Our Thoughts on IT Matters

Keep Posted on Industry News and Events

   

Our Prediction:  Blockchain WILL Replace the Supplier Invoice

Most clients today use a complicated procedure for processing supplier payments to ensure the process is not only accurate and complete, but also: comports with the terms of the commercial agreement performs in compliance with the conditions of the contractual agreement is done with authenticated trading partners isn’t fraudulent or illicit in any way is fully auditable An Example of This Authentication Process: A Purchase Requisition is made, signifying the internal demand for the seller’s products and services. The terms of a Commercial Arrangement are agreed to, including product, service, and pricing information. A Contractual Agreement ...

Read More

Market Alert: ZTE Future Uncertain

The latest casualty in what some consider the emerging trade showdown between the USA and China has come in the form of ZTE, who has announced they have ceased ‘major operations’.  On April 16th, 2018, the U.S. Department of Commerce banned American companies from exporting parts to ZTE.  Given that 25%+ of the components that make up ZTE equipment comes from U.S. manufacturers, ZTE was forced to shut down its production lines.  While most people are aware that ZTE manufactures mobile handsets, most were not fully aware that the bulk of their revenue comes from telecom exchange, optical transmission, and other tier one communications ...

Read More

GDPR: An Opportunity for SSM (Strategic Supplier Management)

Many client executives are currently working to become compliant with the new General Data Protection Regulation (“GDPR”).  The GDPR regulation goes into effect on 25 May, 2018, and while GDPR is a European Union regulation, it is expected to be implemented worldwide due to its wide reaching or near universal regulatory umbrella. Around 20 years ago, pretty much all data was stored in the corporate datacenter. Today, that data could be in multiple locations, stored on the edge in branch offices as well as in the public cloud. Critically, Personal Identifiable Information (“PII”) could exist outside primary systems. GDPR represents “the law ...

Read More