The document describes the current key distribution process at the WSU Engineering Business Office. Kathryn spends too much time on the process. The goals are to understand the root causes and make Kathryn's work more efficient. Currently, it takes 15 minutes of labor per key distributed and the average lead time is 28.5 minutes. Record keeping in various formats like forms, spreadsheets, and software takes up significant time. The future state map aims to streamline the process by eliminating duplicate entry steps, checking software for tag and key availability upfront, and reducing lead time and labor time per key.
The document summarizes a value stream mapping project for a pilot plant producing a new product. The pilot plant runs trials of compounds developed in R&D to test commercial production feasibility. It aims to deliver 50kg of the product per month to customers in 3kg batches on a weekly schedule. The value stream mapping shows that raw materials currently sit in the warehouse for 10 days before processing, and intermediate and finished products also accumulate inventory before pulling by customers. Areas for improvement include reducing inventory times, increasing uptime of key processes like reaction and distillation, and decreasing changeover times across processes.
Music City Agile 2019 - Measuring Flow: Metrics that MatterJulie Wyman
The document discusses different metrics that can be used to measure workflow and flow, including throughput, lead time, cycle time, and cumulative flow diagrams. Throughput measures the number of work items completed over time and can be used for predictability. Lead and cycle times measure how long work items take to move through different stages. Cumulative flow diagrams visualize the number of work items in each stage over time to identify bottlenecks and work-in-progress. Improving flow through metrics can deliver work earlier, increase feedback, and smooth workloads.
The document discusses using Lean Six Sigma to improve key performance indicators for supply chain management. The project aims to increase on-time shipments from 55% to 92%, inventory turnover from 7 to 16, inventory accuracy from 78% to 95%, and reduce operational hours per unit from 11.4 to 4 hours. Current performance is analyzed and causes of delays are identified. Various Lean Six Sigma tools are used to address issues, including 5S, value stream mapping, and cause-and-effect diagrams. Implementation of the project leads to reduced costs, improved productivity, higher inventory turns, and better customer satisfaction.
Value Stream Mapping: What to Do Before You Dive InTKMG, Inc.
Recorded webinar: http://slidesha.re/1juuPs4
To subscribe: http://ksmartin.com/subscribe
To purchase the book: http://bit.ly/VSMbk
Value Stream Mapping is a powerful way to improve performance across a large portion of an enterprise. But, before you dive into mapping, there are significant steps you must take to assure a successful outcome. In this webinar, award-winning author, Karen Martin shares the proper preparation an organization must take to reap the full set of benefits Value Stream Mapping offers.
Topics include:
Leadership – what is their role?
Scoping – how "big” should you go?
Team formation – who are the right people to include?
Facilitator selection – what traits and skills are needed?
Charter development and socialization – it’s far more than a planning tool!
Logistics & communication – how do you make sure everyone is engaged and prepared?
Watch this webinar for a no-nonsense discussion about the key success factors and common failings in preparing to value stream map.
I gave this presentation at Lean Kanban Asia-Pacific conference in Bangalore, India on December 11th, 2014 and at AgileDC on Washington, USA on October 21st, 2014.
I have several recent blog posts on this topic, This search link should get most of them: http://connected-knowledge.com/?s=lead+time. If you need one "best" post, here it is, Inside a Lead Time Distribution: http://connected-knowledge.com/2014/09/07/inside-lead-time-distribution/
The document describes Abbott Informatics' STARLIMS Electronic Lab Notebook (ELN) product. The ELN provides a centralized electronic solution for capturing and storing lab data, replacing inefficient paper notebooks and files stored on shared drives. It allows for flexible data entry like Excel, along with search and sharing capabilities. The ELN ensures compliance through features like on-screen method execution instructions and full traceability. It aims to make labs more efficient, compliant, flexible and reduce errors through automated data handling and validation checks. The ELN integrates with STARLIMS and other systems to streamline workflows.
The document summarizes a value stream mapping project for a pilot plant producing a new product. The pilot plant runs trials of compounds developed in R&D to test commercial production feasibility. It aims to deliver 50kg of the product per month to customers in 3kg batches on a weekly schedule. The value stream mapping shows that raw materials currently sit in the warehouse for 10 days before processing, and intermediate and finished products also accumulate inventory before pulling by customers. Areas for improvement include reducing inventory times, increasing uptime of key processes like reaction and distillation, and decreasing changeover times across processes.
Music City Agile 2019 - Measuring Flow: Metrics that MatterJulie Wyman
The document discusses different metrics that can be used to measure workflow and flow, including throughput, lead time, cycle time, and cumulative flow diagrams. Throughput measures the number of work items completed over time and can be used for predictability. Lead and cycle times measure how long work items take to move through different stages. Cumulative flow diagrams visualize the number of work items in each stage over time to identify bottlenecks and work-in-progress. Improving flow through metrics can deliver work earlier, increase feedback, and smooth workloads.
The document discusses using Lean Six Sigma to improve key performance indicators for supply chain management. The project aims to increase on-time shipments from 55% to 92%, inventory turnover from 7 to 16, inventory accuracy from 78% to 95%, and reduce operational hours per unit from 11.4 to 4 hours. Current performance is analyzed and causes of delays are identified. Various Lean Six Sigma tools are used to address issues, including 5S, value stream mapping, and cause-and-effect diagrams. Implementation of the project leads to reduced costs, improved productivity, higher inventory turns, and better customer satisfaction.
Value Stream Mapping: What to Do Before You Dive InTKMG, Inc.
Recorded webinar: http://slidesha.re/1juuPs4
To subscribe: http://ksmartin.com/subscribe
To purchase the book: http://bit.ly/VSMbk
Value Stream Mapping is a powerful way to improve performance across a large portion of an enterprise. But, before you dive into mapping, there are significant steps you must take to assure a successful outcome. In this webinar, award-winning author, Karen Martin shares the proper preparation an organization must take to reap the full set of benefits Value Stream Mapping offers.
Topics include:
Leadership – what is their role?
Scoping – how "big” should you go?
Team formation – who are the right people to include?
Facilitator selection – what traits and skills are needed?
Charter development and socialization – it’s far more than a planning tool!
Logistics & communication – how do you make sure everyone is engaged and prepared?
Watch this webinar for a no-nonsense discussion about the key success factors and common failings in preparing to value stream map.
I gave this presentation at Lean Kanban Asia-Pacific conference in Bangalore, India on December 11th, 2014 and at AgileDC on Washington, USA on October 21st, 2014.
I have several recent blog posts on this topic, This search link should get most of them: http://connected-knowledge.com/?s=lead+time. If you need one "best" post, here it is, Inside a Lead Time Distribution: http://connected-knowledge.com/2014/09/07/inside-lead-time-distribution/
The document describes Abbott Informatics' STARLIMS Electronic Lab Notebook (ELN) product. The ELN provides a centralized electronic solution for capturing and storing lab data, replacing inefficient paper notebooks and files stored on shared drives. It allows for flexible data entry like Excel, along with search and sharing capabilities. The ELN ensures compliance through features like on-screen method execution instructions and full traceability. It aims to make labs more efficient, compliant, flexible and reduce errors through automated data handling and validation checks. The ELN integrates with STARLIMS and other systems to streamline workflows.
My desire to devise exceptional solutions to stimulating challenges and proficiently create products exceeding customers’ expectations is why I love what I do and why I excel at it. My commitment to deliver success provides value and advantages to those who depend on me.
Size and function are attributes that provide information about objects. Size describes an object's physical dimensions and helps build associations, like knowing a skyscraper is larger than a house. Function describes what an object is used for, such as a pencil for writing, and also helps form associations between related objects. Attributes can be qualities like size, color, or parts that provide additional details about an object.
Dean Ryan decided to leave his role as director of rugby of Worcester Warriors. The chief executive, Jim O'Toole, said Ryan was no longer interested in being a day-to-day director of a Premiership club and made it clear at a board meeting that he wanted to be released from his contract. While reluctant to see him go, the board eventually agreed his departure was best for the long-term stability of the club. Ryan then left Warriors, but O'Toole stated he would not be joining another Premiership club.
The test consists of 20 physics problems across 6 subject areas to be completed in 100 minutes. The problems cover Classical Mechanics, Electrodynamics, Quantum Mechanics, Solid-State Physics, Mathematical Methods of Physics, and Thermal and Statistical Mechanics. Sample problems include determining the displacement required to launch a mass to a given speed using a spring, calculating the net magnetic field from two current-carrying wires, and finding the most likely distance of an electron from the nucleus in a hydrogen atom.
El documento habla sobre los adultos mayores y las problemáticas que enfrentan. En la sociedad no existe preparación para el envejecimiento y las familias y sociedad deben educarse sobre este proceso. Los adultos mayores experimentan cambios internos y externos y atraviesan necesidades que no son atendidas a pesar de que viven con familiares. Se necesitan nuevos programas y proyectos para brindar una mejor atención integral a los adultos mayores y sensibilizar a la comunidad sobre este tema.
es un grupo de individuos que tienen ciertos elementos en común, tales como el idioma, costumbres, valores, tareas, visión del mundo, edad, ubicación geográfica (un barrio, por ejemplo), estatus social o roles. Por lo general, en una comunidad se crea una identidad común, mediante la diferenciación de otros grupos o comunidades (generalmente por signos o acciones), que es compartida y elaborada entre sus integrantes y socializada. Generalmente, una comunidad se une bajo la necesidad o mejora de un objetivo en común, como puede ser el bien común; si bien esto no es algo necesario, basta una identidad común para conformar una comunidad sin la necesidad de un objetivo específico. También se llama comunidad a un conjunto de animales (o de cualquier otro tipo de vida) que comparten ciertos elementos.
Terras Alphaville Resende é um empreendimento com localização privilegiada e combinação perfeita entre loteamento residencial, centro de excelência para empresas e áreas verdes.
Envolto por belas paisagens naturais, o empreendimento será implantado em uma área situada na Av. Augusto de Carvalho, a menos de 5 minutos do centro e próximo à Rua Tenente Coronel Adalberto Mendes, a qual oferece grande variedade de comércio e serviços.
Entre em nosso site para mais informações : www.alphavilleresende.com.br
This document discusses message authentication codes (MACs). It explains that MACs use a shared symmetric key to authenticate messages, ensuring integrity and validating the sender. The document outlines the MAC generation and verification process, and notes that MACs provide authentication but not encryption. It then describes HMAC specifically, which applies a cryptographic hash function to the message and key to generate the MAC. The key steps of the HMAC process are detailed.
Este documento describe los conceptos clave del desarrollo sustentable, incluyendo sus áreas ambiental, económica y social. Explica que el desarrollo sustentable busca satisfacer las necesidades actuales sin comprometer los recursos de las futuras generaciones. También destaca la importancia de crear conciencia en la sociedad sobre el cuidado del medio ambiente y la necesidad de que haya un equilibrio entre la economía, la sociedad y el medio ambiente para lograr un desarrollo verdaderamente sustentable.
Symmetric encryption uses the same key to encrypt and decrypt data, providing confidentiality. Keys must be distributed securely between parties. Common approaches involve using a key distribution center (KDC) that shares secret keys with parties and can provide temporary session keys. Link encryption protects data as it travels over each network link, while end-to-end encryption protects data for its entire journey but leaves some header data unencrypted. Key distribution, storage, renewal and replacement are important aspects of maintaining security when using symmetric encryption.
5. message authentication and hash functionChirag Patel
1) Message authentication can be achieved through message encryption, message authentication codes (MACs), or hash functions.
2) MACs provide authentication by appending a fixed-size block that depends on the message and a secret key. Receivers can verify messages by recomputing the MAC.
3) Hash functions map variable-length data to fixed-length outputs and are easy to compute but infeasible to reverse or find collisions. Common hash functions include MD5 and SHA-512.
This document discusses message authentication techniques including message encryption, message authentication codes (MACs), and hash functions. It describes how each technique can be used to authenticate messages and protect against various security threats. It also covers how symmetric and asymmetric encryption can provide authentication when used with MACs or digital signatures. Specific MAC and hash functions are examined like HMAC, SHA-1, and SHA-2. X.509 is introduced as a standard for digital certificates.
This document discusses hash functions and their analysis for a network security seminar. It begins by defining a hash function as a mathematical function that converts a large amount of data into a small string of integers. Common applications of hash functions include hash tables for quickly searching data, eliminating data redundancy, caches, bloom filters, and pattern matching. Cryptographic hash functions have properties like preimage and second preimage resistance as well as collision resistance. Popular cryptographic hash functions discussed include MD2, MD4, MD5, SHA-1, and SHA-2, along with their advantages, limitations, and examples of attacks.
This document discusses key concepts in microeconomics related to firm costs, revenues, and market structures. It defines different types of costs such as fixed, variable, and average costs. It also explains the concepts of total revenue, average revenue, and marginal revenue. Different market structures are introduced such as monopoly, oligopoly, and perfect competition. Barriers to entry and factors that differentiate products like branding are also covered. Key relationships like isoquants, isocost lines, and how firms minimize costs are summarized.
Mba 505 business_processes_operations_productivity_strategy_tutorial1sChainon
The document discusses process design and mapping. It outlines the steps of process design which include process mapping, identifying activities, grouping activities, conceptualizing flow, and identifying inputs/outputs. Process mapping protocols are also discussed, such as using shapes to represent activities and flows. An example process map of a sandwich making process is shown to illustrate inputs, outputs, decision points, and more. Key performance metrics like throughput time and cycle time are also defined.
My desire to devise exceptional solutions to stimulating challenges and proficiently create products exceeding customers’ expectations is why I love what I do and why I excel at it. My commitment to deliver success provides value and advantages to those who depend on me.
Size and function are attributes that provide information about objects. Size describes an object's physical dimensions and helps build associations, like knowing a skyscraper is larger than a house. Function describes what an object is used for, such as a pencil for writing, and also helps form associations between related objects. Attributes can be qualities like size, color, or parts that provide additional details about an object.
Dean Ryan decided to leave his role as director of rugby of Worcester Warriors. The chief executive, Jim O'Toole, said Ryan was no longer interested in being a day-to-day director of a Premiership club and made it clear at a board meeting that he wanted to be released from his contract. While reluctant to see him go, the board eventually agreed his departure was best for the long-term stability of the club. Ryan then left Warriors, but O'Toole stated he would not be joining another Premiership club.
The test consists of 20 physics problems across 6 subject areas to be completed in 100 minutes. The problems cover Classical Mechanics, Electrodynamics, Quantum Mechanics, Solid-State Physics, Mathematical Methods of Physics, and Thermal and Statistical Mechanics. Sample problems include determining the displacement required to launch a mass to a given speed using a spring, calculating the net magnetic field from two current-carrying wires, and finding the most likely distance of an electron from the nucleus in a hydrogen atom.
El documento habla sobre los adultos mayores y las problemáticas que enfrentan. En la sociedad no existe preparación para el envejecimiento y las familias y sociedad deben educarse sobre este proceso. Los adultos mayores experimentan cambios internos y externos y atraviesan necesidades que no son atendidas a pesar de que viven con familiares. Se necesitan nuevos programas y proyectos para brindar una mejor atención integral a los adultos mayores y sensibilizar a la comunidad sobre este tema.
es un grupo de individuos que tienen ciertos elementos en común, tales como el idioma, costumbres, valores, tareas, visión del mundo, edad, ubicación geográfica (un barrio, por ejemplo), estatus social o roles. Por lo general, en una comunidad se crea una identidad común, mediante la diferenciación de otros grupos o comunidades (generalmente por signos o acciones), que es compartida y elaborada entre sus integrantes y socializada. Generalmente, una comunidad se une bajo la necesidad o mejora de un objetivo en común, como puede ser el bien común; si bien esto no es algo necesario, basta una identidad común para conformar una comunidad sin la necesidad de un objetivo específico. También se llama comunidad a un conjunto de animales (o de cualquier otro tipo de vida) que comparten ciertos elementos.
Terras Alphaville Resende é um empreendimento com localização privilegiada e combinação perfeita entre loteamento residencial, centro de excelência para empresas e áreas verdes.
Envolto por belas paisagens naturais, o empreendimento será implantado em uma área situada na Av. Augusto de Carvalho, a menos de 5 minutos do centro e próximo à Rua Tenente Coronel Adalberto Mendes, a qual oferece grande variedade de comércio e serviços.
Entre em nosso site para mais informações : www.alphavilleresende.com.br
This document discusses message authentication codes (MACs). It explains that MACs use a shared symmetric key to authenticate messages, ensuring integrity and validating the sender. The document outlines the MAC generation and verification process, and notes that MACs provide authentication but not encryption. It then describes HMAC specifically, which applies a cryptographic hash function to the message and key to generate the MAC. The key steps of the HMAC process are detailed.
Este documento describe los conceptos clave del desarrollo sustentable, incluyendo sus áreas ambiental, económica y social. Explica que el desarrollo sustentable busca satisfacer las necesidades actuales sin comprometer los recursos de las futuras generaciones. También destaca la importancia de crear conciencia en la sociedad sobre el cuidado del medio ambiente y la necesidad de que haya un equilibrio entre la economía, la sociedad y el medio ambiente para lograr un desarrollo verdaderamente sustentable.
Symmetric encryption uses the same key to encrypt and decrypt data, providing confidentiality. Keys must be distributed securely between parties. Common approaches involve using a key distribution center (KDC) that shares secret keys with parties and can provide temporary session keys. Link encryption protects data as it travels over each network link, while end-to-end encryption protects data for its entire journey but leaves some header data unencrypted. Key distribution, storage, renewal and replacement are important aspects of maintaining security when using symmetric encryption.
5. message authentication and hash functionChirag Patel
1) Message authentication can be achieved through message encryption, message authentication codes (MACs), or hash functions.
2) MACs provide authentication by appending a fixed-size block that depends on the message and a secret key. Receivers can verify messages by recomputing the MAC.
3) Hash functions map variable-length data to fixed-length outputs and are easy to compute but infeasible to reverse or find collisions. Common hash functions include MD5 and SHA-512.
This document discusses message authentication techniques including message encryption, message authentication codes (MACs), and hash functions. It describes how each technique can be used to authenticate messages and protect against various security threats. It also covers how symmetric and asymmetric encryption can provide authentication when used with MACs or digital signatures. Specific MAC and hash functions are examined like HMAC, SHA-1, and SHA-2. X.509 is introduced as a standard for digital certificates.
This document discusses hash functions and their analysis for a network security seminar. It begins by defining a hash function as a mathematical function that converts a large amount of data into a small string of integers. Common applications of hash functions include hash tables for quickly searching data, eliminating data redundancy, caches, bloom filters, and pattern matching. Cryptographic hash functions have properties like preimage and second preimage resistance as well as collision resistance. Popular cryptographic hash functions discussed include MD2, MD4, MD5, SHA-1, and SHA-2, along with their advantages, limitations, and examples of attacks.
This document discusses key concepts in microeconomics related to firm costs, revenues, and market structures. It defines different types of costs such as fixed, variable, and average costs. It also explains the concepts of total revenue, average revenue, and marginal revenue. Different market structures are introduced such as monopoly, oligopoly, and perfect competition. Barriers to entry and factors that differentiate products like branding are also covered. Key relationships like isoquants, isocost lines, and how firms minimize costs are summarized.
Mba 505 business_processes_operations_productivity_strategy_tutorial1sChainon
The document discusses process design and mapping. It outlines the steps of process design which include process mapping, identifying activities, grouping activities, conceptualizing flow, and identifying inputs/outputs. Process mapping protocols are also discussed, such as using shapes to represent activities and flows. An example process map of a sandwich making process is shown to illustrate inputs, outputs, decision points, and more. Key performance metrics like throughput time and cycle time are also defined.
The document discusses Lean methodology which focuses on eliminating waste to produce high quality products faster and at lower cost. Lean aims to streamline processes through techniques like single piece flow, just-in-time production, and eliminating non-value added activities to improve throughput, quality, and customer satisfaction. Key aspects of Lean covered include value stream mapping, reducing the seven wastes, line balancing, managing bottlenecks, setup reduction, pull systems, and visual management.
The document compares and contrasts continuous flow and batch production methods. Continuous flow focuses on eliminating waste such as waiting time, excess inventory, and defects through one-piece flow and small batch sizes. This allows for faster cycle times, increased throughput and capacity, and reduced lead times compared to batch production which typically has longer cycle times and more non-value added time due to large batch sizes and waiting between processes. The document provides examples of value stream maps to illustrate the differences between batch and continuous flow production systems.
This document describes two projects:
1. Creating a dashboard program in MS Excel to track multiple projects for an OEM's program management department in a centralized database. Various input and status sheets were designed to populate the dashboard.
2. Conducting a time study of a muffler end spinning machine to calculate production targets. Video time study identified this machine as the bottleneck. Further study broke down operator actions and calculated allowances to determine the machine's cycle time and hourly output for each shift.
Agile Dev West 2018_Measuring Flow: Metrics that MatterJulie Wyman
The document discusses different metrics for measuring workflow, including lead time, cycle time, throughput, and cumulative flow diagrams (CFDs). It explains that lead time is the total time from start to finish of a work item, while cycle time does not include wait time. Throughput measures the number of work items completed within a time period. CFDs visualize the number of work items in different workflow stages over time to identify bottlenecks. The document provides examples of charts for these different metrics and discusses how teams can use metrics to understand their workflow and improve predictability.
Value Stream Mapping in Office & Service SetttingsTKMG, Inc.
Recorded webinar: http://bit.ly/1l6zLVy
Subscribe: http://www.ksmartin.com/subscribe
To purchase the book: http://bit.ly/VSMbk
This webinar covers the subtle differences between manufacturing-style value stream maps and those in office and service settings.
Contact us if you'd like an in-house workshop or external facilitation for a real-time mapping session. http://www.ksmartin.com
This document discusses quick changeovers in manufacturing lines. It defines a changeover as starting production of a new style after finishing the current style. Quick changeovers finish the current style and start maximum output of the new style in the shortest time possible. The document lists benefits of quick changeovers like higher production and reduced costs. It provides tips for reducing changeover times like preparing in advance, having necessary materials ready, and starting new processes as soon as old ones finish. Finally, it emphasizes that quick changeovers require coordinated efforts across departments.
This document discusses work measurement and its applications in lean manufacturing. It provides an overview of the origins and contributors of work measurement. Some key techniques described include predetermined time systems, work method analysis, and video-based work measurement. The document also discusses how work measurement can be applied to understand material flow, labor utilization, setup times, and other processes. The overall aim of work measurement is to analyze work, simplify processes, set performance standards, and improve workflow efficiency in lean applications.
This document discusses process analysis. It begins with objectives like process analysis, flowcharting, types of processes, and performance metrics. It then defines key terms like process, cycle time, and utilization. It describes process flowcharting and standard symbols used. It discusses types of processes like make-to-order, make-to-stock, and hybrid processes. It also covers performance metrics like operation time, throughput time, velocity, and productivity. Examples are provided to illustrate concepts like cycle time calculations.
This document discusses process analysis. It begins with objectives like process analysis, flowcharting, types of processes, and performance metrics. It then defines key terms like process, cycle time, and utilization. It describes standard flowchart symbols and types of processes like make-to-order, make-to-stock, and hybrid. Finally, it discusses performance metrics such as operation time, throughput time, velocity, and productivity and provides examples to illustrate concepts.
This document provides information about process analysis, including definitions of key terms, examples of process flowchart symbols, different types of processes, and metrics for measuring process performance. It discusses process flowcharting and how to represent the major elements of a process using standard symbols. It also defines different types of processes like make-to-order, make-to-stock, and hybrid processes. Finally, it provides examples of calculating cycle time, throughput rate, efficiency, and other process metrics.
Process Mining and Data-Driven Process SimulationMarlon Dumas
Guest lecture delivered at the - Institut Teknologi Sepuluh on 8 December 2022.
This lecture gives an overview of process mining and simulation techniques, and how the two can be used together in process improvement projects.
The Koamtac kdc 300 scanner will be implemented to record 24-hour late items and overflow stock in the warehouse. This will save significant time and costs compared to the current manual process. Specifically:
1) In the recovery department, using the scanner will reduce the time to record late items from 15 hours per day to just 2 hours, saving over £30,000 per year.
2) The scanner allows items to be quickly scanned and emailed to the call center, eliminating delays for customers.
3) In the EDAD department, scanning overflow items and printing labels will make it easier to track stock and reduce issues like late items or stock-outs.
The document discusses lean implementation efforts at a production cell that manufactures connectors. It outlines the challenges of reducing lead time by 60%, work in progress by 70%, and other metrics. Process analysis was conducted including value stream mapping. Opportunities were identified and prioritized. Changes implemented included layout redesign, standard work, visual management boards, and focused improvement teams. Lessons from kaizen events were documented. The lean transformation efforts showed improvements across key metrics and engaged the team.
This document provides guidance on improving production line efficiency. It discusses calculating standard minute values and production targets. Key factors that impact efficiency are identified such as not following individual operator targets, poor recording systems, excessive overtime without productivity, and non-value added work. Specific examples are given for calculating efficiency and addressing bottlenecks. The importance of proper planning, teamwork, and leadership are emphasized for maximizing efficiency.
This document discusses various concepts related to operations scheduling including scheduling objectives, issues, decisions, forward and backward scheduling approaches, loading jobs, input-output control, Gantt charts, assignment methods, and sequencing jobs. Specifically, it defines scheduling as prescribing when operations are performed and establishing start/completion times. It notes effective scheduling can provide competitive advantages through faster throughput, capacity, and delivery. The objectives, types of scheduling, and significant scheduling issues are also outlined.
These slides are from the Metrics-Based Process Mapping webinar delivered 09-29-2021.
Companion resources:
• View the recording - https://tkmg.com/webinars/metrics-based-process-mapping-3/
• Buy the book - https://tkmgacademy.com/products/metrics-based-process-mapping/
• Take the TKMG Academy course - https://tkmgacademy.com/courses/metrics-based-process-mapping/
The document discusses process analysis and capacity planning. It begins by defining a process as any part of an organization that takes inputs and transforms them into outputs. Key decisions around capacity and resource utilization can impact productivity and profits. Process flow charting is introduced as a way to visually represent process activities, timings, and flows. Examples of process strategies for different planning premises are provided. Performance metrics for analyzing processes like throughput time and bottlenecks are also outlined. The document concludes with an example of analyzing a toy manufacturing process.
This project applies the Six Sigma DMAIC methodology to improve a sand casting process at a foundry in Southern India that manufactures flywheel outer casings. In the Define phase, the problem of high defect rates is stated. In the Measure phase, defect data is collected and the baseline sigma level is calculated. In the Analyze phase, statistical tools like Pareto charts and fishbone diagrams are used to identify sources of variation. In the Improve phase, solutions are implemented to reduce defects. Experimental results show the optimized process reduced defects and increased sigma levels, validating the Six Sigma approach.
The document discusses a production planning project where the author plays the role of a production planner for the Greek Manufacturing Company. The company produces two products, Alpha and Beta, using various component parts. The production planning is done on a weekly basis, checking inventory levels, placing orders internally and with vendors to fulfill customer orders. Three different approaches are discussed - ad-hoc planning, using reorder points, and developing a decision support system using forecasting. The maximum profits achieved under each approach are $732,238.75 for ad-hoc, $527,392.25 using reorder points, and $954,420.75 using the decision support system.
1. The document describes a computer simulation model of the Subway food service location at Wayne State University to minimize customer wait times.
2. The current model shows high wait times, especially at the salad station, but scheduling employees differently reduces wait times significantly.
3. The proposed model schedules two employees each at the bread and salad stations instead of just one, lowering average wait time from 18 minutes to just over 0 minutes.
This document provides a summary of a group project report on big data analytics. It discusses how big data and analytics can help companies optimize supply chains by improving decision making and handling risks. It defines big data as large, diverse, and rapidly growing datasets that are difficult to manage with traditional tools. It also discusses data sources, management, quality dimensions, and using statistical process control methods to monitor and control data quality throughout the production process.
Amazon has undertaken an ambitious initiative called "Dragon Boat" to build a global logistics network and supply chain. This will allow Amazon to bypass carriers like UPS and FedEx to gain more control over deliveries and reduce costs. As part of this, Amazon has rapidly expanded their network of fulfillment centers, sortation centers, delivery stations, and Prime Now hubs across the US and worldwide. The sortation centers help improve efficiency by sorting packages by zip code for regional delivery. This initiative aims to place Amazon at the center of the logistics industry and give them an advantage in speed and control of the delivery process.
Optimization of International student expenses at Wayne state pptParag Kapile
This document presents an optimization model to minimize the total annual expenses for international students at Wayne State University. It defines decision variables for tuition costs based on academic program, living expenses based on housing options, food expenses based on meal plans, recreational costs, and health insurance costs. The objective function is to minimize total costs subject to constraints that the student can only choose one option for each category. The model was formulated and solved for 250 unique student cases to find the optimal allocation of expenses.
design n testing of tool used in press shopParag Kapile
The document summarizes a project analyzing punch tools used in sheet metal industries. It models various punch profiles, including flat, convex, concave, and one-way shear, using finite element analysis to minimize stress on the tool. Analysis found radial deformation and stresses were lowest for punches with a 22.5 degree balanced convex shear. It recommends this punch type to reduce stress and enable using lower press capacities. The project aims to increase tool life by optimizing punch cutting profiles through finite element modeling.
1. Back Office Process
“Key” Distribution Process at
WSU Engineering Business Office
Abishek Anand
Shruti Baug
Joel Fortgang
Kara Wandrie
Parag Kapile
2. Engineering Business Office (EBO)
• Key Distribution Process to give key to open
engineering rooms consists of 2 employees:
1. Kathryn- Primary contact with the system.
2.Eman- Student assistant. She is responsible
for placing keys on and off the rack, maintaining
inventory and filling in spreadsheets.
• 10 keys are requested per week.
• Heavy load during the commencement of
semester.
3. Purpose of the Project
• Kathryn who is the primary contact with the
system has to spend too much time and too
much effort on the system.
• The purpose of the project is find the root
cause of the problem, find the appropriate
solution for the problem and to make Kathryn
work easy and efficient.
6. New Key Request
• Completed Key Request Form is submitted to
EBO. (10 mins)
• Information from the form is filled in the EBO
system, excel sheet and print out is taken and
maintained in a file.(15 mins)
7.
8. New Request cont..
• Tag # is obtained by entering the room # from
the system. (2 mins)
• Tag # is located in the key box.(10 mins)
9.
10. New Key Request cont...
• Corresponding key from the Tag # is selected.
• Key is put in the envelope.
• Key # is filled in the form, and envelope is
stapled to the request form and passed to
front desk. (5 mins)
• Customer is emailed to pick up the key.
• Customer must show ID and sign request at
pick up.
11. Current State Value Stream Map
Supplier/Customer
Receive Form Review One Card
Information
Custom Software
Enter information
into Software
Print Out Docs
Excel
Enter Key into
Spreadsheet
Find Tag Take Key Return Tag Give Student Key File Paperwork
30 Seconds
0 Seconds
5 Seconds
14400 Seconds
360 Seconds
600 Seconds
180 Seconds
0 Seconds
360 Seconds
0 Seconds
600 Seconds
0 Seconds
30 Seconds
0 Seconds
20 Seconds
0 Seconds
5 Seconds
0 Seconds
120 Seconds
3600 Seconds
5 Sets of Paperwork
Value Added Time = 1710
Seconds
Total Lead Time = 18600
Seconds
C/T 5 Seconds
W/T 14400 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 60 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 5 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 3600 Seconds
U/P 100%
Shifts 1
Production Control
Intermittent when problems
DailyDeliveryofKeys
DailyDeliveryofApplications
Daily Delivery of Applications Daily Delivery of Keys
Intermittent when problems
Intermittent
12. Current State Value Stream Map
Supplier/Customer
Production Control
Intermittent when problems
Daily Delivery of Applications Daily Delivery of Keys
Intermittent when problems
Receive Form Review One Card
Information
Custom Software
Enter information
into Software
30 Seconds
0 Seconds
5 Seconds
14400 Seconds
360 Seconds
600 Seconds 0 Seconds
C/T 5 Seconds
W/T 14400 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
IntermittentPrint Out Docs
Excel
Enter Key into
Spreadsheet
Find Tag Take Key
180 Seconds
0 Seconds
360 Seconds
0 Seconds
600 Seconds
0 Seconds
30 Seconds
0 Seconds 0 Sec
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 60 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
Intermittent when problems
Return Tag Give Student Key File Paperwork
20 Seconds
0 Seconds
5 Seconds
0 Seconds
120 Seconds
3600 Seconds
5 Sets of Paperwork
Value Added Time = 1710
Seconds
Total Lead Time = 18600
Seconds
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 5 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 3600 Seconds
U/P 100%
Shifts 1
Supplier/Customer
Production Control
Intermittent when problems
Daily Delivery of Applications Daily Delivery of Keys
Intermittent when problems
13. KPI Metrics
• Labor time spent per key
– Total labor hours spent per keys issued in a week
= Total # of minutes spent/
#of keys issued per week
= 15 minutes (from Gemba walk)
14. • Average Lead time
– Total time taken from the time student drops off
form until receiving the key
– Measured in minutes
– Average lead time is 28.5 minutes
KPI Metrics
15. • Average number of keys issued
– Number of keys issued per week
= Total # of keys issued / # of weeks
= 131/13
= 10
KPI Metrics
17. • Takt time
– Available time / Customer demand
= 40 hours / 10 keys per week
= 4 hours per key per week
KPI Metrics
18. • Kathryn and Eman utilize a lot of time
distributing, ordering keys, and entering data
into system. This consumes a lot of time for
personnel in the engineering office. Current
labor time spent per key is 15 minutes and the
desired labor time is under 6 minutes.
Problem Statement
19. ● 5 Hypotheses
○ The physical access to the keys is challenging.
○ The record keeping takes up a lot of valuable time.
○ Keys are not returned so new keys must continually be
made.
○ Takes too long to procure keys for the students.
○ Wayne States key ordering process takes too much effort.
Plan – 5 Whys
Why are Kathryn and Eman are spending to much of their day
working on distributing keys?
20. ● 5 Hypotheses
○ The physical access to the keys is challenging.
○ The record keeping takes up a lot of valuable time.
○ Keys are not returned so new keys must continually be
made.
○ Takes too long to procure keys for the students.
○ Wayne States key ordering process takes too much effort.
● Evidence
○ Value Stream: Record keeping is where most of the active
time is spent.
● Controllable: No
Plan – 5 Whys
Why are Kathryn and Eman are spending to much of their day
working on distributing keys?
21. ● 4 Hypotheses
○ The Paper work is not uniformed
○ The recording system is convoluted
○ Paper Binders are hard to work with
○ Inaccurate Paper Work
Plan – 5 Whys
Why does the record keeping take so much time?
22. ● 4 Hypotheses
○ The Paper work is not uniformed
○ The recording system is convoluted
○ Paper Binders are hard to work with
○ Inaccurate Paper Work
● Evidence
○ Gemba Walk: Operators complain about software system
● Controllable: No
Plan – 5 Whys
Why does the record keeping take so much time?
23. ● 3 Hypotheses
○ There are multiple systems being used
○ The excel spreadsheet is too complicated
○ The software design is confusing
Plan – 5 Whys
Why is the recording system problematic?
24. ● 3 Hypotheses
○ There are multiple systems being used
○ The excel spreadsheet is too complicated
○ The software design is confusing
● Evidence
○ Flow Chart-The same work is done three times
● Controllable - Yes
Plan – 5 Whys
Why is the recording system problematic?
25. Plan - 4S for Excess Time Consumption
Order
Skill Suppliers
Systems
Surrounding
s
Key
manufacturer
Key delivery from
the manufacturer
Unreadable
Forms
Untrained
Employee
Manpower
Shortage
Software
Duplication Software
Outdated
Sending Multiple
Reminders/e-mails
Concerned
customer not
available
Disorganized key
cabinet
Excess time
consumption
27. Plan- Future State Value Stream Map
Supplier/Customer
Receive Form Review One Card
Information
Check software for
Tag # and if Key is
Available
Custom Software
Enter User info into
Software
Find Tag Take Key Return Tag Give Student Key
30 Seconds
0 Seconds
5 Seconds
14400 Seconds
60 Seconds
600 Seconds
120 Seconds
0 Seconds
600 Seconds
0 Seconds
30 Seconds
0 Seconds
20 Seconds
0 Seconds
5 Seconds
0 Seconds
Value Added Time = 870
Seconds
Total Lead Time = 15000
Seconds
C/T 5 Seconds
W/T 14400 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 60 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 60 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 5 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
Production Control
Weekly
DailyDeliveryofKeys
DailyDeliveryofApplications
Daily Delivery of Applications Daily Delivery of Keys
Intermittent when problems
Intermittent
Weekly
28. Plan- Future State Value Stream Map
Supplier/Customer
Production Control
Weekly
Daily Delivery of Applications Daily Delivery of Keys
Intermittent when problems
Weekly
Supplier/Customer
Production Control
Daily Delivery of Applications Daily Delivery of Keys
Intermittent when problems
Receive Form Review One Card
Information
Check software for
Tag # and if Key is
Available
Custom Software
Enter User info into
Software
30 Seconds
0 Seconds
5 Seconds
14400 Seconds
60 Seconds
600 Seconds
120 Seconds
0 Seconds 0 Seconds
C/T 5 Seconds
W/T 14400 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 60 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
Weekly
Dail
Intermittent
Weekly
Find Tag Take Key Return Tag Give Student Key
600 Seconds
Seconds
30 Seconds
0 Seconds
20 Seconds
0 Seconds
5 Seconds
0 Seconds
Value Added Time = 870
Seconds
Total Lead Time = 15000
Seconds
C/T 60 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 5 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
Daily
29. Plan- Improvements in Future State
• Eliminated 2 process steps
• Added 2 levels of status communication
• Lead time
– Current State = 28.5 minutes
– Future State = 14.5 minutes
• Labor time
– Current State = 15 minutes
– Future State = 3 minutes
30. Plan – Design Decisions To Merge
Recording Processes
• Decision Variable
– Time to Process Key
– Cost in dollars
– Training Requirements
– Support / Stability
– Data Import / Initial Data Entry
– Oversight
31. Plan – Design Alternatives
• One System
– Paper Only
– Excel Spreadsheet Only
– Existing Custom Software
– New Software
34. Do - Method for Small Scale Test
• Obtain Key Wizard Trial Version
• Train Eman (Student Assistant) in Key Wizard
• For One Week
• Enter Data into Both System
• Record Time for Each System
35. Check - Small Scale Test
• Compare Average Times to Process for Existing
• Evaluation Time Savings per Week
• Compute New KPI
– Average Labor Time Per Key
• Determine ROI on Key Wizard
• Present Findings to Lara (Office Manager)
• Lara Determines if Plan should be
implemented, or go back to plan
36. Act - Full Implementation
• Determine Week of Low Key Demand from
Historic Data
• Convert Existing Data into Key Wizard
• Train Staff (Kathryn, Lara and Eman)
• Begin Processing Keys
37. Expected Results
• Key Process Labor Time Reduction from 15
minutes to under 6 minutes
• Greater Long Term Stability of System
• Better Oversight for Office Manager (Lara)
38. Review/Loop-Do we need to Keep going
• Ongoing
– Review Key Process Numbers Every Semester for
Employee performance
– Contact Key Wizard Manufacturer for Updates
Once a year
• Another PDCA Cycle
– Look at all KPI’s
– Revisit Customer Viewpoint
– Determine if another Cycle is needed
39. A3- Report
Projected Business Performance Improvement Story [BPIS]
Prior State Problem Statement Process Analysis
Gemab Walk, Flow
Chart, Current VSM Map
KPI Definitions, Key Performance
Metrics 5 Why Analysis, Fishbone Diagram
Design Initiatives Implementation Results
Future Value Stream,
Solution Criteria,
Solution Alternatives,
Evaluation Matrix
Do Explanation, Check
Explanation, Act Explanation,
Review and Loop
Expected Results Explanation,
Process Labort Reduced 23 %
41. ● Standardize Form
● Place Forms On-Line
● Review Software Alternatives with Staff for
better evaluation criteria
● Organize Key Boxes
● Replace Key Boxes
Appendix -Further
Recommendations
42. ● Develop Online Request System
● Record phone number of student
● Prevent graduation for non-return keys
● Charge a deposit
Appendix -Further
Recommendations
43. ● http://www.prosystech.ca/overviewsk.aspx
● http://www.keywizard.net/prices.html
● https://www.dlaco.com/tracerxt/tracer1.htm
● http://www.instakey.com/key-control-software/
● http://www.morsewatchmans.com/product/keywatcher/key-
control-software/
● https://www.aidex-software.com/en/key-organizer/
https://www.keytracker.com/Product/Category/Key-Control-
Software
● Software Written By Computer Science Class
Appendix - Software List
44. ● Hypotheses
○ The physical access to the keys is challenging.
■ Evidence - The key cabinet is hard to access and is very un-organized.
○ The record keeping takes up a lot of valuable time.
■ Evidence - Value Stream: Record keeping is where most of the active
time is spent.
○ Keys are not returned so new keys must continually be made.
■ Evidence - They have a set process to follow if a key is requested and
cannot be found because someone else didn’t return it after use.
○ Takes too long to procure keys for the students.
■ Evidence - They make the students come to the office just to fill out
paper work then leave and make them come back when the key is ready.
○ Wayne States key ordering process takes too much effort.
■ Evidence -he students have to come in to fill out forms and then later
have to come back to pick it up.
Appendix – 5 Whys
Why are Kathryn and Eman are spending to much of their day working on distributing
keys?
45. ● Hypotheses
○ The Paper work is not uniformed
■ Evidence - Gemba Walk: Inspection of Paperwork
○ The recording system is convoluted
■ Evidence- Gemba Walk: Operators complain about
software system
○ Paper Binders are hard to work with
■ Evidence- Gemba Walk: Photos of binders
○ Inaccurate Paper Work
■ Evidence - Gemba Walk: Interview with Kathryn
Appendix – 5 Whys
Why does the record keeping take so much time?
46. ● Hypotheses
○ There are multiple systems being used
■ Evidence - Flow Chart: The same work is done three
times
○ The excel spreadsheet is too complicated
■ Evidence - Gemba Walk: Example of the spreadsheet
○ The software design is confusing
■ Evidence - Gemba Walk: Photos of interface
Appendix– 5 Whys
Why is the recording system problematic?
48. Appendix- Current Value Stream
Map of all Processes
Value Added Time = 30065
Seconds
Total Lead Time = 7200
Seconds
30 Seconds
0 Seconds
30 Seconds
0 Seconds
60 Seconds
0 Seconds
Supplier
Online Form External Processing Key is Ready Email Key Pick Up
KeyNeeds
tobe
made
Enter Key into
Software
Enter Key into
Spreadsheet
ForStock
Put Key in Envelope
ForHandingOut
Send Pick Up Email Pick up of Key
KeyExists
Receive Key After
Use
Enter Key into
Software
Enter Key into
Spreadsheet
Find Tag Put Tag on Key Return Tag with Key
KeyReturn
Go to Key Request
Loop
KeyDoesn’tExist
Find Tag Put Tag on Key Return Tag with Key
300 Seconds
14400 Seconds
28800 Seconds
0 Seconds
5 Seconds
0 Seconds
600 Seconds
3600 Seconds
120 Seconds
3600 Seconds
120 Seconds
0 Seconds
30 Seconds
0 Seconds
60 Seconds
0 Seconds
120 Seconds
14400 Seconds
Value Added Time = 30155
Seconds
Total Lead Time = 21600
Seconds
30 Seconds
14400 Seconds
120 Seconds
7200 Seconds
120 Seconds
0 Seconds
60 Seconds
0 Seconds
30 Seconds
0 Seconds
30 Seconds
0 Seconds
Value Added Time = 390
Seconds
Total Lead Time = 21600
Seconds
C/T 30 Seconds
W/T 14400 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 7200 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 60 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 60 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 14400 Seconds
U/P 100%
Shifts 1
C/T 60 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 3600 Seconds
U/P 100%
Shifts 1
C/T 600 Seconds
W/T 3600 Seconds
U/P 100%
Shifts 1
C/T 5 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 28800 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 300 Seconds
W/T 14400 Seconds
U/P 100%
Shifts 1
File Paperwork
120 Seconds
3600 Seconds
120 Seconds
3600 Seconds
C/T 120 Seconds
W/T 3600 Seconds
U/P 100%
Shifts 1
File Paperwork
C/T 120 Seconds
W/T 3600 Seconds
U/P 100%
Shifts 1
File Paperwork
C/T 120 Seconds
W/T 3600 Seconds
U/P 100%
Shifts 1
120 Seconds
3600 Seconds
Customer
PC = Manager
Intermittent
Intermittent
Intermittent
Find Tag Take Key Return Tag Give Student Key File Paperwork
600 Seconds
0 Seconds
30 Seconds
0 Seconds
20 Seconds
0 Seconds
5 Seconds
0 Seconds
120 Seconds
3600 Seconds
5 Sets of Paperwork
Value Added Time = 1710
Seconds
Total Lead Time = 18600
Seconds
C/T 60 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 5 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 3600 Seconds
U/P 100%
Shifts 1
Receive Form Review One Card
Information
Custom Software
Enter information
into Software
Print Out Docs
Excel
Enter Key into
Spreadsheet
30 Seconds
0 Seconds
5 Seconds
14400 Seconds
360 Seconds
600 Seconds
180 Seconds
0 Seconds
360 Seconds
0 Seconds
C/T 5 Seconds
W/T 14400 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 30 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
C/T 120 Seconds
W/T 0 Seconds
U/P 100%
Shifts 1
Intermittent
DailyDeliveryofKeys
DailyDeliveryofApplications
Intermittent When there is a Problem Intermittent When there is a Problem
Key
Requested
49. • Returned keys per week
– Number of keys that are returned back to the
office per week
• Keys ordered per week
– Number of keys ordered per week by back office
when the keys requested are either unavailable or
inventory for the key is low
Appendix - KPI Metrics