MatrixOne licenses Procter & Gamble's global manufacturing software

Product lifecycle management specialist MatrixOne has licensed an application built internally by consumer giant Procter &...

Product lifecycle management specialist MatrixOne has licensed an application built internally by consumer giant Procter & Gamble, and will resell it to the consumer packaged goods (CPG) industry.

The application, which is based on the MatrixOne eMatrix product, provides a database of the technical specifications necessary to run a CPG manufacturing business.

Proctor & Gamble's product combines work processes and an information system of technical specifications. It is designed to reduce material costs and time for product development, and improve quality. Created internally in 1997, the application was originally built to meet the demands of six business units. It now supports Procter & Gamble's global business.

The company no longer wants to support the application and sees the MatrixOne licensing agreement as an opportunity to maintain the product's development while also driving technical specification standards in consumer packaged goods and pharmaceutical industries.

Steve David, chief information officer at Procter & Gamble, said, "We do not want to be in the software business," adding that it would be too costly to continue developing upgrades for the application.

Mark O'Connell, president and chief executive of MatrixOne, said, "By building a technical specifications management application on our eMatrix technology, Procter & Gamble has furthered its tradition of excellence and created an opportunity for the entire CPG industry to realise new levels of innovation, productivity, and cost savings."



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Business applications

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...