Review Related Literature

Only available on StudyMode
  • Topic: Bread, Bakery, Personally identifiable information
  • Pages : 2 (594 words )
  • Download(s) : 2677
  • Published : December 1, 2012
Open Document
Text Preview


This review of related literature focuses on how to process used to automate a sales order fulfillment process. Such a system contains a list of order to be filled, and then prompts workers to pick the necessary items, and provides them with packaging and shipping. The said business needs an inventory system to help them to record the tracking of the business flow and help them to make it easier for them to monitor items. This inventory system involved the progresses of the daily process of buying and selling of their products.

* Julie’s Bakeshop System
Since 1999, Julie’s Franchise Corporation has garnered a string of Franchise Excellence Awards for consistently high achievements of growth and development in all aspects of franchise operations that uphold the stringent standards of the Julie’s Bakeshop System: Quality; Customer Service; Cleanliness; Sanitation; Maintenance; and Reliable Management. They Transacting Business and Visitors who register to transact business on the site and make use of the various services offered by Julie’s bakeshop. They use Personally Identifiable Information to customize the Site, to make appropriate service offerings, and to fulfill buying and selling requests on the Site. We may email Visitors and Authorized Customers about research or purchase and selling opportunities on the Site or information related to the subject matter of the Site. We may also use Personally Identifiable Information to contact Visitors and Authorized Customers in response to specific inquiries, or to provide requested information.  * Goldilocks System

Goldilocks was opened in 1966 as a family business and started as a simple one-door apartment in a two-story structure at 2300 Pasong Tamo Street in Makati. It first opened its US branch in 1976, at Artesia, California. Goldilocks uses login information, including, but not limited to, IP addresses, ISPs, and...
tracking img