The Six Sigma Method and Design of Experiments

Six Sigma is becoming a proven approach for businesses and organizations to improve their performance. The spectrum of companies actively engaging in Six Sigma today is wide from industrials like Celanese, Caterpillar, GE, Honeywell, and 3M to service/retail organizations like Starwood Hotels, Sears, and Home Depot. Six Sigma has even started in the financial industry with Bank of America and JPMorgan Chase initiating major deployments in the past two years. Probably the most exciting area is in the public and healthcare sectors with success stories emerging from city government and John Hopkins Medical.

So what is all this excitement about? Haven't these quality tools been around for years? Is it just the fact that people have strange names like Champion, Green Belt, Black Belt and for the chosen few, Master Black Belt? Okay, if it is not the names then what? Six Sigma's success revolves around the fundamental elements needed for any successful organization. Six Sigma starts with a vision of delivering products and services to customers with no defects from the eyes of the customers. For companies it is vital to deliver these products and services at a profit. Once the organization has created their own vision of Six Sigma, the business leaders need to define their organization's objectives in numerical terms. These "high-level metrics," often called big Y's in Six Sigma, are the foundation for identifying project y's that Six Sigma Belts will execute projects on. With big Y's in hand, business leaders called Six Sigma "Champions" breakdown these organizational level Y's into smaller y's a project leader called a Green Belt or Black Belt can work from.

So what's next, do business leaders take a hands-off management by objectives (MBO) approach of, "I don't care how you do it as long as you get results!"? For Six Sigma organizations the answer is a loud "NO." Champions do care how projects are executed and have appointed highly trained Master Black Belts to assist and mentor project leaders in applying the Six Sigma method to manage their projects. I believe this is the key to Six Sigma's success. In a past life I participated in a high-level meeting with executives from the world leader in the production of a product we all know. The purpose of the meeting and visit was to evaluate a critical new product design. All of the high-tech executives were dressed in dark Italian business suits complemented with gold and diamonds. I listened closely to each question these executives asked. I never once heard "how much?", "when?" or even "why?" ? every question was "by what method?." Methodology is what Six Sigma is about.

Six Sigma Methods

There have evolved two key methods for carrying out Six Sigma projects. The first method is the most well-defined and works best if you have a problem with an unknown solution in existing products, processes or services. This method is called DMAIC or Define, Measure, Analyze, Improve and Control. The newest method, which is in the developing stages, is called Design for Six Sigma or DFSS. The goal of DFSS is to develop a new product, process or service that is defect-free in the eyes of the customer. A number of consulting companies have invented roadmaps for DFSS like IDOV (Identify, Design, Optimize and Validate) and DMADV (Design, Measure, Analyze, Design and Verify).

Six Sigma and Design of Experiments

Once an organization has decided on the method and the project y's, Belts are marched off to training "waves" bringing management-approved projects to class. DMAIC Green Belt training is normally two one-week sessions separated by one month. Black Belt training waves are extended by two additional months with two more weeks of training. The emphasis during the extended two weeks of Black Belt training is often on learning more details about advanced tools such as Design of Experiments (DOE).

So where does Design of Experiments fit into Six Sigma? Six Sigma is about understanding and controlling the variation of key process variables known as inputs or x's in order to obtain improved results on project outputs or y's. In Design of Experiment terms these inputs or x's are often referred to as factors and the outputs are referred to as responses. In nearly all Six Sigma projects the relationship of the project y's takes on the form of y=f(x1,x2,...xn). Wait a minute, isn't this what Design of Experiments is all about? Of course, for almost 100 years Design of Experiments has been proven to be one of the best known methods for validating and discovering relationships between responses and factors. In Six Sigma terms it is discovering the relationship between outputs called y's and inputs called x's. Today's Six Sigma Belts are primarily taught to focus their use of Design of Experiments in the Improve phase of DMAIC and the Optimize phase of IDOV. For DMAIC Six Sigma training the most common experimental designs taught are factorial and fractional factorial designs. Some curriculums introduce response surface designs and optimization designs at a high level. DFSS includes the experimental designs taught in all levels of DMAIC training and often expands to include the concept of robust designs. As an alternative to the classical approach, there are also a number of consulting companies teaching Taguchi designs as the preferred method for robust design.

Final Remarks

Six Sigma looks as though it is here to stay and even in today's slow economy one of the few areas where there still are a number of new positions. The Six Sigma process is a great step toward creating learning organizations with its well-defined roadmaps and management structure. As with most new methodologies Six Sigma will mature and grow as it expands into new areas such as DFSS. As Six Sigma professionals learn more about the power of properly planned experiments, Design of Experiments will be integrated into most phases of the Six Sigma roadmap and not just considered an advanced tool for the improvement and optimization phases. Experienced practitioners of statistical methods like Design of Experiments should learn the language of Six Sigma and help integrate new methods into the Six Sigma process to improve its effectiveness.

Peter Peterka is the leading consultant for 6sigma.us. Peter has eleven years of experience performing as a Master Black Belt, working with numerous companies, including 3M, Dell, Dow, GE, HP, Intel, Motorola, Seagate, and Xerox. You can signup for Peter's 6sigma.us at 6sigma.us.

trusted cleaning company Bannockburn ..
In The News:

Apple's iOS 26.1 update delivers major security fixes, performance boosts and enhanced privacy controls for your iPhone. Discover why updating now protects your data.
Russian hackers use fake CAPTCHA tests to spread dangerous malware targeting governments and journalists. Learn how to protect yourself from these deceptive attacks.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Miami-Dade debuts America's first autonomous police SUV with AI cameras, drone deployment and real-time crime detection in groundbreaking law enforcement pilot.
Bank impostor scams cost Americans $2.9 billion as criminals use AI voices and caller ID spoofing to steal life savings. Learn nine essential fraud protection tips.
Foreign-owned apps secretly harvest personal data from seniors, making them prime targets for scams. Learn how to protect your privacy and stop data brokers today.
Sens. Josh Hawley and Richard Blumenthal introduce bipartisan GUARD Act to protect minors from AI chatbots through mandatory age verification and disclosure requirements.
Ghost-tapping scammers exploit wireless technology to drain accounts through small transactions, but RFID-blocking wallets and transaction alerts can protect you.
French pilot project demonstrates wireless charging roads that can deliver over 300 kilowatts of power to EVs while driving, potentially eliminating range anxiety.
YouTube's Ghost Network spreads information-stealing malware through thousands of fake videos offering cracked software, using compromised accounts and fake engagement.
Protect your privacy by disabling your smart TV microphone. Most TVs have hidden mics that listen even when voice commands are off. Learn quick steps to stop unwanted audio capture.
SessionReaper vulnerability hits Magento and Adobe Commerce stores, compromising 250+ sites in one day. Hackers steal data and hijack shopping sessions.
Master essential parental controls and digital safety tools to protect your kids online. Learn screen time limits, location settings and privacy controls every parent needs.
Cybersecurity expert shares six essential steps to protect against dark web threats, including data removal services, password managers and antivirus software.
NVIDIA GPU space mission could revolutionize cloud services by enabling orbital data centers that make apps, games and AI tools faster and more efficient.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Microsoft warns Windows 10 users face serious security risks as 90% of ransomware attacks target unsupported systems. Learn why upgrading to Windows 11 is crucial.
Nike unveils Project Amplify, revolutionary motorized shoes developed with Dephy that add powered assistance to every step for runners and walkers.
Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.

How to Snuff Out the Competition Without Leaving a Mark

Does the competition drive you crazy?Are they relentless about taking... Read More

Invalid Excuses for Poor Business Results - The Economy

Note to Rite Aid and CVS: It's not about the... Read More

Site Selection and Demographic Tips for Establishing Outlets

Many cities have home pages on the Internet. Many of... Read More

What Every Service Provider Ought To Know About Writing A Business Plan

It's easy to lose sight of what needs to be... Read More

Strategy Without Tactics is Futile

From time to time there seems to be a flurry... Read More

Do You Really Need a Business Plan?

"I don't need a business plan."Neither did Alice in Wonderland."Would... Read More

Abstract Thought; Business Strategies and Biological Systems

To stop a computer virus you must understand how it... Read More

Legal Strategies in Business Plans

Writing a Business Plan these days is tough, venture capitalists... Read More

Innovators Role at Hard Times

One Research Scientist at the Hewlett-Packard (HP) Imaging Systems laboratory... Read More

Mining Market Data

With a heightened awareness of opportunity, ideas can often be... Read More

When Do I Need To Hire A Business Plan Consultant

Every new business owner knows that a business plan is... Read More

25 Ways To Find Companies To Buy

When you start your program to purchase your "ideal" company,... Read More

Clearing the Path: 4 Ways Fear Wreaks Havoc on Your Dream and What to Do About It

Please take a moment before you read any further and... Read More

Urban Flight in Ohio

Many of Ohio's downtown areas are in need of upgrading... Read More

The Top Five Reasons Strategic Plans Fail

"Most great plans aren't. They are just nice, high-level ideas."That's... Read More

Shortening Product Life Cycle!

The current state of the available technology at the disposal... Read More

Strategic Acquisition Strategies for Small Businesses

Growth through acquisition should not be considered an option reserved... Read More

College Students and Graduates to Run Company Outlets or Franchises

Does your overall business strategy include the recruitment of college... Read More

2 Simple Steps Before Starting Your Business

There is so much small business information available today that... Read More

Business Plan 101 How to Write a Table of Contents

No matter what business you plan to start in your... Read More

Break-Even Analysis

A significant advantage of some business ideas is that the... Read More

Are You Ready To Go International?

Although North Americans were the dominant population on the Internet,... Read More

Hunters and Gatherers - Are You Serving Both Their Needs?

The University of Exeter in the United Kingdom recently published... Read More

Three Easy Ways To Know Thy Competitor

"Did you hear what your competitor is doing?" This question... Read More

Dotcom Business Plans Archive Project

One of the most important initiatives in the domain of... Read More

luxury cleaning services Lake Forest ..