Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

IS principles in action case: Honda uses collaboration software to speed product development

Why did Honda resort to a software package to support this critical business process rather than develop a custom application to meet its needs

Honda is the world's largest motorcycle maker and Japan's third largest automaker behind Toyota and Nissan. It also has
a power products division that manufactures lawn mowers, snow blowers, portable generators, and outboard motors. The
company's car models include the Accord, Acura, Civic, Legend, Prelude, and Insight-a gasoline-electric hybrid.

The automobile industry is intensely competitive, with manufacturers facing cut-throat global competition. They are under
pressure to reduce costs to the minimum and pass the savings along to customers. They must also reduce the time to produce
new models that appeal to customers in many parts of the world while tailoring automobiles to customer specifications. To
overcome these challenges, manufacturers are turning over an increasing portion of their design, development, production,
and customer-support activities to multiple suppliers and other business partners. Such collaborative product development is
changing the way Honda brings products to market.

The research and development activities for Honda use software called eMatrix from MatrixOne to support collaborative
product development. This Internet-based system helps document and manage the product's bill of materials (BOM)-
a list that describes all components of the finished product, such as part numbers, quantity, measurements, and labor and material costs. An accurate and complete BOM is critical to the manufacturing process-any mistake can cost the manufacturer in loss of labor and materials and valuable time-to-market. eMatrix enables Honda research and design engineers to
share design information from the early stages of product development so that the accuracy of the engineering BOM is
greatly improved. The system supports engineers as they manage and configure all the details that go into a product:
basic car design, options, features, local variations, components and larger assembled parts, specifications, supporting
documentation, costs, and engineering changes. The single, accurate view of the engineering BOM across all organizations
involved in the product ensures that most design and development issues are identified and resolved earlier in the design and manufacturing cycle. Such coordination leads to the early detection and resolution of many problems-saving
time and resources. The bottom line is higher quality, decreased costs, and the ability to bring automobiles to market
faster.

The eMatrix system is being deployed in multiple stages with the ultimate goal of linking Honda's global research and
design activities wherever they are located. The first phase of the rollout was completed in October 2001 and connected
several thousand design engineers throughout Japan, the United States, the United Kingdom, and Thailand. The software
vendor, MatrixOne, partnered with Fujitsu to deploy the eMatrix platform and integrate it with Honda's other key information
systems.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91616128
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Assessment - network analysis using wiresharkpurpose of the

Assessment - Network Analysis using Wireshark Purpose of the assessment (with ULO Mapping) This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the comple ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

Network project management assignment -purpose of the

Network Project Management Assignment - Purpose of the assessment - The purpose of this assignment is to build a clear understanding of project management fundamentals and their application, specifically: demonstrate pro ...

Assignment -need project made by packet truce follow the

Assignment - Need project made by packet Truce. Follow the given report and please don't make the project big and video will describe full project in details and with configuration. Project - Design and Implementation of ...

Sip encodingwhy does the session initiation protocol sip

SIP, ENCODING Why does the session initiation protocol SIP allow the sender and receiver to choose two different multimedia encoding schemes? Describe a scenario where it makes sense to use different protocols for sender ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assume that the number of customers who arrive at a water

Assume that the number of customers who arrive at a water ice stand follows the Poisson distribution with an average rate of 6.4 per 30 minutes. What is the probability that more than one customer will arrive during the ...

Question snmp initially appeared in 1988 but it did not

Question : SNMP initially appeared in 1988, but it did not receive widespread adoption. What have been the issues with SNMP, and have they been addressed? How widely used is SNMP now? Find some examples of tools that use ...

Fiona told her friend that she is very fortunate as the

Fiona told her friend that she is very fortunate as the slow-down in the economy has not decreased sales in her grocery store by much compared to sales of new cars in his car dealership. Explain what Fiona meant using th ...

Cybersecurity policy design issues describe cybersecurity

Cybersecurity Policy Design Issues Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication What features can be added ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As