Search this blog


a

Saturday, August 22, 2009

Enterprise Asset Management Systems: Your Manufacturing Organization’s Underrated Superstar

For all you baseball fans living in the US and Canada, you can probably appreciate that we are quickly approaching what is referred to as “the dog days of August.” This is when the pennant races are close, and almost every game has added significance for a team’s chances of making it to the playoffs.

As I was enjoying one of those rare idyllic days lying in the backyard hammock and reading the sports page, it occurred to me how the good teams are not just about one or two great players. Rather, they are comprised largely of players whose natural athletic ability may not necessarily match that of the few superstars on the team, and who may not be found basking in the limelight, but who consistently work hard and practice on a daily basis. These are the players that, when given the opportunity, can deliver the key play or get the big hit when the game is on the line.

This made me think about how in a manufacturing environment, the most unlikely areas can contribute in a critical situation. In many organizations, it is the maintenance department that, much like the unsung heroes of the baseball team, manages to keep aging equipment running flawlessly. When a machine unexpectedly breaks down, it is this department that knows what is required to repair it. And just like the baseball season, summertime is a busy time for maintenance departments, as companies choose to use the summer holiday period to shut down in order to install, repair, or replace equipment in their production facility.

In this blog post, I thought it would be a good idea to take an inside look at the challenging world of enterprise asset management (EAM), and find out how this unheralded software can give your company the winning edge.

Factors Leading to Critical Failure of Assets

  • poor maintenance practices
  • undocumented maintenance logs
  • poor budget planning
  • inability to track known rates of failure for equipment

What Is EAM

Because competition within industries is fierce, any downtime in a facility can make the difference between profit and loss for the organization’s bottom line. In many organizations that are capital equipment-intensive (i.e., mining, oil and gas, utilities, aerospace manufacturing, etc.), the ability to plan maintenance or replacement of such physical assets as machinery is controlled through an EAM system.

An EAM system generates analytical data to optimize machine-operating efficiency, and calculates costs to support and maintain single pieces or a series of physical assets. EAM also works closely with the computerized maintenance management system (CMMS). CMMS provides predictive maintenance schedules and, by analyzing available inventory, assigns physical resources (inventory and labor) to a scheduled work order for equipment pieces. This generates replenishment purchasing requisitions for maintenance, repair, and overhaul (MRO) spare parts.

In the diagram below, you can see how EAM works as part of a three-pronged approach with EAM, CMMS, and production to gather data for analysis. This analysis helps managers to decide whether to repair equipment, schedule resources, or plan for new capital equipment purchase and installation.

image 1

Benefits of EAM

  • Ensures compliance with government-legislated health and safety programs by demonstrating tool and machinery reliability through the tracking of all historical maintenance.
  • Develops life cycle management systems to identify known or predictive mean time between failure (MTBF) and root cause analysis.
  • Allows the ability to implement continuous process improvements in the areas of tools and identification, to properly calibrate tools and equipment as part of a predictive maintenance program. This is done with the help of radio frequency identification (RFID).
  • Allows the ability to schedule maintenance and installation of new equipment and to manage repair budgets and schedules, through integration of EAM with CMMS.
  • Enables streamlined procurement management policies for MRO spare parts.
  • Enables trend analysis to determine when maintenance is cost-prohibitive and to plan for replacement of capital equipment.

EAM Products to Consider

At TEC’s web site, you can review different vendors’ products as well as obtain white papers and vendor comparison reports. In this section, I offer a brief overview of some EAM products worth consideration.

IFS EAM

IFS’s product offerings include over 30 modules of enterprise solutions, many of which that can be purchased as either an overall integrated solution or as a bolted-on best-of-class solution. IFS has a unique add-on available that includes both IFS EAM and IFS ERP called IFS OEE (with “OEE” standing for overall equipment effectiveness). This solution performs analytics while equipment assets are running (which avoids downtime), and it makes the necessary adjustments to maintain an optimum level of production. IFS EAM allows organizations to proactively manage assets and maintenance activites. It combines unique features to permit data modeling on equipment in order to determine whether equipment is near the end of its production life cycle. For further details, visit IFS’s vendor showcase.

Infor EAM Enterprise Edition

Infor EAM delivers a unified solution for monitoring and managing the performance, maintenance, and deployment of company assets. With Infor EAM, the maintenance and plant engineering practitioner is able to perform maintenance optimization, staff productivity analysis, budget forecasting, and strategic planning. There are five separate modules which, combined together, form a complete EAM solution.

* maintenance
* inventory/warranty
* uptime
* reliability risk management
* strategic planning

For further details, visit Infor’s vendor showcase.

A Final Thought

Today’s manufacturers are fighting for any edge that will lower their costs and that will allow them to meet the challenges of global manufacturing and ever-stringent regulatory and compliance legislation. One paradigm shift has been to conduct maintenance based on an actual condition, and not on aggregate rates of failure. This departure from the traditional approach is a result of systems now being able to track real-time performance of equipment. Through EAM, condition-based maintenance (CBM ) is now a reality, and it will permit your maintenance department to perform like champions.

What’s in a name? or Enterprise systems’ reincarnations (Part II)

While the Part I of this topic focused on Consona Corporation (former M2M Holdings), this time the discussion continues with the recently minted Solarsoft entity, privately owned by Marlin Equity Partners. True, in Part I, besides Infor, I could have also mentioned as old news the renaming of Verticent ERP Plus (formerly PowerCerv [evaluate this product]) as part of the ASA International parent and SoftBrands (formerly Fourth Shift and AremisSoft), but these companies have not that candidly professed their appetite for more acquisitions.

In any case, in April 2007 Canada-based CMS Software merged with the United Kingdom (UK)-based XKO Software Limited, a provider of specialist enterprise software. CMS has been in the enterprise resource planning (ERP) business for over 20 years, and, naturally, it has always looked for ways to improve the services and products it delivers to its customers. As the market increasingly demands consistent local service delivered on a global basis, the company hoped to enhance its ability to meet that demand via the merger.

But, when CMS and XKO merged they knew that they would eventually need to find a new name for the combined business. Namely, both firms were relatively well known in their local markets but the names have lost their original meaning and communicated little to new customers in new markets. According to the letter sent to all customers and partners, putting together a six-letter acronym didn’t make sense, so the company held an internal contest and the name “Solarsoft” was chosen, as suggested by a member of the staff.

The name was reportedly liked for its power and simplicity and, critically, the company could acquire the domain name. After careful consideration, the management felt the time was right to re-name XKO and CMS. Thus, from early November 2007 CMS Software, Inc. has been doing business as Solarsoft Business Systems. In the UK XKO has been re-named Solarsoft Business Systems Limited. The old names have been retired, except for Mattec Corporation, the manufacturing execution system (MES) subsidiary, and the joint venture business in China, which will not change their names at this time.

Since Solarsoft is in its early developmental stage compared to Consona or Infor, it intends to extend its manufacturing and distribution ERP software range through a series of point solution acquisitions over the next year or so. While time will only tell what possible target purchases these will be (given that someone has recently said that the current ERP market is like a post-Thanksgiving turkey — all good stuff has already been picked), Shawn McMorran, CEO of Solarsoft, says that the company intends to build on the recently dubbed Solarsoft Open Services Architecture (SOSA) framework to offer integrated systems across front and back office operations, including supply chain integration, e-commerce and process automation.

SOSA (not the once popular baseball player!) is a web services architecture that builds on the simple client/server model that powers the World Wide Web (WWW). Using flexible Extensible Markup Language (XML) messages, SOSA applications are envisioned to be easily integrated across the network within an organization or with trading partner systems across the Internet. All Solarsoft customers will eventually leverage SOSA to deploy a suite of plug-in applications to extend their core ERP platform beyond the back-office.

Such an open architecture framework was required since Solarsoft ERP systems are built on vendor platforms from former CMS technology partners IBM and Microsoft. In addition, via former XKO, Solarsoft also supports a range of UNIX implementations including AIX and open source Linux. XKO is best known in Europe for various systems aimed at managing finance, inventory and production in businesses ranging from builders’ merchants through fast moving consumer goods (FMCG) distributors to high-tech engineering firms. The company has grown organically and through acquisition since its formation from the merger of KSE and Xavier Computer Group in 1999.

Regardless of the underlying technology used, a future standard architecture (i.e., SOSA) must ensure that all platforms work together with a suite of value-added options offering flexible configurations for the targeted manufacturing, distribution and wholesale & merchant sectors. For now, it appears that the vendor will group its offering into three platform-based product suites:

1. mVP, building on the Solarsoft CMSm5 ERP [evaluate this product] foundation;
2. iVP, building on the Solarsoft CMSi5 ERP [evaluate this product] foundation; and
3. xVP, or a cross-platform solution that will most likely enable tailored integration of former disparate XKO systems and future acquisitions.

The last offering seems the least defined at this stage, but we will have to wait to see how this noble concept will work in all product cases, since there is always some significant time and work to take place before a concept comes to realization. Also, we should wait and see whether Solarsoft acquisition strategy will be close to those of Infor or Consona. The company just acquired VantagePoint Systems, Inc. (TSX VENTURE:VPG), the lesser-known packaging manufacturing industry ERP provider. It is too early to judge whether Solarsoft is bottom-feeding or has a well-devised strategy of targeting some defendable niches.

This brings us to another general issue for all those companies that have been (and still want to be) on an acquisition trail: can they really continue without running out of steam. But, that is a topic on its own. For now, dear readers, what is your opinion on the strategy of the above-mentioned, recently renamed acquisitive companies? Which of them are (or are not) in for a brighter future?

Information Security 101: an Introduction to Being Compliant and Protecting Your Assets

Internet access, and collaborative tools (whether a phone system’s conferencing capabilities, or document-sharing applications) are “must-haves” for most businesses today.

But by now many managers know that you shouldn’t stop at just implementing these tools and then going ahead, footloose and fancy-free, with using them. As with any other asset, you need to protect not just the technology that enables these tools and applications, but also the information that these tools allow users to share.
To ensure the confidentiality of private information—and help ensure compliance with regulations and internal policies—information security software is now also a “must have.”

A recent survey by Milford, Massachusetts (US)-based Enterprise Strategy Group revealed that the majority of organizations (59 percent of those that responded) do not even have a formal policy in place to define the sharing of data, particularly intellectual property.

What does this mean? Many companies “are flying by the seat of their pants and hoping not to get burned,” when it comes to data breaches, says Jon Oltsik, senior analyst with ESG.

But those who do get a little too close to the fire may find that not only the seats of their pants get scorched, but that they come close to losing the shirts off their backs too, as costly compliance violations add up. And never mind the costs that result from trying to stay on top of compliance by continually checking internal controls. And never mind the possibility of serving time in the slammer if the compliance violation is severe enough.

And, oh, never mind the damage that can be done to the reputation of your company in the face of public disclosure of your compliance violations.

It follows, then, that one of the first steps in boosting your security measures is to create a security and compliance policy. This internal policy should be a working document that clearly states your company’s security and data classification policies, (and that includes, depending on your industry or business activities, a functional definition of intellectual property).

Once that’s done, you need to make sure all employees know about those policies. One of the final steps to ensuring your assets are covered (think of it as flame-retardant for the seat of your pants) for data breach: install an up-to-date information security system that helps you enforce those policies and that helps maximize data protection.

In order to choose the right information security system, you’ll need to identify the ways that users may currently be allowing sensitive information beyond the confines of your organization. And with e-mail, Internet access, and other collaborative tools, the ways data can be leaked, manipulated, or lost are numerous.

And as for compliance—many organizations are still struggling to get their heads around the cumbersome (and potentially costly) US Sarbanes-Oxley Act (SOX) of 2002.

Which Companies Need to Be Particularly Concerned with Data Security?

Companies in any manufacturing industry that need to ensure the confidentiality or secrecy of recipes or processes

· Companies in any industry known for innovation or thought leadership

· Enterprises in any industry needing to maintain records for auditing in accordance with SOX

· Hospitals and other health care facilities dealing with thousands of pieces of confidential patient data on a daily basis.

· Companies at the end of the supply chain, involved in accepting credit card payment by phone or Internet

How Can Information Security Specifically Address Your Data Confidentiality and Compliance Needs?

· Create levels of authorized access to vulnerable data, and ensure limited access with private passwords

· Establish secure communication channels between terminals or remote offices with electronic data interchange (EDI) and virtual private networks (VPNs)

· Mitigate the risk of both internal and external data breach with firewalls and data encryption methods

· Automatically analyze potential new threats to the system, and send alerts to the appropriate administrators

· Aid in compliance with SOX, and other regulations, such as the requirements created by the Payment Card Industry (PCI) Security Standards Council, the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA), or in Japan, the Financial Instruments and Exchange Law (J-SOX) and the Protection of Personal Information Law

· Capture, monitor, and keep financial file logs (from financial reporting systems) for at least one year, for SOX audits

Information Security Slip Ups—or Why Chains around Your Computer Hardware Won’t Keep Your Data Safe

* When hackers access the credit card numbers (or other confidential personal information) of your customers, it can cost you from $90 to $305 USD for each breached record. For US-based retail chain TJX, which let nearly 100 million credit card numbers get into the virtual sticky fingers of hackers, the damage has been dear indeed. (This may happen more often than you realize… bought jeans or a watch over the Internet lately? Lingerie? Books? How about a CD or DVD? In addition to the company cited above, the same or a similar issue has plagued Guess, Victoria’s Secret, Barnes & Noble, Tower Records, Eli Lilly, and even—gasp!—Microsoft, to name but a few. )
* Never underestimate the wrath of an employee spurned… a woman employed as an administrative assistant recently deleted $2.5 million (USD) (and seven years’) worth of architectural drawings to seek revenge (or would that be pre-venge?) on her employer, whom she believed was planning to fire her. The woman used her own account credentials to access the files, which it took her about four hours to delete. The files have since been restored. But clearly, this firm could have benefited from an information security package that would have ensured that the administrative assistance did not have authorization to access the files in question.
* The spouse of an employee at Pfizer performed an unauthorized installation of a peer-to-peer (P2P) protocol on a company laptop, which led to a flood of exposed employee data. In attempt to make amends, the company felt obliged to offer the more than 17,000 affected employees a years’ free credit monitoring, at a reported cost of $25,000 (USD). Again, had the company been aware of the potential risks of mobile devices such as laptops, and the need for not just passwords but security features that prevent the download of unauthorized programs or applications, this breach could have been prevented. Pfizer is probably thanking its lucky stars the damage wasn’t more costly, and that customer information was not part of the breach.

What an Information Security System Can Do to Tackle These Risks:

* Strengthen encryption methods, so that even remotely hosted private or confidential data cannot be (so easily) cracked
* Make sure that your information security solution can protect you against structured query language attacks, and that the vendor agrees to provide upgrades that will help protect you against new viruses, trojans, and malware.
* Limit or deny use of vendor-supplied password defaults, to minimize the possibility of password breaches
* With data forensic abilities, information security solutions can respond to threats and analyze events in order to better predict potential future security breaches

Want More Information about How to Find the Best Information Security Software for Your Needs?

* Visit Technology Evaluation Center’s (TEC’s) Information Security Evaluation Center to find out more benefits of implementing info security
* Find out about the ways firewall software can target your security needs
* Download sample request for proposal (RFP) templates for information security and firewall
* Read articles about information security by industry experts

Any comments, questions, or advice about Iiformation security? Let everybody know below.

Surviving Amid “ERP Sharks” as a “Visionary Vendor for the Pragmatic User

Maybe just for the sake of change (or some fun), let me start this blog post as a quiz question. It could go like this:

Can anyone name the mid-market incumbent manufacturing and distribution-oriented enterprise resource planning (ERP) vendor that has a global presence (through regional territory distribution centers and a global reseller network in the United States [US], Canada, Africa, Asia-Pacific, Australia and the United Kingdom [UK]), an install base of 12,000 companies in over 60 countries, and the channel consisting of a few hundred value added resellers (VARs) that contribute to about 85 percent of its revenues?

As some helping tips, the privately-held vendor was incorporated in 1978 in South Africa, and has since grown organically (with no major acquisitions thus far) to about $60 million in revenues. Well, for those (rare few I suspect) that have guessed we are talking here about SYSPRO, may I boldly suggest an audition for the “Jeopardy” (or like) quiz show?

In any case, for nearly 30 years, SYSPRO has been offering a broad range of extended-ERP solutions for small and mid-sized manufacturing and distribution organizations (the sweet spot being the companies with US$10 million to US$250 million in revenues).

I believe that SYSPRO has survived largely unscathed through all the mayhem and carnage in its market via the right combination of product and technologies, plus a successful “partner-dominant” go-to-market strategy that can (and should) be leveraged more aggressively going forward.

Recently, SYSPRO has founded and has been targeting a new information technology (IT) buyer category. For such buyers, it has espoused a strategy called PragmaVision –- a “chasm-crossing” bridge that provides a visionary, yet feasible enterprise applications roadmap for mid-market technology buyers.

As described well in Goeffrey A. Moore’s “Crossing the Chasm” bestseller book, there is a typical gap between early adopters (i.e., visionary buyers, which are somewhat keen to try out new technologies, appreciate product’s potential for competitive advantage and have more influence than innovators, but are also a small market segment) and the early majority (i.e., pragmatists that are a large percentage of the market, and that buy into new technologies only after there is a clear, easy understanding of the benefits by all peers).

SYSPRO believes strongly that these buyers demand a unique combination of robust and scalable yet current technologies that provide near-zero risk and high return on investment (ROI). “PragmaVists,” as SYSPRO calls them, buy into new technologies only after there is a clear, easy understanding of the benefits. They also happen to make “the bulk” of all IT purchases, but they do not love technology for technology’s sake and require an evolutionary and stable strategy to control their “mission critical” systems. They also desire a proven track record from their vendor and demand strong references from people they trust.

In other words, a pragmatic prospective customer wants from its vendor:

1. a vertical market expertise;
2. a strong and integrated product suite;
3. broad but tried-and-true technology options; and
4. a large and satisfied customer base (of peer companies).

While the last criterion is easily met via the above figure of 12,000 installations, to the end of the verticalization demand SYSPRO targets four vertical manufacturing and distribution sectors (and their sub-sectors or micro-verticals):

1. Food;
2. Medical Devices:
3. Electronics/Hi-Tech; and
4. Industrial Machinery/Equipment.

As an example of vertically-oriented functionality, for Medical Device manufacturers, the vendor offers the following capabilities:

* The US Food & Drug Administration (FDA) and other regulatory compliance;
* Lot and serial number traceability;
* Digital signatures;
* Multi level Bills of Material (BOMs) with Routings and Structures;
* Asset utilization; and
* Integrated service and customer relationship management (CRM).

Generally speaking, SYSPRO provides quite a well-rounded enterprise applications choice for mixed-mode manufacturers and distributors. For distribution companies [evaluate this product], SYSPRO offers a strong 24/7, 360-degree view of order and inventory, serial number and lot tracking, order fulfillment, sales analysis and customer service.

For discrete manufacturing companies [evaluate this product], SYSPRO offers real-time, finite production scheduling, shop floor controls and choices of engineer-to-order (ETO) [evaluate this product], assemble-to-order (ATO), made-to-order (MTO) and/or mixed mode manufacturing [evaluate this product]. The product is also applicable for both discrete and process manufacturing [evaluate this product] environments.

The namesake SYSPRO suite is a role- and Web-based, with solutions in the following 11 categories:

1. Financial Management [evaluate this product];
2. Distribution;
3. Manufacturing;
4. Analytics;
5. CRM [evaluate this product];
6. E-Commerce;
7. Advanced Factory Scheduling;
8. Reporting;
9. Regulatory Compliance;
10. Technology Solutions (i.e., to develop custom SYSPRO e.net extension solutions based on a service-oriented and open architecture); and
11. Lean Operations.

SYSPRO also offers a number of vertically-oriented and differentiating capabilities that are not typically found in traditional ERP systems. Such so-called “killer applications” would be:

* Embedded electronic data interchange (EDI);
* Trade Promotion Management;
* Material Yield System (for Cut-to-Size/Shape industries);
* Integrated Forecasting & Inventory Optimization; and
* Visibility & Tracking Functionality (pervasive across the entire suite).


Tuesday, August 4, 2009

How a supplier provides the agility to the systems of company of Post-execution

Agresso saw an occasion unexploited in the vulnerability of the majority of the current solutions of the planning of entrepreneurial resource of par (ERP), which cannot really address the fast change within a company. Basic information on Agresso and its world of businesses of Agresso of product (ABW) 5.5 can be found in the system and the Post-execution of company Agility-No longer necessarily Oxymoron?. For information on the occasion Agresso addresses, sees the agility of Post-execution of the systems of company: An analysis and modeling approaches with the agility Post-execution in systems company.

Part two of the systems and the Post-execution of company of series Agility-No longer one Oxymoron?

We realize that the slogans of platform like data capture unlimited, indicating of principal execution, and alarm of the possibilities for the report and the analysis ; combined the process of businesses, the course of operation, and the report in a model simple and unified ; or financial operation and not - financier of intelligence in a lockstep, a block-model of average Lego little without concrete examples. For this purpose, the best illustration of Agresso of 'capacity of S to incorporate architectural flexibility-without accounts and Master of register of obstruction data-is the possibility of creating a structure of account of register without secondary-registers of the whole. This is contrary with conventional approaches with financier analyzes, who is to create the complex structures of register with several secondary-registers (for example, with a structure of account resembling x/xx/xx/xx/xxx/xxxx/xxx) in order to adapt to all the report and possible datum fields of analysis, with combinations like , of funds , of committee , center of cost , department , assessment , of division , subjective of account and so on. For example, offer of the multiple dimensional possibilities CODED it supporting up to eight segments of variable code length of account, which allow the income and the expenditure detecting a level of analysis strongly detailed, whereas the hierarchies and the devices of groups of account add the practically unlimited pyramidal increase of account to meet the investigation, report, and needs for drilldown (see the financial applications of collaboration of composition).

Agresso 'approach of S to the analysis is rather than almost any financial information can be rolled up via the principal constitutive blocks, beginning with attributes mentioned in the part one of this series. They are the basic building blocks of the application software package of ABW, and form the way in which the system can be adapted to the customer requirements to answer a series of needs for information. In a general way, the attributes define which analysis must be captured on entering transactions, but they can also be organized in hierarchy of report to make it possible information to be looked in various dimensions. The definition of attribute of outside-of-the-box covers all the principal data (in other words, fixed or static head) in the application (such as the category of cost, the type of capital, the direction, the place, the employee, the center of cost, the department, the event, the type of expenditure, the project, the funds, the type of recipient, and the property).

However, the users can add their own definitions to the need to provide the analysis most appropriate to their business. Thus, by using only the standard functionality, the application can be conceived in function, since the validity of the attributes can be limited to certain definite ranges of date, or certain User groups, while the linkages defined between the attributes allow a being of attribute for had by others. Like another improvement, each attribute or single category of analysis can have multiple values. Using this service, it is possible to analyze adjustments separately each standard of accountancy, if wished, to provide another layer of analysis, a responsibility, and an order. Moreover, attributes can be held for the User groups specific or limited to the date defined for the user different extends, which in the manner it is feasible to keep adjustments of end of the year, for example, separated from the temporary adjustments.

Systems and Post-execution of company Agility-No longer one Oxymoron?

In mid-2006, Agresso, one of the five principal suppliers in the whole world of the solutions nobody-power stations of the planning of entrepreneurial resource (ERP), transformed a more aggressive entry into market of the North-American software, where it has currently approximately hundred customers. It was mainly because the supplier saw an occasion unexploited in the vulnerability of the majority of the current solutions of ERP of par, which cannot really address the fast change within a company. With a hearth on organizations of maltreatment in rapid-change the mode, Agresso is deployed in 100 countries, with more than 10.000 sites in 2.400 organizations of user and approximately 1.1 million users.

Part one of the systems and the Post-execution of company of series Agility-No longer one Oxymoron?

For information on the occasion Agresso addresses, sees the agility of Post-execution of the systems of company: An analysis and modeling approaches with the agility Post-execution in systems company.

Agresso North America is a completely had subsidiary company of unit 4 Agresso, based in Sliedrecht (the Netherlands). Agresso 'North-American offices of S are in Victoria, Colombia-British (Canada); Dallas, Texas (US); and Los Angeles, California (US). In short, the head office of Agresso of unit 4 was an international producer of management software of company and a supplier of security software since 1980, when the pilot professionals a dozen joined forces, sharing a passion and a vision to develop the software punt--independent and standard-based which turns around the processes of businesses of the customer. Since then, the unit 4 Agresso became almost 2.300 professionals, and now provides the management software of company to more than 30.000 customers in almost 100 countries. The company was with dimensions on the Dutch Stock Market (EURONET: U4AGR) since 1998. With branches in eleven European countries, the USA, and Canada, and with sales volumes in the whole world, the supplier carried out approximately $450 million (of USD) in the incomes in 2005.

The head office of the 'activities of S are cut in two independently run divisions: management software of company, and Internet and safety, coming respectively from the old group and the old Dutch unit 4 (the fusion of Agresso of supplier of Norwegian ERP of specialist in safety and management software in company in Internet between these two suppliers having taken place in 2000). The division of management software of company develops, of the sales, instruments, and supports the management software of company for management, the support, and the optimization of the processes of businesses, and for the optimization of operational management. The security solutions of sales of division of Internet and safety of the thirds, and provides services for the execution and the maintenance of the data protection. On the market for economic applications, the unit 4 Agresso has a principal international position in the public sector, and the service of the services to the companies, with the world of businesses of Agresso of product of flagship (ABW). This division, which organically raised 16 percent in 2005, also contributed approximately 52 percent of incomes, with 82 percent flat beating seam of incomes of company before interest, tax, depreciation, and damping (EBITDA), and 78 percent of the company of 'employees of S.

Generally Agresso wants to be distinguished on the market by means of a combination from knowledge specialized and detailed from a certain number of markets chosen, with the standardization of the products on the basis of technology tried-and-true which is interoprable with other principal solutions of businesses of company. Thus, since Agresso never envisages to offer only to each one, it shows the specialization in the mediums of the businesses chosen, which mainly eliminates the need for software excessively adapted to the customer requirements. On the one hand, its principal helps of product ABW give to the organizations with the range of the user (in what are the service of the services, the projects, and much of various kinds of reports/ratios of primary customer of importance) the necessary functionality for the management and the order of their processes of businesses, which become of this fact more effective, more transparent, and more easily handy.

ABW is the strategic international continuation of product in the group of Agresso of unit 4, organically established ground to the top (in opposition to being the result of acquisitions of the disparate products and technologies). The homogeneous and organic nature of the continuation provides a communal ground glance and, of feeling and each role has a simple user interface (UI) and unified safety. The characteristics of the product of the innate analytical possibilities, since (opposite with much of packages of par which must be based on the third machines to extract and operate the information of management) it is basically a powerful warehouse of data with possibilities integrated to satisfy the financial needs and not - financial complexes for information. The analytical possibilities are carried out with attributes, which will be explained later this series. For now, it is enough to indicate that its indigenous, model Warehouse Information process of businesses, and models of the delivery of analytics and report are inextricably dependent in a virtual cycle.

With the best power to interlace these three components, Agresso 'strategy of outward journey-with-market of S is dynamic companies nobody-power stations aimed in the semi-market (the supplier 'the soft spot of S) that, because of standardization, consolidation of industry, change of management, and the objectives of businesses of rapid-growth, requires the agility of post-execution. Agresso calls this target BLINC, for undertaken alive IN the change.

ABW found acceptance significant in the private service sector (for example, of the services, the engineering services, the services to the companies, and marketing and of the media) and public sector (local government, government organizations, health care, more raised education, etc). A less known fact is than Agresso has a dominant position in the public sector in Sweden, in Norway, and with RU, whereas it is successful in the public sector of other countries also, though mainly in Europe up to now. The company with the experiment in almost 2.400 organizations nobody-exchanges (of which more half are in the public sector), and persistent attachment with postings to support the challenges and the ambitions of the organizations nobody-exchanges. In 1992, Agresso gained its first customers of phase in the public sectors of Norway, of Sweden, and RU, to reach 250 customers from here 1997. The 2000s early saw its first transborder shared achievements of services and achievements of capital in Oslo and Stockholm (capitals of Norway and Sweden, respectively). Also the projects of the note included achievements for the Ethiopian project of water in Africa, and for the House of Commons with RU.

Agresso learned certainly by its vast experiment that the public sector has very different goals and needs the private sector, since the public sector is mission rather than income-conduit. Its mission is to maintain the public (rather than management and the shareholders), and to provide services to the citizens in the sound jurisdiction-is him via the schools (elementary and higher education), the police force or the firemen, the local government, the roadworks, the health care, or the Social services of leisure or serious. Once to be a train of sauce to the juice with the unlimited funds of taxpayer, today the public sector is posed almost everywhere with the meticulous examination and the painful constraints in terms of limited funds, and to the inalienable or expensive skilful personnel, at the same time as the whole of the inhabitants never requiring again services. One expects that each agency reaches its goals without taxes or tariffs carrying out, and has make more with less attitude with the continuous improvement is the day order. The best example is with RU, where one expects that each public entity measures the execution compared to the nationally given standards. This hope required on line the service of all the governmental services, since such an initiative was looked like crucial in Great Britain 'international competitiveness of S.

More and more, the central governments in the whole world require the use of the computers and the automation of Internet to bind and control the agencies under their authority, and to allow a better enabling of the employees and a better supply of services buildings and of responsibility the local authorities, at the cities, cities, cities, and finally, users (citizens). Moreover, the local authorities, the health care, and the first-aid organizations have an obligation to again bring back to their greater governmental units, if they are states, provinces, cantons, or the central boards of directors (which, alternatively, must publish the results with the electorate). Thus, the civils servant not only must provide online services to their customers, but must also be able to seek, amalgamate, and bring back data with regard to success of their agencies and the statute of their progress towards automation of information. They require of a complete sight of information of management constantly to make effective judgements about the resources and of the performance of service. Consequently, of the applications of software in support of the public sector must be integrated through all the processes, and they must support the internal aspects of the agency or the government organization in its management of the data, people, finances, and her detail mission-like good on public which if, at the end of the day, the advantage of the body of the 'charter of S.

Agresso 'hearth of S on companies nobody-power stations and its major arrangement their inherent business challenges and appropriatenesses carried out the supplier to carry out the higher position of leadership of the market (or close to it) in several European countries. Apart from the public sector, the division of management software of company has a firm situation of market in Europe, as a higher European player (in five the principal world ones) on the market of the management of wallet of project (page by minute), and as a one of the eight principal European players of finances (among the twelve principal ones overall) according to Gartner.

With the last release of ABW, the unit 4 Agresso moves to the international market for the companies and the establishments to the range of the user means and large. In this sector, operation project-based, much of human interaction, and the data flows constantly changing are central. For this purpose, ABW 5.5 is a narrowly integrated multidevise, multilingual, and continuation multicompany of the modules that which include financial management, human resources (hour) and delivers of pay, management of supply, cost of project and invoicing, report and analytics, and automation of process of businesses (BPA), with and the management information management of document to its core. The idea behind the product is to authorize all the departments and employees (since in people and of the organizations service-exchanges, of the departments are often of small companies of their own boss, with the deputy responsibility), and to facilitate the transformation of businesses to the need. The result should be decision making improved in various departments, giving of this fact to each one more hour of thinking and of acting strategically. On one moreover high level, the product controls the following processes of its customers of target:

* report-with-record
* rent-with-withdraw
* order-with-money cash
* budget-with-envisage
* obtain-with-pay

As for the genesis of product, 1987 saw the introduction of the functionality of core, the financial management, which contributes always approximately 50 percent of income of licence. Possibilities of hour were presented in 1995. The posterior years saw the introduction of the functionality of page per minute (see the management of wallet of project for organizations of maltreatment: Establishing bond between the management of the projects and the executions), which contributes currently roughly a quarter of incomes of licence of ABW. The 2000s early saw improvements to support deputy responsibilities and decentralized accountancy; the first integration of market; and support in a proactive way of work (constant housing including change).

The supplier had taken more step in internationalization of product, in terms of localization, languages, and whole of police force, by which Asia, the Central Europe, and Europe east are on the screen of radar. Its offer is currently available in nineteen languages. For already provided localizations, had in support of Unicode, a simple centralized installation of Agresso will provide local statutory conditions required to each customer. The company will probably compete with of this fact in the space of semi-market ($50 million to $1 billion organizations [USD], although it can measure to the top with the need), straightforwardly the suppliers traditional in this space, such as the software of Lawson, the systems of Deltek (see the additions of welcomes of supplier of management software of company), the solutions of businesses of Microsoft (put-band), SAP, and Oracle. In some areas, healthy competition can also come from the tastes of CODED, Maconomy, the exact iScala of software (see the total aspirations of software), of Epicor, etc

While ABW developing 5.5. , Agresso tried to concentrate more on enabling and alignment of the people. For this purpose, it there had significant investments of process of hour such as recruitment and the deployment, and in the improved user interface (UI), as in the delivery of information via the desktop machines executtive and increased the report and the tools for analysis. As for the hearth on the mechanisms of linearization of work place and performance of service, the supplier ensured himself that the course of operation was allowed in as much process of businesses like possible, with integration to include more data seizes real-time, and with the facility of improved use and the deployment. Finally and especially, for the quality of information, and the perfection, speed, and the relevance of the measurement of execution, the hearth was on financial possibilities and of project of order (such as the project estimating, saving, and far-sighted) and the intelligence in the form of the opinion and alarms, by its new possibilities of IntellAgent.

Looking at other angle, Agresso wanted the future-proof the offer and lowers its total costs of property (operating burnup) via the considerations such as improved architecture, modellers of course of operation, data models, independence gantry, interworking, Unicode, action to avoid personalization, glance and feeling, and so on. The supplier also wanted to help of the customers to embrace changes by modelling their organization better, and the economic model, the model of the delivery of information (report) and the process model are thus unified, and as a whole act. A better enabling of the people should come via the orientation from role, of, simpler order, facility of use, the adaptable proactive supply courses of operation of information, and an important level of personalization. Finally and especially, the widened participation of user come from the participation in an encouraging way of the external assistance (citizens, students, etc), distributed the responsibility, and the corporative government.

The platform of technology of Agresso uses open standards, and allows him with the personnel to increase their preferred choice of the components popular and easily available of industry, rather than being locked in the solutions of technology which could be today with the mode but out of the favour soon. Agresso offers architecture extensible based on WEB of N-line (with a layer given, the layer of logic of businesses, the layer of extraction, and lay down it presentation) which is in conformity with the framework of Microsoft .NET and Extensible Markup Language (XML) - Division of data based, and is thus in agreement with concepts directed towards the services of architecture (SOA). (For more information, to see the evolution of architecture: Central processing units with orientated architecture towards the services). The platform of technology increases industry and the open standards popular and easily available compared to the databases, with the support of Oracle, of the waiter of Microsoft SQL, and MySQL. It also supports a customer (rich) smart as well as a customer (thin) based on the WEB (for the deployment of outpost), or a mixture of both. The logic of businesses is separately maintained centrally and UI, so that the web client are updated and returned without manual intervention, of this fact also allowing the independence of gate and navigator. The web client is strongly configurable, allowing a range of possibilities of self-service.

Technical architecture is in conformity through a broad range of the industrial standards for the interface, interworking, and integration. Additional possibilities are provided via the blocked access unified to information via the services of Web (for the centralized access of corporation to ABW via the gates, for example). This simplifies integration with other systems, and provides the bottom for future developments, such as the integration gantry-based basically with all the platforms of intergiciel (IBM including WebSphere, Microsoft SharePoint, waiter of application of Oracle, or BEA WebLogic). When it comes to the deployment, no configuration (recording, files of initialization [INI], or arrangements of environment) is not necessary on the customer, due to the centralized possibilities of management and deployment, although it role-based there, safety-occupied presentation. Safety is integrated into all the levels, starting with an opening (unified) simple with the authentification of name of user and password and the authentification integrated by Microsoft Windows. The authentification could imply the numerical certificates customer-based, the authentification of digital fingerprint (biometrics), the infrastructure of public key (PKI), and the support of smart card, and is open to integrate rather simply with other methods of authentification. All the achievable ones (as with the prolongations of .dll or .exe) have a digital signature to avoid that to notch or any other handling not - authorized.



Email posting Enterprise Asset Management

For a team of design, a condition loosely indicated is often fallacious. That 's why it is important to seize conditions in a structured way, in a database of conditions maintained by directors of conditions, before they passed length to the development teams of product. The role of the director of conditions can not exist in the scenario running, or it could be achieved by the team of sale. But it is essential to correctly analyze conditions before taking them for the development. The companies can employ methodologies of the practices like the diagram of affinity, the PUGH Matrix, or the QFD to analyze, give the priority, and to trace in conditions with the existing devices or the new devices which they can provide. These methodologies also require companies to evaluate what the competitors can deliver to answer a given requirement. The true system of the management of life cycle of product (PLM) underlines the fact that conditions of product should be communicated clearly to all the agents of development of product, including the design, the test, the materials, the supplier, manufacture, the computer-integrated manufacturing of production, and teams of service. The increase in the visibility of the conditions of product is the first stage by applying any system of PLM.

Increasing productivity

The design starts starting from a concept produced by a need given for the market. The team of design must be given a very effective environment in order to be able to work with the maximum productivity. The use of the tools of the computer-aided design (CAD) and of the engineering computer-assisted (CAE) was common in industry for the last decade, but the true challenge is to store the produced data of CAD in a centralized, blocked, and easily accessible place. He 's also important so that the engineers of studies can daily sign or check these files during the cycle of design. This will give to originators more control of the design of products, since the centralized storage of the data of product leads to a rich development process of information of product.

Moreover, the incorporation of a strict mechanism of approval will make it possible originators to suitably make things the first time. The precise data of CAD are an important component of analysis for the teams of the planning of CAE or process computer-assisted (CAPE), since the incorrect or inaccurate data of CAD make efforts of useless CAE and CAPE. Moreover, making sure that the data of CAD are precise result of will in the precise nomenclatures of technology (EBOMs) for the planning systems of resource of the planning of the means of manufacture (MRP) or of company (ERP).

The cleanliness and the order of data of CAD are not only important for the team of design, but also for the following teams of development of product in bottom of the line. For this reason, the management of the data of CAD is regarded as heart of PLM.

To bring people is together the main aim of any system of PLM. When the people of development of product are narrower (practically speaking), they can collaborate more effectively. Because of the current tendencies of globalisation, like the tendency towards competences and the resources of admission of the funds of thirds which are geographically separated, it became obligatory to collaborate in a virtual environment. The health of collaboration can be parametrized with three fundamental questions:

  • How your collaboration fix do is it environment?
  • How much effectively can you collaborate?
  • How much resources your environment of collaboration do it consume in terms of network, and hardware and software?

Collaboration plays a crucial role when your teams of design are separate geographically. It also makes the fate of the direction for the organizations which externalisent the whole design of products at the organizations or the suppliers of third. Collaboration makes it possible the companies of host centre to give the feedback of design of products to the companies or to the suppliers of associated design with the parts of the design, rather than at the end. It is critical, as early tracking of the exits in the design of products is less expensive to fix than the exits which are detected later.

Reduction of the Time-with-market

Do the organizations of manufacture try to answer, of question how of reducing the time-with-market? Compagnies can obtain more market share and profit if they present the product for launching on the market earlier than their competitors. Thus, they tend to the minimum to reduce the duration of cycle as much as possible. The duration of cycle of product as a whole can be broken up into durations of cycle for the design, the analysis of technology, the validation, the purchases, the planning of process, and piloting.

The development of product comprises cross-functional team work, because the following functions are generally implied: marketing, design, technology, purchase, test, computer-integrated manufacturing of production, manufacture, and quality. In a conventional cycle of development of product, these cross-functional calculuses teams work in series, after the other (also named periodic technology). This conventional method attaches really the duration of cycle of product to a certain period, as only one team can work at the same time (while the other teams await the results). For example, the analysis, the test, and the teams of purchase will await the design to be achieved before themselves proceeding.

The period with vacuum of other teams can be employed to narrow the total duration of cycle of the product. This leads to the concept of convergent technology, where the cross-functional calculuses teams can begin their work at a preset point of the preceding stage of the life cycle of product. For example, the technology or the departments of purchase could begin the processes of analysis and purchases when the design is of 60 percent of complete. And the planning of manufacture could start once the analysis and the test are of 50 percent of complete. Convergent technology can phenomenally narrow the duration of cycle of product, by increasing the resources of maximum time possible of all the agents of the product.

However, the impact of the recovery in convergent technology heavy is compared with periodic technology. For example, when there is a change of design after 60 percent of achievement of the design, it carry out the work of the teams of analysis and test, since they already began their work. But this impact can be easily controlled in a numerical work place. If the analysis and test are carried out in a numerical environment which without seam is integrated with the environment of CAD, then the impact of the change of design is minimal: it is the power of the numerotisation. It is strongly suggested to him that the environment of development of product is digitalized as much as possible in order to reaching successful convergent technology. Nowadays, there are tools of CAD which are narrowly integrated with the indigenous tools of CAE and CAPE. Simultaneity can be easily realized with the numerical kind of environment which holds account to conceive, to analyze, of test of simulation, and planning of the products, since activities should not necessarily be exerted physically. This also reduces the cost to establish the physical prototypes.


Engineering data is the output of the design team, which releases the design to other teams in order to get their feedback. The design team then incorporates the collected feedback on the engineering parts. There should be a revision control mechanism in this process. Even after the design is completed, there can be a design change due to failure in product development steps down the line. And even after design, analysis, and testing, there may be difficulties in the assembling process only during the piloting stage. In this scenario, the part has to be revised, and the design change will be incorporated in the new revision. The product will once more undergo reviews, analysis, testing, and validation before it comes back to piloting.

Engineering data control is more cumbersome when design is outsourced to a third party organization or to a supplier. In this case, the host company should notify the design partner or supplier that a design change is necessary. When companies do not have a healthy collaborative environment, this design change process increases cycle time drastically. This is why collaboration and integration between the host company and its design partners and suppliers play an important role in reducing time-to-market.

Preserving Product Knowledge

Introducing more new products every year is becoming a trend in the manufacturing industry. Research shows that the companies introducing more products per year will be more profitable. Within this trend, it has become vital for companies to preserve product knowledge in a well-defined information technology (IT) system, instead of keeping it only inside the brains of various employees. In other words, product knowledge is an asset to companies—if they have a proper system of storing product data, they do not need to worry about human resource attrition. Product knowledge can consist of any one of the following elements:

  • engineering data
  • product requirements or specification sheets
  • lists of suppliers that can supply the product
  • lists of technical specifications such as CAD drawings, CAD models, process specs, etc.
  • engineering analysis reports on parts
  • the number of configurations that can be generated from product aggregates, and their compatibility rules

Modular Product Development—Design One, Configure Many

Organizations striving to introduce more new products per year should concentrate on modularizing their product structures, and on generating more variants from the structures. The concept of modularization helps phenomenally in saving time-to-market. All they need to do is break down the product structure into meaningful sets of aggregates, and create compatibility rules between the aggregates under each product line. Basically, they need to make a product portfolio rationalization. If they make sure their aggregates can work with each other across different models under a single product line, they can easily generate new product configurations on the fly (based on product need), and launch the new product in just weeks. This eliminates the time barrier for conventional product development, which involves starting from scratch. It takes time for organizations to come to the level of reusing and leveraging product aggregates to generate many configurations, and only a few organizations around the world have achieved this.

The construction of the data is the output of the team of design, which publishes the design with other teams in order to obtain their feedback. The team of design then incorporates the feedback gathered on the parts of technology. There would have is a control drive of revision in this process. Even after the design is filled, there can is a change of design due to the failure of development of product brings back the line. And even after the design, analysis, and the test, it can there have difficulties in the process of assembly only during the stage of piloting. In this scenario, the part must be updated, and the change of design will be built-in new revision. The product will undergo reviews once more, analyzes, test, and the validation before it returns to piloting.

The construction of the order of data is more cumbersome when the design is externalis�e with an organization of third or a supplier. In this case, the company of host centre should inform the associate or the supplier of design which a change of design is necessary. When the companies do not have a healthy environment of collaboration, this process of change of design increases the duration of cycle rigorously. This is why collaboration and integration between the company of host centre and its associates of design and suppliers play a big role by reducing the time-with-market.

Safeguarding of the knowledge of product

The presentation of the products plus each year becomes a tendency in industry. Research proves that the companies presenting more products per annum will be more advantageous. In this tendency, it became essential that the companies preserve the knowledge of product in a well defined system of information technology (IT), instead of keeping it only inside the brains of various employees. In other words, the knowledge of product is capital companies they have a suitable system to store data of product, they does not need to worry about wear human resources. The knowledge of product can be composed of any of the following elements:

  • data of technology
  • sheets of conditions or specifications of product
  • lists of suppliers who can provide the product
  • lists of features such as diagrams of CAD, models of CAD, Spc. process, etc
  • reports/ratios of analysis of technology on parts
  • the number of configurations which can be produced aggregates of product, and their rules of compatibility

The modular product Development-Conceive one, configure much

The organizations trying to present the products per annum should concentrate on modulariser their structures of product, and on producing of more than alternatives of the structures. The concept of modularization helps phenomenally in the time-with-market of economy. Very that they must make is to break up the structure of product into plays signicatifs of aggregates, and creates rules of compatibility between the aggregates under each product. Basically, they must make a rationalization of booklet of product. If they secure their aggregates can function the ones with the others through various models under a simple product, they can easily produce configurations of product moving (based on the need for product), and launch the product into right weeks. This eliminates the barrier from time for the development of conventional product, which implies starting from the scratch. That takes time so that the organizations come on the level from the aggregates from re-use and increasing from product to produce of many configurations, and only some organizations around the world carried out this.