212 Conclusion If an crt euvr ieerws ianngd stuhpopul gy hcthl ae iand setrrsaht iepg yc odnot ceunmt be yn tcso bn ys uml taannut s- , I find these risk management elements missing and con - cb ee r mn i onrge. Ir ehsoi pl i ee nt ht ii sn a2r0t i2c3l e. Bh ue cl pksl ey yo ou uarnsde ay tobuerl tc; oI me xppa encyt turbulent times ahead. Private Equity Investments in Supply Chain Software. Increasingly, private equity investments in software from PE firms like Blackstone Group , If rnosmi g hctuPs taor mt neerr sc,oannt dr aTc ht so, ms aad Bd lrianvgo t ae rceh nmoillokgi nygc coams h- pa na nd i selsa swhi itnhgdwe bo tr kwf oh ri lcee ss l. oFwo ri nsgt rRa &t eDg i icnIvTe si nt mv eesnt -t , ma ses ne tt ss ., Ng eetvienrvboel vl ieedv ea tt ha ebporaersds l reevleelatsoe pcrl aoitme cst tthhaets e accompany these acquisitions. Chasing Shiny Objects. Today, 48% of companies ft oe ac umssoanr ed iugni tcal le at rrawn shf aotr mt h ai st i mo ne, abnust. Us unpf oprl yt ucnhaatien- lbyu, ti lhdei nf og ccuasp iasboi lni t ti ee sc .hFnoorl oegx ya ma cpql ue ,i sSiAt iPo nt o, nu ot st do ing i t a l tl iroa nwsiftohr mp raetdi oi cnt iivne aann ianl yt et igcrsa, taeudt oc ml o ua tdi -orne, aadnydpIonrttef ro-- net of Things (IoT) capabilities. The issue? There is ni mo pc rl ao rviet yc ao pn ahboi lwi t i tehse. sI ne as od fvtawnacreemeevnotl su ti ni o tne, cShAnPo l o g y twe ea lml - isnbt ee nc odme de tseealmf - sse. rDvoi nng’ t liinkveeos tt hi ne rcfhuansci nt igo ns ha li nayn d objects. Instead, focus on defining core capabilities. In the process, make sure there is clarity on process redefinition. Doing the same old process, but only faster, could be the greatest risk of all.
If You Think Visibility is Easy. Think Again.
The most significant risk to today’s supply chain is the st iuc pe ps . l yF uc nh ca ti ino lneaal deexrc’ se lel ennt rc ee nacnhde de nbteelri ep fr ii snehtirsat no sr iaccat li opnr aa lc - ef ifnf idc ipernocgyr edsosmsitna al lteedt ho ne db iugiiltdailnsgump pullyt ic- thi ae irns augpepnl yd ac .hWa ien visibility. Uq unilreeasr nr ei nt hg i ni skhi na gr dc. oBnuviel dn itni ognsaul papplpy rcohaacihnevs i. sTi ob di l ai tyy, cr oe -m - po fa ns ui epspal yr ec hs taui nc kv. iOs ivbei rl i tt yh es hpoaws ts dt ehcaat dseu, pt ph ley mc he aa isnu rl eeamd ee nr st av ar er ina bo ti l pi tryo, cglroessisni gn gt h. Gi si vgeanp tghreo wl e sv ei nl s iomf puonrctearnt caei n. t y a n d Sf uunpcpt li yo nc sh at oi ni ml e pa dr oevr es ni nesei dg hvtiss. i bS ii gl int ya lascsruo rsrsoaul nl md ot hdee ss uapn-d ply chain but are not used effectively in traditional Infor- mation Technology (IT) architectures.
213
Made with FlippingBook Ebook Creator