The Original Equipment Suppliers Association (OESA) held its 19th Annual Conference this week in suburban Detroit under the theme: “The Industry’s New Landscape.” And while much of the day was devoted to autonomous vehicle developments and the potential negative impacts on the industry’s North American competitiveness that would result from substantial changes to NAFTA, the afternoon session included a robust discussion of today’s strong market in North America and the more guarded outlook for 2018 and beyond.
Pharmaceutical name clearance in the United States can be complicated. This post aims to provide insight into the regulatory safety review process and the trademark registration process for candidate drug names. This information will allow drug manufacturers to make more informed decisions during the pharmaceutical name selection process so that they can arrive at a viable name, and get to market, more quickly.
In the manufacturing industry, a company’s supply chain can be a source of both risk and value. By paying careful attention to the terms of its supply chain contracts, a company can help to mitigate its risks while at the same time maximizing the value of its supply chain. While no provision in a contract should be overlooked, the six areas discussed below generally are the most critical points to consider when it comes to drafting a supply chain agreement.
The race to self-driving cars has created new challenges and opportunities for companies, particularly automotive original equipment manufacturers that are facing competition from non-traditional sources in the technology industry.
Security incidents, loss of customer data, exposure of confidential corporate assets, demands of ransom, and similar stories are becoming daily headlines with the impacts being felt across a wide variety of industries. We hear it every day. One need not go looking in the history books for examples of significant and costly breaches of sensitive data maintained by companies and other organizations. There are a plethora of large scale and wildly divergent security incidents occurring all the time: