Event: Anylogic International User Conference, 2015
In this presentation at the ANNYLOGIC 2015 user conference, Dr. Alan Barnard, CEO of Goldratt Research Labs and Dr. Andrey Malykhanov presents a simulation model they developed for an end-to-end mining supply chain to test whether a PUSH vs. PULL vs. HYBRID based supply chain management strategy will give the best customer service, profitability and cost/ton performance for supplier and customers. The “PULL” logic was based on the principles of Theory of Constraints (developed by Dr. Eli Goldratt) and the latest work by Dr. Nassim Taleb on how to design systems that are not just robust, but Antifragile – ones that are not harmed by, but can benefit from volatility.
Research shows that 70% of all ICT projects such as SAP implementations are not deemed a “great” success. This is despite the fact that the power and coverage of the technology and implementation know-how has grown dramatically. Could Theory of Constraints (TOC) help suppliers and customers unlock the inherent value potential of an ICT project like an SAP implementation?…
Research shows that 70% of all ICT projects such as SAP implementations are not deemed a “great” success. This is despite the fact that the power and coverage of the technology and implementation know-how has grown dramatically.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.