...EXECUTIVE SUMMARY The purpose of this case study is to identify and present the factors that contribute to Family Dollar’s success through quantitative measures of internal data, external data, and common sense assumptions. The study consists of several parts, each with a distinctive purpose: • Mission Statement – provides a description of what Family Dollar seeks to accomplish on a day-to-day basis and sets the standard for quantitative performance measures. • External Factor Evaluation (EFE) Matrix – outlines the opportunities and threats that could affect the company and rates Family Dollar’s current performance in addressing those factors. • Competitive Profile Matrix – outlines the success factors that are critical to the company’s continuity and rates Family Dollar’s performance as well as its rivals’ performances in addressing those factors. CASE STUDY FOR FAMILY DOLLAR STORES MISSION STATEMENT Existing Mission Statement To be a compelling place to shop for our customers; To be a compelling place to work for our team members; To be a compelling place to invest for our shareholders. Revised Mission Statement Family Dollar’s mission is to provide convenience and low prices for our customers (1), exceptional opportunities and incentives for our associates (9), and outstanding returns for our investors (5). Through our strategy of nationwide expansion (3), technological innovation in our logistics network (4), and energy reduction initiatives...
Words: 816 - Pages: 4
...information among all of the firms that contribute value to a product, from the source of raw materials to end customers. We will integrate issues from marketing (channels of distribution), logistics, and operations management to develop a broad understanding of a supply chain. By taking a strategic perspective, we will focus on relatively long term decisions involving the investment in productive resources, configuration of processes, product designs, and development of parterships with suppliers and channels of distribution. Although the development of analytical tools is not one of the primary objectives of the course, students should be comfortable with quantitative analysis. By the end of the course, you should have developed an appreciation for the major strategic issues trade-offs in supply chain management as well as the ability to use conceptual frameworks to make decisions. TEACHING/LEARNING METHODOLOGY The detailed course outline starting on page 6 lists, for every class session, the reading(s), case(s), assignment(s), and anything else of importance. Please read this outline carefully before every session. Because class time is our most precious and inelastic resource, please come to every class prepared. Essential preparation includes reading the assigned readings and cases and doing the assignments. Recommended Text Book1 (VM) Van Mieghem, Jan, Operations Strategy: Principles and Practice, Dynamic Ideas, Charlestown, MA, 2008. Optional Reference Chopra, Sunil...
Words: 3965 - Pages: 16
...Trivedi Department of Electrical & Computer Engineering, Duke University, Durham, NC 27708, U.S.A. ABSTRACT Attack tree (AT) is one of the widely used non-state-space models for security analysis. The basic formalism of AT does not take into account defense mechanisms. Defense trees (DTs) have been developed to investigate the effect of defense mechanisms using measures such as attack cost, security investment cost, return on attack (ROA), and return on investment (ROI). DT, however, places defense mechanisms only at the leaf nodes and the corresponding ROI/ROA analysis does not incorporate the probabilities of attack. In attack response tree (ART), attack and response are both captured but ART suffers from the problem of state-space explosion, since solution of ART is obtained by means of a state-space model. In this paper, we present a novel attack tree paradigm called attack countermeasure tree (ACT) which avoids the generation and solution of a state-space model and takes into account attacks as well as countermeasures (in the form of detection and mitigation events). In ACT, detection and mitigation are allowed not just at the leaf node but also at the intermediate nodes while at the same time the state-space explosion problem is avoided in its analysis. We study the consequences of incorporating countermeasures in the ACT using three case studies (ACT for BGP attack, ACT for a SCADA attack and ACT for malicious insider attacks). Copyright © 2011 John Wiley & Sons...
Words: 8828 - Pages: 36
...www.it-ebooks.info www.it-ebooks.info Praise “A must-read resource for anyone who is serious about embracing the opportunity of big data.” — Craig Vaughan Global Vice President at SAP “This timely book says out loud what has finally become apparent: in the modern world, Data is Business, and you can no longer think business without thinking data. Read this book and you will understand the Science behind thinking data.” — Ron Bekkerman Chief Data Officer at Carmel Ventures “A great book for business managers who lead or interact with data scientists, who wish to better understand the principals and algorithms available without the technical details of single-disciplinary books.” — Ronny Kohavi Partner Architect at Microsoft Online Services Division “Provost and Fawcett have distilled their mastery of both the art and science of real-world data analysis into an unrivalled introduction to the field.” —Geoff Webb Editor-in-Chief of Data Mining and Knowledge Discovery Journal “I would love it if everyone I had to work with had read this book.” — Claudia Perlich Chief Scientist of M6D (Media6Degrees) and Advertising Research Foundation Innovation Award Grand Winner (2013) www.it-ebooks.info “A foundational piece in the fast developing world of Data Science. A must read for anyone interested in the Big Data revolution." —Justin Gapper Business Unit Analytics Manager at Teledyne Scientific and Imaging “The authors, both renowned experts in data science before it had a name, have...
Words: 146629 - Pages: 587
...The industry of premium coffee production has had a shadow cast over it by the coffee juggernaut, Starbucks. As any American who has been out of their home in the last fifteen years knows, Starbucks has virtually taken over the coffee retail business all over the US. It would prove quite difficult to go to any relatively large city or town and not see at least two Starbucks retail stores or find their products in the local grocery store. With such a formidable competitor present in the industry, it seems improbable that any other producer of premium coffee would be able to compete. A small, Vermont based coffee brewer by the name of Green Mountain Coffee Roasters (GMCR) has managed to carve out a piece of the market for itself and has begun spreading all over the northeast United States. Originating in 1981, Green Mountain Coffee was originally supplied to customers of a small café but once word spread of their high quality coffee beans and unique selection and roasting process, their product began to spread to different venues. Restaurant and hotel demand boost Green Mountain into the wholesale industry. Within the next fifteen years they had opened twelve company stores that were responsible for ten percent of their income. However, they noticed a steady decline in the returns they were seeing from these retail stores and decided to close its stores; a risky move considering that they had always been an important means of providing samples of their product to the consumer. Despite...
Words: 2500 - Pages: 10
...The industry of premium coffee production has had a shadow cast over it by the coffee juggernaut, Starbucks. As any American who has been out of their home in the last fifteen years knows, Starbucks has virtually taken over the coffee retail business all over the US. It would prove quite difficult to go to any relatively large city or town and not see at least two Starbucks retail stores or find their products in the local grocery store. With such a formidable competitor present in the industry, it seems improbable that any other producer of premium coffee would be able to compete. A small, Vermont based coffee brewer by the name of Green Mountain Coffee Roasters (GMCR) has managed to carve out a piece of the market for itself and has begun spreading all over the northeast United States. Originating in 1981, Green Mountain Coffee was originally supplied to customers of a small café but once word spread of their high quality coffee beans and unique selection and roasting process, their product began to spread to different venues. Restaurant and hotel demand boost Green Mountain into the wholesale industry. Within the next fifteen years they had opened twelve company stores that were responsible for ten percent of their income. However, they noticed a steady decline in the returns they were seeing from these retail stores and decided to close its stores; a risky move considering that they had always been an important means of providing samples of their product to the consumer. Despite...
Words: 2500 - Pages: 10
...intelligence occur in people, many animals and some machines.There is no solid definition of intelligence relating it to human intelligence. The problem is that it cannot yet be characterize in general what kinds of computational procedures can be called intelligent. We understand some of the mechanisms of intelligence and not others. Sometimes Artificial Intelligence is about simulating human intelligence but not always.On the one hand, we can learn something about how to make machines solve problems by observing other people or just by observing our own methods. On the other hand, most work in AI involves studying the problems the world presents to intelligence rather than studying people or animals. AI textbooks define the field as "the study and design of intelligent agents where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy who coined the term in 1956,defines it as "the science and engineering of making intelligent machines." 2.HISTORY Although the computer provided the technology necessary for AI, it was not until the early 1950's that the link between human intelligence and machines was really observed. In late 1955, Newell and Simon developed The Logic...
Words: 2505 - Pages: 11
...efficiency. One of the several information systems which are considered to be of the great help for managers in decision making is the decision support system. Decision Support System (DSS) combines models and data in an attempt to solve semi- structured and some unstructured problems with extensive user involvement. With correct gathering and manipulation of data, DSS can provide several alternative solutions which in turn can lead to correct decision making. Today, there are many companies adopting decision – support systems and data mining software not only in the U.S. but also in the Philippines. However, there is limited literature on companies in Iloilo City adopting this technology. For this reason, the proponents saw the need to study the process of one company in Iloilo City where this type of information system can be adopted. That company is Westvis Marketing Corporation. Westvis Marketing Corporation (WMC) was founded by Mr. Honesto Tomas Hsia on April 2011. Mr. Hsia was a former managing partner in Metrostate Consumer, Inc. (MCI). MCI’s chief supplier, Cosmetique Asia Corporation (CAC) was distributed by MCI to numerous stores in Panay Island. It also distributes products from Silka Beauty Product lines which include soap, lotion, body spray, and hair gels. MCI was the distributor behind the entry of Phoenix Petroleum Phils Inc. (PPPI) in Panay. Later...
Words: 8773 - Pages: 36
...strategy keys to create and capture customer loyalty. As the demand for new products rose in the 1980s, these market requirements were to increase their flexibility and responsiveness to adapt existing products and processes or to develop new ones in order to meet customer needs. As manufacturing improved in the 1990s, managers began noticing material and service inputs involving suppliers and their major impact on an organization‘s ability to meet customer needs. As a result of these changes, organizations now find that it difficult to manage their own organizations. Today, Wal-Mart topped the list of the America‘s biggest companies on the Fortune 500 list, ―with sales of almost $345 billion — more than a quarter of a trillion dollars‖ (Forbs). In 2014, Walmart stock products made in more than 70 countries and at any given time, operates more than 11,000 stores in 27 countries around the...
Words: 4926 - Pages: 20
...period towards intensive use of LNG. There is a strong need in industry for the development of the building blocks needed to develop their business cases. We develop these building blocks, some business cases, as well as methods for planning and control of the logistics in LNG synchromodal transportation networks. Activities / work packages I. LNG supply chains and synchromodal transport networks: providing an identification of markets and demand to serve, economic and sensitivity analyses, definition of logistical requirements and options for synchromodal transportation. II. Multi-modal inventory-routing problems: deriving tools to enable an efficient and effective supply to distribution points in the network through synchromodal operations. III. Direct delivery multi-modal transportation problems: deriving decision tools to enable efficient direct ship-to-ship refuelling at sea. Expected results: The main objective is to derive solution approaches to design LNG synchromodal transportation networks and tools for planning of transportation and replenishment operations to enable accessibility and efficient usage of this type of fuel for all modes of transport. Market identification, demand forecasts, economic analyses and business cases are intended outcomes of this study. The developed knowledge base on LNG-specific aspects in logistics can strengthen the development efforts of the sector in The Netherlands and can aid to position Dutch companies at the frontier of development of...
Words: 16799 - Pages: 68
...2011 Planning & Assessing RX 330 Productions for Toyota North America Team Charlie Oscar Oscar Lima AMBA 640, Section 9044 8/9/2011 Section I II III Executive summary Introduction Exercise 1: Toyota Production System (TPS) today TPS term definitions & practical examples IV Exercise 1: TPS as a total entity Advantages Limitations Evolution TPS use among other companies V Exercise 2: Grid analysis (Weighted scoring model) Exogenous factors & assumptions Endogenous factors & assumptions Constraints VI VII Exercise 2: Location recommendation Exercise 3: Decision tree analysis TMMC production capacity recommendation Limitations Past performance: RX 330/350 VIII Exercise 4: Current regional production strategy Assessment Change recommendations IX Summary Appendix A References Page 2 3 4 4 7 7 8 8 9 10 11 13 16 16 17 17 18 19 19 19 21 21 23 24 1 I. Executive Summary Toyota Motor Corporation is leading the way to future mobility through innovation, productivity, quality and efficiency. Toyota uses a self-developed strategy known as the Toyota Production System (TPS) to guide business process improvements. This strategy applies principles of “just-in-time” production, also called “lean”, to align supply closely with consumer demand while avoiding surplus inventory. The report defines eight TPS terms, i.e. jidoka, just-intime, hoshin, heijunka, muda, kaizen, standardized work, and pokayoke; and gives examples of how terms are applied in other industries...
Words: 6813 - Pages: 28
...Data Mining Practical Machine Learning Tools and Techniques The Morgan Kaufmann Series in Data Management Systems Series Editor: Jim Gray, Microsoft Research Data Mining: Practical Machine Learning Tools and Techniques, Second Edition Ian H. Witten and Eibe Frank Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration Earl Cox Data Modeling Essentials, Third Edition Graeme C. Simsion and Graham C. Witt Location-Based Services Jochen Schiller and Agnès Voisard Database Modeling with Microsoft® Visio for Enterprise Architects Terry Halpin, Ken Evans, Patrick Hallock, and Bill Maclean Designing Data-Intensive Web Applications Stefano Ceri, Piero Fraternali, Aldo Bongio, Marco Brambilla, Sara Comai, and Maristella Matera Mining the Web: Discovering Knowledge from Hypertext Data Soumen Chakrabarti Understanding SQL and Java Together: A Guide to SQLJ, JDBC, and Related Technologies Jim Melton and Andrew Eisenberg Database: Principles, Programming, and Performance, Second Edition Patrick O’Neil and Elizabeth O’Neil The Object Data Standard: ODMG 3.0 Edited by R. G. G. Cattell, Douglas K. Barry, Mark Berler, Jeff Eastman, David Jordan, Craig Russell, Olaf Schadow, Torsten Stanienda, and Fernando Velez Data on the Web: From Relations to Semistructured Data and XML Serge Abiteboul, Peter Buneman, and Dan Suciu Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations Ian H. Witten and Eibe Frank ...
Words: 191947 - Pages: 768
...Data Mining Third Edition This page intentionally left blank Data Mining Practical Machine Learning Tools and Techniques Third Edition Ian H. Witten Eibe Frank Mark A. Hall AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Morgan Kaufmann Publishers is an imprint of Elsevier Morgan Kaufmann Publishers is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA This book is printed on acid-free paper. Copyright © 2011 Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must...
Words: 194698 - Pages: 779
...Int. J. Production Economics 133 (2011) 25–34 Contents lists available at ScienceDirect Int. J. Production Economics journal homepage: www.elsevier.com/locate/ijpe Identifying risk issues and research advancements in supply chain risk management Ou Tang a,c, S. Nurmaya Musa a,b,n a Department of Management and Engineering, Link¨ping University, SE-581 83 Link¨ping, Sweden o o Department of Engineering Design and Manufacture, University of Malaya, 50603 Kuala Lumpur, Malaysia c School of Economics & Management, Tongji University, Shanghai 200092, PR China b a r t i c l e in fo Available online 3 July 2010 Keywords: Supply chain Risk management Citation/co-citation analysis abstract The purpose of this paper is to investigate the research development in supply chain risk management (SCRM), which has shown an increasing global attention in recent years. Literature survey and citation/ co-citation analysis are used to fulfil the research task. Literature survey has undertaken a thorough search of articles on selected journals relevant to supply chain operations management. Meanwhile, citation/co-citation analysis uses Web of Sciences database to disclose SCRM development between 1995 and 2009. Both the approaches show similar trends of rising publications over the past 15 years. This review has piloted us to identify and classify the potential risk associated with different flows, namely material, cash and information flows. Consequently, we identify some research...
Words: 8250 - Pages: 33
...Original Contributions Data Mining Applications in Healthcare Hian Chye Koh and Gerald Tan A B S T R A C T Data mining has been used intensively and extensively by many organizations. In healthcare, data mining is becoming increasingly popular, if not increasingly essential. Data mining applications can greatly benefit all parties involved in the healthcare industry. For example, data mining can help healthcare insurers detect fraud and abuse, healthcare organizations make customer relationship management decisions, physicians identify effective treatments and best practices, and patients receive better and more affordable healthcare services. The huge amounts of data generated by healthcare transactions are too complex and voluminous to be processed and analyzed by traditional methods. Data mining provides the methodology and technology to transform these mounds of data into useful information for decision making. This article explores data mining applications in healthcare. In particular, it discusses data mining and its applications within healthcare in major areas such as the evaluation of treatment effectiveness, management of healthcare, customer relationship management, and the detection of fraud and abuse. It also gives an illustrative example of a healthcare data mining application involving the identification of risk factors associated with the onset of diabetes. Finally, the article highlights the limitations of data mining and discusses some future directions....
Words: 5507 - Pages: 23