Verified Document

Logic-Based Configurator On The Web, Term Paper

deal size by customer Sales

Order cycle time

Order cycle times reduction of 65% or more recorded with mftrs contacted

Cost of Sales

Days Sales Outstanding reduction from 60 to 29 days on average

Cross-sell and up-sell revenue

Increase of 33% on aggregate

Average sales price per order

Increase from 9% to 26%

Quote and Order

Average costs to complete an order

95% reduction in cost per order

Special Pricing Requests

Over 100% ROI on automating Special Pricing Requests

Bad or incomplete orders

Incomplete order reductions of 20%

Customer Service

Number of customer complaints

98% reduction in cost of simple requests

Revenue lost to churn

60% when cross-selling is used with quote-to-order

Number of calls on order status

Median level of 500 per week to 70

Warranty and Returns

Reduction in warranty cost on customized products

10% reduction at a minimum

Labor cost reductions

Decrease order re-work from 15% to 2%

Future Research

What is most lacking in the article however is a progression of where their research could be applied throughout the complexity levels of mass customization. The graphic below based on analysis from Columbus (2003) shows the varying levels of mass customization with color gradations applied to the definition of guided selling, quote-to-order or sales configuration, and product configuration. The message of this chart is that constraint-based engines can scale from the most simplistic (Assemble to Order) functions...

Parts of this document are hidden

View Full Document
svg-one

The reader also get a good sense of where the authors see the growth trajectories of these technologies moving more into transactional workflows (they were right) and the need to have greater integration at the knowledge management level (also correct). The authors could have brought in more of the aspects of the use of the evolutionary role of rules-based configurators to the role of catalog and content management, which became the basis of guided selling and assemble-to-order, which led to the revolution in e-commerce mass customization.
References

McGuiness, Isbel, Parker, Patel-Schneider, Resnick and Welty (1998) - A Description Logic-Based Configurator on The Web. Published Fall 1998 SIGART Bulletin as part of the ACM Consortium. Accessed from the Internet on January 12, 2007 from location:

http://portal.acm.org/citation.cfm?id=1056756&dl=ACM&coll=&CFID=15151515&CFTOKEN=6184618

Columbus (2003) - Configuration is the Heart of Customer Fulfillment for Complex Product Manufacturers. AMR Research Report. Monday March 31, 2003. Retrieved from the Internet on January 12, 2007 at http://lwcresearch.com/filesfordownloads/ConfigurationIstheHeartofCustomerFulfillmentforComplexProductManufacturers.pdf

Sources used in this document:
References

McGuiness, Isbel, Parker, Patel-Schneider, Resnick and Welty (1998) - A Description Logic-Based Configurator on The Web. Published Fall 1998 SIGART Bulletin as part of the ACM Consortium. Accessed from the Internet on January 12, 2007 from location:

http://portal.acm.org/citation.cfm?id=1056756&dl=ACM&coll=&CFID=15151515&CFTOKEN=6184618

Columbus (2003) - Configuration is the Heart of Customer Fulfillment for Complex Product Manufacturers. AMR Research Report. Monday March 31, 2003. Retrieved from the Internet on January 12, 2007 at http://lwcresearch.com/filesfordownloads/ConfigurationIstheHeartofCustomerFulfillmentforComplexProductManufacturers.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Telecommunication FedEx Is a Logistics
Words: 1425 Length: 5 Document Type: Term Paper

Receipt of information is not typically confirmed, either by internal or external users. For the most part, the people uploading new information do not need to know whether or not the information has been received. There are exceptions -- customer service staff updating an order will want to know that the updated information has been received. They will typically see a note (subset information accessed via the bar code) on

Telecommunications Issues in Telecommunications Networks
Words: 1060 Length: 4 Document Type: Essay

There are many different methods for creating and utilizing such systems, and one large set or class of such approaches has been labeled the Systems Development Lifecycle Approach. In this perspective, systems or projects are seen as being continuous processes made up of constituent parts, each one of which feeds into the next. There are many different ways to view or arrange separate system elements or project phases within

Telecommunications Equipment
Words: 3286 Length: 10 Document Type: Term Paper

Telecommunication equipment industry has undergone drastic developments and changes since the 1990s. The telecommunication equipment industry has become quite popular due to the tremendous increase in the use of communication services all over the world. This paper provides a deep insight into the major manufacturers involved in the telecommunication equipment industry. It also highlights the core policy transformations and privatization changes occurring in the global telecommunication industry which is affecting

Telecommunications and Networking in Business
Words: 1244 Length: 4 Document Type: Research Paper

An example of this is how quickly Microsoft responded to their exclusion of the Internet as a viable strategy shift. Using a global telecommunications system and their global knowledge management network, they were able to quickly devise a product roadmap and recruit developments who knew the Web development platforms better than anyone did globally. This shift in strategy saved Microsoft from facing a daunting task of playing catch-up to

Telecommunication Systems at Utpa Telecommunication
Words: 718 Length: 2 Document Type: Term Paper

The university has policy and standards, promotes awareness, risk management, business recovery planning, incident management, data security, and technical security. UTPA houses an Information Security office that continuously analyzes and assesses information security risk in critical state systems and develops appropriate safeguards and strategies to reduce loss exposure. Related practices include conducting risk analysis and assessment, assessing network and systems vulnerability, and developing and managing strategic and tactical plans. Data

Telecommunications the Term Telecommunications Refers
Words: 345 Length: 1 Document Type: Term Paper

In addition there continues to be a rapid definition of communications standards for ensuring the highest level of compatibility on each communications medium and platform. The adoption of the Open Systems Interconnect Model (OSI) is a case in point, as is the continued development of WiFI standards throughout the wireless community ((Huynh 2001). Data communications' adoption rates regarding the Internet's wireless and metropolitan Wide-Area Networks including WiFI technologies have

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now