SESSION: 48 TIME: 3:40 PM – 4:30 PM ROOM: TBA PRESENTER: Brian Smith, Whittney Gilstrap, and Kate Mullen, e2b teknologies This session will cover a spectrum of web technologies including Microsoft SharePoint for intranets and extranets, website platform options such as WordPress and HTML, eCommerce applications that integrate to your ERP system, and other portal
SESSION: 56 TIME: 2:20 PM – 3:10 PM ROOM: TBA PRESENTER: Gwido Dlugopolsky, Magnet An overview of the Lean Methodology which is used to eliminate waste and maximize work flow. Items covered Define lean Principles of lean Value and waste Lean structure / Roles and Responsibilities House of lean (Lean tools) Lean Daily Management
SESSION: 55 TIME: 9:25 a.m. – 10:15 a.m. ROOM: TBA PRESENTER: Gwido Dlugopolsky, Magnet This is a must-attend session for manufacturing managers, executives, and IT staff responsible for implementing and maintaining policies, procedures, and applications in support of ISO compliance, 5S, Six Sigma, Kaizen,and other quality initiatives.
DIRECTOR, CUSTOMER SUPPORT SERVICES Kate holds over 10 years of experience in the information systems industry in her previous positions of Support Manager, Software Implementer and Support Analyst for e2b teknologies. Kate got her start working with the United States Army as an Administrative Specialist. There, she was responsible for all administrative support to the
An adaptable platform is needed to adjust to the versatility and volatility of today’s global marketplace. Companies grow through the adaptability of their technology and the implementation of versatile business solutions along the way. It’s these solutions that allow for swift decisions, backed by data, that give you more control to push forward or pull
When packing for a vacation, many of us rely on a checklist to make sure we have IDs, passports and other travel documents. Check. Swimwear, toiletries, and other personal effects? Check. Devices, gadgets, and accessories? Check. What about an understanding of the company cybersecurity guidelines and implementation of cybersecurity measures? More often than not, traveling