Home > Store

Applying Design for Six Sigma to Software and Hardware Systems

Register your product to gain access to bonus material or receive a coupon.

Applying Design for Six Sigma to Software and Hardware Systems

Premium Website

  • Sorry, this book is no longer in print.
Not for Sale

Description

  • Copyright 2010
  • Edition: 1st
  • Premium Website
  • ISBN-10: 0-13-714430-X
  • ISBN-13: 978-0-13-714430-3

The Practical, Example-Rich Guide to Building Better Systems, Software, and Hardware with DFSS

Design for Six Sigma (DFSS) offers engineers powerful opportunities to develop more successful systems, software, hardware, and processes. In Applying Design for Six Sigma to Software and Hardware Systems, two leading experts offer a realistic, step-by-step process for succeeding with DFSS. Their clear, start-to-finish roadmap is designed for successfully developing complex high-technology products and systems that require both software and hardware development.

Drawing on their unsurpassed experience leading Six Sigma at Motorola, the authors cover the entire project lifecycle, from business case through scheduling, customer-driven requirements gathering through execution. They provide real-world examples for applying their techniques to software alone, hardware alone, and systems composed of both. Product developers will find proven job aids and specific guidance about what teams and team members need to do at every stage.

Using this book’s integrated, systems approach, marketers, software professionals, and hardware developers can converge all their efforts on what really matters: addressing the customer’s true needs.

Learn how to

  • Ensure that your entire team shares a solid understanding of customer needs
  • Define measurable critical parameters that reflect customer requirements
  • Thoroughly assess business case risk and opportunity in the context of product roadmaps and portfolios
  • Prioritize development decisions and scheduling in the face of resource constraints
  • Flow critical parameters down to quantifiable, verifiable requirements for every sub-process, subsystem, and component
  • Use predictive engineering and advanced optimization to build products that robustly handle variations in manufacturing and usage
  • Verify system capabilities and reliability based on pilots or early production samples
  • Master new statistical techniques for ensuring that supply chains deliver on time, with minimal inventory
  • Choose the right DFSS tools, using the authors’ step-by-step flowchart
If you’re an engineer involved in developing any new technology solution, this book will help you reflect the real Voice of the Customer, achieve better results faster, and eliminate fingerpointing.

About the Web Site  The accompanying Web site, sigmaexperts.com/dfss, provides an interactive DFSS flowchart, templates, exercises, examples, and tools.

Sample Content

Online Sample Chapter

Applying Design for Six Sigma to Software and Hardware Systems: Requirements Flow-Down

Sample Pages

Download the sample pages (includes Chapter 10 and Index)

Table of Contents

Foreword      xvii
Preface      xxi
Acknowledgments      xxvii
About the Authors      xxix


Chapter 1: Introduction: History and Overview of DFSS      1
A Brief Historical Perspective on Six Sigma and Design for Six Sigma (DFSS) 1
Historical Perspective on Design for Six Sigma 8
DFSS Example 14
Summary 27

Chapter 2: DFSS Deployment      29
Ideal Scenario for DFSS Deployment 29
Steps Involved in a Successful DFSS Deployment 30
DFSS Deployment: Single Project 45
Minimum Set of Tools, and the “One Tool Syndrome” 47
Goals for DFSS 48
“The DFSS Project was a Success, But . . .” 50
Summary 50

Chapter 3: Governance, Success Metrics, Risks, and Certification      53
DFSS Governance 53
Success Metrics 57
Product Development Risks 58
DFSS Certification 62
Summary 64

Chapter 4: Overview of DFSS Phases      65
DFSS for Projects, Including Software and Hardware 65
DFSS Process Nomenclatures 69
Requirements Phase 73
Architecture Phase 75
Architecture Phase for the Software Aspects 78
Design Phase 78
Integrate Phase 78
Optimize Phase 78
Verify Phase 80
Summary 82

Chapter 5: Portfolio Decision Making and Business Case Risk      83
Position within DFSS Flow 83
Portfolio Decision Making as an Optimization Process 84
Financial Metric 85
Portfolio Decisions and Resource Constraints 89
Goals, Constraints, Considerations, and Distractions 91
Adjusting Portfolio Decisions Based on Existing Commitments and the Organization’s Strategic Direction 92
Summary: Addressing Business Case Risk 94

Chapter 6: Project Schedule Risk      95
Position within DFSS Flow 95
Project Schedule Model 95
The “Fuzzy Front End” and Delays Caused by Changing Requirements 97
Time for First Pass: Critical Path versus Critical Chain 98
Critical Chain/Theory of Constraints Project Management Behaviors 103
Iterations, Qualification, and Release to Product 105
Summary: Addressing Schedule Risk 106

Chapter 7: Gathering Voice of the Customer to Prioritize Technical Requirements      107
Importance and Position within DFSS Flow 107
VOC Purpose and Objectives 110
The VOC Gathering (Interviewing) Team 110
Customer Selection 111
Voices and Images 112
Customer Interview Guide 113
Planning Customer Visits and Interviews 115
Customer Interviews 116
KJ Analysis: Grouping, Structuring and Filtering the VOC 117
Identifying Challenging Customer Requirements (NUDs) 120
Kano Analysis 122
Validation and Prioritization of Customer Requirements 124
Translating Customer Requirements to System Requirements: The System-Level House of Quality 124
Constructing a House of Quality 128
Summary: VOC Gathering—Tying It All Together 134

Chapter 8: Concept Generation and Selection      137
Position within DFSS Flow 137
Concept Generation Approaches 137
Brainstorming and Mind-Mapping 140
TRIZ 141
Alternative Architecture Generation: Hardware and Software 143
Generation of Robust Design Concepts 146
Consideration of Existing Solutions 147
Feasibility Screening 148
Developing Feasible Concepts to Consistent Levels 148
Concept Selection 149
Summary 152
Appendix: Kansei Engineering 152

Chapter 9: Identification of Critical Parameters and FMEA      153
Position within DFSS Flow 153
Definition of a Critical Parameter 153
Considerations from VOB and Constraints 155
Prioritization and Selection of Critical Parameters 157
FMEA 160
Software FMEA Process (Software Systems, Software Subsystems, and Software Components FMEA) 164
Software FMEA Implementation Case Study 169
Considerations of Reliability and Availability 172
Examples of Critical Parameters 174
Summary 176
Appendix: Software FMEA Process Documentation 176

Chapter 10: Requirements Flow-Down      187
Position within DFSS Flow 187
Flow-Down for Hardware and Software Systems 190
Anticipation of Potential Problems: P-Diagrams and DFMEA 193
Target and Spec Limits 197
Measurement System Analysis 198
Capability Analysis 202
Flow-Down or Decomposition 203
Flow-Down Examples 206
Initial Tolerance Allocation 208
Summary 210

Chapter 11: Software DFSS and Agile      211
Measuring the Agile Design 218
Summary 221

Chapter 12: Software Architecture Decisions      223
Software Architecture Decision-Making Process 224
Using Design Heuristics to Make Decisions 227
Using Architecture Tactics to Make Decisions 228
Using DFSS Design Trade-Off Analysis to Make Decisions 230
Using Design Patterns, Simulation, Modeling, and Prototyping for Decisions 234
Summary 235

Chapter 13: Predictive Engineering: Continuous and Discrete Transfer Functions      237
Discrete versus Continuous Critical Parameters 238
Methods for Deriving a Transfer Function for a Discrete Critical Parameter 241
Logistic Regression for Discrete Parameters 242
Methods for Deriving a Transfer Function for a Continuous or Ordinal Critical Parameter 244
Existing or Derived Equation (First Principles Modeling) 245
Modeling within a Spreadsheet, Mathematical Modeling Software, or Simulation Software 246
Empirical Modeling using Historical Data: Regression
Analysis and General Linear Model 247
Empirical Modeling using Design of Experiments 251
Empirical Modeling using Response Surface Methods 256
DOE with Simulators: Design and Analysis of Computer Experiments (DACE) 259
Summary 261

Chapter 14: Predictive Engineering: Optimization and Critical Parameter Flow-Up      263
Critical Parameter Flow-Up: Monte Carlo Simulation 266
Critical Parameter Flow-Up: Generation of System Moments (Root Sum of Squares) 267
Critical Parameter Scorecard 269
Selecting Critical Parameters for Optimization 270
Optimization: Mean and/or Variance 271
Optimization: Robustness through Variance Reduction 273
Multiple Response Optimization 280
Cooptimization of Cpk’s 282
Yield Surface Modeling 283
Case Study: Integrated Alternator Regulator (IAR) IC for Automotive 288
Summary 290

Chapter 15: Predictive Engineering: Software Optimization      293
Multiple Response Optimization in Software 293
Use Case Modeling in Optimization 294
Evaluate the Model 298
Software Mistake Proofing 299
Software Stability 303
Summary 305

Chapter 16: Verification of Design Capability: Hardware      307
Position within DFSS Flow 307
Measurement System Analysis (MSA) 307
Improvements for Inadequate Measurement Systems 310
The Risk of Failures Despite Verification: Test Escapes 313
Determine the Capability 315
Summary 316

Chapter 17: Verification of Reliability and Availability      319
Customer Perspective 319
Availability and Reliability Flow Down 321
Bathtub Curve and Weibull Model 322
Software Reliability 325
Early Life Failures/Infant Mortality 326
Useful Life/Constant Failure Rate 326
Wear Out 327
Detailed Flowchart for Reliability Optimization and Verification 327
Accelerated Life Testing 328
WeiBayes: Zero Failures Obtained from ALT 330
Risk of Failures Despite Verification: Reliability Test Escapes 331
Methods to Improve Reliability and Availability 332
Summary 333
Appendix: Case Studies—Software Reliability, and System Availability (Hardware and Software Availability) 333

Chapter 18: Verification: Software Testing Combined with DFSS Techniques      347
Software Verification Test Strategy Using Six Sigma 350
Controlling Software Test Case Development through Design Patterns 354
Improving Software Verification Testing Using Combinatorial Design Methods 356
Summary 358
Bibliography 359
Glossary of Common Software Testing Terms 359

Chapter 19: Verification of Supply Chain Readiness      363
Position within DFSS Flow 363
Verification that Tolerance Expectations Will Be Met 366
Confidence in Robust Product Assembly (DFMA) 366
Verification of Appropriate and Acceptable Interface Flows 369
Confidence in the Product Launch Schedule 369
Confidence in Meeting On-Time Delivery and Lead-Time Commitments 370
Case Study: Optoelectronic Multichip Module 380
Summary 382

Chapter 20: Summary and Future Directions      385
Future Directions 386

Index       391

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020