SlideShare a Scribd company logo
1 of 18
Download to read offline
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Ramiro Cid | @ramirocid
Lean Six Sigma Methodology
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
2
Index
1. Concepts Slide 3
2. Introduction Slide 4
3. DMAIC Slide 7
4. Process Mapping Slide 8
5. Fishbone Diagram Slide 9
6. SIPOC Slide 10
7. CTQ’s Slide 11
8. Metrics Slide 12
9. Risk Analysis Slide 13
10. Graphs Slide 14
11. Business Case Slide 15
12. Certifications Slide 16
13. Sources used and webs to expand knowledge Slide 17
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Lean:
Created by Toyota on 1989. (Author: Jim P. Womack)
Focus on speed and best cost (efficiency)
Main concepts of this methodology:
Identify and remove 8 wastes: Transport, Inventory, Motion, Waiting, Over production, Over processing, Defects and Skills
Six Sigma:
Created by Motorola on 1985
Focus on effectivity of processes
Some companies who implemented Six Sigma: GE (implemented and refined it), 3M, Airbus, Phillips
Main concepts of this methodology:
1) Statistical number, 2) Methodology (DMAIC), 3) Philosophy on customer focus and in 0 defects.
4) Data driven decisions
1. Concepts
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Lean Six Sigma is a process improvement methodology that relies on a collaborative team effort to improve
performance by systematically removing waste, combining Lean and Six Sigma to eliminate the eight kinds of
waste (muda): Transportation, Inventory, Motion, Waiting, Over production, Over processing, Defects, and Skills
(abbreviated as 'TIMWOODS').
The Lean Six Sigma concepts were first published in a book titled Lean Six Sigma: Combining Six Sigma with Lean
Speed by Michael George and Robert Lawrence Jr. in 2002
Lean Six Sigma utilizes the DMAIC (Define, Measure, Analyze, Improve and Control) phases similar to that of Six
Sigma. Lean Six Sigma projects comprise aspects of Lean's waste elimination and the Six Sigma focus on reducing
defects, based on critical to quality (CTQ) characteristics.
In the next slides we will see some tools used by this methodology. To show all them we will include some
examples to show how to use each of them.
2. Introduction
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Lean Six Sigma includes concepts of both methodologies.
Six Sigma use statistics tools for characterization and study of the processes, this is the reason of the name, as
sigma is the standard deviation which gives an idea of the variability in a process and the goal of Six Sigma is to
reduce it so that the process is always within the limits set by customer requirements.
1 sigma = 690,000 DPMO = 32% efficiency
2 sigma = 308,538 DPMO = 69% efficiency
3 sigma = 66,807 DPMO = 93.3% efficiency
4 sigma = 6.210 DPMO = 99.38% efficiency
5 sigma = 233 DPMO = 99.977% efficiency
6 sigma = 3.4 DPMO = 99.99966% efficiency
7 sigma = 0.019 DPMO = 99.9999981% efficiency
Note: DPMO means “Defects per million opportunities”
2. Introduction
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Regarding the other methodology, Lean manufacturing or lean production, often simply "lean", is a systematic
method for the elimination of waste ("Muda") within a manufacturing system. Lean also takes into account waste
created through overburden ("Muri") and waste created through unevenness in work loads ("Mura"). Working from
the perspective of the client who consumes a product or service, "value" is any action or process that a customer
would be willing to pay for.
Lean principles are derived from the Japanese manufacturing industry.
The eight muda are:
1. Transport (moving products that are not actually required to perform the processing
2. Inventory (all components, work in process, and finished product not being processed
3. Motion (people or equipment moving or walking more than is required to perform the processing
4. Waiting (waiting for the next production step, interruptions of production during shift change
5. Overproduction (production ahead of demand
6. Over Processing (resulting from poor tool or product design creating activity
7. Defects (the effort involved in inspecting for and fixing defects
8. Skills (waste of Skills, referred to as "under-utilizing capabilities and delegating tasks with inadequate training)
2. Introduction
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 7
3. DMAIC
DEFINE
CONTROL
IMPROVE ANALYSE
MEASURE
Project Charter ü
Process Mapping ü
Fishbone diagram ü
Process Analysis ü
Create Solutions ü
Select Solutions ü
Validate Solutions ü
Implement Solutions ü
Monitoring ü
Documentation ü
What’s my problem ?
How big is my problem ?
What are the root
causes of my problem ?
What is the best
solution ?
How can we sustain the
improvement ?
“Big impact on business
during IT infrastructure
incidents”
SLA’s vs. Resolution time
average
This lack of visibility of critical
information technology is a
problem
To have a monitoring system
connected to Incident
management application
Doing the maintenance and
update of all IT Assets in the
monitoring system
One practical example:
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
An example of a Process mapping where an IT Incident management:
4. Process Mapping
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
An example of a Fishbone Diagram where time to resolve an incident is the target and we have 6
different domains: Man, Method, Materials, Mother Nature, Machine and Measurement
5. Fishbone Diagram
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
An example of a SIPOC table where the different steps we have on Process Mapping are showed
as a table:
6. SIPOC
Supplier Input Process Output Customer
Customer
Call / Email /
Monitoring tool
Notification
Detection
Record in Incident
Management tool
Monitory tool Alarms
Notification
Detection
Record in Incident
Management tool
Infrastructure System logs Analyze
Record in Incident
Management tool
IT Area
Knowledge /
Experience /
Documentation
Corrective action
Record in Incident
Management tool
IT Area Solution found Quality check Notification
Customer Feedback Close incident
Record in Incident
Management tool
IS
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
An example of a CTQ’s where we could see 3 different aspects of a problem: a) VOC (‘Voice of
Client’) where we include what our customer (internal or external) wants, b) Statements which are
close to the true (possible to get) and finally c) CTQ which is like the SLA of the target we want to
reach.
7. CTQ’s
VOC True need CTQ
"Alarm notification at the
time it happens"
Time [< 5 Minutes]
1 minute to receive the alert on Incident
management from monitoring tool
"I would not need to report
the incident"
0 Incidents
reported by users
All IT assets monitored
"No delays on my process
because IT infrastructure
reason"
Resolution time
following SLAs in
Incident
management tool
Resolution time following SLAs in Incident
management tool
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
An example of metrics we want to reach using an Incident management tool:
8. Metric
Reference: SLA Interactions or incidents
SLA (Resolution
time objective)
Days
SLA (Resolution
time objective)
Hours
1 - Critical 0,25 6
2 - High 0,25 6
3 - Average 1 24
4 - Low 4 32
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
An example of Risk Analysis. In spite of is not mandatory to use it on Lean Six Sigma, it is ever
recommended to do it to get the risks of a new project, environment, change, etc. with the target of
reduce as much as possible the residual risk (the risk after apply controls):
9. Risk Analysis
C I A
factor
value
No dual power source in routers
In case some electric
phase is down the router
will be down
2 routers: Main and backup.
Backup router give service in
less than 10 seconds in case
of the main crash. Both are
connected in different
electric phases
x 1 4 1 4
No dual power source in Colt
fibber convertes in front of routers
In case some electric
phase is down the router
will be down
2 routers: Main and backup.
Backup router give service in
less than 10 seconds in case
of the main crash. Both are
connected in different
electric phases
x 1 4 1 4
Router not accessible by in case
WAN connection crashes
In case WAN connection is
down will not be able to
access to manage the
router
have a management
modem connected by an
analogic line to manage the
router by console port
x 1 1 2 2
Router Buenos Aires John Smith Michael Johnson
Location/s Power user Vulnerability description Threat description Existing Controls/practicesAsset Risk Owner ProbabilityImpact
Risk
Value
Assets criticality
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
In spite of is not mandatory to use them on Lean Six Sigma, it is ever
recommended to do because help us to show data in an easy way so giving us
support to our statements.
We can use MS Excel or similar tools, but we have an specific tool for statistical
data management and graphs called ‘Minitab’ very useful for Lean Six Sigma
projects
10. Graphs
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
An example of summary of a Business Case (after do all the calculations needed to get the final
figures):
A Business Case is ever needed to justify our investments (CAPEX and/or OPEX) in a project so
for Lean Six Sigma it is important too to do it.
11. Business Case
Gross Profit
Topic Total Cost
Gross Profit 1st year:
Cost of monitoring - Cost of incidents - 10% of saving
because monitoring rollout)
5.530,00 € No profit
Gross Profit next years:
Cost of monitoring - Cost of incidents - 10% of saving
because monitoring rollout)
730,00 € No profit
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
There are 4 steps to be certificated on Lean Six Sigma:
12. Certifications
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
 What is Lean Six Sigma | goleansixsigma.com
URL: https://goleansixsigma.com/what-is-lean-six-sigma/
 ‘Lean Six Sigma’ | Wikipedia
URL: https://en.wikipedia.org/wiki/Lean_Six_Sigma
 What is Six Sigma? | AU: T. M. Kubiak and Donald W. Benbow
URL: http://asq.org/learn-about-quality/six-sigma/overview/overview.html
 Six Sigma vs. Lean Six Sigma | Villanova University
URL: http://www.villanovau.com/resources/six-sigma/six-sigma-vs-lean-six-sigma/#.V87e7UYqSJ8
 LSSI – Lean Six Sigma Institute
URL: http://www.leansixsigmainstitute.org/
13. Sources used to expand knowledge
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Questions?
Many thanks !
Ramiro Cid
CISM, CGEIT, ISO 27001 LA, ISO 22301 LA, ITIL
ramiro@ramirocid.com
@ramirocid
http://www.linkedin.com/in/ramirocid
http://ramirocid.com http://es.slideshare.net/ramirocid
http://www.youtube.com/user/cidramiro

More Related Content

What's hot (20)

Six Sigma Principles And Concepts PowerPoint Presentation Slides
Six Sigma Principles And Concepts PowerPoint Presentation SlidesSix Sigma Principles And Concepts PowerPoint Presentation Slides
Six Sigma Principles And Concepts PowerPoint Presentation Slides
 
FAILURE MODE EFFECT ANALYSIS
FAILURE MODE EFFECT ANALYSISFAILURE MODE EFFECT ANALYSIS
FAILURE MODE EFFECT ANALYSIS
 
Basic Six Sigma Presentation
Basic Six Sigma PresentationBasic Six Sigma Presentation
Basic Six Sigma Presentation
 
Advanced Product Quality Planning presentation
Advanced Product Quality Planning presentationAdvanced Product Quality Planning presentation
Advanced Product Quality Planning presentation
 
Value Stream Mapping Process
Value Stream Mapping ProcessValue Stream Mapping Process
Value Stream Mapping Process
 
Lean six sigma - Waste elimination (Yellow Belt)
Lean six sigma - Waste elimination (Yellow Belt)Lean six sigma - Waste elimination (Yellow Belt)
Lean six sigma - Waste elimination (Yellow Belt)
 
PDCA Cycle
PDCA CyclePDCA Cycle
PDCA Cycle
 
7 tools of quality
7 tools of quality7 tools of quality
7 tools of quality
 
DMAIC Methodolgy
DMAIC MethodolgyDMAIC Methodolgy
DMAIC Methodolgy
 
Dmaic overview for slideshare
Dmaic overview for slideshareDmaic overview for slideshare
Dmaic overview for slideshare
 
Spc training
Spc training Spc training
Spc training
 
Product Life Cycle Management
Product Life Cycle ManagementProduct Life Cycle Management
Product Life Cycle Management
 
SIX SIGMA Green Belt Training
SIX SIGMA Green Belt TrainingSIX SIGMA Green Belt Training
SIX SIGMA Green Belt Training
 
Yellow Belt Training
Yellow Belt TrainingYellow Belt Training
Yellow Belt Training
 
Six Sigma Introduction
Six Sigma IntroductionSix Sigma Introduction
Six Sigma Introduction
 
Lean six sigma (green belt)new
Lean six sigma (green belt)newLean six sigma (green belt)new
Lean six sigma (green belt)new
 
PDCA Plan Do Check Act
PDCA Plan Do Check ActPDCA Plan Do Check Act
PDCA Plan Do Check Act
 
Kaizen Poster
Kaizen PosterKaizen Poster
Kaizen Poster
 
Six Sigma and Its Implementation
Six Sigma and Its ImplementationSix Sigma and Its Implementation
Six Sigma and Its Implementation
 
Six Sigma Yellow Belt
Six Sigma Yellow BeltSix Sigma Yellow Belt
Six Sigma Yellow Belt
 

Viewers also liked

Six Sigma the best ppt
Six Sigma the best pptSix Sigma the best ppt
Six Sigma the best pptRabia Sgh S
 
ASQ Black Belt Body of Knowledge based Lean Six Sigma exam practice questions
ASQ Black Belt Body of Knowledge based Lean Six Sigma exam practice questionsASQ Black Belt Body of Knowledge based Lean Six Sigma exam practice questions
ASQ Black Belt Body of Knowledge based Lean Six Sigma exam practice questionsxepre81
 
Six sigma formulas
Six sigma formulasSix sigma formulas
Six sigma formulaspw40507
 
How to Systematically Improve First Contact Resolution
How to Systematically Improve First Contact ResolutionHow to Systematically Improve First Contact Resolution
How to Systematically Improve First Contact ResolutionUpstream Works
 
Introduction to First Call Resolution
Introduction to First Call ResolutionIntroduction to First Call Resolution
Introduction to First Call ResolutionUpstream Works
 
¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?Ramiro Cid
 
Six Sigma
Six SigmaSix Sigma
Six Sigmajay68
 
Six Sigma Workshop for World Bank, Chennai - India
Six Sigma Workshop for World Bank, Chennai -  IndiaSix Sigma Workshop for World Bank, Chennai -  India
Six Sigma Workshop for World Bank, Chennai - IndiaMurali Nandigama, Ph.D.
 
Lean Manufaturings and 7 wastings - See how Lean Manufacturings connects wit...
Lean Manufaturings  and 7 wastings - See how Lean Manufacturings connects wit...Lean Manufaturings  and 7 wastings - See how Lean Manufacturings connects wit...
Lean Manufaturings and 7 wastings - See how Lean Manufacturings connects wit...Ujihara, Hélio M
 
Session 8 - Introduction to Lean Six Sigma
Session 8 - Introduction to Lean Six SigmaSession 8 - Introduction to Lean Six Sigma
Session 8 - Introduction to Lean Six SigmaMedXellence
 
Aaadissertdefesa Ppt Sgq17082007
Aaadissertdefesa Ppt Sgq17082007Aaadissertdefesa Ppt Sgq17082007
Aaadissertdefesa Ppt Sgq17082007Ujihara, Hélio M
 
First Contact Resolution - The Performance Driver!
First Contact Resolution - The Performance Driver!First Contact Resolution - The Performance Driver!
First Contact Resolution - The Performance Driver!HDI Orange County
 

Viewers also liked (20)

Six Sigma
Six SigmaSix Sigma
Six Sigma
 
Six Sigma the best ppt
Six Sigma the best pptSix Sigma the best ppt
Six Sigma the best ppt
 
Dansen synopsis
Dansen synopsisDansen synopsis
Dansen synopsis
 
ASQ Black Belt Body of Knowledge based Lean Six Sigma exam practice questions
ASQ Black Belt Body of Knowledge based Lean Six Sigma exam practice questionsASQ Black Belt Body of Knowledge based Lean Six Sigma exam practice questions
ASQ Black Belt Body of Knowledge based Lean Six Sigma exam practice questions
 
Six sigma formulas
Six sigma formulasSix sigma formulas
Six sigma formulas
 
How to Systematically Improve First Contact Resolution
How to Systematically Improve First Contact ResolutionHow to Systematically Improve First Contact Resolution
How to Systematically Improve First Contact Resolution
 
Introduction to First Call Resolution
Introduction to First Call ResolutionIntroduction to First Call Resolution
Introduction to First Call Resolution
 
¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?
 
Six Sigma
Six SigmaSix Sigma
Six Sigma
 
Six Sigma Workshop for World Bank, Chennai - India
Six Sigma Workshop for World Bank, Chennai -  IndiaSix Sigma Workshop for World Bank, Chennai -  India
Six Sigma Workshop for World Bank, Chennai - India
 
Lean Manufaturings and 7 wastings - See how Lean Manufacturings connects wit...
Lean Manufaturings  and 7 wastings - See how Lean Manufacturings connects wit...Lean Manufaturings  and 7 wastings - See how Lean Manufacturings connects wit...
Lean Manufaturings and 7 wastings - See how Lean Manufacturings connects wit...
 
Session 8 - Introduction to Lean Six Sigma
Session 8 - Introduction to Lean Six SigmaSession 8 - Introduction to Lean Six Sigma
Session 8 - Introduction to Lean Six Sigma
 
Aaadissertdefesa Ppt Sgq17082007
Aaadissertdefesa Ppt Sgq17082007Aaadissertdefesa Ppt Sgq17082007
Aaadissertdefesa Ppt Sgq17082007
 
AgileCamp 2014 Track 5: The Seven Wastes - Can You Get Leaner
AgileCamp 2014 Track 5: The Seven Wastes - Can You Get LeanerAgileCamp 2014 Track 5: The Seven Wastes - Can You Get Leaner
AgileCamp 2014 Track 5: The Seven Wastes - Can You Get Leaner
 
Lean Information Technology Webinar
Lean Information Technology WebinarLean Information Technology Webinar
Lean Information Technology Webinar
 
First Contact Resolution - The Performance Driver!
First Contact Resolution - The Performance Driver!First Contact Resolution - The Performance Driver!
First Contact Resolution - The Performance Driver!
 
Lean 6sigma and DMAIC
Lean 6sigma and DMAICLean 6sigma and DMAIC
Lean 6sigma and DMAIC
 
Six sigma
Six sigmaSix sigma
Six sigma
 
DMAIC Methodology
DMAIC MethodologyDMAIC Methodology
DMAIC Methodology
 
Lean Six Sigma
Lean Six SigmaLean Six Sigma
Lean Six Sigma
 

Similar to Lean Six Sigma methodology

Lean Six Sigma - Concept & Application
Lean Six Sigma - Concept & ApplicationLean Six Sigma - Concept & Application
Lean Six Sigma - Concept & ApplicationHusnain Shahid
 
Lecture 13Application of Six Sigmain Service operati.docx
Lecture 13Application of Six Sigmain Service operati.docxLecture 13Application of Six Sigmain Service operati.docx
Lecture 13Application of Six Sigmain Service operati.docxsmile790243
 
Quality Improvement in Low Pressure Die Casting Of Automobile Cylinder Head U...
Quality Improvement in Low Pressure Die Casting Of Automobile Cylinder Head U...Quality Improvement in Low Pressure Die Casting Of Automobile Cylinder Head U...
Quality Improvement in Low Pressure Die Casting Of Automobile Cylinder Head U...paperpublications3
 
Six Sigma Final
Six Sigma FinalSix Sigma Final
Six Sigma Finalanubhuti10
 
Quick introduction to lean and six sigma
Quick introduction to lean and six sigmaQuick introduction to lean and six sigma
Quick introduction to lean and six sigmaGaurav Suman
 
Six sigmaforsoftware
Six sigmaforsoftwareSix sigmaforsoftware
Six sigmaforsoftwareSoumyadip Das
 
Six sigma ajal
Six sigma ajalSix sigma ajal
Six sigma ajalAJAL A J
 
IRJET- Quality Improvement in Building Construction using Six Sigma
IRJET-  	  Quality Improvement in Building Construction using Six SigmaIRJET-  	  Quality Improvement in Building Construction using Six Sigma
IRJET- Quality Improvement in Building Construction using Six SigmaIRJET Journal
 
Six Sigma for Beginners- Yellow and Green Belt
Six Sigma for Beginners- Yellow and Green BeltSix Sigma for Beginners- Yellow and Green Belt
Six Sigma for Beginners- Yellow and Green BeltRajiv Tiwari
 
Six Sigma in Manufacturing Industries Barriers to Implementation.pdf
Six Sigma in Manufacturing Industries  Barriers to Implementation.pdfSix Sigma in Manufacturing Industries  Barriers to Implementation.pdf
Six Sigma in Manufacturing Industries Barriers to Implementation.pdfIslamAbdouAbbas1
 
IRJET- Quality Audit of Public Building Project by using Six Sigma Techniques
IRJET- Quality Audit of Public Building Project by using Six Sigma TechniquesIRJET- Quality Audit of Public Building Project by using Six Sigma Techniques
IRJET- Quality Audit of Public Building Project by using Six Sigma TechniquesIRJET Journal
 
Scrum in Practice
Scrum in PracticeScrum in Practice
Scrum in PracticeESUG
 
Six sigma,SIPOC, Fact based decison making
Six sigma,SIPOC, Fact based decison makingSix sigma,SIPOC, Fact based decison making
Six sigma,SIPOC, Fact based decison makingsadia butt
 
Interface Between Six Sigma and Knowledge Management
Interface Between Six Sigma and Knowledge ManagementInterface Between Six Sigma and Knowledge Management
Interface Between Six Sigma and Knowledge Managementsachinmgadekar21
 
Six Sigma_DMAIC_Bharath Seminar
Six Sigma_DMAIC_Bharath SeminarSix Sigma_DMAIC_Bharath Seminar
Six Sigma_DMAIC_Bharath SeminarBharath M
 
CapstonePaper_Mahesh(1)
CapstonePaper_Mahesh(1)CapstonePaper_Mahesh(1)
CapstonePaper_Mahesh(1)Mahesh S
 

Similar to Lean Six Sigma methodology (20)

Lean Six Sigma - Concept & Application
Lean Six Sigma - Concept & ApplicationLean Six Sigma - Concept & Application
Lean Six Sigma - Concept & Application
 
Lecture 13Application of Six Sigmain Service operati.docx
Lecture 13Application of Six Sigmain Service operati.docxLecture 13Application of Six Sigmain Service operati.docx
Lecture 13Application of Six Sigmain Service operati.docx
 
Quality Improvement in Low Pressure Die Casting Of Automobile Cylinder Head U...
Quality Improvement in Low Pressure Die Casting Of Automobile Cylinder Head U...Quality Improvement in Low Pressure Die Casting Of Automobile Cylinder Head U...
Quality Improvement in Low Pressure Die Casting Of Automobile Cylinder Head U...
 
Six Sigma Final
Six Sigma FinalSix Sigma Final
Six Sigma Final
 
Quick introduction to lean and six sigma
Quick introduction to lean and six sigmaQuick introduction to lean and six sigma
Quick introduction to lean and six sigma
 
Six sigmaforsoftware
Six sigmaforsoftwareSix sigmaforsoftware
Six sigmaforsoftware
 
IJIRS_Improvement of Quality Sigma Level of Copper Terminal at Vertical Machi...
IJIRS_Improvement of Quality Sigma Level of Copper Terminal at Vertical Machi...IJIRS_Improvement of Quality Sigma Level of Copper Terminal at Vertical Machi...
IJIRS_Improvement of Quality Sigma Level of Copper Terminal at Vertical Machi...
 
Six sigma - pimg
Six sigma - pimgSix sigma - pimg
Six sigma - pimg
 
Six sigma ajal
Six sigma ajalSix sigma ajal
Six sigma ajal
 
IRJET- Quality Improvement in Building Construction using Six Sigma
IRJET-  	  Quality Improvement in Building Construction using Six SigmaIRJET-  	  Quality Improvement in Building Construction using Six Sigma
IRJET- Quality Improvement in Building Construction using Six Sigma
 
Six Sigma for Beginners- Yellow and Green Belt
Six Sigma for Beginners- Yellow and Green BeltSix Sigma for Beginners- Yellow and Green Belt
Six Sigma for Beginners- Yellow and Green Belt
 
Six Sigma in Manufacturing Industries Barriers to Implementation.pdf
Six Sigma in Manufacturing Industries  Barriers to Implementation.pdfSix Sigma in Manufacturing Industries  Barriers to Implementation.pdf
Six Sigma in Manufacturing Industries Barriers to Implementation.pdf
 
IRJET- Quality Audit of Public Building Project by using Six Sigma Techniques
IRJET- Quality Audit of Public Building Project by using Six Sigma TechniquesIRJET- Quality Audit of Public Building Project by using Six Sigma Techniques
IRJET- Quality Audit of Public Building Project by using Six Sigma Techniques
 
Introduction to Six Sigma
Introduction to Six SigmaIntroduction to Six Sigma
Introduction to Six Sigma
 
Scrum in Practice
Scrum in PracticeScrum in Practice
Scrum in Practice
 
Six sigma,SIPOC, Fact based decison making
Six sigma,SIPOC, Fact based decison makingSix sigma,SIPOC, Fact based decison making
Six sigma,SIPOC, Fact based decison making
 
Interface Between Six Sigma and Knowledge Management
Interface Between Six Sigma and Knowledge ManagementInterface Between Six Sigma and Knowledge Management
Interface Between Six Sigma and Knowledge Management
 
6sigma
6sigma6sigma
6sigma
 
Six Sigma_DMAIC_Bharath Seminar
Six Sigma_DMAIC_Bharath SeminarSix Sigma_DMAIC_Bharath Seminar
Six Sigma_DMAIC_Bharath Seminar
 
CapstonePaper_Mahesh(1)
CapstonePaper_Mahesh(1)CapstonePaper_Mahesh(1)
CapstonePaper_Mahesh(1)
 

More from Ramiro Cid

Seminario sobre ciberseguridad
Seminario sobre ciberseguridadSeminario sobre ciberseguridad
Seminario sobre ciberseguridadRamiro Cid
 
Captación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagenCaptación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagenRamiro Cid
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for saleRamiro Cid
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?Ramiro Cid
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500Ramiro Cid
 
Cyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationCyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationRamiro Cid
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection RegulationRamiro Cid
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Thinking on risk analysis
Thinking on risk analysisThinking on risk analysis
Thinking on risk analysisRamiro Cid
 
Drones and their use on critical infrastructure
Drones and their use on critical infrastructureDrones and their use on critical infrastructure
Drones and their use on critical infrastructureRamiro Cid
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyRamiro Cid
 
Space computing
Space computingSpace computing
Space computingRamiro Cid
 
The relation between internet of things, critical infrastructure and cyber se...
The relation between internet of things, critical infrastructure and cyber se...The relation between internet of things, critical infrastructure and cyber se...
The relation between internet of things, critical infrastructure and cyber se...Ramiro Cid
 
Internet of things
Internet of thingsInternet of things
Internet of thingsRamiro Cid
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Risk optimization management inside it governance
Risk optimization management inside it governanceRisk optimization management inside it governance
Risk optimization management inside it governanceRamiro Cid
 
Summit itSMF - Risk optimization management inside it governance
Summit itSMF - Risk optimization management inside it governanceSummit itSMF - Risk optimization management inside it governance
Summit itSMF - Risk optimization management inside it governanceRamiro Cid
 

More from Ramiro Cid (20)

Seminario sobre ciberseguridad
Seminario sobre ciberseguridadSeminario sobre ciberseguridad
Seminario sobre ciberseguridad
 
Captación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagenCaptación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagen
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500
 
Cyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationCyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk Aggregation
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Thinking on risk analysis
Thinking on risk analysisThinking on risk analysis
Thinking on risk analysis
 
Drones and their use on critical infrastructure
Drones and their use on critical infrastructureDrones and their use on critical infrastructure
Drones and their use on critical infrastructure
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacy
 
Space computing
Space computingSpace computing
Space computing
 
The relation between internet of things, critical infrastructure and cyber se...
The relation between internet of things, critical infrastructure and cyber se...The relation between internet of things, critical infrastructure and cyber se...
The relation between internet of things, critical infrastructure and cyber se...
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Risk optimization management inside it governance
Risk optimization management inside it governanceRisk optimization management inside it governance
Risk optimization management inside it governance
 
Summit itSMF - Risk optimization management inside it governance
Summit itSMF - Risk optimization management inside it governanceSummit itSMF - Risk optimization management inside it governance
Summit itSMF - Risk optimization management inside it governance
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Lean Six Sigma methodology

  • 1. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Ramiro Cid | @ramirocid Lean Six Sigma Methodology
  • 2. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 2 Index 1. Concepts Slide 3 2. Introduction Slide 4 3. DMAIC Slide 7 4. Process Mapping Slide 8 5. Fishbone Diagram Slide 9 6. SIPOC Slide 10 7. CTQ’s Slide 11 8. Metrics Slide 12 9. Risk Analysis Slide 13 10. Graphs Slide 14 11. Business Case Slide 15 12. Certifications Slide 16 13. Sources used and webs to expand knowledge Slide 17
  • 3. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Lean: Created by Toyota on 1989. (Author: Jim P. Womack) Focus on speed and best cost (efficiency) Main concepts of this methodology: Identify and remove 8 wastes: Transport, Inventory, Motion, Waiting, Over production, Over processing, Defects and Skills Six Sigma: Created by Motorola on 1985 Focus on effectivity of processes Some companies who implemented Six Sigma: GE (implemented and refined it), 3M, Airbus, Phillips Main concepts of this methodology: 1) Statistical number, 2) Methodology (DMAIC), 3) Philosophy on customer focus and in 0 defects. 4) Data driven decisions 1. Concepts
  • 4. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Lean Six Sigma is a process improvement methodology that relies on a collaborative team effort to improve performance by systematically removing waste, combining Lean and Six Sigma to eliminate the eight kinds of waste (muda): Transportation, Inventory, Motion, Waiting, Over production, Over processing, Defects, and Skills (abbreviated as 'TIMWOODS'). The Lean Six Sigma concepts were first published in a book titled Lean Six Sigma: Combining Six Sigma with Lean Speed by Michael George and Robert Lawrence Jr. in 2002 Lean Six Sigma utilizes the DMAIC (Define, Measure, Analyze, Improve and Control) phases similar to that of Six Sigma. Lean Six Sigma projects comprise aspects of Lean's waste elimination and the Six Sigma focus on reducing defects, based on critical to quality (CTQ) characteristics. In the next slides we will see some tools used by this methodology. To show all them we will include some examples to show how to use each of them. 2. Introduction
  • 5. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Lean Six Sigma includes concepts of both methodologies. Six Sigma use statistics tools for characterization and study of the processes, this is the reason of the name, as sigma is the standard deviation which gives an idea of the variability in a process and the goal of Six Sigma is to reduce it so that the process is always within the limits set by customer requirements. 1 sigma = 690,000 DPMO = 32% efficiency 2 sigma = 308,538 DPMO = 69% efficiency 3 sigma = 66,807 DPMO = 93.3% efficiency 4 sigma = 6.210 DPMO = 99.38% efficiency 5 sigma = 233 DPMO = 99.977% efficiency 6 sigma = 3.4 DPMO = 99.99966% efficiency 7 sigma = 0.019 DPMO = 99.9999981% efficiency Note: DPMO means “Defects per million opportunities” 2. Introduction
  • 6. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Regarding the other methodology, Lean manufacturing or lean production, often simply "lean", is a systematic method for the elimination of waste ("Muda") within a manufacturing system. Lean also takes into account waste created through overburden ("Muri") and waste created through unevenness in work loads ("Mura"). Working from the perspective of the client who consumes a product or service, "value" is any action or process that a customer would be willing to pay for. Lean principles are derived from the Japanese manufacturing industry. The eight muda are: 1. Transport (moving products that are not actually required to perform the processing 2. Inventory (all components, work in process, and finished product not being processed 3. Motion (people or equipment moving or walking more than is required to perform the processing 4. Waiting (waiting for the next production step, interruptions of production during shift change 5. Overproduction (production ahead of demand 6. Over Processing (resulting from poor tool or product design creating activity 7. Defects (the effort involved in inspecting for and fixing defects 8. Skills (waste of Skills, referred to as "under-utilizing capabilities and delegating tasks with inadequate training) 2. Introduction
  • 7. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 7 3. DMAIC DEFINE CONTROL IMPROVE ANALYSE MEASURE Project Charter ü Process Mapping ü Fishbone diagram ü Process Analysis ü Create Solutions ü Select Solutions ü Validate Solutions ü Implement Solutions ü Monitoring ü Documentation ü What’s my problem ? How big is my problem ? What are the root causes of my problem ? What is the best solution ? How can we sustain the improvement ? “Big impact on business during IT infrastructure incidents” SLA’s vs. Resolution time average This lack of visibility of critical information technology is a problem To have a monitoring system connected to Incident management application Doing the maintenance and update of all IT Assets in the monitoring system One practical example:
  • 8. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid An example of a Process mapping where an IT Incident management: 4. Process Mapping
  • 9. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid An example of a Fishbone Diagram where time to resolve an incident is the target and we have 6 different domains: Man, Method, Materials, Mother Nature, Machine and Measurement 5. Fishbone Diagram
  • 10. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid An example of a SIPOC table where the different steps we have on Process Mapping are showed as a table: 6. SIPOC Supplier Input Process Output Customer Customer Call / Email / Monitoring tool Notification Detection Record in Incident Management tool Monitory tool Alarms Notification Detection Record in Incident Management tool Infrastructure System logs Analyze Record in Incident Management tool IT Area Knowledge / Experience / Documentation Corrective action Record in Incident Management tool IT Area Solution found Quality check Notification Customer Feedback Close incident Record in Incident Management tool IS
  • 11. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid An example of a CTQ’s where we could see 3 different aspects of a problem: a) VOC (‘Voice of Client’) where we include what our customer (internal or external) wants, b) Statements which are close to the true (possible to get) and finally c) CTQ which is like the SLA of the target we want to reach. 7. CTQ’s VOC True need CTQ "Alarm notification at the time it happens" Time [< 5 Minutes] 1 minute to receive the alert on Incident management from monitoring tool "I would not need to report the incident" 0 Incidents reported by users All IT assets monitored "No delays on my process because IT infrastructure reason" Resolution time following SLAs in Incident management tool Resolution time following SLAs in Incident management tool
  • 12. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid An example of metrics we want to reach using an Incident management tool: 8. Metric Reference: SLA Interactions or incidents SLA (Resolution time objective) Days SLA (Resolution time objective) Hours 1 - Critical 0,25 6 2 - High 0,25 6 3 - Average 1 24 4 - Low 4 32
  • 13. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid An example of Risk Analysis. In spite of is not mandatory to use it on Lean Six Sigma, it is ever recommended to do it to get the risks of a new project, environment, change, etc. with the target of reduce as much as possible the residual risk (the risk after apply controls): 9. Risk Analysis C I A factor value No dual power source in routers In case some electric phase is down the router will be down 2 routers: Main and backup. Backup router give service in less than 10 seconds in case of the main crash. Both are connected in different electric phases x 1 4 1 4 No dual power source in Colt fibber convertes in front of routers In case some electric phase is down the router will be down 2 routers: Main and backup. Backup router give service in less than 10 seconds in case of the main crash. Both are connected in different electric phases x 1 4 1 4 Router not accessible by in case WAN connection crashes In case WAN connection is down will not be able to access to manage the router have a management modem connected by an analogic line to manage the router by console port x 1 1 2 2 Router Buenos Aires John Smith Michael Johnson Location/s Power user Vulnerability description Threat description Existing Controls/practicesAsset Risk Owner ProbabilityImpact Risk Value Assets criticality
  • 14. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid In spite of is not mandatory to use them on Lean Six Sigma, it is ever recommended to do because help us to show data in an easy way so giving us support to our statements. We can use MS Excel or similar tools, but we have an specific tool for statistical data management and graphs called ‘Minitab’ very useful for Lean Six Sigma projects 10. Graphs
  • 15. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid An example of summary of a Business Case (after do all the calculations needed to get the final figures): A Business Case is ever needed to justify our investments (CAPEX and/or OPEX) in a project so for Lean Six Sigma it is important too to do it. 11. Business Case Gross Profit Topic Total Cost Gross Profit 1st year: Cost of monitoring - Cost of incidents - 10% of saving because monitoring rollout) 5.530,00 € No profit Gross Profit next years: Cost of monitoring - Cost of incidents - 10% of saving because monitoring rollout) 730,00 € No profit
  • 16. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid There are 4 steps to be certificated on Lean Six Sigma: 12. Certifications
  • 17. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid  What is Lean Six Sigma | goleansixsigma.com URL: https://goleansixsigma.com/what-is-lean-six-sigma/  ‘Lean Six Sigma’ | Wikipedia URL: https://en.wikipedia.org/wiki/Lean_Six_Sigma  What is Six Sigma? | AU: T. M. Kubiak and Donald W. Benbow URL: http://asq.org/learn-about-quality/six-sigma/overview/overview.html  Six Sigma vs. Lean Six Sigma | Villanova University URL: http://www.villanovau.com/resources/six-sigma/six-sigma-vs-lean-six-sigma/#.V87e7UYqSJ8  LSSI – Lean Six Sigma Institute URL: http://www.leansixsigmainstitute.org/ 13. Sources used to expand knowledge
  • 18. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Questions? Many thanks ! Ramiro Cid CISM, CGEIT, ISO 27001 LA, ISO 22301 LA, ITIL ramiro@ramirocid.com @ramirocid http://www.linkedin.com/in/ramirocid http://ramirocid.com http://es.slideshare.net/ramirocid http://www.youtube.com/user/cidramiro