Thursday, October 21, 2010

Focus work2.0


When some people are still happy for the rapid rise of the blog, the lack of effective profit model of many web2.0 sites are suffering venture capitalists; industry once known as web2.0 wiki development of straw, although wiki model Let the wisdom, knowledge, problem-solving skills to show through, but the lack of popularity, intellectual and so on to web2.0 once again pushed to an awkward situation. At this point, Waugh off (work2.0) sprout, work2.0 use of competitive bidding procurement cost savings for SMEs, to provide employment opportunities for the many roots, but also cock for cultural and creative industries to provide a new development opportunities. September 13, 2006, held at the China Science and Technology Hall, 2006 Waugh off (work2.0) Web site operators and the development of the seminar, will be the first system of work2.0, while many work2.0 site will also be a collective appearance.

"Waugh at the word" from "work" of harmonics. It means not just an ordinary job, but a new type of networking communication. It inherits the core spirit of web2.0, but with the BLOG, WIKI web2.0 applications such as existing models have very different, both web2.0 application mode is mainly to attract large number of user groups, and work2.0 attracted is the value of user groups, brings a group of enterprises, companies dominated customer base, including the advertising value and so on. If both web2.0 application model is the most open burn bigger and does not consider short-term profits, then work2.0 can be profitable from the start. Now it seems, work2.0 pattern mainly in cash incentives, competitive bidding and reward in the form of the site appears (to www.InnoCentive.com on behalf of foreign and domestic to K68 as the representative). work2.0 the typical characteristics of the work achieved to-many network-based, users can select by work2.0 platform to do better at work, so networking rapid expansion, more opportunities for their own gain. Such a way that the full integration of human resources, on the one hand, companies can develop many problems and needs of non-core business on work2.0 to reward, on the other hand a large number of universities, research institutions, professionals and staff time to rest be used effectively.

In terms of the investment business, work2.0 further business community, business community will become a part of the industrial chain, with good market prospects. Give a simple example in terms of: customer work2.0 on the website task, a task may have 20 people bid the same time, there will be 20 items to the customer information, and customers only to pay the most satisfactory one can be, investors benefit from, customers earn big. Also, some say work2.0 the value is subversive, it is the Internet's ultimate dream. But as a core value for the new Internet service model, the auction transaction, payment, intellectual property issues and trust issues also plagued the parties are dealing. In addition, work2.0 venture investors are able to generate revenue? It can promote the development of China's cultural and creative industries? By "in September 2006 Waugh off (work2.0) site operators and Development", the industry will woek2.0 current situation and development trend of in-depth discussion, but also with relevant government departments of policy . Web2.0 websites in the future still unclear circumstances, work2.0 will lead the field of industry and media attention.






Recommended links:



To expose the fraud: WINRAR to compress 775MB 13.4MB



Premier Audio Rippers And Converters



6.2 inch car dvd player hl 8100gb for nissan



GETTING Started with Corel Draw 10 (4) hands to create vector graphics (1)



3G2 To MPEG



ASF CONVERTER



DVR-MS to MP4



"Journey" amending the law of my magic battle + guardian



"Martian" Builder - Mars Pinyin input method



Storage Astronomy



"Golden Land Project" supervision of our Lifeline



Tencent no winner already had three incidents



Easy Download Managers



To. NET Migration risk assessment [1]



Feeling so Steady and VB API (1)



Guide Audio CD Burners



Tuesday, October 19, 2010

JSF will not repeat the mistakes EJB



1.Sun the only technology on the ruined EJB

Sun introduced its own technology, has always been very self-confident, even a little conceited to the extent of self-confidence. Because of ego, Sun does not always willing to promote the technology, and planning a little ingenuity, blindly look to the attractiveness of the technology itself, as if the Expert Group pedantic they shouted, they will arise from those clouds of sensation. This is a commercial society, the emperor's daughter is still unhappy marriage, not to mention you are a liquor, but also superstition what sell themselves?

EJB's fate has dealt a blow to Sun, do not know if Sun has not woken up. Why such a great server-side EJB component architecture, will lose even Hibernate and his ilk? EJB really is too complicated? Perhaps, but not the EJB living to the point of the root causes of this predicament. Only technical theory, ignore the user needs, turned a deaf ear to the voice of the programmer, is Sun's biggest weakness, this weakness affected the release of all Sun technologies to their business plan is always tepid EJB source.

EJB's rich content, I am afraid that only Java "cattle people" who can appreciate. I have heard more than one Java "cow" and praise of the EJB. High level of abstraction, reasonable structure, stable performance and adaptability omnipotent, large-scale enterprise applications using EJB development is the "cow man" who is the only choice.

Unfortunately, EJB complex concepts, esoteric terminology and heavyweight framework, so that large numbers of patience and love "technology fast" discouraged programmers. On the contrary, publicity-seeking Hibernate, its simple configuration, easy to understand the rules and so-called "lightweight" object encapsulation, because the programmer likes to vote in the Java arena was able to quickly became popular, as doing my part of the star. Things change, so EJB shake their heads, do nothing.

Hibernate EJB's advantages and shortcomings will not go into here, if given the chance, I will also discuss the author and readers. The disrespect of the Hibernate, Hibernate's supporters do not want angry angry. As a tremendously popular Java ORM technology, Hibernate Java programmers have long been widely accepted, its founder Gavin King is now the fame and fortune, to the points of criticism, or be able to afford one? Moreover, as Gaving King joined the EJB group to standardize the development of EJB ORM, EJB and Hibernate turn hostility into friendship, now a person. As a family, and I complained about something, right when everyone is "contradictions among the people" to handle it, huh, huh!

2. Strikingly similar history, it will repeat itself

The reason that Hibernate and EJB, not to deliberately no judgments of a pass, but to explain the technology to promote Sun's planning on how lightly. Carefully JSF technology, then take a look at JSF Java Web community complaints, you will find that today's JSF and then EJB, exactly the same situation.

First of all, and, like EJB, JSF is an advanced technology. Trying to build a Java Web's UI framework, Fuzzy programming and Web programming Java Desktop line, so that a large number of programmers on the desktop programming experience, can be applied to Web programming intact, this is any other Java Web frameworks have thought of;

Second, and, like EJB, JSF also has a very complex concept. In the JSF "simplify Java Web development" goal behind, is unprecedented technical complexity of JSF. Connectionless nature of HTTP protocol, and respond to the request processing mode, determines the complexity of Web programming, especially Form processing and complicated, is inevitable. Since the JSF, the programmers do not have the face of these complex and cumbersome, then the framework must face. This is the JSF complicated reasons. Of course, the basic JSF programming quite simple, but deep into the JSF's internal, you need to know including the JSF request processing lifecycle, including many complex concepts;

Again, and, like EJB, JSF is also a lack of tools. When we use all kinds of IDE to easily write the desktop program, expected to be difficult to imagine, the lack of these tools support, back 20 years ago, the big picture of how the program will be. The importance of tools can not be overemphasized. JSF is designed for the tool, but, JSF is launched, the tools available meager, even now, visual JSF page editor is also rare;

Finally, and, like EJB, JSF is also a victim of bad business promotion plan. Not timely introduction, then introduced the relationship between untreated well and JSP, but also no large-scale business promotion, JSF only by its own technical advantages, and competitors deal with.

EJB Hibernate then have to contend with, today's JSF Struts and so there next to sneer at. History is strikingly similar, and strikingly similar history, they often continue to repeat itself. Bear to recall the fate of EJB, JSF to repeat it? Sun, please tell us the answer!







Recommended links:



FLASH into VCD, no COMPUTER could not see FLASH MV



New Cataloging



Make a IPHUNTER



Why "Chinese Made" Did Not Engage In Head



MOD to MPG



Expert Printer



DAT to MP4



Specialist Install And Setup



Advantage Of Limited Group Of Users: 2007 To See VPS Hosting



U disk to create running Win98 super mini



CHILDREN'S Books list: Foreign Books victory, was embarrassing domestic children's books



reviews REFERENCE Tools



The Average Salary 7K Public Relations Industry Is A Lie



How To Tracking Cell Phone Location Secrets To



Hot open source issues



MOD Converter



Wednesday, October 6, 2010

Desktop and notebook computers to connect with online IR


A home computer with a friend, on Windows may be very familiar with it! You are not often seen in the control panel has a set of icons infrared, but I have never in-depth study? Does he want to try it hands? But the desktop computer does not have infrared adapter Yeah, but it does not matter Do not give with one. With this infrared adapter, desktop and notebook computers can have the same infrared communication. Infrared adapter in the past is hard to see, now you can find in the market, there are several brands, communication effects are plausible. Buy a bar, a cost of 200 yuan, the city can buy a computer.

In the infrared data between two computers each transfer, there are two methods: the first one is an infrared connection, the second is the infrared-line, following these two methods were described.

An infrared connection

First of all, the correct installation of desktop and notebook computers infrared driver. In the WIN98 system in infrared devices are Plug and Play devices, generally open in the BIOS, the system automatically infrared feature complete and infrared applications infrared driver installation. If you can not automatically install, check the infrared adapter using the manual or Help files WIN98 systems. After installation, double-click the taskbar icon to open the infrared communication, "Infrared Monitor" program, by changing the settings to activate it, so search for other infrared devices in the state.

If all goes well, it can be connected. Open the two computers were the "Infrared Monitor" window, the desktop window aligned infrared adapter infrared port laptops, two "infrared monitor" will quickly respond to and report found that the effective area each other, and list the name of the other communications. This indicates that the connection has been established, data transmission can be had.



WIN98 system comes with an infrared data transmission applications, called "infrared" (shown in Figure 2), you can double-click "My Computer" in the "infrared receiver" to open it. This program can use the data transfer routine, click the "Send File" option to send files to each other, click the "received files" to see the other side sent me something simple to use, very convenient.



The above approach has been to meet basic data each transfer needs, but it can only send data, or passively receive data Buneng Qu initiative to seek for Bing Huoqu what they want, so there are some limitations. Here the infrared line can do this in order to achieve real Internet.

Second, infrared line

Infrared line to use "direct cable connection" program, if your computer does not have to install a "direct cable connection", please control panel "Add / Remove Programs" to install it. Also, if the machine is not installed network protocol, go to Control Panel in the "Network" item to add clients and protocols, I suggest you add "Microsoft Internet user", "TCP / IP" and "File and printer sharing" the three, it will give the infrared line and conventional on-line to achieve the same function.

Then the following steps to execute on both machines, "Direct Cable Connection" program.

1, open the Start menu, select "Programs", "attachment", "communication" open "Direct Cable Connection" program.

2, the program will first ask you to run this computer is selected as the host or client, you must be a computer set to host another set to the client.

3, the next step, the program requires you to "Select the port you want to use" (Figure 3). Note that the Department's most critical: WIN98 systems usually infrared communication device as a serial and parallel port to deal with, of course, this is not a physical serial port or parallel port, but a virtual out, which is in the infrared driver in Device Manager after the installation is complete infrared device in the new virtual serial port or parallel port. WIN98 system for these virtual ports are assigned port number, the specific port number in "Infrared Monitor" in the "Options" column found. So, when the "Direct Cable Connection" program requires you to select the port, you have to choose distribution system for the infrared device virtual serial port or parallel port. (WIN98 general set of virtual infrared port COM4 or COM5, infrared parallel set of virtual LPT2 or LPT3)



4, Click "Next", the program prompts have set up the host or client. Click Finish, set success. Set after the completion of the online. The infrared port on both computers as opposed to the host, click "listen" and then click on the client, "Connection", if all is well, "Direct Cable Connection" program will display a successful connection. (Figure 4)



After a successful connection, the host to set a number of shared files or folders. Clients can access these shared content on the host computer, you can also upload files on the client to the host's shared folder, you can also try the network game.






Recommended links:



Premier Search Or Lookup Tools



Baidu In The Mad Hope And Hardship



Yuan Meng: Ubuntu 9.10 New Version Of The Debut



Nine ways to recruit Good staff



ASF TO MPG



Easy to use FTP Servers



for you Games Arcade



cheap CONTRACT mobile phones acceptable phones



Europe and the United States will not be Outsourced as "mirage"?



Tencent said the prosecution did not rule out the possibility 51.com



Taobao Is Free Of Charge Commitment Charges Due To Question



WMV to MPEG



The latest trends in "Westward Journey 3" Daohao Trojan



Are days, as the (ZONTIS) infrared camera prices down across the board



"Black, then it" is not very "black"



AVI to 3GP



Saturday, September 25, 2010

Dell accused of the largest mergers and acquisitions worth the



PC industry last quarter's profit margin is only 5.2% for IT services, Dell decided to shot. Yesterday, Dell offered to 3.9 billion offer to acquire a IT service provider Perot Systems. If successful, this is Dell's largest in the history of M & A time scale.

It is reported that, Perot Systems is a healthcare IT services in the many achievements of the company, has been established for 21 years. The outside world that its style is strong and solid, so Dell is shot in such a company to expand its IT services business is not surprising.

Currently, Dell is the world's second-largest PC maker, which has about 60% of revenue from the PC market. The more worthless the PC to be like other technology giants Dell, Hewlett-Packard, IBM, like through the IT services industry to upgrade their profit margins to ensure that shareholders and investors to cross.

But Wall Street analysts say that, despite the acquisition of Perot Systems and Dell not wrong, but wrong is not worth the price. It is reported that the acquisition premium of up to 67.5%. 3.9 billion of the purchase price is Perot Systems currently 1.4 times revenue, while last year on IT services giant EDS Hewlett-Packard's purchase price is 0.6 times the latter revenue. Analysis, although some expensive, but it fully illustrates the Dell PC industry want to get rid of over-reliance on the plight of the urgent mood.

Dell's side said that the acquisition of Perot Systems, 2012-year company revenue for Dell.







Recommended links:



Flash to MPEG



E-Mail Clients Introduction



University home page frequently black student groups as "lambs to the slaughter"



Ultimate Practicing Four Cents Lets You Easily Got To The 99



BEST Astronomy



On the memory leak (1)



SWF To MP4



Chemistry teachers and multimedia courseware



EFFICIENCY analysis 2



3 Accounting in a drama, colorful festival Foshan accounting



How to become a DBA FROM a beginner



Best Font Tools



Baidu Xing, TENCENT death?



DVR-MS To MPG



Tuesday, September 14, 2010

Useful time of the class



Very often, a piece of code we need to calculate the time-consuming operation, we often write:

The first case, to the millisecond.

clock_t start = null, end = null;

double duration = 0;

start = clock ();

/ / Operation statements here

end = clock ();

duration = (double) (end - start) / CLOCK_PER_SEC;

Second case, accurate to seconds.

time_t start = null, end = null;

int duration = 0;

start = time (NULL);

/ / Operation statements here

end = time (NULL);

duration = end - start;

Is the time to code in C + + projects can be reused, we can to package.

The scope of the object to the use of computing time. Of course, these classes can only be used in certain occasions.

class TimeCost

(

public:

TimeCost () (m_cur = time (NULL);

~ TimeCost ()

(

time_t cur = time (NULL);

prinftf ("Time cost is% d s
", Cur - m_cur;

)

private:

time_t m_cur;

)



class TimeCost2

(

public:

TimeCost2 () (m_cur = clock ();)

~ TimeCost2 ()

(

clock_t cur = clock ();

double cost = (double) (cur - m_cur) / CLOCK_PER_SEC;

printf ("Time cost:% f s
", Cost);

)

private:

clock_t m_cur;

)

Of course, the biggest drawback of these two classes is the strict calculation of time depends on the object's lifetime.






Recommended links:



CNNIC proposes to amend the terms of promoting open to individuals, CN domain name registration



free converter mp4 to 3gp



convert m4a to m4r



Best Animation Tools



Clocks And Alarms Storage



Guide to fully EXPERIENCE the still-mail (a) - attachment



Directory Web Development



Mkv Files



VIDEO formats



BenQ Competing Against The Shining 2008 SEPG Conference



Easy to use EDUCATION



"Plant Wars zombie" automatic "fight" means plant



MSN "offline" stability remains a cause of disease remission



JSF To Pass Parameters Via URL



Teaching Domain Quiz



Thursday, July 29, 2010

"Bullwhip effect" of the comprehensive management


"Bullwhip effect" is a common marketing activities, high-risk behavior, which directly increase the supply of suppliers and inventory risk, and even disrupt the production and marketing business management scheduling order, lead to the production, supply, marketing, confusion, solve the "bullwhip effect" problem is normal enterprise marketing management and good customer service, a necessary prerequisite.

First, the "bullwhip effect" causes

Procter & Gamble (P & G) in the study "diapers" in the market demand found that the number of retail products is quite stable, volatility is not significant. Visit distribution centers in order to her situation, obviously surprised to find that volatility increases, the distribution center that they are based on aggregated demand order sellers to her orders. She further study found that retailers often based on historical sales and sales of reality Qingkuang of Yuce, Queding a more objective in order Liang, Dan To Baozhengzhege order yes Jishikede of, and able to adapt to the changes in incremental Gukexuqiu, They will usually predict a certain order for enlarged orders to wholesalers, wholesalers out of the same considerations will also summarize the basis of retail order further magnified in some order to the sales center. Thus, while the customers do not have big fluctuations in demand, but after retailers and wholesalers in order to enlarge, the order quantity on a one way magnified. In the investigation to its suppliers, such as 3M, the order situation, she was surprised to find that the change order more, and more to the upstream supply chain, the greater the deviation of its order. This is the marketing needs of variation in the magnification, one popularly known as the "bullwhip effect."

"Bullwhip effect" is a common phenomenon in marketing, because when all levels of the supply chain from their suppliers based only on the adjacent lower the demand for information vendors supply decisions, the authenticity will not demand information upstream along the supply chain, resulting in the phenomenon of sequential amplification to reach the best source suppliers (such as general distributor, or manufacturer of the product), its demand for access to information and actual customer demand in the consumer market information has undergone a drastic deviation, coefficient of variation of demand than the needs of distributors and retailers, the coefficient of variation is much greater. Because of this variation of demand amplification effect, upstream supply very often to maintain a higher than 鍏?downstream demand inventory level to meet Xiaoshou business orders of uncertainty which artificially Zengtai upstream in the supply chain that suppliers , supply, inventory management and marketing risks, and even lead to the production, supply, marketing confusion.

Have a "bullwhip effect" because there are six main areas, namely demand forecast correction, order quantity policy, price volatility, short game, inventory imbalances and response to environmental variation responsibility.

Demand amendment is adopted when the members of the supply chain ordering directly downstream demand information and data as a basis, they will generate demand amplification. For example, in marketing activities, if the retailer's history, the highest monthly sales of 1,000 units, but coincided with a major festival next month, in order to ensure the continued sale of goods, he will be on the basis of the highest sales in additional A%, so he under the orders of their superiors wholesalers (1 + A%) 1000 浠? Wholesale sales in the region is expected to aggregate after (assuming) for 12,000, he needs to ensure the retailer has an additional B%, so he orders the manufacturer (1 + B%) 12000 浠? Manufacturers need to ensure that wholesale goods, although he knows of which were overstated, but he did not know the circumstances, so he had to at least by (1 + B%) 12000 浠?production, and to play safe, considering the damage leakage provides such situation, he added volume production, this increase in bookings layer by layer, resulting in "bullwhip effect."

In the supply chain, each enterprise will be its upstream order, under normal circumstances, the vendor and not to a higher order on the supplier to order one, but considering the inventory and transportation costs, based on a cycle or summary to the supplier after a certain number of orders; order to reduce the frequency, reduce costs and avoid stock-out risk, sellers tend to increase the amount in accordance with the best economy of scale orders. Also frequently orders will increase the workload and costs vendors, suppliers often require sellers to order a certain number or certain period, then sellers of goods or as early as possible to get the goods in full, or to prepare for contingencies often artificially increased order, such as ordering policy led to the "bullwhip effect."

Price volatility is due to a number of promotions, or the economic environment caused by mutations, such as price discounts, quantity discounts, sweepstakes, and vicious competition and the shortage of competitors, inflation, natural disasters, social unrest. Such factors put many retailers and sales staff in advance purchase orders greater than the actual demand, because inventory costs less than the price discount as interest received, sales staff in advance of course willing to buy more, so order does not truly reflect the needs of changes, resulting in "bullwhip effect."

When demand is greater than supply, the rational decision-making is based on the proportion of orders for allocation of available supply, for example, the total supply is only 40% of order, a reasonable allocation method is 40% of their supply orders. At this time, vendors in order to obtain a larger share of the rations, intentionally exaggerated its order demand is inevitable, when the demand for cooling, the order has suddenly disappeared, such as the shortage game demand caused by the distortion of information eventually led to "beef whip effect. "

Responsibility for ordering inventory imbalances aggravated the demand amplification. Marketing operations, general practice is the first supplier of distribution in place pending completion of the sale after the settlement of vendors. A result of this system is that suppliers need to sellers (wholesalers, retailers) before the settlement amount in accordance with the seller is responsible for ordering the goods to the seller in designated areas, while the seller does not bear the cost of cargo handling; in excess supply of goods or damage occurs when the provider needs to bear the exchange, returns and other related losses, so that inventories of natural transfer of responsibility to the suppliers, so that vendors in a good position. While vendors when cash flow poor, due to a large number of stocks can be used as assets to use, so vendors will use these stocks and other suppliers, barter, Huozhe despite the provisions of the supplier price, low delivery, speed up recovery of its investment to ease cash flow difficulties; then, sales business by keeping the number of stocks can also be carried out as a game with the supplier of chips. Therefore, vendors generally tend to increase the order to seize the initiative, it will inevitably lead to "bullwhip effect."

Response to environmental variation arising from the uncertainty of demand amplification is to promote order increase of the real causes. Natural environment, human environment, policy environment and social environment change will increase market uncertainty. Vendors to address these uncertainties affect one of the most important means of maintaining inventory, and enhanced with these uncertainties, the concomitant changes in inventory. When the forecast uncertainty is artificially dyed declared, or the formation of a more general understanding, in order to maintain the security to cope with these uncertainties inventory, sales Chamber of Commerce to increase orders, transfer of risk of uncertainty to the supplier, so will lead to "bullwhip effect."



Second, solve the "bullwhip effect" approach

From the supplier perspective, the "bullwhip effect" in the supply chain vendors at all levels (total distributors, wholesalers, retailers) transfer risk and the result of speculation, it will lead to the production disorder, inventories, costs increase, channel blocking, market turmoil, risk increases, so will be able to properly address risk aversion, reducing efficiency. Enterprises from the following six aspects of comprehensive management.

1, order management at different levels

From the supplier point of view, not all vendors (wholesalers, retailers) the status and role are the same. In accordance with Pareto's law, they some are general dealers, some major vendors, and some key vendors, and the proportion of key vendors accounted for about 20%, it achieved sales of 80%. Therefore, suppliers should be based on certain criteria to classify vendors for different vendors divided into different grades, different levels of their order management, such as general sales agents for the implementation order to meet the management, major vendor for the order to adequate management, the key vendors for a perfect order management, so that you can live through the control key vendors and key vendors to reduce the mutation probability; in short supply, priority in order to ensure that key vendors; suppliers can also hierarchical management strategies, at the right time to eliminate unqualified vendors, maintaining the unity of vendors and channels management as a norm.

This approach has been in some good company good application effect is obvious, such as the 3M company for his services to key customers with perfect orders. In order to improve the quality of services, to ensure that key customers, 3M company introduced a new algorithm called "Platinum Club" of service measures. 3M, the "Platinum Club" members of the implementation of a variety of accidents safeguards to the main Place of Delivery out of stock, access to the necessary inventory to complete "Platinum" customer orders. These safeguards include reserves from the secondary site will be transferred out of inventory, and 3M, a worldwide search for other storage facilities in the inventory. Once these emergency measures in place, use of premium transportation services immediately to arrange direct delivery, even in exceptional circumstances, 3M Company will loan to the supply of goods sold "platinum" customers, he aims to do so is to ensure that in any case The key is able to provide comprehensive ordering service, and enhance the confidence of vendors, creating a good market environment, reduce demand amplification orders.

2, to enhance the storage management, and reasonable share of responsibility for inventory

Avoid artificial processing of the data supply chain is one way to get downstream to upstream business enterprises in the real demand information, so that upstream and downstream enterprises of the original data according to the same plan to develop supply and demand. For example, IBM, HP and Apple and other companies in the cooperation agreement explicitly required distributors to retailers, warehouse products, the central bank is fed back, although these data do not point of sale data from retailers, less comprehensive, but better than the Goods sent after the lost information on the goods much better.

The use of electronic data interchange (EDI) and other modern information technology to track the sales situation is resolved in due course "bullwhip effect" of the important methods, such as DELL through Internet / Intranet, telephone, fax, etc. to form a highly efficient information network, when the orders generated DELL when you can spread the information center, information center will be divided into sub-task orders, and through the Internet and information networks between enterprises assigned to the regional centers, regional centers by DELL assembly of electronic orders, in accordance with the agreed timetable time, on time delivery (usually less than 48 hours), so that order, manufacture, supply "one stop" complete, effectively prevent the "bullwhip effect" generated.

Joint inventory management strategy is a reasonable share of responsibility for inventory, to prevent the demand variability amplification of advanced methods. In the VMI environment, vendors do not need a large inventory advances will not increase the cash flow pressures on the contrary, will play a large inventory financing, and improve return on capital, or even from the inventory can to restrict the role of suppliers, it actually exacerbated the order of demand amplification, to enable the supplier to increase the risk of abnormalities. Joint inventory management is to amend this to make the right suppliers and vendors of balancing the responsibilities of a risk-sharing in the inventory management model, its suppliers and vendors have established a reasonable inventory costs, transportation costs and competition Xing stock loss sharing mechanism, the supplier of full responsibility for all sales business transformation Wei's part of the responsibility, so the two sides shared the cost and risk, benefit sharing, have Liyuxingcheng cost, Feng Xian Yu Xiaoyipingheng, so You Xiaodi suppress the "Niu whip effect "and increased production.

3, shortening lead time, outsourcing services

In general, the shorter lead time to set more accurate amount, and therefore encourages shorten the order of a break, "bullwhip effect" in a good way.

According to Wal-Mart's investigation, if the purchase of 26 weeks in advance, demand forecast error was 40%, if the purchase of 16 weeks in advance, then the demand forecast error was 20%, if the purchase in the sales season beginning, the demand forecast error of 10 %. Application of modern information systems through the timely access to sales information and goods flow, while the frequency of small quantities through a multi-joint shipping method to achieve takes to actually type order, so that further reduce the demand forecast error.

Use of outsourcing services, such as third-party logistics can also shorten the lead time and make small order to achieve the scale of operation, so vendors need not be from the same suppliers a one-time large numbers of orders. Although this will increase the additional processing costs and management costs, but as long as the cost savings than the cost of additional large, the application of this method is worth.

4, to avoid shortage of the game under the act

When faced with shortage of supply, suppliers can sell to customer records for the previous limit of supply, rather than the quantity ordered, so that you can prevent the vendors to supply more exaggerated your order. General Motors has long been done, many large companies such as Hewlett-Packard, also began to adopt this approach.

In short supply, distributors supply suppliers lack of understanding, it is easy to increase the degree of game. And vendors to share the situation of supply capacity and inventory information can ease the concerns of vendors, which to some extent, to prevent them in the game. However, the sharing of this information can not completely solve the problem, if the supplier before the advent of the shopping season to help vendors do a good job working order, they can better design and production capabilities and organization of the production schedule to meet the demand for the product, thereby reducing the production " bullwhip effect "of opportunity.

5, reference to historical information, the appropriate reduction amendment, sent in batches

Gong Ying registered under the analysis of historical data and current Huan Jing, Liang Shi Dang cut orders, while Wei ensure 闇?眰, vendors can use the inventory and joint Yun Shu Lianhe way Duo batch Fasong, so, at no extra cost premise, Ye Nenggou order to ensure the meet.

6, the period of payment, in advance

The period of payment, in advance, according to the logistics of payment, Arranging the Proportional delivery is Xiaochu order unrealistically high in a good way, because this book Shu Zuo Wei Zhi Shi Qiang beginning one kind of reference, the specific linkage of payment, the supply and to ensure the Dinggou and Distribution of double-loop management.

In advance of the specific method of payment, is divided into a number of accounting during the period, in each period (if that period is divided into three or four month period, each period of 10 days or 7 days) at the end should be back to section time; For how many days before the end of the period of payment, shall be given a positive price, and so on, would help promote the scheme.






相关链接:



The nature of chain



He Jinghua Xu Shaochun joined the first on



avi to iphone



PHS Delisting Who Is In Charge



Ma and Wang Shi in the end how much of the donations for the disaster area?



Auto Attendant computer operator



Project Management Introduction



Best Converters And Optimizers



Convert mp4 to 3gp free



flv format



Discuz! 7.0 mature and stable inheritance is more EFFECTIVE and user-friendly re-



Dealer's "breakout year"



mov to avi converter



Happy Dragon Boat Challenge embroidered NON-MAINSTREAM "brown" to mobilize



Paladin 4 solved the copy protection



Thursday, July 22, 2010

What conditions should be maliciously registered domain name?



Readers inquired

Counsel:

Foreign to a company called me recently registered a domain name registration is malicious, a violation of their trademark rights, asked me to return and pay 5,000 dollars in compensation. I ask: how can I do?

Readers: Han Xin

Lawyers to answer

Han Xin reader:

"Uniform Domain Name Dispute Resolution Policy" clearly defined bad faith registration of the case: the situation is as follows but not limited to the following situations, such as the Group of Experts found to exist, then the domain name constitutes bad faith registration and use of evidence: your domain name registration or access the main the purpose of the trademark or service mark as a commodity of all the complainants or their competitors to sell, lease or transfer the domain to obtain the direct costs associated with the domain name registration in addition to income persons; your registration of the domain name is intended to prevent the trade mark and service mark owners appropriate domain name to reflect the trademark,; your registered domain name main purpose is to undermine the normal course of business by competitors; to use the domain name means the purpose for commercial gain, by creating your your web site or web site sold the goods or services with the complainant between the source of those trademarks, sponsors, affiliated or guarantor's confusion, deliberately luring Internet users to your website or other on-line address those .

If you register a domain name with the conditions specified above, the general will be identified as malicious.

As for compensation, only if you register with the malicious domain, does not necessarily constitute a tort. "Trademark Law" fifth 12 provides: "any of the following acts shall be an infringement of a registered trademark: (a) of the registered trademark without permission, in the same or similar goods on the use of its trademark the same or similar to trademarks; (b) Sales infringement of a registered trademark of the goods; (c) forging, a registered trademark of another person without authorization or selling forged or made without authorization of the registered trademark; (d) without the trademark registrant agreed to change its registered trademarks and trademarks of the replacement of the commodities to market; (e) a registered trade mark to another person the exclusive right to cause other damage. "Only with these situations, it may relate to compensation. If only the registered domain name and the domain name and certain trademarks not only connected, but also has the linguistic meaning of common words, then the registration act does not necessarily lead to compensation of the complaint.







Recommended links:



Convert avi to ipod



Was Brilliant: Ten-man Weapon Crack Revealed Inside Story Of Classical



ESRI experts, non-Chan: Snow Emergency GIS can do more



Jiangmin Response To The Letter, Said Attorney Alibaba China Lagged Far Behind The Law



"Do Not Call Me"



Gome Huang Guangyu whereabouts after the incident: Decline or transfiguration



Perpetually Divx Xvid to MP4



DVD Cloner Build 2502



video file formats



Youtube To Palm OS Online



CONVERTING mp3 to aac



Articles About Site Administration



Merry DVD Ripper Platinum



Vertical Market Apps Specialist



Review Hobby



.ape Files



Wizard Newsgroup Clients