410A1 (en) * 2016-01-04 2017-07-06 Bank Of America Corporation Alternative channel selection based on predictive work flow
US10515315B2 (en) * 2016-03-11 2019-12-24 Wipro Limited System and method for predicting and managing the risks in a supply chain network
US10803414B2 (en) * 2016-05-25 2020-10-13 Dassault Systemes Americas Corp. Risk identification in supply chain
US10623443B2 (en) * 2016-07-08 2020-04-14 Ulrich Lang Method and system for policy management, testing, simulation, decentralization and analysis
KR20180090053A (en) * 2017-02-02 2018-08-10 에이치피프린팅코리아 주식회사 A server for providing a service and operation method thereof
CN107169782A (en) * 2017-03-31 2017-09-15 上海银澎信息科技有限公司 Method and apparatus for the data transfer of supply chain
TWI643139B (en) * 2017-05-08 2018-12-01 萬泰科技股份有限公司 Production equipment management system
US10768612B2 (en) * 2017-06-02 2020-09-08 Applied Materials, Inc. Method for back end planning and scheduling
CN107644351A (en) * 2017-08-24 2018-01-30 哈尔滨工业大学 Two-echelon supply-chain coordination approach based on quantity discount under the conditions of information symmetrical
CN107844897A (en) * 2017-10-25 2018-03-27 国网湖南省电力公司 A kind of power network mountain fire monitoring alarm shaft tower computational methods based on divide and conquer
US11645719B2 (en) 2017-12-05 2023-05-09 International Business Machines Corporation Dynamic event depiction facilitating automatic resource(s) diverting
EP3786862A4 (en) * 2018-04-27 2021-04-28 Panasonic Intellectual Property Management Co., Ltd. Prediction device, prediction method, and program
JP6969681B2 (en) * 2018-05-29 2021-11-24 日本電気株式会社 Control planning equipment, control planning methods, and programs
US11030557B2 (en) * 2018-06-22 2021-06-08 Applied Materials, Inc. Predicting arrival time of components based on historical receipt data
US11270242B2 (en) 2018-10-08 2022-03-08 International Business Machines Corporation Identifying and evaluating risks across risk alert sources
US11397906B1 (en) * 2018-10-16 2022-07-26 Amazon Technologies, Inc. Predicting demand for route generation
EP3644243A1 (en) 2018-10-26 2020-04-29 KBC Groep NV Improved system-user interaction relating to advice
US11126957B2 (en) 2018-10-31 2021-09-21 International Business Machines Corporation Supply chain forecasting system
US11669063B2 (en) * 2018-11-28 2023-06-06 ExxonMobil Technology and Engineering Company Surrogate model for a chemical production process
CN111319035B (en) * 2018-12-14 2022-11-08 中国科学院沈阳自动化研究所 Robot control system construction method for realizing modular communication
KR102202139B1 (en) * 2018-12-17 2021-01-12 지속가능발전소 주식회사 Method for analyzing risk of cooperrator supply chain, computer readable medium for performing the method
CN109635473B (en) * 2018-12-19 2022-08-02 清华大学 Heuristic high-flux material simulation calculation optimization method
WO2020152645A1 (en) * 2019-01-25 2020-07-30 Tata Consultancy Services Limited Managing dynamically adaptive supply network and system therefor
CN109903419B (en) * 2019-02-02 2021-03-19 宁波吉利汽车研究开发有限公司 Problematic part processing method and device and production control equipment with multiple vehicle types being collinear
CN109871403B (en) * 2019-02-26 2020-10-27 扬州制汇互联信息技术有限公司 Industrial big data analysis method based on industrial supply chain
US20220180979A1 (en) * 2019-03-15 2022-06-09 3M Innovative Properties Company Adaptive clinical trials
CN111833127A (en) * 2019-04-23 2020-10-27 湖北天力奇新材料股份有限公司 Product cost quotation management system
US11687840B2 (en) 2019-05-20 2023-06-27 Honeywell International Inc. Forecasting with state transitions and confidence factors
GB2601937B (en) * 2019-08-02 2023-09-06 Global Engineers Tech Pte Ltd Method and system for managing a crane and/or construction site
US11521143B2 (en) * 2019-08-14 2022-12-06 International Business Machines Corporation Supply chain disruption advisor
US20220277331A1 (en) * 2019-10-30 2022-09-01 Complete Intelligence Technologies, Inc. Systems and methods for procurement cost forecasting
US11379767B2 (en) * 2019-12-03 2022-07-05 Dell Products L.P. Adjusting a master build plan based on events using machine learning
WO2021181357A1 (en) * 2020-03-13 2021-09-16 Ithink Logistic Quick Services Llp System and method for post-dispatched return to origin prediction of a package in logistics
WO2021181352A1 (en) * 2020-03-13 2021-09-16 Ithink Logistic Quick Services Llp System and method for pre-dispatched return to origin prediction of a package in logistics
CN111369174B (en) * 2020-03-20 2023-04-18 中国西安卫星测控中心 Military and civil fusion cross-layer longitudinal resource matching method based on feature extraction
US20220092492A1 (en) * 2020-09-21 2022-03-24 International Business Machines Corporation Temporal and spatial supply chain risk analysis
EP4232989A1 (en) * 2020-10-22 2023-08-30 QMS Technologies Inc. Permissioning and dependency mapping in supply chain management
CN112347752B (en) * 2020-11-16 2021-09-14 中国信息通信研究院 Autonomous drawing management method and device for industrial chain
CN112396374A (en) * 2020-11-17 2021-02-23 山东财经大学 Inventory optimization management system and method for dairy product supply chain system under uncertain environment
CN112733162A (en) * 2020-12-31 2021-04-30 北京乐学帮网络技术有限公司 Resource allocation method, device, computer equipment and storage medium
US11715052B2 (en) 2021-04-27 2023-08-01 International Business Machines Corporation Monitoring and adapting a process performed across plural systems associated with a supply chain
EP4099238A1 (en) * 2021-05-31 2022-12-07 Sedapta S.r.l. Integrated system for supply chain management
US20230004911A1 (en) * 2021-06-30 2023-01-05 EMC IP Holding Company LLC Early-warning data-informed business spend and actuation
WO2023283493A1 (en) * 2021-07-09 2023-01-12 Verify, Inc. Workflow generation and processing
CN113837476A (en) * 2021-09-27 2021-12-24 北京金山云网络技术有限公司 Product delivery supply chain prediction method and device, electronic equipment and computer readable storage medium
JP7196982B1 (en) 2021-10-19 2022-12-27 カシオ計算機株式会社 INVENTORY CONTROL METHOD, PROGRAM AND INVENTORY CONTROL DEVICE
KR102453977B1 (en) * 2021-10-27 2022-10-14 주식회사 에이젠글로벌 Method for collecting and processing supply chain data and apparatus for performing the method
CN113779896A (en) * 2021-11-11 2021-12-10 聊城中超智能设备有限公司 Supervision method and system for medical instrument maintenance
US20230214765A1 (en) * 2022-01-04 2023-07-06 Project44, Inc. Machine learning technologies for predicting order fulfillment
JP7298000B1 (en) * 2022-04-20 2023-06-26 ユアサシステムソリューションズ株式会社 Disaster risk management system and computer program
US20230419255A1 (en) * 2022-06-28 2023-12-28 Hitachi, Ltd. Flow decomposition method
CN115496366B (en) * 2022-09-23 2023-12-22 南京简亿网络科技有限公司 Supply chain safety evaluation optimization method and system
CN115860485B (en) * 2023-02-17 2023-05-23 南京币鑫数据科技有限公司 Supply chain risk control system and method based on big data and artificial intelligence
CN116303806B (en) * 2023-05-25 2023-10-13 国网福建省电力有限公司管理培训中心 Sharing method, value co-creation sharing system, medium and electronic equipment
CN117236880A (en) * 2023-09-06 2023-12-15 河北建筑工程学院 Method and system for whole-process management of construction project contract
CN117236649B (en) * 2023-11-10 2024-01-26 天津麦旺生物技术有限公司 Scheduling method for pet feed processing raw material demand

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030018490A1 (en) * 2001-07-06 2003-01-23 Marathon Ashland Petroleum L.L.C. Object oriented system and method for planning and implementing supply-chains
US7171379B2 (en) * 2001-03-23 2007-01-30 Restaurant Services, Inc. System, method and computer program product for normalizing data in a supply chain management framework

Family Cites Families (87)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0770967A3 (en) 1995-10-26 1998-12-30 Koninklijke Philips Electronics N.V. Decision support system for the management of an agile supply chain
US7212829B1 (en) 2000-02-28 2007-05-01 Chung Lau Method and system for providing shipment tracking and notifications
JP2004504993A (en) * 2000-04-04 2004-02-19 マルコーニ コーポレイション ピーエルスィー Tracking and practice management systems and methods
US8786437B2 (en) 2000-09-08 2014-07-22 Intelligent Technologies International, Inc. Cargo monitoring method and arrangement
TW577003B (en) * 2000-09-29 2004-02-21 Manugistics Inc System, network, storage device, and method for supply chain management, including collaboration
US7359874B2 (en) 2001-01-08 2008-04-15 International Business Machines Corporation Method and system for facilitating parts procurement and production planning across an extended supply chain
US20020099678A1 (en) * 2001-01-09 2002-07-25 Brian Albright Retail price and promotion modeling system and method
US20020099598A1 (en) * 2001-01-22 2002-07-25 Eicher, Jr. Daryl E. Performance-based supply chain management system and method with metalerting and hot spot identification
US20020099578A1 (en) * 2001-01-22 2002-07-25 Eicher Daryl E. Performance-based supply chain management system and method with automatic alert threshold determination
US7324966B2 (en) * 2001-01-22 2008-01-29 W.W. Grainger Method for fulfilling an order in an integrated supply chain management system
US20040215551A1 (en) * 2001-11-28 2004-10-28 Eder Jeff S. Value and risk management system for multi-enterprise organization
US20030083947A1 (en) * 2001-04-13 2003-05-01 Hoffman George Harry System, method and computer program product for governing a supply chain consortium in a supply chain management framework
US20020138316A1 (en) 2001-03-23 2002-09-26 Katz Steven Bruce Value chain intelligence system and methods
US7216086B1 (en) * 2001-04-30 2007-05-08 Cisco Technology, Inc. Method and apparatus providing a supply chain management system useful in outsourced manufacturing
US7870012B2 (en) * 2001-05-15 2011-01-11 Agile Software Corporation Method for managing a workflow process that assists users in procurement, sourcing, and decision-support for strategic sourcing
US20020178077A1 (en) 2001-05-25 2002-11-28 Katz Steven Bruce Method for automatically invoking a software module in response to an internal or external event affecting the procurement of an item
US7246080B2 (en) * 2001-06-08 2007-07-17 International Business Machines Corporation Apparatus, system and method for measuring and monitoring supply chain risk
US20030014287A1 (en) 2001-07-02 2003-01-16 Dell Products, L.P. Continuity of supply risk and cost management tool
US20030033179A1 (en) 2001-08-09 2003-02-13 Katz Steven Bruce Method for generating customized alerts related to the procurement, sourcing, strategic sourcing and/or sale of one or more items by an enterprise
US7996329B1 (en) * 2001-12-13 2011-08-09 Sap Aktiengesellschaft Profit optimization
WO2003073472A2 (en) 2002-02-22 2003-09-04 Flextronics International Usa, Inc. Electronic component design, procurement and manufacturing collaboration
US8386296B2 (en) * 2002-03-08 2013-02-26 Agile Software Corporation System and method for managing and monitoring supply costs
US7107285B2 (en) * 2002-03-16 2006-09-12 Questerra Corporation Method, system, and program for an improved enterprise spatial system
US20030225651A1 (en) 2002-05-21 2003-12-04 Yu-To Chen System and method for fulfillment value at risk scoring
US20040153187A1 (en) * 2002-10-11 2004-08-05 Thomas Knight Systems and methods for improving planning, scheduling, and supply chain management
EP1573598A4 (en) 2002-12-16 2006-07-26 Questerra Corp Real-time insurance policy underwriting and risk management
US20040148217A1 (en) 2003-01-24 2004-07-29 Lauring Stephen R. Method and system for increasing accuracy in shipping and inventory forecasting
CN1802660A (en) * 2003-05-16 2006-07-12 Pch国际有限公司 Method and system for supply chain management employing a vizualization interface
US20040260703A1 (en) * 2003-06-20 2004-12-23 Elkins Debra A. Quantitative property loss risk model and decision analysis framework
US7505927B2 (en) 2003-07-14 2009-03-17 Price Edward R Extended manufacturing environment
US20050071207A1 (en) * 2003-09-26 2005-03-31 E2Open Llc Visibility and synchronization in a multi tier supply chain model
CN1691025A (en) 2004-04-29 2005-11-02 鸿富锦精密工业(深圳)有限公司 Management system and method for scrutiny of supplier achievement
KR100580512B1 (en) 2004-06-23 2006-05-15 현대자동차주식회사 structure for preventing wound by brake pedal of vehicles
US20060085323A1 (en) * 2004-10-14 2006-04-20 Cisco Technology Inc. System and method for analyzing risk within a supply chain
EP1854058A2 (en) 2005-02-01 2007-11-14 Christopher Chapin Inventory equalization system
US7475806B1 (en) 2005-02-24 2009-01-13 Savr Communications, Inc. Method and system of universal RFID communication
US7418307B2 (en) 2006-05-16 2008-08-26 International Business Machines Corporation System and process for supply management for the assembly of expensive products
US7890090B2 (en) 2006-06-09 2011-02-15 Motorola Mobility, Inc. Dynamic mobile call forwarding by local area service discovery
US7561107B2 (en) 2006-09-07 2009-07-14 Intelleflex Corporation RFID device with microstrip antennas
US20080065439A1 (en) * 2006-09-08 2008-03-13 Buyers Edge Llc Methods, systems, and computer program products for implementing purchase control services
US7538681B1 (en) 2006-09-19 2009-05-26 Onasset Intelligence, Inc. Method and apparatus for monitoring containerized ID tagged assets
US7791455B1 (en) 2006-12-29 2010-09-07 Onasset Intelligence, Inc. Method and apparatus for autonomous detection of a given location or situation
US20080172262A1 (en) * 2007-01-12 2008-07-17 Lianjun An Method and System for Disaster Mitigation Planning and Business Impact Assessment
US11403581B2 (en) * 2007-03-07 2022-08-02 Blue Yonder Group, Inc. Sentient optimization for continuous supply chain management
CN101071481A (en) * 2007-03-23 2007-11-14 田小平 Business trip service system and method
US20080313060A1 (en) * 2007-06-18 2008-12-18 Damodaran Suresh K Openly accessible inventory management system and method
US7895131B2 (en) 2008-01-04 2011-02-22 Tracking Innovations, Inc. Cargo tracking apparatus, system and method
US8515804B2 (en) 2008-01-23 2013-08-20 Patrick J. Brennan System and method for managing partner organizations
CN101582156A (en) * 2008-05-14 2009-11-18 北京中食新华科技有限公司 Food supply chain model
CN101587568A (en) * 2008-05-19 2009-11-25 北京中食新华科技有限公司 Expert system used in agricultural-product supply-chain logistics system
CN101587569A (en) * 2008-05-19 2009-11-25 北京中食新华科技有限公司 A kind of decision-support assistant system that is used for agricultural-product supply-chain
CN101291337B (en) * 2008-05-30 2012-11-07 同济大学 Grid resource management system and method
CN201311674Y (en) 2008-09-19 2009-09-16 中国国际海运集装箱(集团)股份有限公司 Real-time tracking monitoring system for container full-supply chain
US8543473B2 (en) * 2008-11-12 2013-09-24 International Business Machines Corporation Business partner collaboration and buy analysis
US20100125486A1 (en) 2008-11-14 2010-05-20 Caterpillar Inc. System and method for determining supply chain performance standards
US8185430B2 (en) 2009-01-30 2012-05-22 Bank Of America Corporation Supplier stratification
US20100194560A1 (en) * 2009-02-02 2010-08-05 United Parcel Service Of America, Inc. Systems and methods for enhanced business process monitoring
ATE505856T1 (en) 2009-02-05 2011-04-15 Research In Motion Ltd PORTABLE WIRELESS COMMUNICATION DEVICE WITH DIVERSITY ANTENNA SYSTEM AND CORRESPONDING METHOD
EP3576390B1 (en) 2009-04-16 2022-06-08 Federal Express Corporation System and method for management of wireless devices aboard an aircraft
CN102549561B (en) 2009-07-30 2015-01-21 弗莱克斯电子有限责任公司 Remote device diagnostic and repair apparatus and methods
WO2011025987A1 (en) * 2009-08-28 2011-03-03 Savi Networks Llc Asset monitoring and tracking system
US8239169B2 (en) 2009-09-25 2012-08-07 Gregory Timothy L Portable computing device and method for asset management in a logistics system
US8299920B2 (en) 2009-09-25 2012-10-30 Fedex Corporate Services, Inc. Sensor based logistics system
CN101692300B (en) * 2009-10-14 2012-09-05 金蝶软件(中国)有限公司 Warning method, warning device and warning system for visual safety stock
US8290965B2 (en) * 2009-12-08 2012-10-16 Decernis, Llc Apparatus and method for the automatic discovery of control events from the publication of documents
US20110307292A1 (en) 2010-06-09 2011-12-15 Decernis, Llc System and Method for Analysis and Visualization of Emerging Issues in Manufacturing and Supply Chain Management
US8502672B1 (en) 2010-08-16 2013-08-06 Onasset Intelligence, Inc. Method and apparatus for performing predetermined actions by a device upon completion of given job functions
US10726362B2 (en) * 2011-01-31 2020-07-28 X-Act Science Inc. Predictive deconstruction of dynamic complexity
US9007205B2 (en) 2011-06-01 2015-04-14 Thermo King Corporation Embedded security system for environment-controlled transportation containers and method for detecting a security risk for environment-controlled transportation containers
US9748668B2 (en) 2011-07-15 2017-08-29 Blackberry Limited Diversity antenna module and associated method for a user equipment (UE) device
US8626558B2 (en) * 2011-09-07 2014-01-07 Dow Corning Corporation Supply chain risk management method and device
US9495012B2 (en) 2011-09-27 2016-11-15 Z124 Secondary single screen mode activation through user interface activation
CA2853912A1 (en) 2011-09-28 2013-04-04 Elementum Scm (Cayman) Ltd. Analyzing and presenting supply, fabrication, and logistics data
US20130090961A1 (en) * 2011-10-11 2013-04-11 Stanley Benjamin Smith System for a data supply chain to enable data suppliers to contribute data collection questions to data collection protocols and post data into said data collection protocols aligned with said data collection questions and compensate data suppliers and collect fees from data consumers and advertisers associated with the data supply chain.
USD681649S1 (en) 2012-01-05 2013-05-07 Flextronics Ap, Llc Display panel with graphical user interface for analyzing and presenting supply, fabrication, and logistics data
USD681662S1 (en) 2012-01-05 2013-05-07 Flextronics Ap, Llc Display panel with graphical user interface for analyzing and presenting supply, fabrication, and logistics data
USD681651S1 (en) 2012-01-05 2013-05-07 Flextronics Ap, Llc Display panel with graphical user interface for analyzing and presenting supply, fabrication, and logistics data
USD681650S1 (en) 2012-01-05 2013-05-07 Flextronics Ap, Llc Display panel with graphical user interface for analyzing and presenting supply, fabrication and logistics data
USD681670S1 (en) 2012-01-05 2013-05-07 Flextronics Ap, Llc Display panel with graphical user interface for analyzing and presenting supply, fabrication and logistics data
US9194932B2 (en) 2012-06-01 2015-11-24 Senaya, Inc. Method and system for airplane container tracking
WO2014008386A2 (en) * 2012-07-05 2014-01-09 Flextronics Ap, Llc Method and system for controlling supply chains
US20140048951A1 (en) 2012-08-14 2014-02-20 Bridge Semiconductor Corporation Semiconductor assembly with dual connecting channels between interposer and coreless substrate
US9026187B2 (en) 2012-09-01 2015-05-05 Morphie, Inc. Wireless communication accessory for a mobile device
US9020536B1 (en) 2012-10-30 2015-04-28 Onasset Intelligence, Inc. Method and apparatus for tracking a transported item while accommodating communication gaps
US8886216B1 (en) 2012-10-30 2014-11-11 Onasset Intelligence, Inc. Method and apparatus for tracking a transported item while accommodating communication gaps
US10591607B2 (en) 2013-03-28 2020-03-17 Carrier Corporation Tracking device
DE112017002668T5 (en) 2016-05-24 2019-02-21 Flex Ltd. Systems and procedures for active supply chain monitoring

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7171379B2 (en) * 2001-03-23 2007-01-30 Restaurant Services, Inc. System, method and computer program product for normalizing data in a supply chain management framework
US20030018490A1 (en) * 2001-07-06 2003-01-23 Marathon Ashland Petroleum L.L.C. Object oriented system and method for planning and implementing supply-chains

Cited By (93)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140278706A1 (en) * 2009-12-01 2014-09-18 Jochen Lothar Leidner Methods and systems for generating supply chain representations
US10896392B2 (en) * 2009-12-01 2021-01-19 Refinitiv Us Organization Llc Methods and systems for generating supply chain representations
US10262283B2 (en) * 2009-12-01 2019-04-16 Thomson Reuters Global Resources Unlimited Company Methods and systems for generating supply chain representations
US20190311312A1 (en) * 2009-12-01 2019-10-10 Refinitiv Us Organization Llc Methods and systems for generating supply chain representations
US20150193566A1 (en) * 2012-06-29 2015-07-09 Jerome Rolia Capacity planning system
US10146214B2 (en) 2012-07-05 2018-12-04 Flextronics Ap, Llc Method and system for collecting supply chain performance information
US20140019189A1 (en) * 2012-07-05 2014-01-16 Flextronics Ap, Llc Method and system for controlling supply chain pricing
US20150088585A1 (en) * 2013-09-26 2015-03-26 International Business Machines Corporation Supply chain management using problem and remediation propagation modeling
US20150088596A1 (en) * 2013-09-26 2015-03-26 International Business Machines Corporation Supply chain management using problem and remediation propagation modeling
US20150120373A1 (en) * 2013-10-25 2015-04-30 Jabil Circuit, Inc. Systems and methods for risk processing and visualization of supply chain management system data
US20150142500A1 (en) * 2013-11-15 2015-05-21 International Business Machines Corporation Decision support system for inter-organizational inventory transshipment
US20150178645A1 (en) * 2013-12-20 2015-06-25 The Dun & Bradstreet Corporation Discovering a business relationship network, and assessing a relevance of a relationship
US10496950B2 (en) * 2014-02-17 2019-12-03 United Parcel Service Of America, Inc. Systems, methods, and computer program products for providing intelligent visibility across an outcome-based service cycle infrastructure
US20150235171A1 (en) * 2014-02-17 2015-08-20 United Parcel Service Of America, Inc. Systems, methods, and computer program products for providing intelligent visibility across an outcome-based service cycle infrastructure
US10460332B1 (en) * 2014-02-20 2019-10-29 Amazon Technologies, Inc. Predicting performance for providing an item
US20150242778A1 (en) * 2014-02-24 2015-08-27 Bank Of America Corporation Vendor Management System
US20150310021A1 (en) * 2014-04-28 2015-10-29 International Business Machines Corporation Big data analytics brokerage
US10430401B2 (en) * 2014-04-28 2019-10-01 International Business Machines Corporation Big data analytics brokerage
US11321649B1 (en) * 2014-04-29 2022-05-03 Blue Yonder Group, Inc. System and method of a supply chain retail process manager
US20220253778A1 (en) * 2014-04-29 2022-08-11 Blue Yonder Group, Inc. System and Method of a Supply Chain Retail Process Manager
US20150347941A1 (en) * 2014-05-30 2015-12-03 General Electric Company Method and system for complex dynamic supply chain systems modeling management and optimization
US20150370890A1 (en) * 2014-06-24 2015-12-24 International Business Machines Corporation Providing a visual and conversational experience in support of recommendations
US9594824B2 (en) * 2014-06-24 2017-03-14 International Business Machines Corporation Providing a visual and conversational experience in support of recommendations
US9396698B2 (en) * 2014-06-30 2016-07-19 Microsoft Technology Licensing, Llc Compound application presentation across multiple devices
US20150379958A1 (en) * 2014-06-30 2015-12-31 Microsoft Corporation Compound application presentation across multiple devices
US9659394B2 (en) 2014-06-30 2017-05-23 Microsoft Technology Licensing, Llc Cinematization of output in compound device environment
US9773070B2 (en) 2014-06-30 2017-09-26 Microsoft Technology Licensing, Llc Compound transformation chain application across multiple devices
US9356913B2 (en) 2014-06-30 2016-05-31 Microsoft Technology Licensing, Llc Authorization of joining of transformation chain instances
US10296857B2 (en) 2014-08-15 2019-05-21 Elementum Scm (Cayman) Ltd. Method for determining and providing display analyzing of impact severity of event on a network
US10074142B1 (en) * 2014-08-18 2018-09-11 Algonyx LLC Computational architecture and method for a time-varying control system
US20160104089A1 (en) * 2014-10-08 2016-04-14 Deutsche Post Ag Handling data about a company specific supply chain network
US9880549B2 (en) 2014-11-14 2018-01-30 International Business Machines Corporation Dynamic batch size and internal transportation
US20160148155A1 (en) * 2014-11-21 2016-05-26 International Business Machines Corporation Optimizing network yield during freight booking
US20160148153A1 (en) * 2014-11-21 2016-05-26 International Business Machines Corporation Optimizing network yield during freight booking
US20190207807A1 (en) * 2015-04-02 2019-07-04 Elementum Scm (Cayman) Ltd. Method and system for determining and locating nodal weaknesses in a network
US20160321609A1 (en) * 2015-04-30 2016-11-03 International Business Machines Corporation Decision support tool for business rules management in a booking system
US20160321607A1 (en) * 2015-04-30 2016-11-03 International Business Machines Corporation Decision support tool for business rules management in a booking system
US20160352841A1 (en) * 2015-05-28 2016-12-01 At&T Intellectual Property I Lp Facilitating dynamic establishment of virtual enterprise service platforms and on-demand service provisioning
US9860339B2 (en) 2015-06-23 2018-01-02 At&T Intellectual Property I, L.P. Determining a custom content delivery network via an intelligent software-defined network
US20170007403A1 (en) * 2015-07-08 2017-01-12 AdjuCor GmbH Implantable device for the locationally accurate delivery and administration of substances into the pericardium or onto the surface of the heart
US20170017909A1 (en) * 2015-07-14 2017-01-19 Tata Consultancy Services Limited System and method for risk management in a supply chain
US11238389B2 (en) * 2015-07-14 2022-02-01 Tata Consultancy Limited Services System and method for risk management in a supply chain
US20170071494A1 (en) * 2015-09-14 2017-03-16 Biosense Webster (Israel) Ltd. Dual multiray electrode catheter
US20170109675A1 (en) * 2015-10-16 2017-04-20 Mastercard International Incorporated Systems and methods for identifyhing and monitoring a supply network using a payment processing network
EP4063979A1 (en) * 2016-01-26 2022-09-28 Basf Se System and method for risk based control of a process performed by production equipment
US20240013119A1 (en) * 2016-01-26 2024-01-11 Basf Se System and method for risk based control of a process performed by production equipment
US11699117B2 (en) 2016-01-26 2023-07-11 Basf Se System and method for risk based control of a process performed by production equipment
US11209553B2 (en) 2016-05-24 2021-12-28 Flex Ltd. Systems and methods for active supply chain monitoring
US20170344933A1 (en) * 2016-05-27 2017-11-30 Caterpillar Inc. Method and system for managing supply chain with variable resolution
US20180293685A1 (en) * 2017-04-05 2018-10-11 Thomson Reuters Global Resources Unlimited Company Systems, methods and machine readable programs for value chain analytics
US11069018B2 (en) * 2017-04-05 2021-07-20 Refinitiv Us Organization Llc Systems, methods and machine readable programs for value chain analytics
WO2018217694A1 (en) * 2017-05-22 2018-11-29 Jabil Inc. Systems and methods for interfaces to a supply chain management system
US20230114754A1 (en) * 2017-05-22 2023-04-13 Jabil Inc. Systems and methods for interfaces to a supply chain management system
WO2018217690A3 (en) * 2017-05-22 2019-02-14 Jabil Inc. Systems and methods for providing diagnostics for a supply chain
WO2018217692A1 (en) * 2017-05-22 2018-11-29 Jabil Inc. Systems and methods for optimized design of a supply chain
WO2018217695A1 (en) * 2017-05-22 2018-11-29 Jabil Inc. Systems and methods for assessment and visualization of supply chain management system data
WO2018217693A3 (en) * 2017-05-22 2019-01-31 Jabil Inc. Systems and methods for risk processing of supply chain management system data
US20220147891A1 (en) * 2017-05-22 2022-05-12 Jabil Inc. Systems and methods for optimized design of a supply chain
US10733558B2 (en) * 2017-06-14 2020-08-04 William Spencer Askew Systems, methods, and apparatuses for optimizing outcomes in a multi-factor system
US10565537B1 (en) * 2017-06-14 2020-02-18 William Spencer Askew Systems, methods, and apparatuses for optimizing outcomes in a multi-factor system
US10887130B2 (en) 2017-06-15 2021-01-05 At&T Intellectual Property I, L.P. Dynamic intelligent analytics VPN instantiation and/or aggregation employing secured access to the cloud network device
US11483177B2 (en) 2017-06-15 2022-10-25 At&T Intellectual Property I, L.P. Dynamic intelligent analytics VPN instantiation and/or aggregation employing secured access to the cloud network device
WO2019032714A1 (en) * 2017-08-09 2019-02-14 Walmart Apollo, Llc Systems and methods for task execution based on automatically generated user input requests
US11558392B2 (en) 2017-12-07 2023-01-17 Bank Of America Corporation Automated event processing computing platform for handling and enriching blockchain data
US11729180B2 (en) * 2017-12-07 2023-08-15 Bank Of America Corporation Automated event processing computing platform for handling and enriching blockchain data
US11265326B2 (en) * 2017-12-07 2022-03-01 Bank Of America Corporation Automated event processing computing platform for handling and enriching blockchain data
US11188909B2 (en) 2017-12-07 2021-11-30 Bank Of America Corporation Automated event processing computing platform for handling and enriching blockchain data
US20220116401A1 (en) * 2017-12-07 2022-04-14 Bank Of America Corporation Automated Event Processing Computing Platform for Handling and Enriching Blockchain Data
US11734686B2 (en) 2017-12-07 2023-08-22 Bank Of America Corporation Automated event processing computing platform for handling and enriching blockchain data
US11196747B2 (en) 2017-12-07 2021-12-07 Bank Of America Corporation Automated event processing computing platform for handling and enriching blockchain data
US10915844B2 (en) * 2017-12-26 2021-02-09 International Business Machines Corporation Validation of supply chain data structures
US10664799B2 (en) 2018-06-29 2020-05-26 OMNY, Inc. Supply mesh platform
US11216761B2 (en) * 2018-07-09 2022-01-04 Societe Enkidoo Technologies System and method for supply chain optimization
US20240078491A1 (en) * 2018-10-31 2024-03-07 Walmart Apollo, Llc Systems and methods for distributed risk analysis
US11676088B2 (en) 2018-10-31 2023-06-13 Walmart Apollo, Llc Systems and methods for distributed risk analysis
US11094013B2 (en) 2018-11-01 2021-08-17 OMNY, Inc. Private currency and trade engine
US11651430B2 (en) 2018-11-01 2023-05-16 OMNY, Inc. Private currency and trade engine
US20200209811A1 (en) * 2018-12-31 2020-07-02 Noodle Analytics, Inc. Controlling production resources in a supply chain
US11694142B2 (en) * 2018-12-31 2023-07-04 Noodle Analytics, Inc. Controlling production resources in a supply chain
US20220172139A1 (en) * 2019-03-15 2022-06-02 3M Innovative Properties Company Operating a supply chain using causal models
US11507914B2 (en) * 2019-03-27 2022-11-22 Accenture Global Solutions Limited Cognitive procurement
US20200311668A1 (en) * 2019-03-27 2020-10-01 Accenture Global Solutions Limited Cognitive procurement
US11556895B2 (en) * 2019-08-28 2023-01-17 One Network Enterprises, Inc. System and computer program for providing high delivery performance in a value chain
US20220036302A1 (en) * 2019-11-05 2022-02-03 Strong Force Vcn Portfolio 2019, Llc Network and data facilities of control tower and enterprise management platform with adaptive intelligence
US11475401B2 (en) 2019-12-03 2022-10-18 International Business Machines Corporation Computation of supply-chain metrics
US11699118B2 (en) * 2020-01-24 2023-07-11 Registrar Corp. Systems and methods for analyzing product movement information and generating compliance profiles
US11699119B2 (en) * 2020-01-24 2023-07-11 Registrar Corp. Systems and methods for analyzing product movement information and generating compliance profiles
US11222293B2 (en) * 2020-01-24 2022-01-11 Registrar Corp Systems and methods for analyzing product movement information and generating compliance profiles
US20220101222A1 (en) * 2020-01-24 2022-03-31 Registrar Corp. Systems and methods for analyzing product movement information and generating compliance profiles
US20220092494A1 (en) * 2020-01-24 2022-03-24 Registrar Corp. Systems and methods for analyzing product movement information and generating compliance profiles
US11943357B2 (en) 2020-12-14 2024-03-26 International Business Machines Corporation Mitigating risk in business networks in a privacy preserving manner
WO2022266362A1 (en) * 2021-06-18 2022-12-22 Jabil Inc. Systems and methods for risk processing of supply chain management system data
US11809462B2 (en) * 2022-01-26 2023-11-07 Dealerware, Llc Organization hierarchy systems and methods

Also Published As

Publication number Publication date
EP2852922A2 (en) 2015-04-01
US20140018951A1 (en) 2014-01-16
EP2881904A1 (en) 2015-06-10
EP2852922A4 (en) 2015-06-24
JP2015528946A (en) 2015-10-01
US20140018949A1 (en) 2014-01-16
US20140019189A1 (en) 2014-01-16
WO2014008386A2 (en) 2014-01-09
CN107103402A (en) 2017-08-29
US10146214B2 (en) 2018-12-04
CN107122876A (en) 2017-09-01
CN104412283B (en) 2017-12-01
CN104992258A (en) 2015-10-21
WO2014008386A3 (en) 2014-05-15
US20140018950A1 (en) 2014-01-16
CN104412283A (en) 2015-03-11

Similar Documents

Publication Publication Date Title
US10146214B2 (en) Method and system for collecting supply chain performance information
US20200065759A1 (en) Method and Apparatus for Managing, Displaying, Analyzing, Coordinating, and Optimizing Innovation, Engineering, Manufacturing, and Logistics Infrastructures
US20190303831A1 (en) Method for determining and providing analysis of impact severity of event on a network
US20160217399A1 (en) Method and system for monitoring shipments in a supply and/or logistics chain
Bak Supply chain risk management research agenda: from a literature review to a call for future research directions
Li et al. Enhancement of supply chain resilience through inter-echelon information sharing
Dunke et al. Time traps in supply chains: Is optimal still good enough?
Iakovou et al. A stochastic inventory management model for a dual sourcing supply chain with disruptions
US20190207807A1 (en) Method and system for determining and locating nodal weaknesses in a network
US9721294B1 (en) Apparatus and method for evaluating and presenting supply chain condition of an enterprise
US20150120370A1 (en) Advanced planning in a rapidly changing high technology electronics and computer industry through massively parallel processing of data using a distributed computing environment
US20200394605A1 (en) Dynamic risk-based package delivery
Rekik et al. Modeling (and learning from) Inventory Inaccuracies in e‐retailing/B2B contexts
Nguyen et al. Optimizing the recovery of disrupted single-sourced multi-echelon assembly supply chain networks
US7552041B2 (en) Method, system, and computer program product for determining an optimal database refresh rate
US20080027834A1 (en) Systems and methods for inventory management
US20150120371A1 (en) Automotive manufacturing optimization through advanced planning and forecasting through massively parallel processing of data using a distributed computing environment
US20150120369A1 (en) Chemical and natural resource supply chain advanced planning and forecasting through massively parallel processing of data using a distributed computing environment
Rodger et al. A petri net pareto ISO 31000 workflow process decision making approach for supply chain risk trigger inventory decisions in government organizations
Ivanov et al. Simulation Applications to Structural Dynamics in Service and Manufacturing Supply Chain Risk Management
Brands Improving Material Availability Using A Control Tower for Service Tools
Yuan et al. A Bayesian framework for supply chain risk management using business process standards
Freitas Distribution logistics performance: application of a conformity metric between execution and travel plans in a Brazilian logistic company
Brückner et al. After-market spare parts inventory centralization at Sandvik Mining and Rock Technology.
WO2024073505A1 (en) System, method, and apparatus for supply chain management

Legal Events

Date Code Title Description
AS Assignment

Owner name: FLEXTRONICS AP, LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LINTON, THOMAS K.;WHIPPLE, MARK;BERGER, MARNI;AND OTHERS;SIGNING DATES FROM 20130911 TO 20130915;REEL/FRAME:031312/0588

AS Assignment

Owner name: FLEXTRONICS SALES AND MARKETING (A-P), LTD., MAURI

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FLEXTRONICS AP, LLC;REEL/FRAME:031616/0329

Effective date: 20131105

AS Assignment

Owner name: FLEXTRONICS INTERNATIONAL LIMITED, SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FLEXTRONICS SALES AND MARKETING (A-P), LTD.;REEL/FRAME:031619/0909

Effective date: 20131105

Owner name: ELEMENTUM SCM (CAYMAN) LTD., CAYMAN ISLANDS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FLEXTRONICS INTERNATIONAL LIMITED;REEL/FRAME:031619/0922

Effective date: 20131105

AS Assignment

Owner name: FLEXTRONICS INTERNATIONAL LTD., SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FLEXTRONICS SALES & MARKETING (A-P) LTD.;REEL/FRAME:033931/0655

Effective date: 20140611

Owner name: ELEMENTUM SCM (CAYMAN) LTD., CAYMAN ISLANDS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FLEXTRONICS INTERNATIONAL LTD.;REEL/FRAME:033931/0806

Effective date: 20140611

Owner name: FLEXTRONICS SALES & MARKETING (A-P) LTD., MAURITIU

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FLEXTRONICS AP, LLC;REEL/FRAME:033931/0423

Effective date: 20140911

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION