Sentences with phrase «chain technology from»

Not exact matches

The Dick Smith chain of technology and electrical goods shops is probably a poor example of the wider problems confronting retailing but its collapse this week is a reminder that the shake - out which has rattled the retail world over the past few years is far from over.
Not yet profitable, it is deploying the $ 95 million it raised earlier from investors like Danny Meyer and Steve Case to build powerful systems for siting and planting new stores, forging supple regional supply chains, and developing technology for mobile ordering and cashless transactions, with which it is experimenting.
A recent report from retail think tank Fung Global Retail & Technology estimated that the widespread closures among those four chains alone — nearly 400 stores — will leave approximately $ 2.5 billion in sales up for grabs.
Actual results, including with respect to our targets and prospects, could differ materially due to a number of factors, including the risk that we may not obtain sufficient orders to achieve our targeted revenues; price competition in key markets; the risk that we or our channel partners are not able to develop and expand customer bases and accurately anticipate demand from end customers, which can result in increased inventory and reduced orders as we experience wide fluctuations in supply and demand; the risk that our commercial Lighting Products results will continue to suffer if new issues arise regarding issues related to product quality for this business; the risk that we may experience production difficulties that preclude us from shipping sufficient quantities to meet customer orders or that result in higher production costs and lower margins; our ability to lower costs; the risk that our results will suffer if we are unable to balance fluctuations in customer demand and capacity, including bringing on additional capacity on a timely basis to meet customer demand; the risk that longer manufacturing lead times may cause customers to fulfill their orders with a competitor's products instead; the risk that the economic and political uncertainty caused by the proposed tariffs by the United States on Chinese goods, and any corresponding Chinese tariffs in response, may negatively impact demand for our products; product mix; risks associated with the ramp - up of production of our new products, and our entry into new business channels different from those in which we have historically operated; the risk that customers do not maintain their favorable perception of our brand and products, resulting in lower demand for our products; the risk that our products fail to perform or fail to meet customer requirements or expectations, resulting in significant additional costs, including costs associated with warranty returns or the potential recall of our products; ongoing uncertainty in global economic conditions, infrastructure development or customer demand that could negatively affect product demand, collectability of receivables and other related matters as consumers and businesses may defer purchases or payments, or default on payments; risks resulting from the concentration of our business among few customers, including the risk that customers may reduce or cancel orders or fail to honor purchase commitments; the risk that we are not able to enter into acceptable contractual arrangements with the significant customers of the acquired Infineon RF Power business or otherwise not fully realize anticipated benefits of the transaction; the risk that retail customers may alter promotional pricing, increase promotion of a competitor's products over our products or reduce their inventory levels, all of which could negatively affect product demand; the risk that our investments may experience periods of significant stock price volatility causing us to recognize fair value losses on our investment; the risk posed by managing an increasingly complex supply chain that has the ability to supply a sufficient quantity of raw materials, subsystems and finished products with the required specifications and quality; the risk we may be required to record a significant charge to earnings if our goodwill or amortizable assets become impaired; risks relating to confidential information theft or misuse, including through cyber-attacks or cyber intrusion; our ability to complete development and commercialization of products under development, such as our pipeline of Wolfspeed products, improved LED chips, LED components, and LED lighting products risks related to our multi-year warranty periods for LED lighting products; risks associated with acquisitions, divestitures, joint ventures or investments generally; the rapid development of new technology and competing products that may impair demand or render our products obsolete; the potential lack of customer acceptance for our products; risks associated with ongoing litigation; and other factors discussed in our filings with the Securities and Exchange Commission (SEC), including our report on Form 10 - K for the fiscal year ended June 25, 2017, and subsequent reports filed with the SEC.
The new procedures, meant to reduce the chances of another outbreak, reportedly will make it more difficult for the restaurant chain to source ingredients from small local suppliers that may not be able to afford the technology and other requirements for increased scrutiny.
But the retail giant began using the technology in 2016 to track how pigs from China moved through the supply chain to the American table.
From getting Slurpees delivered to our door to a robot bringing us water to our hotel room, here are six chains using technology to deliver better and faster service.
And to increase its responsiveness to new challenges facing the international monetary system — from digital currencies, to block chain technology, to cyber-hacking.
THE (BLOCK) CHAIN GANG: FUTURISTIC FINANCE From digital currencies like Bitcoin to decentralized real estate ownership records, the blockchain continues to be one of the tech world's most promising and perplexing technologies.
From highways to rails to the frequency of flights, combined with an outstanding capital ecosystem, Atlanta is uniquely positioned for supply chain technology and talent.
BlackBerry's ability to manage inventory and asset risk; BlackBerry's reliance on suppliers of functional components for its products and risks relating to its supply chain; BlackBerry's ability to obtain rights to use software or components supplied by third parties; BlackBerry's ability to successfully maintain and enhance its brand; risks related to government regulations, including regulations relating to encryption technology; BlackBerry's ability to continue to adapt to recent board and management changes and headcount reductions; reliance on strategic alliances with third - party network infrastructure developers, software platform vendors and service platform vendors; BlackBerry's reliance on third - party manufacturers; potential defects and vulnerabilities in BlackBerry's products; risks related to litigation, including litigation claims arising from BlackBerry's practice of providing forward - looking guidance; potential charges relating to the impairment of intangible assets recorded on BlackBerry's balance sheet; risks as a result of actions of activist shareholders; government regulation of wireless spectrum and radio frequencies; risks related to economic and geopolitical conditions; risks associated with acquisitions; foreign exchange risks; and difficulties in forecasting BlackBerry's financial results given the rapid technological changes, evolving industry standards, intense competition and short product life cycles that characterize the wireless communications industry, and the company's previously disclosed review of strategic alternatives.
EY, also known as Ernst & Young, has formed the Ops Chain to integrate blockchain technology across its practices, from financial services and logistics to other industries such as automotive, media, and oil and gas.
Many factors could cause BlackBerry's actual results, performance or achievements to differ materially from those expressed or implied by the forward - looking statements, including, without limitation: BlackBerry's ability to enhance its current products and services, or develop new products and services in a timely manner or at competitive prices, including risks related to new product introductions; risks related to BlackBerry's ability to mitigate the impact of the anticipated decline in BlackBerry's infrastructure access fees on its consolidated revenue by developing an integrated services and software offering; intense competition, rapid change and significant strategic alliances within BlackBerry's industry; BlackBerry's reliance on carrier partners and distributors; risks associated with BlackBerry's foreign operations, including risks related to recent political and economic developments in Venezuela and the impact of foreign currency restrictions; risks relating to network disruptions and other business interruptions, including costs, potential liabilities, lost revenues and reputational damage associated with service interruptions; risks related to BlackBerry's ability to implement and to realize the anticipated benefits of its CORE program; BlackBerry's ability to maintain or increase its cash balance; security risks; BlackBerry's ability to attract and retain key personnel; risks related to intellectual property rights; BlackBerry's ability to expand and manage BlackBerry ® World ™; risks related to the collection, storage, transmission, use and disclosure of confidential and personal information; BlackBerry's ability to manage inventory and asset risk; BlackBerry's reliance on suppliers of functional components for its products and risks relating to its supply chain; BlackBerry's ability to obtain rights to use software or components supplied by third parties; BlackBerry's ability to successfully maintain and enhance its brand; risks related to government regulations, including regulations relating to encryption technology; BlackBerry's ability to continue to adapt to recent board and management changes and headcount reductions; reliance on strategic alliances with third - party network infrastructure developers, software platform vendors and service platform vendors; BlackBerry's reliance on third - party manufacturers; potential defects and vulnerabilities in BlackBerry's products; risks related to litigation, including litigation claims arising from BlackBerry's practice of providing forward - looking guidance; potential charges relating to the impairment of intangible assets recorded on BlackBerry's balance sheet; risks as a result of actions of activist shareholders; government regulation of wireless spectrum and radio frequencies; risks related to economic and geopolitical conditions; risks associated with acquisitions; foreign exchange risks; and difficulties in forecasting BlackBerry's financial results given the rapid technological changes, evolving industry standards, intense competition and short product life cycles that characterize the wireless communications industry.
And although we don't know how this is all going to end up we do know one thing and I'd like to steal a quote from Bill Gates whenever he said block chain technology is a tour de force and we couldn't agree more with Bill Gates on that.
Prior to joining BPC, Kurt spent 4 years working as a consultant and corporate development executive with several technology and marketing companies, including NewView Technologies, Inc. (formerly eSteel, Inc.), a supply chain software company backed by $ 100 million in funding from leading venture capital investors (Goldman, Sachs & Co., Kleiner Perkins Caufield & Byers, Bessemer Venture Partners), and CM Media Inc., a leading new media company.
Prior to that he worked for Celanese Corporation, a global technology and specialty materials company, for over 20 years in roles with increasing responsibility, including positions as its Vice President, Global Business Services from October 2012 to March 2014, its Vice President, Supply Chain from October 2011 to October 2012 and its first - ever Global Accounting Director.
From Detroit's car makers to Silicon Valley's technology champions, China is both a critical source of revenue and profits, and a vital link in global supply chains.
Garzik believes all blockchains, even private chains, must be based on public technology: «And then from side chains, private chains, confederated chain perspective, use that same software and simply build a gate around that permissions who is going to use that system.
Among the factors that could cause actual results and outcomes to differ materially from those contained in such forward - looking statements are the following: macro-economic conditions (including fluctuations in housing prices, oil markets, jobless rates and other indicators), credit market changes and constraints, foreign currency fluctuation, the company's ability to manage its property portfolio, the impact of labor markets, failure to effectively manage costs or achieve anticipated expense and cost reductions, and disruptions in our supply chain or information technology systems.
A full - on globalization backlash could undermine hopes for shifting away from secular stagnation by derailing the nascent recovery in investment spending and productivity growth in the U.S. Global trade tends to boost productivity through fostering of competitive pressures, product specialization, scale economies, global value chains and technology transfer.
Bob Norman from GreenPalm will be available to discuss the various options available to food manufacturers keen to address the issue of sustainable palm oil in their supply chains, at Booth 853 at the 2014 Institute of Food Technology (IFT) Annual Meeting and Food Expo, June 22 to 24, in New Orleans.
Aside from its embrace of cutting - edge technology, another unique aspect of CHS is its integrated supply chain.
A select group of 35 executives from major food industry companies such as US Foods, Popeyes, and Einstein Noah Restaurant Group came together for a conference focused on technology innovation, supply - chain collaboration and sharing of best practices.
Meanwhile, the VDMA's special exhibit on Industry 4.0 illustrated the power of smart technologies in mass customisation with a fully traceable miniature supply chain, from online order to product delivery, shadowed all the way by «digital twins».
Technology was developed to extract dietary oils from seeds that had never been used previously to supply dietary oils in the human food chain, and this caused a boon to corn and soybean crops which could now be used to produce polyunsaturated oils.
Here the latest innovations in the plastic packaging value chain were on display for you — from raw materials, preform manufacture, stretch blow - moulding technology, filling systems and closure production to labelling, recycling and accessories.
Over 310 exhibitors from more than 20 countries and areas are expected this year, who will display their advanced technology and products in the world for the buyers and delegates, with their exhibits covering the whole dairy industry chain, including cow cultivation, farm equipment and facilities, processing and packaging, ingredients, various kinds of dairy products, etc..
As a professional business - to - business (B2B) platform that serves customers from the entire global bakery industrial chain, Bakery China has been committed to exploring new opportunities and technologies worldwide.
From using sensors to monitor conditions on oil palm plantations more closely to harnessing the potential of blockchain to make the notoriously complex palm oil supply chains more transparent, Webber says that «technology will be the key to sustainable palm oil».
That process of hydrogenating vegetable oils, primarily oils derived from soy and corn, two highly subsidized crops in the U.S. which have only been in the food chain post WWII due to expeller - pressed technology, creates toxic trans - fats which have now been shown to be very unhealthy and linked to many diseases.
Get insights into processing technology and the entire chain from cow to consumer — from pasteurization, homogenization and UHT treatment to filtration, automation, service systems, waste water treatment and many other aspects of modern dairy processing.
Complementing this theme is next - generation robotics technology, which will be demonstrated through every step of the manufacturing chain, from incoming raw materials to outgoing finished product.
Year - on - year, brands, converters and retailers from across the world flock to the show to discover the latest advances in packaging technology and learn how the supply chain can be revolutionised.»
Get insights into processing technology and the entire chainfrom pasteurization, homogenization and UHT treatment to filtration, automation, service systems, waste water treatment and many other aspects of modern dairy processing.
This year we're emphasizing our broadening reach with representatives from: the Power Electronics Manufacturing Consortium; AIM Photonics; shovel - ready sites like Luther Forest Technology Campus; Western NY STAMP; Syracuse's White Pine; and Marcy Nanocenter / Nano Utica, along with a robust supply chain.
«The disease risk score signature, distinguishing viral from bacterial infections with only 2 transcripts, has potential to be translated into a clinically applicable test using current technology such as polymerase chain reaction.
Researchers collected water samples from area lakes, ponds and streams and used polymerase chain reaction (PCR) technology to amplify — or copy — the entire mitochondrial genomes from the eDNA found in those environments.
Tracking technology in the form of barcodes or RFID chips can establish a data trail that allows companies to follow each lot from manufacturer to pharmacy shelf, and as of 2013, tracking of pharmaceuticals throughout the supply chain is required as per the Drug Quality and Security Act.
Centre for Jatropha Promotion & Biodiesel (CJP) is the Global authority for scientific commercialization of Jatropha & other non-food biofuel crops and designs and implements the growing of non-food biofuel crops worldwide in a structured Agri - Supply chain, Value additions and research activities thereon & provides technology and services from «Soil to Oil» for the breeding, development, planting and harvesting of next - generation commercial biofuel crops CJP has been engaged in promoting sustainable farming for biodiesel production since last one decade and its research findings and on - hand field experiences in respect of various technical, agronomical / silvicultural aspects of plantations of Jatropha have resulted in significant improvements in knowledge and technical background related to Productivity, profitability and sustainability of commercial production of Jatropha oil crop.
After World War II, industrialized processes gave us the seed - expeller technology to extract oil from corn and soy, propelling them into the food chain in mass for the first time in history.
These dietary oils were not part of the food chain prior to WWII, when expeller - pressed technology was developed to extract oils from seeds like corn and soy.
Some Outfit Details Sunglasses — Topshop Top — H&M (sold out so from my sister Julie)(similar) Gold Chain and Choker — Zara (similar) Pearl Earrings — DIY from Wander and Hunt (similar) Pearl Drop Necklace — Underground Market at Shanghai Science and Technology Museum (similar) Pants — Banana Republic but hemmed to be cropped (similar) Shoes — Leopard Kitten Heels from random Central store (similar) Bag — Louis Vuitton Speedy 35 Lipstick — Giorgio Armani Lip Maestro # 402
• Theater (er, theatre) chains across the pond plan to invest in digital technology to capitalize on upcoming releases from Steven Spielberg and James Cameron.
Hybrid customers can choose from three separate grades, adding luxury features and technology options as they move up the chain from XLE Plus to XLE Premium and Limited.
Shifting away from hardware to other parts of a consumer technology chain is not unusual and can often mean a path to greater success.
«Thanks to great strides in collaboration among all in the information chain, from author to reader, and thanks to advances in technology, this could become reality sooner than some may imagine.
Where public market investments rely on several financial organizations to perform various services from acquisition and development to offering diversified portfolios of REITs, Fundrise uses technology to consolidate these functions and reduce the number of intermediaries in the value chain.
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
About Blog Supply Chain, Logistics, Research, and Strategy from the Center for Transportation & Logistics at the Massachusetts Institute of Technology.
a b c d e f g h i j k l m n o p q r s t u v w x y z