Connect with us

Supply Chain

This Week in Logistics News (July 25 – 31)

Avatar

Published

on

As my colleague Clint Reiser pointed out in last week’s news round-up, baseball is back. And while the season will look a lot different than in years past, it is back. At least until it isn’t. Unlike the NHL and NBA which chose to use bubble cities to contain the teams, baseball teams are still traveling for games. And while the league is somewhat limiting travel by only having teams play in their geographic division, this still means a lot of travel for players. And within the first week of the season, we had our first COVID-19 outbreak. The Miami Marlins have had 19 players test positive for the virus and their season is on hold. This has resulted in a number of other canceled games, with players wondering how this will all play out. Meanwhile, the other major sports league in the US, the NFL, has not chosen to operate in a bubble city either and training camps kicked off this week. This has resulted in players across the league opting out of the season due to coronavirus concerns. Obviously, we have no way of knowing how the bubble locations will work out for the NBA and NHL, but it will be interesting to see if it makes an impact on whether a season can finish. I’m not holding out much hope for baseball or football, or really sports in general this year. And now on to this week’s logistics news.

The US Postal Service has faced an uphill battle as it continues to lose money. Now, the USPS has reached an agreement in principle to receive a $10 billion loan from the US Department of the Treasury under the CARES act, which the agency projects will keep it solvent at least until May 2021. The USPS said its board of governors unanimously approved the loan agreement Tuesday, which will be finalized in the coming weeks. In an effort to retain regular shippers the agency has rolled out its first loyalty program. Under the program, business customers can earn $40 in credits for every $500 spent on Priority Mail and Priority Mail Express postage through its Click-N-Ship program. They can apply the credits to subsequent purchases of those products at checkout. Credits expire one year from the date of issuance.

Members of the local Yaqui indigenous community who are demonstrating for better land rights, have blocked railways used to move auto parts, as well as grains and steel, from Sonora to the United States. As a result, Ford’s Mexico unit has said that operations at its Hermosillo plant in the same state have been affected. Additionally, Ford said that the blockades is hitting imports and exports to and from the US. The blockade has hit both the Mexicali-California and the Nogales-Arizona border crossings, and so far has prevented the passage of 15 trains carrying about 150,000 tons of cargo, according to the Mexican railways association AMF. AMF President Jose Zozaya said the association has been in talks with the government and protesters, and that he is confident the situation will be resolved soon.

Post-Brexit trade plans for the UK and European Union have hit all sorts of snags. Now, there is another hurdle that will need to be navigated: pallets. Pallets have been the unsung hero of global trade for nearly a century, but new regulations are threatening a pallet shortage. Starting January 1, 2021, wooden pallets moving goods between the UK and EU will need to comply with ISPM-15, an international rule that requires them to be baked to 56 degrees Celsius for at least 30 minutes to prevent the spread of pests and diseases. The head of the UK’s Timber Packaging and Pallet Confederation has warned that Britain won’t have enough that comply with the rule, and that the coronavirus pandemic has impacted its efforts to plug the shortfall. This will be a serious obstacle to overcome considering that as many as 100 million pallets move between the UK and EU each year.

One result of the coronavirus pandemic has been a surge in consumer purchases of items such as baking mixes and soups. While this has been beneficial to manufacturers of these items, it has also caused a lot of stress on their supply chains. General Mills now plans to boost the number of outsourcing manufacturing partners and suppliers by as much as 20 percent from pre-pandemic levels. The company has 24 manufacturing plants in the US and generally uses third party manufacturers to produce about 30 percent of its products. General Mills’ factories are running at full capacity but are not equipped to handle the surge; the company said US meals and baking sales rose 75 percent, while cereal sales rose 26 percent. While bringing on new partners will help capacity restraints, it is not a simple process. The company has said that it takes about six to eight weeks to vet a new manufacturing partner.

The US possibly has the most COVID-19 testing capacity in the world but is falling short in getting results quickly. The main issue here is a supply chain bottleneck when it comes to testing facilities and labs getting their hands on the appropriate chemical kits and tools. There are a few companies that dominate the market and their machines run on chemical kits and disposable plastic parts that only they sell. The result is that with so many requests coming in for their equipment, they do not have the capacity to handle all the requests. US labs now run about 800,000 diagnostic tests daily, according to the COVID Tracking Project. But the United States needs 6-10 million tests per day, by various estimates.

More and more cities and countries around the world are looking at ways to reduce carbon emissions in congested city centers. Dublin is the latest to look at ways to combat air pollution and congestion. The city is piloting mini urban distribution centers and powered walkers and quad cycles to enable city center deliveries that don’t contribute to local emissions or congestion. The pilot is funded by Dublin City Council, Enterprise Ireland, and Belfast City Council. The system was developed as part of a Small Business Innovation Research (SBIR) challenge, which sought new approaches to optimizing deliveries. Through this, design and manufacturing consultancy Fernhay developed the containers, bikes, and walkers for global logistics carrier UPS to trial. The vehicles will enable workers to deliver goods such as groceries, medicine and parcels.

The coronavirus lockdown has seen a spike in online grocery shopping worldwide. In the UK, stores such as Tesco, Sainsbury’s, and Ocado have seen incredible growth. As a result, Amazon is now offering free grocery deliveries to Prime members in London and the surrounding area to compete with traditional grocers. Amazon Fresh, the company’s grocery delivery service, will offer same-day delivery in most areas on orders over £40 ($51.51) placed before 9 p.m. The minimum order value has also been lowered to £15 ($19.32). Prime members in Greater London and parts of the southeast of England can get free delivery in two-hour windows on all orders over £40 ($51.51), or pay £3.99 ($5) for delivery in a one-hour slot.

Online grocer FreshDirect is making a move from its traditional next-day delivery model to launch same-day delivery. The company is partnering with technology firm Fabric to open a micro-fulfillment center at one of the grocer’s Washington, D.C.-area distribution facilities later this year. FreshDirect relaunched same-day delivery in New York City last month, rebranding it as FreshDirect Express. The Washington, D.C. on-demand service will be the first time the grocer will be using a micro-fulfillment center.

That’s all for this week. Enjoy the weekend and the song of the week, Paul Simon’s The Boy in the Bubble.

Source: https://logisticsviewpoints.com/2020/07/31/logistics-news-july-25-31/

Blockchain

US Cybersecurity Agency Recommends Integration of Blockchain in Supply Chain

Supply Chain Blockchain Machine Boxes Factory Brown Blue

Supply Chain Blockchain Machine Boxes Factory Brown BlueThe United States Cybersecurity and Infrastructure Security Agency (CISA), in a report dubbed “Building A More Resilient ICT Supply Chain: Lessons Learned During the COVID-19 Pandemic,” published on Nov 6, said the blockchain technology can help in resolving supply chain problems in light of the coronavirus pandemic. Assessing the Impact of Coronavirus in Supply Chain and How

Read MoreRead More. The post by Dalmas Ngetich appeared first on BTCManager, Bitcoin, Blockchain & Cryptocurrency News

Avatar

Published

on

The United States Cybersecurity and Infrastructure Security Agency (CISA), in a report dubbed “Building A More Resilient ICT Supply Chain: Lessons Learned During the COVID-19 Pandemic,” published on Nov 6, said the blockchain technology can help in resolving supply chain problems in light of the coronavirus pandemic.

Assessing the Impact of Coronavirus in Supply Chain and How Blockchain Comes in Handy

In the report, the agency’s goal was to assess the supply chain’s impact from the coronavirus pandemic — a highly contagious viral disease that is still claiming lives in the United States and around the globe.

As the world was attacked by the healthcare crisis, transportation was severely affected as borders were closed as governments jumped in to prevent exponential spread.

CISA calls on ICT companies to engage in scenario planning for different types of events and map out alternatives for a speedy restoration of normalcy, especially in the supply chain. 

In their view, blockchain–a solution that provides real-time visibility in the supply chain, can come in handy. It could further help address transportation and logistical bottlenecks. Notably, companies that had robust contingency plans fared better in delivering their products and services to the market:

“To reduce the impacts of transportation and logistics issues, ICT companies can engage in scenario planning for different types of events and map out the alternatives that can allow for the supply chain to be restored as efficiently as possible. To further assist in these efforts, companies can utilize technology platforms that provide real-time, blockchain visibility into available logistics capacity.”

Supply Chain After the COVID-19 Pandemic

Increasingly, companies and agencies seem to be preparing for post-pandemic businesses where the virus and advisories from the government will shape the way business is done.

Some of the measures introduced will be for continuity. In preparation, one way of doing that is to identify possible weak points and introduce robust solutions that can absorb shocks should they arise.

Blockchain technology is garnering support from entities and individuals for its characteristics. Its decentralization, transparency, and security are particularly useful in the supply chain where opaque operations cost the industry millions of dollars every year.

BTCManager, in August, reported on Honeywell integration of blockchain to weed out counterfeit products and improve transparency in the supply chain. 

Like BTCMANAGER? Send us a tip!
Our Bitcoin Address: 3AbQrAyRsdM5NX5BQh8qWYePEpGjCYLCy4

Source: https://btcmanager.com/us-cybersecurity-agency-blockchain-supply-chain/

Continue Reading

Start Ups

Logistics Company XpressBees Raises $110 Million From Investcorp And Others

Avatar

Published

on

  • XpressBees raises $110 million from private equity funds Investcorp, Gaja Capital, and Northwest Venture Partners.
  • The company will use the funds to expand in Express Cargo, 3PL, and Cross Border Logistics.

Pune-based e-commerce logistics service provider XpressBees raises $110 million (or about Rs 800 crore) in its Series E funding round led by private equity funds, including Investcorp, Gaja Capital, and US-based growth equity investment firm Northwest Venture Partners.

The company will utilize the funds in further automating its hubs and sort centers, improving technological infrastructure, and to expand its delivery footprint in the entire country.

According to the media reports, The company is in the process of foraying into Express Cargo, 3PL (third-party logistics), and cross border logistics.

With this investment, the three PE investors have acquired a collective stake of 31% in the company.

In September 2015, The company first raised $5 million in Seed funding from various investors including Chiratae Ventures, Vertex Ventures, and others.

In January 2018, XpressBees had raised $100 million from the Alibaba Group as part of its corporate funding round.

Following, In January 2020, it raised $10 million in its Series D funding round from existing investor Alibaba Group.

Other top investors, including InnoVen Capital, Elevation Capital, New Enterprise Associates, have also invested in the company.

While Alibaba Group is the most active investor in XpressBees. Till date, it has invested more than Rs 1,000 crore (or about $134 million) in the company.

Since its inception, The company has raised more than $275 million in a total of eight funding rounds, mostly participated by Alibaba, Chiratae Ventures, and InnoVen Capital.

Also Read: Food Aggregator Swiggy Introduces ESOP Liquidity Program To Reward Its Employees

“Investcorp strongly believes in the digital transformation of the Indian consumer and the enterprises,” said Varun Laul of Investcorp.

“We are delighted to partner with Xpressbees in their mission to build India’s premier E-commerce logistics business,” said Gopal Jain, Managing Partner, Gaja Capital.

According to the reports, Ecom Express is also in advanced talks with Bahrain-based Investcorp to raise $40 million in funding.

About XpressBees – XpressBees is a Pune-based end-to-end supply chain solutions provider founded in 2015 by Amitava Saha and Supam Maheshwari, who also founded baby products shopping platform Firstcry.

XpressBees is considered one of India’s fastest growing express logistics service providers, competes with Delhivery, Ecom Express, Shadowfax, among several others.

Follow IndianStartupNews on FacebookInstagramTwitter for the latest updates from the startup ecosystem.

Source: https://indianstartupnews.com/news/logistics-company-xpressbees-raises-110-million-from-investcorp-and-others/?utm_source=rss&utm_medium=rss&utm_campaign=logistics-company-xpressbees-raises-110-million-from-investcorp-and-others

Continue Reading

Supply Chain

Tips for Keeping Your Business Inventory Organized

Avatar

Published

on

No matter the business, inventory is a key component. Organization and tracking ability are crucial. If these aren’t present, it can cause a multitude of issues for your business. Follow these tips for keeping your business inventory organized. These tips will provide you with a few reminders to keep your inventory efficiently and successfully organized.

Only Have What You Need

When you don’t have enough of a product, or you have an extra surplus of a product, issues can occur. Obviously, if you don’t have enough of a product then you run into the issue of not being able to sell it to your customers, which ultimately gives you incorrect data to anticipate how much of the product you are going to need. In addition, having an extra surplus of the product will not only not allow for you to correctly track and organize the data, but it could also cause issues with the physical stocking and storage element of your product.

Make Sure You Pay Attention to Dates

Dates are extremely important, especially when viewing the overall organization of your inventory. You obviously want to make sure you properly date everything and that you are following the correct protocol when it comes to dates. To do this easily, make sure you have the proper equipment to date your items, as well as paying close attention to the dates and requirements that need to be followed.

Use Data Software

Having software to track your data will help your business keep your inventory beyond organized. Not only will it help you track numbers such as sales and returns, but it will help you get other important data necessary to organize and track your products’ success. Knowing these numbers will help you keep your business inventory organized.

Making sure you always have the proper number of products in inventory, understanding how important you dating and coding is on your products, and using data software are three recommendations and tips for keeping your business inventory organized. Following these tips will only ensure success for anything and everything inventory for your business!

 

Source: Christina Duron is a freelance writer for multiple online publications where she can showcase her affinity for all things digital. She has focused her career around digital marketing and writes to explore topics that spark her interest.

 

Continue Reading

Blockchain

New And Innovative Supply Chain Threats Emerging

Avatar

Published

on

The electronics supply chain is seeing evidence of increased sophistication in the counterfeiting of complex ICs and simple passives, both of which can impact the functioning and safety of the systems that use them.

New technologies are being developed to build trust by helping to identify counterfeit devices before assembly and during failure analysis. It’s too early to tell how effective those measures will be, but individual component identification is becoming an important tool in that effort.

“Trust requires looking at the whole value chain, from design through manufacturing, and carefully monitoring every step,” said Tom Katsioulas, head of trust-chain business at Mentor, a Siemens Business. “Security is about the digital assets. Trust is about the physical assets. And identity connects the two.”

Questions about authenticity can occur at a supplier, with contractors to a supplier, or during the movement of components between contractors and to the customer. The types of anti-counterfeiting options to be used depend both on the value of the component and the consequences of fake components. But they all focus on the ability to uniquely identify a component so it can be tracked through final system assembly.

Counterfeiting can occur anywhere there’s a reliable revenue stream. “There’s $70 billion a year in printer consumables sold into the world,” said Scott Best, technical director of anti-counterfeiting products at Rambus. “This is a remarkable opportunity for counterfeiters. It is a $10 million effort to take apart somebody else’s security chip, completely reverse engineer it (the reverse engineering is completely legal), and print a functional clone. That’s 50 people for a couple of years. But if you can do it, there’s a guaranteed $100 million annual product stream from that chip.”

In addition to lost revenues and profits, safety is driving much of the concern today. “What I’ve seen now are other, more important markets, looking for anti-counterfeiting solutions because of safety issues,” added Best.

This changes the stakes of counterfeiting. “If this is a Gucci bag, you [as a customer] might have lost if you paid for a real one and got a fake one,” said Ophir Gaathon, CEO of Dust Identity. “Clearly, an airbag has a completely different implication.”

Fig. 1: An illustration of the many aspects of the supply chain for an electronic device. Source: Keyfactor

Anti-counterfeiting measures have similarities with traceability, especially when it comes to developing unique component IDs. While such IDs solve two different problems, they go much further with anti-counterfeiting. Critically, wherever economically feasible, counterfeiting protections can be used in a forward-looking manner — as a system is being assembled. They also help in retrospect if a failure ends up being caused by a counterfeit component.

“One of the big problems is being able to identify a part, and there have been different tag technologies that have surfaced over the years to address that,” said John Hallman, product manager for trust and security at OneSpin Solutions. “If you go back 10 years ago, there were attempts to attach DNA tags. They’ve made some progress. Now there are all sorts of electronic IDs, where you have an identifier that is random in silicon, and authorization technologies. We’re looking at verification data as a unique identifier, where you take verification data and attach that to the IP using blockchain technology.”

In effect, that data becomes unique down to the individual bit. “That data can then stay with the device, and if someone modifies it, you can see that,” Hallman said. “This approach turns the problem of trying to look at a piece of IP or chip and assess it into one of how to build this into a device so it can travel along with that IP. The data stays encrypted and is connected in an external database.”

Zero trust
Trust traditionally has been established at the organization level by vetting. But just having an approved vendor is no longer good enough. “The problem with ‘trust, but verify’ is that you’re assuming trust at the outset,” said Steve Carlson, director, aerospace and defense solutions at Cadence.. “And if you do some verification one time, then you say, ‘Okay, now they’re trustworthy,’ then they have free rein within the system.”

The newer approach is to assume that, at any given time, no entity can be trusted without proof, no matter how many times that proof has been given in the past. It’s called “zero trust,” and it treats every interaction as if it was the first. “It was a false notion that because the manufacturing was onshore, you could trust that supplier because it was done through ‘guns, guards and gates,’” Carlson noted.

But humans in the process can reduce the level of trust. “When we’re talking about zero trust and zero touch, where we don’t want to include advanced human intervention in the various stages, automation is key,” said Ellen Boehm, senior director of IoT product management at Keyfactor.

Trusting devices
The notion of “trust” is an overarching concept that covers many specific elements. One of them has to do with whether or not one trusts the components going into a system as being authentic or counterfeit. Assigning each such component a unique identifier – “serialization” — is one step toward being able to authenticate components.

But serialization can be a challenge. “The biggest problems with serialization are the commitment to specific serial numbers, having all participants in the ecosystem commit to the same serial numbers, and having a system that will be able to recall the serial numbers,” said Gaathon. This creates a need for more sophisticated approaches.

An electronic system — whether a satellite, automobile, or high-availability computer — can have an extremely sophisticated supply chain. Chips and passives are assembled onto boards, boards are assembled into modules, and modules come together into a finished system.

“There’s a difference between identity and identifiers,” noted Katsioulas. “I may have identifiers for multiple purposes. For a single device, between design, manufacturing, and assembly, before I ship the chips out to the wilderness, I can have three or four or five identifiers. I create a unified identity that consists of those identifiers.”

It’s also important to consider that, while there is always a risk of a rogue operator within an organization, much of the vulnerability comes when components or sub-assemblies are transferred between different participants in the supply chain — or even between different plants belonging to a single supplier.

Identifying ICs
The focus of most ID efforts has been on silicon chips, for a couple of reasons. The most obvious is the fact that these tend to be the high-value components that supply much of the differentiation in a system. The second reason is the fact that they’re amenable to having an electronic ID that can be interrogated and read, either while the chip is isolated or while it’s in a system.

There are several approaches to creating a unique chip ID. They overlap, so conceptually they could be used in a complementary fashion.  The chip ID that has received the most attention is an electronically addressable ID. Used for traceability, it could be created during manufacturing using a number of different techniques. But counterfeiting places more constraints on the ways such an ID can be established. “[With] an injected ID, you create some secret number on a server,” said Dave Huntley, business development at PDF Solutions and co-chair of three SEMI committees/task forces. “Then you have the problem of who’s controlling the server.”

The gold standard is an ID that originates in the chip itself, which is an internal hardware root of trust (HRoT). “The alternative is based on physical properties of the actual device,” said Huntley. “And when it powers up, it creates its own unique identity at that moment.”

There are different ways of implementing this, but the one that receives the most mentions is the physically unclonable function (PUF). A PUF leverages some random source of high entropy,  like the random power-up state of an SRAM array, to establish an identity. Because the ID is intrinsic to the device, it is immutable. That is an important characteristic of any component ID.

With such a device, the first time it powers up, it “enrolls” its ID. From that point forward, it can identify or “authenticate” itself during manufacturing and even after deployment. Systems can verify all of their chips on each power-up to ensure that nothing has been tampered with

HRoTs serve several purposes, including acting as a seed for public and private keys. For the purposes of those applications, it’s essential — and fundamental — that the actual value returned by the HRoT be confidential in order to protect those keys. It should never leave the device. But a component ID, by definition, must be able to leave the device. So the component ID can also be derived from the HRoT, just like the keys. The HRoT value remains hidden, while the derived ID can be made visible.

For chips that don’t implement a HRoT, it’s still possible to inject an ID. This must be done within a trusted environment to ensure that the equipment loading the ID into the chip and storage of the ID cannot be hacked or gamed.

There are other complementary approaches to proving the integrity of an IC. One technique assures that a given IC has been built using approved masks rather than an altered mask set. “Cadence has technology that essentially imprints some ‘DNA’ into the mask set to be able to detect whether or not the masks were altered,” said Carlson.

This approach is useful only during processing, however, because successive layers of masks will cover the underlying “DNA” traces. Once the device is complete, this approach is no longer useful for validating the chip. “The pattern is put into the mask during the steps that include multi-patterning for mask generation. The choice of layers and locations is a part of the decision process based on mid-manufacturing access to sample wafers,” noted Carlson.

There are also visual cues that can be used to identify an ID. “Multibeam [e-beam] is making it possible to write identifiers on a device in silicon — not electrically, but visually — so you have to get an electron microscope to look at it,” said Huntley. This has the benefit of being created outside the electronic testing flow, and so it can’t be gamed in the same manner as an electronic ID. But electronic and visual IDs are still likely to be used together. “Once that chip is on the circuit board and it’s in a product, you can no longer see it,” said Michael Ford, senior director of emerging industry strategy at Aegis Software and chair of three committees for the IPC standards body. “So visual IDs do not work.”

Passive components
Passives, such as resistors and capacitors, are often considered to be low-value components that don’t merit the attention lavished on ICs. But there are significant efforts to counterfeit them, as well. “I went to this MTA counterfeit summit, and I was blown away by people talking about fake resistors and counterfeit capacitors and the impact it has in the supply chain,” said Katsioulas.

He’s not alone. “The greatest increase in counterfeiting has been in ceramic condensers,” said Ford. “It’s because there was a shortage in the market. [The counterfeits] looked like capacitors and they behaved like capacitors. The only difference was the dielectric was of a lower quality than normal.”

This can have real-world impacts. “There was a specific case where an Air-Force jet went up, and the ‘Friend or Foe’ circuit failed,” continued Ford. “They thought one of the big PGAs had been counterfeited. But it was the ceramic condenser, because the signal goes through the passive component to get to the PGA.”

Many such passives arrive mounted on reels. As a result, they’re naturally serialized, and it’s theoretically possible to do individual incoming inspection. “If you have a box full of reels, you might choose to have something that, you know, verifies the box first, opens the box, opens the reels, put the reels on a [spool], and reads all the package IDs in the background before it gets put into production,” said Huntley.

But today, identifying individual passives is likely too cumbersome. Instead, the reel gets a batch ID, and any passive is noted to have come from that reel. “Verifying every single capacitor is probably not worth it,” Huntley observed.

Alric Althoff, senior hardware security engineer at Tortuga Logic, agreed. “It’s going to be hard to do this beyond batches,” he said. While a system might not be traceable back to a specific passive device, it would be traceable to the batch from which the device came.

That’s not necessarily fail-safe, because there are some sophisticated efforts afoot to get counterfeits past incoming quality checks. “There was one case we saw where there was a reel of SMT components, and the first 100 were genuine,” said Ford. “And then every seventh one was a counterfeit. So this has been a reel which has been taken by somebody, all the parts taken off, and then the parts put back on again, specifically designed to defeat any incoming inspection regime. If somebody were to find an unexpectedly high quality problem, it’s so random that they can’t find a path to the responsible party.”

Meanwhile, not all assembly is automated. “For manual assembly, it’s a little trickier, because they have bins of components that are just filled up from time to time,” said Ford. “So you have to have procedures to make sure that you never mix the different batches or lots of components within a bin.

One challenge with batches is that batch size doesn’t always match assembly demands. “Let’s say you need to make 100 products, and on those hundred products you use two of a certain component,” Ford said. “So you’re going to use 200 parts. But the parts come on a reel of 1,000. So ERP thinks you’re going to use the 200 parts, and it allocates those. The other 800 have to be there just because they’re physically connected.

“Meanwhile, on a different production line, a guy runs out of materials because there’s some issue. He doesn’t care about anything other than getting his line running, because that’s what he’s judged on.” So some of the 800 parts get used there, without proper tracking. “This is happening all the time in every manufacturing company unless they have transitioned to lean material management,” he added.

Once components are identified, either individually or in batches, they’ll be assembled onto boards and into subsystems. Those units also will need identification.

— Ed Sperling contributed to this report.

Source: https://semiengineering.com/new-and-innovative-supply-chain-threats-emerging/

Continue Reading
Cleantech2 hours ago

Four Corners EV Charging: Utah & Colorado Are Leaving NM & Arizona Behind

Cleantech2 hours ago

Aptera Announces First “Never Charge” Electric Vehicle

Cleantech2 hours ago

Gayam Motor Works & Sokowatch Launch East Africa’s First Commercial Electric Tuk-Tuks

Cleantech3 hours ago

The German Constitution May Protect A Right To Human Driving

Cleantech4 hours ago

2021 Toyota RAV4 Prime Fails Moose Avoidance Test

SaaS5 hours ago

Top 10 SaaStr Videos of the Week: MongoDB, Splash, Slack + Yammer, Gainsight and More!

Cleantech5 hours ago

Supercell Technology From Cadenza Is Centerpiece Of New York Energy Storage Project — CleanTechnica Exclusive (Video)

SaaS5 hours ago

How to Create PPC Campaigns for Real Estate Marketing

Cleantech5 hours ago

Cleantech ETFs Vastly Outperform Dow Jones, Oil & Gas In 2020

Cleantech6 hours ago

ICE Racing Can Still Teach Us Things

Cleantech6 hours ago

California’s Low Carbon Fuel Standard Accelerating Transportation Electrification

SaaS7 hours ago

7 Warning Signs You Have Product Flop on Your Hands (and How to Fix It!)

Ecommerce7 hours ago

Amazon Marketing Consulting

Globe NewsWire7 hours ago

McPhy Energy : Déclaration du nombre total des droits de vote et du nombre d’actions au 30 novembre 2020

Cleantech7 hours ago

Breaking News! Oakland & Seattle Ban Natural Gas as Cities Continue to Lead on Electrification

SaaS8 hours ago

Did You Ship At Least 3 Game-Changing Features This Year?

SaaS9 hours ago

When Should You Use Microsites

Globe NewsWire10 hours ago

Dassault Aviation : Roll-out du Falcon 6X

Globe NewsWire10 hours ago

Dassault Aviation: Falcon 6X rollout

Energy11 hours ago

Crescent Point Announces 2021 Budget

Energy12 hours ago

PHNIX dévoile une nouvelle pompe à chaleur pour le chauffage, le refroidissement et l’eau chaude des habitations, destinée au marché européen

Energy12 hours ago

PHNIX stellt neue Wärmepumpe für Hausheizung, Kühlung und Warmwasser für den europäischen Zielmarkt vor

Esports12 hours ago

NiP announce “Path of a Ninja” talent program

Energy12 hours ago

Wilbur-Ellis Agribusiness Acquires Probe Schedule

Energy12 hours ago

High Purity Alumina Market Estimated to Expand at a CAGR of 12.5% over the Forecast Period of 2020 to 2030 – Persistence Market Research

Energy15 hours ago

Gunvor inaugura una nueva línea de crédito de 540 millones de dólares dedicada al biodiésel

Energy15 hours ago

Gunvor Launches New US $540 Million Biodiesel Borrowing Base

Techcrunch16 hours ago

China’s internet regulator takes aim at forced data collection

Blockchain16 hours ago

Amazing Blocks joins startup and innovation hub TechQuartier

Blockchain17 hours ago

Amazing Blocks attended the European Blockchain Convention

Trending