Premium Essay

Buttons - Case Study 1

In:

Submitted By translog
Words 4090
Pages 17
Pierre Kitts | Integrated Logistics Case Study 1 | March 2, 2014
Case Study 1 – Buttons Limited
Canadian Distribution System

Contents
Executive Summary 1
Introduction 4
Initial Stocking of Stores 6
Figure 1 - Average Transit Time by Ocean Container from Manufacturing Plants to Canadian Stores 8
Figure 2 – Initial Stocking of Stores via 40 FT Ocean Containers to DC’s. 9
Full Distribution System Buttons Canada 10
Figure 3 - Average Transit Time by Consolidated Air from Manufacturing Plants to Canadian Stores 11
Figure 4 – Full Canadian Distribution Flow Chart: Consolidated Air into DC’s Replenishment of Stock 12
Canadian 3PL 13
Incoterm 15
Modal Selection 17
Distribution Centre (DC) 18
Distribution 19
Communications Internal 20
Communications to 3PL 22
Customs 23
Conclusion 24

Executive Summary
Buttons Limited, is a global clothing retailer, and has targeted Canada as a new market for expansion of their lines of affordable, but stylish clothing, by opening up eight new stores in the country. Two stores will be situated in Vancouver British Columbia, three in Toronto Ontario, and three in Montreal Quebec.

A very simple and straight forward distribution solution is recommended. One that will use the same flow chart process for both ocean carriage, for the initial startup and stocking phase of the program (see Figure 2, page 9), and the air consolidation replenishment of stock phase (see Figure 4, page 12).

This system will be providing savings with ocean carriage for the initial stocking phase, and ongoing speed, and economy, through the use of consolidated air shipments, maintaining Buttons claim to fame, in designing, manufacturing, and distributing their fashions to store shelves in 21 days (Figure 1 page 8).

The use of a Canadian 3PL is recommended due to its thorough IT connectivity across its supply chain, and complete

Similar Documents

Free Essay

Project

...AN INVESTIGATION INTO ACADEMIC INDISCIPLINE AND FAILURE AMONG SECONDARY SCHOOL STUDENTS IN ENGLISH LANGUAGE MATHEMATICS, IGBO LANGUAGE, AGRICULTURAL SCIENCE, ECONOMICS PERIOD 2005-2010 (A CASE STUDY OF NIGERIA) TABLE OF CONTENTS Title page Approval Certification Dedication Acknowledgement Abstract Table of contents CHAPTER ONE 1.0 INTRODUCTION 1.1 Background of study 1.2 Statement of the Problems 1.3 Purpose of the Study 1.4 Significant of the Study 1.5 Research Questions 1.6 Scope of the study 1.7 Definition of terms CHAPTER TWO 2.0 LITERATURE REVIEW 2.1 Aspects of students’ indiscipline 2.2 Causes of students indiscipline 2.3 Consequences of students’ indiscipline 2.4 Strategies of maintaining discipline 2.5 Summary of literature review CHAPTER THREE 3.0 RESEARCH METHODOLOGY 3.1 Research design 3.2 Area of the study 3.3 Population of the study 3.4 Sample and sampling techniques 3.5 Development of the instrument 3.6 Method of Data Collection 3.7 Method of Data Analysis 3.8 Validation of instrument CHAPTER FOUR 4.0 DATA PRESENTATION AND ANALYSIS CHAPTER FIVE 5.0 DISCUSSIONS, CONCLUSION, RECOMMENDATIONS, AND SUMMARY 5.1 Discussions 5.2 Conclusion 5.3 Implications 5.4 Recommendations 5.5 Suggestion 5.6 Limitation of the study 5.7 Summary References Appendix TO DOWNLOAD “AN INVESTIGATION INTO ACADEMIC INDISCIPLINE AND FAILURE AMONG SECONDARY SCHOOL STUDENTS IN (ENGLISH LANGUAGE MATHEMATICS, IGBO LANGUAGE, AGRICULTURAL SCIENCE, ECONOMICS” COMPLETE PROJECT MATERIALS...

Words: 1115 - Pages: 5

Free Essay

Pointing Devices

...Pointing Devices 1 Introduction & Rationale A mouse is a pointing device used to input movement onto a GUI via detecting the shift of X and Y coordinates, as the mouse is moved from one position to another. The mouse was first invented in 1964 by Douglas Engelbart and changed the use of computers from scientists only to consumer friendly. [Inventors.about.com, (n.d.)]. The mouse was chosen as the device as its user friendly with few physical input demonstrated by the fact it is a ubiquitous device found all over the world. 2 Ergonomics Ergonomics, the study of how efficiently an environment can facilitate work is a key part of mouse design. Since, the first pointing devices, such as the ones produced at Xerox Parc, computer device have iteratively been improved to achieve as much ergonomic efficiency as possible. Figure 1: The Evolution of Mice As you can see computer mice have followed an extensive evolution over their 44 year existence (19682012). Initial designs were extremely square and were only designed to fit a human hand in terms of size not shape. Furthermore, the status quo of computer mice today are designed to include three buttons (one doubles as a scroll wheel) and to fit the a right hand of a human. It is interesting to note how modern designs have foregone the ambidextrous nature of their predecessors as they value the shape of the mouse more than said feature. 3 Psychology of Interaction The computer mouse provides a natural environment in...

Words: 1239 - Pages: 5

Premium Essay

User Authentication for Network Environment

...CHAPTER ONE INTRODUCTION 1. BACKGROUND OF THE STUDY User authentication for network or internet based environment posed a challenging task for system and network administrator. This statement is true and is still very much applicable till these days as it is a well known fact that authentication is being widely incorporated as part of access control for most systems. Authentication has been the catalyst for business organization in information protection and security. Implementation of access control policies, standards or procedures involves the identification of appropriate authentication mechanism whereby the criticality of the information being protected are being used as justification for having a more refined authentication mechanism as compared to a more simple approach. Without the appropriate authentication mechanism in place, attacker could easily gain access to systems or applications by utilizing personal information, gained through various means, including but not limited to social engineering. Conventional textual passwords are the most common mechanism used in authentication. This method requires a user to enter their username and password, either in alphabet or numeric, or more commonly, a mixture of both forms as authentication tokens to gain access to systems or applications. Two recent surveys have shown that users choose short, simple passwords that are easily guessable, for example, “password”, personal names of family members, names...

Words: 17307 - Pages: 70

Premium Essay

Case Study

...Case Study Best-Book-Buy Online Bookstore Requirements Specification Document (By Henrique Paques, Leo Mark and Shamkant B. Navathe) 1. Introduction The purpose of this case study is to present a data-intensive application for which a database can be designed. It is described with sufficient degree of detail so that the application can be implemented in languages like Java or C using ODBC or JDBC connectivity to the relational database. This case study is an illustration of the typical project we have been using to teach an undergraduate class in database design that covers essentially the first 16 chapters of the textbook at Georgia Tech. The user interface is defined in screen format – these screens can be implemented using Visual Basic or Java as needed, or a simpler version of the interface using simple text menus may be implemented. There are a few reports included in the application specification. They are for illustrative purposes and may be modified as well. The methodology to be followed uses conceptual design in the Entity Relationship Model (Chapter 3), followed by a mapping of the ER schema into the relational schema (Chapter 7). The application is broken into a number of tasks and the inputs and outputs are related to the tasks by means of an Information Flow Diagram. Students should use Chapter 12 to understand the overall process of database design used for design of large databases. A design methodology is developed during the discussion of this...

Words: 5909 - Pages: 24

Premium Essay

Quiz Study Guide

...YOU MAY WANT TO PRINT THIS GUIDE FOR QUICK REFERENCE AND CONVENIENCE 1. The Quiz is "open book, open notes." The maximum time you can spend in the exam is 2 hours, 30 minutes. If you have not clicked the Submit for Grading button by then, you will be automatically exited from the exam. In the Quiz environment, the Windows clipboard is disabled, so you will not be able to copy exam questions or answers to or from other applications. 2. You should click the “Save Answers” button in the exam frequently. This helps prevent connection timeouts that might occur with certain Internet Service Providers, and also minimizes lost answers in the event of connection problems. If your Internet connection does break, when you reconnect, you will normally be able to get back into your quiz without any trouble. Remember, though, that the exam timer continues to run while students are disconnected, so students should try to re-login as quickly as possible. The Help Desk cannot grant any student additional time on the exam. 3. Quizzes for this course will take place during Week 4 and Week 7. This study guide will cover content for both weeks. 4. Reminders * You will only be able to enter your online Quiz one time. * Click the "Save Answers" button often. * If you lose your Internet connection during your Quiz, logon again and try to access your final. If you are unable to enter the exam, first contact the Help Desk and then your instructor. * You will always be able...

Words: 1282 - Pages: 6

Free Essay

Web Portal for Freelance Photographers

...WEB PORTAL FOR FREELANCE PHOTOGRAPHERS: Connecting Freelance Photographers and Prospective Clients A Thesis Paper Presented to the Department of Information Technology Mapúa Institute of Technology School of Information Technology Buendia, Makati Philippines In Partial Fulfilment of the Requirements for the Degree Bachelor of Science in Computer Science and Bachelor of Science in Information Technology By: Ahmed Abdulrahim, Firas A. Peña, John Michael C. June 2012 APPROVAL SHEET This is to certify that we have supervised the preparation of and read the thesis paper prepared by (Firas A. Ahmed Abulrahim and John Michael C. Pena) entitled “Web Portal for Freelance Photographers: Connecting Freelance Photographers and Prospective Clients” and that the said paper has been submitted for final examination by the Oral Examination Committee. Mr. Ariel Kelly D. Balan | | Dr. William T. Torres | Thesis Adviser | | Thesis Instructor | As members of the Oral Examination Committee, we certify that we have examined this paper and hereby recommend that it be accepted as fulfillment of the thesis requirement for the Degree Bachelor of Science in Computer Science and Bachelor of Science in Information Technology. Ms. Ira Camus | | Mr. William Rey | Panel Member | | Panel Member | | | | | | | | Mr. Joel De Goma | | | Committee Chair | | This thesis paper is hereby approved and accepted by the School of Information Technology...

Words: 13899 - Pages: 56

Free Essay

Wot Dis Is It Imptnt

...Charles V. Zegeer, P.E. Associate Director of Roadway Studies Highway Safety Research Center University of North Carolina Chapel Hill, North Carolina FIGURE 5-1 Pedestrian signal displays.' Traffic Signals Traffic signals are intended to assign the right-of-way to vehicular and pedestrian traffic. When installed appropriately, traffic signals can provide many benefits, including the interruption of heavy volumes of motor vehicles where there are insufficient gaps in motor vehicle traffic for pedestrians to cross safely at intersections or midblock locations. Unwarranted or improperly used traffic sig-nals can cause excessive delay for pedestrians and motor vehicles, signal disobedience, and an increase in certain accident types. Even where warranted, traffic signal installations commonly result fn an increase in rear-end and total accidents, with a corresponding reduction in more severe right-angle acci-dents. The effect of traffic signal installations on pedestrian accidents is not well known, but different locational characteristics of the sites are important factors in the accident experience at signals.° While many traffic signals include only the green, yellow, and red signal faces, a variety of signal lens faces may be used, depending on needed signal phasing. Studies have suggested, however, that highly-com-plex, multiphase signals often result in con-fusion and hazardous situations for pedestrians. Therefore, in cases where such complex phasing is necessary, pedestrian...

Words: 4096 - Pages: 17

Premium Essay

Cis210 - Case Study

...Case Study 1 Christopher Jay Lawrence CIS210 System Analysis and Development Professor Bindu Geroge Case Study 1 Access Control System Due to the need for increased security around the campus we need to implement a new Access Control System (ACS) for access to the student dormitories, employee only areas and parking garages. The basic design of this system is to include proximity badge integration for access to the required areas listed above and cameras that will focus and record the face of individual transiting the access point. This system needs to be robust enough to handle the weather, with a backup emergency power system. The cameras need to be hi-res and need to be able to work under low to no light. This system needs to be able to be monitored 24 x 7 have the ability to save the recordings for a minim of two weeks and allow for remote open from the security desk. There are other points to consider since this is for a college. Due to the high level of sexual assault on most colleges and other common issues that arise due to the nature of college students here are a few other features that the system needs to have. There are to be emergency phones and call buttons at each station. These phones and buttons will call back to the security desk and will also trigger the cameras to record. If the emergency button is triggered at night area floods will also light for support in recording and assessment of the situation. These cameras need...

Words: 679 - Pages: 3

Premium Essay

New York Fashion Company Case Study

...Analysis Report Case Study Number 1 The NY Fashion Company Prepared for Prepared by John July 2006 Table of Contents Summary of Case Study: 3 Item a: Maximize total contribution margins given the constraints 3 Item b: Sensitivity analysis of solution given 10,000 yards additional acetate. 6 Item c: Income statement 7 Item d: Unit profit using the volume-based costing method. 10 Item e: Unit profit using the activity based costing method. 11 Item f: Financial/economic explanation for the difference between the unit profits 14 Appendix – Case Study #1 A-1 Summary of Case Study: This case study concerns determination of an optimum product mix solution given a number of resource, demand, and production constraints for a clothing manufacturer. Sensitivity to change in one of the resource constraints is examined. An income statement is developed based on the optimum solution determined. Finally, the unit profit is calculated using both traditional volume based costing and using activity based costing; included is a discussion of the financial and economic reasons for the difference between the two results. The case study document is included as an appendix to this report. Because of difficulties presenting the TORA output files in a readable state as integral parts of this document, those output files are both embedded in the document represented as icons and they will be submitted as four separate files along with this report. With this...

Words: 4455 - Pages: 18

Premium Essay

Inventory System

...CHAPTER I THE PROBLEM AND ITS BACKGROUND 1.1 INTRODUCTION AND ITS BACKGROUND A pastor named Ferdie Sinense together with his wife Marisa Sinense who works as an auditor, established Rapa Generics Pharmacy on September 23, 2011. The main branch of this Pharmacy is located at Las Piňas-Zapote Road in Las Piňas City. Anthony Rudil, a licensed pharmacist and Jennifer Robela the assistant pharmacist are currently managing the business. In addition to that, the business opened its door to three more branches located in Pulang Lupa, Las Piňas and Marikina. The advent of new technology, most company nowadays is using computers in their transactions. Pharmacies in particular, are now making their systems computerized since that helps them minimize the time and efforts consumed by using manual system. Point-of-Sale Inventory System is one of the essential components of a successful business. It is a modern replacement for cash register in retail applications. It can help to record securely all the sales and customer’s orders and track products. A sale refers to the exchange of product or services for an amount of money or its equivalent while inventory, on the other hand, is the total amount of items and the act of counting them. A pharmacy owner must know the precise number of items in their storage areas in order to place orders and control losses up to date. Hence, computerizing both Sales and Inventory System will make an easier and faster transaction among the customers...

Words: 16309 - Pages: 66

Free Essay

Behaviourism vs Psychodynamic

...the behaviourist and psychodynamic perspective account for how people make sense of their environments‘. Psychology as a scientific study of behaviour and mental phenomena, in its systematic approach to observe, describe, predict and explain behaviour (class note), offers different approaches to studying and explaining behaviours, the main approaches includes, behaviourist, psychodynamic, cognitive, humanistic and biological. In this essay, two of the approaches (behaviourist and psychodynamic) will be discussed. There are two categories of behaviourism; radical which explain operant conditioning and classic or methodological behaviourism which explains classical conditioning. Watson (1913, 1919,) developed and popularised methodological behaviourism, while . . . as Morris (1988) recorded, Skinner's radical behaviourism start to be recognised within the academic folklore, in the late 1950s. Psychodynamic perspective was originally explained in the publication by Freud (1900) titled The Interpretation of Dreams, although there are many other psychodynamic theories based on Freud’s ideas (such as Jung’s, Adler‘s, and Erikson’s). This essay is purposed to highlight the similarities and differences between the two aforementioned psychological approaches (behaviourist and psychodynamic). Behavioural approach emphasises scientific study of only observable and measurable behaviours, responses and their environmental determinant. In behaviourism learning theory applies...

Words: 1183 - Pages: 5

Premium Essay

Study Guide

...MGMT591 Final Exam Study Guide YOU MAY WANT TO PRINT THIS GUIDE. 1. The Final Exam is "open book, open notes." The maximum time you can spend in the exam is three hours, 30 minutes. If you have not clicked the Submit for Grade button by then, you will be automatically exited from the exam. In the Final Exam environment, the Windows clipboard is disabled, so you will not be able to copy exam questions or answers to or from other applications. 2. You should click the Save Answers button in the exam frequently! This helps prevent connection timeouts that might occur with certain Internet service providers, and also minimizes lost answers in the event of connection problems. If your Internet connection does break, when you reconnect, you will normally be able to get back into your Final Exam without any trouble. Remember, though, that the exam timer continues to run while students are disconnected, so students should try to re-login as quickly as possible. The Help Desk cannot grant any student additional time on the exam. 3. See Syllabus "Due Dates for Assignments & Exams" for due date information. 4. Reminders * You will only be able to enter your online Final Exam one time. * Click the Save Answers button often. * If you lose your Internet connection during your Final Exam, logon again and try to access your Final Exam. If you are unable to enter the Final Exam, first contact the Help Desk and then your instructor. * You will always be able to see...

Words: 1634 - Pages: 7

Free Essay

Suppy Chain Mangement

...FAQs Answers to frequently asked questions – FAQs SIX COMMON CAUSES OF CONFUSION… PLEASE READ! 1. SCM Globe runs best under two browsers – Chrome and Safari. It will also run under Firefox, but sometimes it runs slowly under Firefox. And it DOES NOT run under Microsoft Internet Explorer. You can download a free copy of the Chrome or Firefox browsers by going to the websites of those browser makers. If Microsoft is your regular browser, Chrome and Firefox co-exist well with Microsoft. You can use Chrome or Firefox when working with SCM Globe. And you can return to the Microsoft browser for other tasks. One of those features is triggered when you download simulation results from SCM Globe to your PC. In the Firefox browser when you click on the “Export Results to Excel” button it will cause Firefox to open a dialog box. The dialog box will ask “What should Firefox do with this file?” There are two options: 1) Open with; or 2) Save File. Select “Save File”. The simulation data will then download as a data file to your PC in whatever folder you use for downloading from the Internet. The file will be something called an “octet-stream” instead of a .csv file. . Unlike a .csv file, you cannot open this file unless you open it from within your spreadsheet application. So open up your spreadsheet application (MS Excel, Apple Numbers, Google Sheets, etc.) and then open the simulation data file that you just downloaded. It will open correctly inside your spreadsheet application. ...

Words: 1443 - Pages: 6

Free Essay

Data

...types of classification tasks will be considered – two-class and multi-class classification. In all cases protein-ligand binding data will analyzed, ligands exhibiting strong binding affinity towards a certain protein being considered as “active” with respect to it. If it is not known about the binding affinity of a ligand towards the protein, such ligand is conventionally considered as “nonactive” one. In this case, the goal of classification models is to be able to predict whether a new ligand will exhibit strong binding activity toward certain protein biotargets. In the latter case one can expect that such ligands might possess the corresponding type of biological activity and therefore could be used as ‘’hits” for drug design. All ligands in this tutorial are described by means of an extended set of MACCS fingerprints, each of them comprising 1024 bits, the “on” value of each of them indicating the presence of a certain structural feature in ligand, otherwise its value being “off”. Part 1. Two-Class Classification Models. 1. Data and descriptors. The dataset for this tutorial contains 49 ligands of Angeotensin-Converting Enzyme (ACE) and 1797 decoy compounds chosen from the DUD database. The set of "extended" MACCS fingerprints is used as descriptors. 2. Files The following file is supplied for the tutorial: • ace.arff – descriptor and activity values 3. Exercise 1: Building the Trivial model ZeroR In this exercise, we build the trivial model ZeroR, in which all...

Words: 5674 - Pages: 23

Free Essay

Survey

...Data Preparation in SPSS Jamie DeCoster Center for Advanced Study of Teaching and Learning University of Virginia 350 Old Ivy Way Charlottesville, VA 22903 August 15, 2012 If you wish to cite the contents of this document, the APA reference for them would be DeCoster, J. (2012). Data Preparation in SPSS. Retrieved from http://www.stat-help.com/notes.html All rights to this document are reserved Table of Contents Version History ............................................................................................................................... 4 Interactive Mode versus Syntax Mode ........................................................................................... 5 Why syntax is typically better..................................................................................................... 5 Getting syntax out of interactive mode commands..................................................................... 5 Best Practices for Data Preparation in SPSS .................................................................................. 7 Use syntax from start to finish .................................................................................................... 7 Maintain accurate codebooks for raw data sets .......................................................................... 7 Use summary data sets for analysis ............................................................................................ 7 Preserve the original...

Words: 9031 - Pages: 37