The Six Sigma Method and Design of Experiments

Six Sigma is becoming a proven approach for businesses and organizations to improve their performance. The spectrum of companies actively engaging in Six Sigma today is wide from industrials like Celanese, Caterpillar, GE, Honeywell, and 3M to service/retail organizations like Starwood Hotels, Sears, and Home Depot. Six Sigma has even started in the financial industry with Bank of America and JPMorgan Chase initiating major deployments in the past two years. Probably the most exciting area is in the public and healthcare sectors with success stories emerging from city government and John Hopkins Medical.

So what is all this excitement about? Haven't these quality tools been around for years? Is it just the fact that people have strange names like Champion, Green Belt, Black Belt and for the chosen few, Master Black Belt? Okay, if it is not the names then what? Six Sigma's success revolves around the fundamental elements needed for any successful organization. Six Sigma starts with a vision of delivering products and services to customers with no defects from the eyes of the customers. For companies it is vital to deliver these products and services at a profit. Once the organization has created their own vision of Six Sigma, the business leaders need to define their organization's objectives in numerical terms. These "high-level metrics," often called big Y's in Six Sigma, are the foundation for identifying project y's that Six Sigma Belts will execute projects on. With big Y's in hand, business leaders called Six Sigma "Champions" breakdown these organizational level Y's into smaller y's a project leader called a Green Belt or Black Belt can work from.

So what's next, do business leaders take a hands-off management by objectives (MBO) approach of, "I don't care how you do it as long as you get results!"? For Six Sigma organizations the answer is a loud "NO." Champions do care how projects are executed and have appointed highly trained Master Black Belts to assist and mentor project leaders in applying the Six Sigma method to manage their projects. I believe this is the key to Six Sigma's success. In a past life I participated in a high-level meeting with executives from the world leader in the production of a product we all know. The purpose of the meeting and visit was to evaluate a critical new product design. All of the high-tech executives were dressed in dark Italian business suits complemented with gold and diamonds. I listened closely to each question these executives asked. I never once heard "how much?", "when?" or even "why?" ? every question was "by what method?." Methodology is what Six Sigma is about.

Six Sigma Methods

There have evolved two key methods for carrying out Six Sigma projects. The first method is the most well-defined and works best if you have a problem with an unknown solution in existing products, processes or services. This method is called DMAIC or Define, Measure, Analyze, Improve and Control. The newest method, which is in the developing stages, is called Design for Six Sigma or DFSS. The goal of DFSS is to develop a new product, process or service that is defect-free in the eyes of the customer. A number of consulting companies have invented roadmaps for DFSS like IDOV (Identify, Design, Optimize and Validate) and DMADV (Design, Measure, Analyze, Design and Verify).

Six Sigma and Design of Experiments

Once an organization has decided on the method and the project y's, Belts are marched off to training "waves" bringing management-approved projects to class. DMAIC Green Belt training is normally two one-week sessions separated by one month. Black Belt training waves are extended by two additional months with two more weeks of training. The emphasis during the extended two weeks of Black Belt training is often on learning more details about advanced tools such as Design of Experiments (DOE).

So where does Design of Experiments fit into Six Sigma? Six Sigma is about understanding and controlling the variation of key process variables known as inputs or x's in order to obtain improved results on project outputs or y's. In Design of Experiment terms these inputs or x's are often referred to as factors and the outputs are referred to as responses. In nearly all Six Sigma projects the relationship of the project y's takes on the form of y=f(x1,x2,...xn). Wait a minute, isn't this what Design of Experiments is all about? Of course, for almost 100 years Design of Experiments has been proven to be one of the best known methods for validating and discovering relationships between responses and factors. In Six Sigma terms it is discovering the relationship between outputs called y's and inputs called x's. Today's Six Sigma Belts are primarily taught to focus their use of Design of Experiments in the Improve phase of DMAIC and the Optimize phase of IDOV. For DMAIC Six Sigma training the most common experimental designs taught are factorial and fractional factorial designs. Some curriculums introduce response surface designs and optimization designs at a high level. DFSS includes the experimental designs taught in all levels of DMAIC training and often expands to include the concept of robust designs. As an alternative to the classical approach, there are also a number of consulting companies teaching Taguchi designs as the preferred method for robust design.

Final Remarks

Six Sigma looks as though it is here to stay and even in today's slow economy one of the few areas where there still are a number of new positions. The Six Sigma process is a great step toward creating learning organizations with its well-defined roadmaps and management structure. As with most new methodologies Six Sigma will mature and grow as it expands into new areas such as DFSS. As Six Sigma professionals learn more about the power of properly planned experiments, Design of Experiments will be integrated into most phases of the Six Sigma roadmap and not just considered an advanced tool for the improvement and optimization phases. Experienced practitioners of statistical methods like Design of Experiments should learn the language of Six Sigma and help integrate new methods into the Six Sigma process to improve its effectiveness.

Peter Peterka is the leading consultant for 6sigma.us. Peter has eleven years of experience performing as a Master Black Belt, working with numerous companies, including 3M, Dell, Dow, GE, HP, Intel, Motorola, Seagate, and Xerox. You can signup for Peter's 6sigma.us at 6sigma.us.

professional maid services Deerfield ..
In The News:

Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Fake AI apps disguised as "ChatGPT" and "DALLĀ·E" are flooding app stores with dangerous malware that steals data and monitors users without detection.
Fake buyers demand specific vehicle reports from unknown sites to steal credit card information from car sellers, but warning signs can help identify these scams before paying.

3 Undercover Ways to Make Big Profits from Your Competition

You have heard that there is extra money on the... Read More

How to Grow Your Business by Clearing the Way to Growth

Is your business growing as fast and effectively as it... Read More

Strategy Without Tactics is Futile

From time to time there seems to be a flurry... Read More

25 Ways To Find Companies To Buy

When you start your program to purchase your "ideal" company,... Read More

Microsoft Great Plains Implementation: Pharmaceutical Corporation Specifics ? overview

Microsoft Business Solutions Great Plains serves mid-size and large clients... Read More

6 Changes You Can Make to Increase Business Profits

I read once that something like 30 percent of all... Read More

How To Kick Start Your Business And Double Your Profits

This will make some people angry as hell, but it's... Read More

Business Plan: The Simplest Business Plan Ever

If you're a solo professional like I am, you know... Read More

During the election we heard about Ohio?s Economy

Much of what we heard in the mass media about... Read More

Mobile Franchise Business Expansion Strategy

If you own a mobile franchise business and wish to... Read More

Are You Aware of Planning in Business?

Human beings are rational agents. Rationality endorses one to take... Read More

Completing the Annual Planning Process

Imagine an office without a desk, or lights, a computer,... Read More

Business Plan 101 How to Write a Table of Contents

No matter what business you plan to start in your... Read More

Regroup - How To Do It And Why It Works

Regroup?is this a new management trend? Not a chance! Regroup... Read More

Strategic Acquisition Strategies for Small Businesses

Growth through acquisition should not be considered an option reserved... Read More

What is Your MSP?

For many consumers and producers, MSP is an acronym for... Read More

Why You Need a Business Planning System NOT a Business Plan

When someone mentions business planning we have been conditioned to... Read More

Mining Market Data

With a heightened awareness of opportunity, ideas can often be... Read More

Troubled Waters Require Capable Leaders at the Helm

Canada's lean leaders need to look beyond the horizon and... Read More

Microsoft Great Plains Implementation: Healthcare/Hospital example ? overview for consultant

Microsoft Great Plains fits multiple services market niche and healthcare... Read More

How to Start A Business Plan

A business plan precisely defines your business, identifies your goals,... Read More

Attributes of Companies You Dont Want to Buy!

There are no "rules of thumb" in the pursuit of... Read More

Executive Summary for Business Plans of Franchisees

Writing a business plan for a franchised outlet of a... Read More

Fail to plan... or Plan to FAIL??

Running a business, whether it be an offline multi-billion dollar... Read More

Do You Have A Customer Identity Crisis?

The trick is to determine what uniquely identifies your best... Read More

quick home cleaning Lake Forest ..