Home Enterprise Solutions Manufacturing and logistics needs to change

How people see and buy things is being affected by technology, and that can be a particular issue for businesses selling perishable items such as food.

"Everyone's being disrupted" by technology, Infor executive vice-president John Flavin told iTWire. But different industries have different problems.

In the food sector, it's not just technology. Home delivery of meals or by supermarkets, and "meal ingredients in a box" services are impacting the demand side of food manufacturers' supply chains. In addition, "the millennial is eating differently" with a focus on fresh, free-range, non-GMO (etc) food.

So how do manufacturers of highly perishable impulse buys such as ice cream cope? They need to consider how they deal with customers, and work out how to deliver in the most efficient way whatever those customers want, he said.

In this new world, delivery life can be just as important as shelf life. If a customer isn't home to accept a delivery, special packaging may be required. But styrofoam boxes and ice packs or dry ice add to the cost of a product that you don't actually need, such as ice cream.

Flavin gave another example from the food industry, this time concerning meat cutting and distribution.

A saving of just 25c per carcass through better scheduling of cutting adds up to $1 million to $2 million over the course of a year for a substantial operation.

Then there are seasonal considerations: people tend to want thicker pork chops during the summer because they barbecue better than the thinner ones cooked in the kitchen at other times of the year, and also overall demand varies at different times of the year (eg, turkey at Christmas).

Outside data also comes into play. A meat processor can sell its output at the prevailing price, chill it in the hope that prices will rise in a day or two, or freeze it in the expectation that it will take a while for prices to recover. But how will prices fluctuate, and how do you determine the optimal mix?

So the next phase will be the widespread application of predictive analytics and artificial intelligence to the available data, he suggested.

To help customers through this maze, Infor offers a value engineering service through its Hook & Loop operation which has expanded from its original role of looking after UI/UX issues for Infor software.

"They'll be proactive with you, asking 'why do you do that?'," said Flavin, and the answer is sometimes "because we've always done it that way". That, as most of us realise when confronted with our habits, is not an adequate reason, thus opening the door to change.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect