This course presents and examines inventory concepts as applied in manufacturing and distribution environments and the inter-relationships between them. It covers objectives, planning levels, demand types, forecasting, order point systems, MRP, different costing types, ABC analysis, order quantities, purchasing, capacity, DRP and warehouse control.

This course will expose you to the challenges involved in managing supply chains and understand the complexity of inter-firm and intra-firm coordination.

New Customers We'll have you and your staff up and running in no time. New customers will benefit from basic system usage and architecture. Our training professionals can answer questions about the system, give guidance on how a new system might be configured and provide a basic system tour. Once the general information has been covered, pick and choose the specific areas you would like to explore!

In this course, you will learn to identify, evaluate, and capture business analytic opportunities that create value. Toward this end, you will learn basic analytic methods and analyze case studies on organizations that successfully deployed these techniques.

A yard management system (YMS) is a software system designed to oversee the movement of trucks and trailers in the yard of a manufacturing facility, warehouse, or distribution center. YMS provides real-time information on the location of trailers in the yard and allows yard employees to move trailers from staging to docks to fill orders in an efficient manner.

This course provides on overview of corporate disclosure by focusing on selected topics that are currently deemed of particular interest to financial reporting. We focus on three main themes. First, we will debate International Financial Reporting Standards (IFRS), in particular their origins and consequences. Second, we will discuss the response of the accounting profession to the financial crisis.

We will examine cloud computing models, look into the threat model and security issues related to data and computation outsourcing, and explore practical applications of secure cloud computing. Using the confidentiality, integrity, and availability of data (CIA) model we will examine the threats and security implications to befall poorly established and maintained cloud computing environment.