Europe's wholesale outdoor market grew 7.2% in value last year, according to the European Outdoor Group. All product categories, except for tents, showed growth.
Walmart plans to expand the technological expertise developed at Flipkart to its global retail operations after it spends about a year integrating the Indian e-commerce company into its operations, according to Walmart's Jeremy King. Flipkart has developed apps that are able to reach consumers in small towns with spotty internet service.
Discounts are more important than ever and consumers are buying more on sale, according to NRF's latest Consumer View survey. NRF surveyed more than 3,000 US consumers to understand their shopping behavior around sales and promotions, and found that 85% have backed out of purchasing an item because it wasn't on sale -- even if they really wanted it. See more insights.
Luxury resale site The RealReal reported on what apparel had the best resale values, including handbags, certain men's apparel and luxury sneakers.
Automotive manufacturers and suppliers should begin preparing now for a global shift in vehicle electrification, according to this Deloitte analysis. The authors write that addressing pain points such as charging stations and battery technology will require major, long-term investments.
Consumption-based cost modeling based on internet of things sensor data can help manufacturing professionals make informed decisions regarding maintenance and other processes, writes Larry White. The sensors should be connected to a manufacturing operations management system and share data in real time.
The 5S lean manufacturing method -- sorting, setting an order, shining, standardizing and sustaining -- can enhance the efficiency of a sheet metal shop. Some shops refer to the method as 6S, adding safety to the mix.
Unmanaged Ethernet/IP switches aren't secure and should only be used to connect a small number of devices with limited capabilities, says Ivana Nikic of Moxa. "[M]anaged switches can come with the support of different levels of security from basic functions like user login authentication to more advanced ones like client/server-based access control and data encryption," Nikic says.