Blog Archives

How to secure your supply chain – 5/7

Previously, I portrayed the different categories of buyer-supplier relationships, and how they influence supply chain disruptions. Today I will look at sourcing strategies and how to or may how not to source: double sourcing, dual sourcing, parallel sourcing, säkra företagets flöden, see-saw sourcing, single sourcing

Posted in ARTICLES and PAPERS
Tags: , , , , , , , ,

ARTICLES and PAPERS
Road Vulnerability
Today we are going back in time, to one of the seminal articles in road vulnerability. Katja Berdica[...]
Importance and Exposure – Measures of Vulnerability?
Today I am presenting a paper from an old friend of mine. Well, "friend" is perhaps a slight exagger[...]
BOOKS and BOOK CHAPTERS
Book Review: Transportation GIS
This book showcases many examples of how GIS can be applied in the field of transportation using Arc[...]
Can your business take a blow?
Are you prepared for whatever mishaps your business throws at you? If you're not, you better start l[...]
REPORTS and WHITEPAPERS
Engineering transportation lifelines
New Zealand is probably not the fist country that comes to mind when thinking of state-of-the-art tr[...]
Analysing road vulnerability in Norway
How does the Norwegian Public Roads Administration NRPA assess the vulnerability of the Norwegian ro[...]
from HERE and THERE
MITIP 2010 – Call for Papers
For several years, when it comes to ICT-driven innovation and production, the MITIP conferences have[...]
Wintry disruptions...again
Winter has come early to Europe this year. Very early. While it is not unusual to have a prolonged c[...]