Category Archives: Supply Chain

Is Co-opetition a Good Thing for Your Supply Chain?

Not too long ago, the ISM ran a cover story on “Collaborating with the Competition”. In this article, they addressed horizontal collaboration, which is the sharing of supply chain assets for mutual benefits, and which is becoming common among some manufacturing groups. This typically occurs between companies in the same industry that, while not direct competitors, market and sell to similar customers and consumers. As an example, if one manufacturer made HDTVs and another made Blu Ray players, which do require similar raw materials and even chipsets for encoding and decoding, they could cooperate in sourcing because, while they are selling to the same consumer, they are not selling the same product. However, this is now occurring between companies that, at least in some product categories, often directly compete with each other. The case of Hershey Co. and the Ferraro Group, as pointed out in the article, is one example. “Higher-end” hershey bars and “lower-end” Ferraro chocolates are in the same price category and target the exact same consumer that will likely only buy one of these products during a trip to the store. This is an example of co-opetition in the supply chain.

According to the “North American Horizontal Collaboration in the Supply Chain Report”, published by EyeForTransport, while still in its early stages, the benefits [of horizontal collaboration] are clearly recognized and there are companies already optimizing their supply chains with this cutting-edge strategy. This is especially true if the collaboration is deep, and extends into sharing warehousing, distribution and even manufacturing capabilities. And of course, the collaboration is going to achieve efficiencies and savings beyond what either company can achieve on its own if you collaboratively optimize everything, as the article recommends. [This echos what the doctor has been saying for years. No other technology or process delivers the returns that optimization delivers, and the maximum effectiveness is always in a collaborative application.] But the real question is, what is the value that is going to be delivered? When you optimize everything within your organization, you maximize the value to your bottom line. But this isn’t necessarily the case when you optimize a joint supply chain.

Why? To understand the rationale, we need to take a step back to the predecessor of horizontal collaboration — the Group Purchasing Organization. The idea behind the group purchasing organization was that if a bunch of companies came together and pooled their total purchasing volume, they could get a better deal from a single supplier than each could on their own. (In simple terms, they are the enterprise version of today’s consumer GroupOn or TeamBuy.) This was true for each company if they all had volume requirements in the same order of magnitude and there was enough companies in the group to take the volume to the next order of magnitude (which, in manufacturing terms, is defined based on the throughput of a production run and the threshold at which manufacturing the product becomes cheaper). If one company had an order of magnitude more demand than the others in the GPO, then the reality is that it could get just as good of a deal if it had a good negotiator, and if a company had an order of magnitude less demand, then it was getting a way better deal than everyone else.

In addition, a deal is only a better deal if it doesn’t help a competitor more than it helps you. So if the GPO contained direct competitors, typically it was only used for buying indirect or non-essential products or services (like office suppliers, maintenance parts, and temporary labour services), and never for components or raw materials used in direct manufacturing. So the organization never saw the full value of what a GPO could deliver unless it joined a smaller GPO that prohibited direct competitors from belonging to the GPO. And then it still didn’t get the best possible deals across the board because smaller GPOs generally had smaller volumes, especially since not all companies were buying the same products or services, or they were not all ready to buy the same categories at the same time.

Co-opetition is taking the concept of a GPO to the next level. It’s essentially saying “why stop at products and basic services when you can also collaborate on warehousing, transportation, and manufacturing asset purchases and take GPOs to the next level”. And while this sounds good in theory, the reality is that you can really only collaborate this deeply with an organization in the same space as you making similar products, and maximum benefit (from an optimization viewpoint) will only be achieved when they are making the same category of products. And if the other companies are making the same categories of products, even if they are not directly competing (like tablets and laptops), they are probably close enough that they are vying for the same consumer dollars (as many consumers have limited disposable income these days), and if the products are that close, and your competitor ends up getting more efficiency gains then you, with the indirect knowledge of your products that they are going to acquire, what’s to stop them from creating a product that directly competes with yours, at a lower production price, using the supply chain you helped them build?

And yes, there are always legal precautions you can take, but first of all, you have to think of every eventuality and then, if the competitor is determined, be prepared for a lengthy, and costly, court case. In other words, the greater the savings are for you, the greater the value your competitor is likely to see. Is it worth it? the doctor doesn’t have the answer, but thinks it is very important that you ask the question!

What is Visibility?

Supply Chain Visibility is a hot-topic, and, as reported in this article in Logistics Management on Defining Visibility late last summer, was the hottest project in 2011 according to a Capgemini Consulting study. Fast forward to 2012, and visibility is a term I’m hearing from at least every other vendor as a selling point of their supply chain services and solutions.

Thus, at this point, I have to ask — what, pray tell, is visibility? When we look up visibility, the first definition returned from dictionary.com is the state or fact of being visible, which isn’t very useful since visible is defined as that [which] can be seen. So what do we have to see?

Well, if you talk to a software-based solutions vendor, we have to see the data. Specifically, data on where your order is in terms of production, shipment, or delivery. And this is good, but it’s not enough. While this will tell you that production on an order is three (3) days behind, it won’t tell you why. Is the plant recovering from a backlog, and about to put your order into overtime production tomorrow? Are they suffering from a worker shortage, or strike, and your order is delayed another week? Or have the components and/or raw materials not yet arrived? And if it’s the latter situation, why? Is it a transportation delay? A production delay? Or a raw material shortage that may take months to correct? So you need visibility into the status of your order and all of your supplier’s orders that impact your orders. But this isn’t always enough.

While it would be great to know as soon as a delay occurs that could potentially impact your supply chain, and give you more time to respond and potentially create and/or implement mitigations and counter-measures (such as finding an alternate source of supply or stepping in to help the supplier solve the problem), this still doesn’t give you any indication of problems that could be brewing. That’s why other vendors try to sell you risk-focussed data solutions such as financial viability reports (from credit-based data) and activity reports (from import/export data). But these solutions only allow you to judge supplier viability, they don’t allow you to determine if an external event in the supplier’s locale (such as war breaking out or a likely natural disaster) could take the supplier out even if they are financially viable and low-risk from a business perspective. So other solutions try to sell you country-based risk assessment solutions with data on each of the locales you are doing business with. And this is a type of visibility. As are sustainability tracking solutions which track sustainability data (with regards to environmental, legislative, and other types of compliance data) to try and predict current and future supplier health based upon a sustainability score that goes beyond pure financial data. And this is another type of visibility.

And if you had all these solutions, you could certainly argue that you had supply chain visibility, but the question is, how complete is it? How much do you need to see to be confident that the chances of an unpredicted event are sufficiently low and/or the chances of you not knowing about an unpredictable event soon enough to implement mitigations are sufficiently low? It’s hard to say. It probably depends upon your operation, your risk exposure, and the strength of your supply chain and supplier relationships.

Regardless, visibility is a concept that is hard to narrow down and no one approach completely solves the problem. Keep that in mind when evaluating solutions on the strength of their visibility.

What Impact Will the National Defense Authorization Act (NDAA) Have On Your Supply Chain?

According to a recent press release over on the IHS site, stringent new counterfeit-part regulations in the 2012 U.S. National Defense Authorization Act (NDAA) may have broad international implications that could impact hundreds of of overseas companies that supply Billions of dollars’ worth of items to the U.S. Government. This act, which was signed into the US law on December 31, 2011, not only authorized 662 Billion in funding “for the defense of the US and its interests abroad”, not only included Title X, Subtitle D on “Counter-Terrorism” which deal with the detention of persons the government suspects of involvement in terrorism, but also contains 8-page section 818 on the “detection and avoidance of counterfeit electronic parts” buried in its 565 pages.

This section states that the secretary of the department of defense shall issue or revise guidance … which … shall address requirements for training personnel, making sourcing decision, ensuring traceability of parts and shall revise … the Federal Acquisition Regulation to address the detection and avoidance of counterfeit electronic parts and The revised regulations … shall provide that … covered contractors who supply electronic parts or products that include electronic parts are responsible for detecting and avoiding the use or inclusion of counterfeit electronic parts or suspect counterfeit electronic parts in such products and for any rework or corrective action that may be required to remedy the use or inclusion of such parts.

In addition, the act states that the Secretary of Defense shall implement a program to enhance contractor detection and avoidance of counterfeit electronic parts and the program … shall require covered contractors that supply electronic parts or systems that contain electronic parts to establish policies and procedures to eliminate counterfeit electronic parts from the defense supply chain, which policies and procedures shall address

 

 

  • the training of personnel
  • the inspection and testing of electronic parts
  • processes to abolish counterfeit parts proliferation
  • mechanisms to enable traceability of parts
  • use of trusted suppliers
  • the reporting and quarantining of counterfeit electronic parts and suspect counterfeit electronic parts
  • methodologies to identify suspect counterfeit parts and to rapidly determine if a suspect counterfeit parts is, in fact, counterfeit
  • the design, operation, and maintenance of systems to detect and avoid counterfeit electronic parts and suspect counterfeit electronic parts, and
  • the flow down of counterfeit avoidance and detection requirements to subcontractors

 

 

 

And many other requirements, along with punishments for offenses which an include 2 and 5 Million dollar fines for individuals and 5 Million and 15 Million dollar fines for corporations for first offenses with second offenses garnering fines of up to 30 Million dollars.

This is of grave concern, because the legislation applies not just to counterfeit parts, but suspect counterfeit parts. An organization that supplies parts that are suspected to be counterfeit, whether proven counterfeit or not, will have to remedy the situation on its own dime (which could cost Millions to mint), and if it doesn’t do so satisfactorily, could be fined Millions of dollars on suspicion. And given that the reports of counterfeit parts have soared dramatically in the last two years, with 1,363 separate verified counterfeit-part incidents in 2011 as compared to 324 in 2009, this is a serious concern for anyone supplying products to the US Government. Given that many of these counterfeit parts are commercial electronic components that have wide use across every major technology end market, this is an especially serious concern for suppliers and manufacturers in electronics supply chains.

It would appear that this puts the need for supply chain security and risk management in your electronics supply chain at an all time high, now that even suspected fraud can bankrupt your company. The impact of this legislation could be much worst than 10+2. What do you think?

How Much Does That Enterprise Supply Management Solution Really Cost, Part II?

In yesterday’s post, we asked how much an enterprise supply management solution really costs because the up-front license cost or annual subscription fee is only one part of the puzzle — and until the full puzzle is understood, it’s hard to figure out what the true cost is and, ultimately, what’s the right solution for the organization. The difficulty is the plethora of license models, and add-on fees, that have been invented by on-premise and SaaS/Cloud vendors over the years in an effort to get a leg-up on their competition (and a siphon into your corporate piggy bank). In today’s post, we’re going to review three proposals from three vendors, Siphon, Skimmer, and Drip. Then, we’re going to demonstrate how to compare them on equal footing.

Siphon is proposing an on-site enterprise solution with a perpetual license cost of 50K plus 100 per user, an implementation fee of 20K, an up front customization fee of 15K for reporting, 25% maintenance, and up-front training of 10K for administrators and 20K for users. It also requires a database, application server, and a middleware license — which have their own maintenance fees. It also requires (3) servers to host the product, space in the data centre, an administrator / developer to maintain the customizations, and a user support person.

Skimmer is proposing a hosted ASP solution with a perpetual license cost of 50K, an additional fee of 50 per user, an additional fee of 1K per integration, and a small transaction fee of $1 per transaction. Maintenance is 10%, but the initial implementation cost is 40K, not counting the 20K for custom reporting or 20K for integration with external systems. User training is 20K up-front.

Drip wants to go pure multi-tenant SaaS for a hosting fee of 40K a year, with 30K up front for implementation, 20K up front for custom reporting, 10K for external systems integration, and 20K up front for training. However, ongoing training, largely self-led, is minimal at 5K / year.

On the surface, Drip sounds expensive if you’re looking to make a 5-year commitment because it’s 200K in license fees, as opposed to 50K for Siphon and 50K for Skimmer, but Skimmer has over 100K in additional up front costs (bringing your down-payment to 150K) and Siphon has at least 75K of up front implementation costs (bringing the total to 125K) plus whatever it costs for the database, app server, and middleware.

The only way to really understand what the respective costs are is to build a detailed cost model that allows for an apples to oranges to pears comparison that allows for similar elements to be compared on an equal footing when possible, and total cost to be understood.

To this end, you need to build a cost matrix similar to the one below (which is contained in this free cost model spreadsheet [that you can use at your own risk*]) so that you can determine the true cost of the solution over the time-span you expect to use it. (Be it the 1, 3, 5, 7, and 10 year time-frames pre-calculated, or some other time-frame). Then fill in the gaps.

For starters, with respect to Siphon’s proposal, we have to cost out the database, application server, and middleware. When we do that, we find that the db license is 15K plus 30% annual maintenance, the application server is 10K plus 25% maintenance, and the middleware server is 20K plus 20% maintenance. Plus, we need to buy 3 servers to support it — one for the application and middleware, one for the database, and one for the web application server. Digging deeper, we find out that it needs five custom module integrations, and each will cost 2K, tacking another 10K onto the proposal in addition to the 10K required to integrate with external systems. Digging into the support requirements, it’s going to require 50% of an admin’s time, and that person costs 90K a year, and 100% of a support rep’s time, and that person costs 60K a year. The servers will consume about 6K of power, an additional 3K of backup services will be required, and the annual maintenance on the database, middleware, and app server will cost 5K, in addition to 5K of annual training to keep the admin up to date.

Skimmer, being a hosted ASP solution, also requires an annual hosting fee of 20K for data centre costs in addition to the 50K perpetual license cost, and an additional fee of 10K in each subsequent year for training.

Drip, being a pure multi-tenant SaaS, has no other costs.

When we put it all together, we end up with the table below:

Cost
Components
On-Premisee Hosted ASPP SaaS
Perpetual License (K)
Flat Fee 50 50 0
Per User 0.1 0
# Users 100 0
Per Module 0 0
# Modules 5 0
Per Integration 2 0
# Integrations 5 0
Per Server 0 0
# Servers 3 0
Total 70 50 0
Annual Hosting Fee (K)
Base Fee 0 20 40
Per User 0 0.05
# Users 0 100
Per Module 0 0
# Modules 0 5
Per Integration 0 1
# Integrations 0 5
Per CPU Hours 0 0
# CPUs 0 0
Per Transaction 0 0.001
# Transactions 0 300
Total 0 30.3 40
Maintenance % (0-1) 0.25 0.1 0
Equipment Up Front
Server Count 3 0 0
Server Cost (K) 8 0 0
Server Life-Span (Yrs) 3 0 0
Total 24 0 0
Mandatory Software
Perpetual DB License (K) 15 0 0
DB Maintenance % 0.3 0 0
Perpetual App Srvr License (K) 10 0 0
App Srvr Maintenance % 0.25 0 0
Perpetual Middleware License (K) 20 0 0
Middleware Srvr Maintenance % 0.2 0 0
Total Software (K) 45 0 0
Total Maintenance (K) 11 0 0
Implementation Cost (K) 20 40 30
Ext. Sys. Integration (K) 10 20 10
Custom Report Development (K) 15 20 20
Upfront User Training (K) 20 20 20
Ongoing Training (Yearly) (K) 10 10 5
Data Center Costs
Admins/Developers Rqrd 0.5 0 0
Annual Salary (K) 90 0 0
Support Reps 1 0 0
Annual Salary (K) 60 0 0
Power (K) 6 0 0
Integrated Systems Maintenance (K) 5 0 0
Backup Fees (K) 3 0 0
Ongoing IT Support Training (K) 5 0 0
Total 124 0 0

And then when we summarize the costs, breaking them down into first year and subsequent year, we get the following summaries:

Up-Front
First Year Costs
On-Premise Hosted ASP SaaS
Perpetual License 70 50 0
Equipment (Computer) 24 0 0
Mandatory Software 45 0 0
Base Implementation 20 40 30
Ext. Sys. Integration(s) 10 20 10
Custom Reporting 15 20 20
User Training 20 20 20
Year 1 Data Centre 124 0 0
Year 1 Hosting/Subscription 0 30.3 30
Total Up-Front 328 180 110
Ongoing Yearly Operating Costs On-Premise Hosted ASP SaaS
Hosting/Subscription 0 30.3 40
Maintenance Fees 17.5 5 0
Mandatory
Maintenance Fees
11 0 0
Equipment Upgrades 8 0 0
On-going Training 10 10 5
Data Centre Costs 124 0 0
Total Yearly 170.5 45.3 45

And then we quickly see that, in the first year, SaaS is the cheapest and On-Premise the most expensive and, more importantly, that going forward, On-Premise is considerably more expensive due to high data centre costs. We also see that, overall, SaaS will be the cheapest solution but this doesn’t mean it is the right solution as the cost of Hosted ASP and SaaS in subsequent years is almost the same, and if the Hosted ASP provider can offer substantially greater security and reliability with the single instance they are offering (as opposed to the multi-tenant SaaS solution), it might be worth the additional 70K up-front cost for the Hosted ASP solution — especially if the company is looking to commit for a longer term (like 5 years). Plus, With the costs so similar, a negotiation might be able to reduce the base implementation and integration costs, putting the Hosted ASP solution on par with the SaaS solution. However, none of this would be clear without this total cost calculation. So do your homework, and your detailed year-over-year costing, before selecting a solution. It will pay off.

* All warranties or representations, express or implied, are disclaimed and you take complete responsibility for the use, or misuse, of the template.

How Much Does That Enterprise Supply Management Solution Really Cost, Part I?

Pardon my language, but GFQ: Good Fracking Question! With the way that most providers price these days, it’s really hard to tell and bravo! to Chain Link Research (CLR) for taking up the issue in a recent 2-part piece on SaaS Pricing: Insanity or Good Deal for Users (Part One and Part Two). When I first broached the subject back in 2009 in my series on An Enterprise Software Buying Guide (Part I: Overview, Part II: Cross Functional Team Formation, Part III: Need Identification, Part IV: Potential Solution Identification, Part V: Cost Model Definition, Part VI: Cost Model Calculations, Part VII: Negotiations and Part VII: Contract Definition & Management), I thought I was the lone crazy voice talking to the cat in the corner that wouldn’t listen because, at the time, everyone thought SaaS was always cheaper and the wave of the future. (Sometimes it is, sometimes it isn’t.) The reality is that up-front license cost or annual subscription fee is only one part of the puzzle, and until the full puzzle is understood, it’s hard to figure out what the true cost is and, ultimately, what’s the right solution for the organization.

As the CLR articles point out, the first thing you have to figure out is what you’re buying. Is it on-premise, hosted ASP, or SaaS/Cloud, and then, more importantly with respect to today’s cost models, is it enterprise or community? I.E. Is it 100% internal to your organization or does it allow you to connect with different organizations within the extended enterprise as well as supply chain partners? Is the price fixed, per usage metric, or based on Spend Under Management (SUM)? If your organization only has 20% SUM today but is buying the solution to get to 80% spend under management, then the cost of the solution is going to quadruple overtime. What sort of user connectivity is supported? Is it in-house only? Remote? Multi-location? And, today, multi-device? (Executives want everything, whether it makes sense or not, to work on their iPad and/or iPhone.) How secure is it? And how much hardware and/or how many data centre resources are going to be required to support it?

If it’s on-premise/hosted ASP, is the license perpetual or for a limited term? If it’s SaaS, is it single-tenant or multi-tenant? What sort of availability or security assurances are there? Is anything being outsourced?

And then, once you get a grip on the basic delivery model, you need to start coming to terms on how the solution is being priced. For SaaS, what is the frequency of subscription payments? What is the payment based on — site license, number of seats, number of transactions, CPU utilization, bandwidth utilization, storage requirements, and/or dollar volume processed? And what are the up-front costs? Is there a one time integration or implementation fee? Any customization fees? Any training fees? The list goes on.

Similarly for enterprise. Is the license fee fixed-term or perpetual? Site license, by user, by server, or by CPU? Does it require any middleware that must be licensed separately? What is included in the way of implementation and integration? In terms of user training and, more importantly, site administrator / developer training? How much customization is required? The list goes on.

For an average business user trying to select the best solution for the business, it’s like trying to compare apples to oranges (which can be compared, by the way — see this post) to processed fuel (which is of an entirely different composition and has an entirely different production cost model, unless, of course, it’s corn-based ethanol). But there is hope! Stay tuned for Part II!