X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 waste card


Lean Tools and Practices that Eliminate Manufacturing Waste
A number of lean manufacturing tools and practices have long been used to reduce manufacturing waste. These include the five S's, visual controls, standardized

waste card  Japanese, is an important waste reduction tool. Mistake proofing is an essential failsafe activity to prevent errors at their source. In simple terms, mistake proofing is any device, mechanism, or technique that either prevents a mistake from being made or makes the mistake obvious so as to avoid a product defect. The objective of mistake proofing is either to prevent the cause of defects in manufacturing or to ensure that each item can be inspected cost-effectively so that no defective items reach

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Regulatory and Compliance RFI/RFP Template

Design for Compliance, Management of Hazardous and Controlled Substances, Regulatory and Compliance Documentation, Managing Recyclables and Controlled Waste, Product Technology  

Evaluate Now

Documents related to » waste card

Pull vs Push: a Discussion of Lean, JIT, Flow, and Traditional MRP Part 1: Tutorial


Flow manufacturing leverages techniques to help manufacturers create any product on any given day, in any given quantity including the "quantity of one" (i.e., through the so-called mixed-model production), while keeping inventories to a minimum and shortening cycle times in order to quickly fill customer orders.

waste card   Read More

Enterprise Resource Planning Vendors Address Lean Manufacturing


Intentia, Fujitsu Glovia, QAD, and SSA Global's solutions supporting lean manufacturing are examined. Which areas the extended enterprise resource planning (ERP) vendors excel in depends on their original ERP system's suitability for repetitive versus to-order environments.

waste card   Read More

Ask the Experts: Approaches to Data Mining ERP


From one of our readers comes this question: I am a student of IT Management; I have an ERP course and I am supposed to write an article to review new aspects of ERP systems. I’ve decided to explore the reasons for using data mining techniques in ERP systems—and to look at different modules to which these techniques have been applied. I am going to prepare a framework to determine

waste card   Read More

Robust Systems are Built from the Bottom Up


Information technology infrastructure takes a back seat to applications investments for lack of a cost justification method. However, the infrastructure systems are breaking down in public; bringing significant attention to an issue that has been set aside far too long.

waste card   Read More

Lean Manufacturing: A Primer


Lean manufacturing emphasizes the minimization of the amount of all the resources (including time) used in the various activities of the enterprise. The typical areas of hidden waste are over-production, waiting, transportation, over-processing, motion, excessive inventory, and defective units.

waste card   Read More

How to Achieve Compliance with Payment Cards


Data auditing and data encryption are two key Payment Card Industry (PCI) requirements for maintaining cardholder data protection. Although the two capabilities are distinct, they’re also synergistic—in fact, PCI recommends using data auditing as a substitute for encryption. Learn more about an auditing and encryption solution that can help you make better decisions about protecting your and your clients’ sensitive data.

waste card   Read More

Let Innovation, Not Technology, Drive Your Product Business


Compliance with regional and international standards, such as the Waste Electric and Electronic Equipment (WEEE) or Restriction of Hazardous Substances (RoHS) directives, has made it more complicated for companies to deliver innovative products to customers. Learn how focusing on product innovation, data integration, and process optimization can help your company satisfy customer needs while meeting compliance standards.

waste card   Read More

Radioactive and Hazardous Waste Management Applications


Three problems are common to most complex environmental modeling efforts: they’re uncertain, multifaceted, and hard to communicate. Overcoming these challenges is especially important when modeling the performance of proposed and existing radioactive waste management facilities. Graphical simulation tools can help represent uncertainties, integrate all aspects of the system, and ease the presentation of complex models.

waste card   Read More

Leveraging Change Control to Meet PCI Requirements


Identity theft and credit card fraud affect all businesses—and the problem is only getting worse. In order to combat these threats, credit card companies have joined forces to introduce the Payment Card Industry Data Security Standard (PCI DSS). For financial institutions, complying with PCI DSS by using real-time monitoring and selective enforcement software can help to relieve the burden of unauthorized changes.

waste card   Read More

Hanging on the Telephone: Antivirus Cold-calling Support Scams


Service support scammers rely on the naiveté of their victims in order to persuade them to grant access to their computers and credit card details. There’s very little a security company can do directly to prevent this activity, apart from keeping its own software up to date so as to detect malware and block as many threats as possible. Read this white paper to find out about different types of scams that threaten your data security.

waste card   Read More