IATA-FIATA Air Cargo Program

April 24, 2017

Despite the successful global operation of the IATA Cargo Agency Program over many decades, the role of
IATA Cargo Agents (freight forwarders) has changed. Previously Cargo Agents were ‘selling-agents’ for and on
behalf of airlines. Whereas today the vast majority of forwarders are ‘purchasing-customers’ of those airlines
and their business relationship is often as buyer and seller.

Spotlight

Cebralog Supply Chain

We are specialists in TRAINING and CONSULTING in LOGÍSTICA and SUPPLY CHAIN. Contact: sac@cebralog.com Our areas of expertise include: - Service level balancing vs. logistic cost - Distribution mesh revision - Inventory reduction master plan - S & OP design and implementation

OTHER WHITEPAPERS
news image

Turning Data into a Strategic Asset for a Modernized, Future-proof Supply Chain

whitePaper | August 15, 2022

No organization’s global supply chain has been untouched by the many unforeseen events that have ravaged the ability to move products from the point of manufacturing to the point of consumption. Public health threats and geopolitical events are just a few challenges to global supply chains—and they all appear to be happening concurrently. Whether you’re talking about business-to-consumer or business-to-business supply chains, the impact of these events has been undeniable. When evaluating their own supply chain risks, organizations should expect the unexpected, and plan their systems accordingly. And organizations need new ways to use data to promote efficiency, visibility, and resiliency in their global supply chains.

Read More
news image

Data science for supply chain whitepaper

whitePaper | May 17, 2022

From Master Data driving ERP software to real-time IoT streams enabling fine grain tracking and optimization, Data is omnipresent when dealing with Supply Chain processes. However, the abundant information is not always leveraged to actually improve the overall flow. Often locked away in specialized software, siloed between departments of the same company or simply not made accessible to business practitioners, the premise of a data-driven Supply Chain falls short of expectations.

Read More
news image

Location-based Process Automation

whitePaper | May 19, 2022

Manufacturers, suppliers, and logistics companies are finding themselves at an interesting intersection today. Digital transformation, forcefully propelled atop any executive agendas by COVID-19, is no longer a trend or a hype. With more pressure from stakeholders, customers, and competitors, companies need to act fast and decidedly to kickstart their smart factory roadmap.

Read More
news image

Production Forecasting for Mining Operations with Simulation

whitePaper | May 17, 2022

Effectively managing the delivery of ore through the “pit-to-port operations” from the mining pit, through the plant, to the port where it is loaded onto a ship is a difficult task. It involves the management of discrete teams from the mining operation, plant operations, loading hauling, rail, port operations, marketing, and shipping. Most of these teams are driven by key performance indicators (KPIs) that focus on the group's performance that in some cases is not aligned to the overall efficient pit-to-port operation. For instance, the objective of minimising rehandling cost at the run of mine (ROM) could impact final product quality when loaded onto a ship. For efficient and effective pit-to-port operations it is important to effectively balance the trade-off between each groups operations to maximise profit whilst minimising risk.

Read More
news image

SECURING THE SOFTWARE SUPPLY CHAIN

whitePaper | August 15, 2022

Cyberattacks are conducted via cyberspace and target an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment or infrastructure; or destroying the integrity of the data or stealing controlled information.1 Recent cyberattacks such as those executed against SolarWinds and its customers, and exploits that take advantage of vulnerabilities such as Log4j, highlight weaknesses within software supply chains, an issue which spans both commercial and open source software and impacts both private and Government enterprises. Accordingly, there is an increased need for software supply chain security awareness and cognizance regarding the potential for software supply chains to be weaponized by nation state adversaries using similar tactics, techniques, and procedures (TTPs)

Read More
news image

Supply Chain Threats – Test, Provision, andValidation

whitePaper | April 15, 2022

Supply Chain security is an area of significant focus and scrutiny today. A number of recent significant attacks against both hardware and software supply chains have further exposed the criticality of understanding the threats posed against manufacturers and providing sufficient mitigations. Understanding and mitigating supply chain threats starts with simply identifying the threats. The purpose of this document is to further expand on prior work and dive into the testing, provisioning, and validation phases. These phases represent potentially the most significant threat against products as they are often conducted, at least in part, by external organizations. Without an understanding of all the known threats currently present, it would be impossible to make any assertions regarding the overall security of products and their associated supply chain

Read More

Spotlight

Cebralog Supply Chain

We are specialists in TRAINING and CONSULTING in LOGÍSTICA and SUPPLY CHAIN. Contact: sac@cebralog.com Our areas of expertise include: - Service level balancing vs. logistic cost - Distribution mesh revision - Inventory reduction master plan - S & OP design and implementation

Events