22 research outputs found

    Expedite requests in Raytheon's North Texas supply chain

    Get PDF
    Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; in conjunction with the Leaders for Manufacturing Program at MIT, 2006.Includes bibliographical references (p. 69-70).In December 2004, a manager at Raytheon Company articulated in the form of an LFM (Leaders for Manufacturing) internship proposal his belief that someone should do something about the amounts of time and money that Raytheon's North Texas plants spent handling expedite requests-requests that someone provide goods or services more quickly than normal. This thesis attempts to summarize the thoughts, learnings, initiatives, and outcomes associated with the ensuing effort. In particular, a large section of the paper is devoted to a case study of the most involved initiative: the devising and implementing of a new dispatching method in one small but central operation in an organization with a long history of processing things first in, first out. While for the project team the compelling factor was achieving a specific dollar impact, the reader of this paper will probably be more interested in the methodology than in Raytheon's ROI. Research for this thesis was conducted during a six-month internship with Raytheon Company's Space and Airborne Systems Supply Chain Management group in McKinney, TX, and Dallas, TX. The internship was affiliated with the Massachusetts Institute of Technology's Leaders for Manufacturing (LFM) Program.by Scott K. Hiroshige.S.M.M.B.A

    Composite Supply Chain Applications

    Get PDF

    TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting

    Full text link
    TaintTrace is a high performance flow tracing tool that protects systems against security exploits. It is based on dynamic execution binary rewriting empowering our tool with fine-grained monitoring of system activities such as the tracking of the usage and propagation of data origi-nated from the network. The challenge lies in minimizing the run-time overhead of the tool. TaintTrace uses a number of techniques such as direct memory mapping to optimize performance. In this paper, we demonstrate that TaintTrace is effective in protecting against various attacks while main-taining a modest slowdown of 5.5 times, offering significant improvements over similar tools.
    corecore