Tuesday, December 30, 2008

Managing Six Sigma or Planning for Pki

Managing Six Sigma: A Practical Guide to Understanding, Assessing, and Implementing the Strategy That Yields Bottom-Line Success

Author: Becki Meadows

Advance Praise for Managing Six Sigma "This book is a unique blend of practical knowledge and cultural change, revolution and evolution strategies. I recommend that serious managers buy the book, spend some serious time reading, and then go out and use its lessons to make a name for themselves."-William Baker, Benchmarking/Knowledge Transfer Office, Raytheon Corporation "I believe Managing Six Sigma will be the new reference standard for the quality movement in coming years."-Robert T. Hunter, Executive Vice President, Rehnborg Center for Nutrition and Wellness

"[The authors'] step-by-step process for integrating the tools of Six Sigma takes the mystery out of this methodology and, by itself, makes this book worth having."-Dennis Adsit, PhD, Vice President, Quality, Intuit

"Breyfogle's Six Sigma deployment methodology is explained in detail for four different business processes: manufacturing, service, transactional, and development. . . . His 21-step plan for each business process is explained in a way that allows any type of company to perform a successful implementation."-Mark Feller, Director of Quality, Baker Electronics

"Breyfogle teaches not only the wider application but also the deeper implications and in-depth implementation of Six Sigma deployment in organizations large and small."-Ram Josyula, President, gelrad.com

Managing Six Sigma is the only book that provides both detailed coverage of Six Sigma techniques and effective methods for managing those who implement Six Sigma. With real-world case studies recounting the triumphs and pitfalls encountered during successful implementations at Motorola and General Electric-plus plans,checklists, and metrics to speed up the implementation process-this rich resource helps managers solve problems effectively and ensure a fast, smooth, and successful Six Sigma implementation.

Booknews

Provides both detailed coverage of Six Sigma techniques and effective methods for managing those who implement Six Sigma. Focus is on manufacturing, development, and service/transactional examples that serve as a bridge between Six Sigma techniques and real-world situations. Case studies recount experiences of successful implementations at Motorola, Eastman Kodak, and General Electric. Equations and formulas are presented only when necessary. Includes plans, checklists, and metrics to speed up the implementation process. Breyfogle is founder of a company specializing in training and consulting in Six Sigma methodologies. Annotation c. Book News, Inc., Portland, OR (booknews.com)

John Wiley and Sons, Inc.

Advance Praise for Managing Six Sigma

"This book is a unique blend of practical knowledge and cultural change, revolution and evolution strategies. I recommend that serious managers buy the book, spend some serious time reading, and then go out and use its lessons to make a name for themselves." -- William Baker, Benchmarking/Knowledge Transfer Office, Raytheon Corporation

"I believe Managing Six Sigma will be the new reference standard for the quality movement in coming years." -- Robert T. Hunter, Executive Vice President, Rehnborg Center for Nutrition and Wellness

"[The authors'] step-by-step process for integrating the tools of Six Sigma takes the mystery out of this methodology and, by itself, makes this book worth having." -- Dennis Adsit, Ph.D., Vice President, Quality, Intuit

"Breyfogle's Six Sigma deployment methodology is explained in detail for four different business processes: manufacturing, service, transactional, and development. His 21-step plan for each business process is explained in a way that allows any type of company to perform a successful implementation." -- Mark Feller, Director of Quality, Baker Electronics

"Breyfogle teaches not only the wider application but also the deeper implications and in-depth implementation of Six Sigma deployment in organizations large and small." -- Ram Josyula, President, gelrad.com



Table of Contents:
WHY SIX SIGMA.
How Six Sigma Compares to Other Quality Initiatives.
Six Sigma Background and Fundamentals.
Six Sigma Needs Assessment.
SIX SIGMA METRICS.
Numbers and Information.
Crafting Insightful Metrics.
Performance Measurement.
SIX SIGMA BUSINESS STRATEGY.
Deployment Alternatives.
Creating a Successful Six Sigma Infrastructure.
Training and Implementation.
Project Selection, Sizing, and Other Techniques.
APPLYING SIX SIGMA.
Manufacturing Applications.
Service/Transactional Applications.
Development Applications.
Need for Creativity, Invention, and Innovation.
List of Symbols.
Glossary.
References.
Index.

New interesting textbook: Lower Your Blood Pressure in 8 Weeks or I Cant Chew Cookbook

Planning for Pki: Best Practices Guide for Deploying Public Key Infrastructure

Author: Russ Housley

An in-depth technical guide on the security technology driving Internet e-commerce expansion.
"Planning for PKI" examines the number-one Internet security technology that will be widely adopted in the next two years. Written by two of the architects of the Internet PKI standards, this book provides authoritative technical guidance for network engineers, architects, and managers who need to implement the right PKI architecture for their organization. The authors discuss results and lessons learned from early PKI pilots, helping readers evaluate PKI deployment impact on current network architecture while avoiding the pitfalls of early technical mistakes. Four technical case studies detail the do's and don'ts of PKI implementation, illustrating both successes and failures of different deployments. Readers will also learn how to leverage future PKI-related technologies for additional benefits.

Booknews

Housely, a scientist developing computer security products, and Polk, the technical lead for public key infrastructure at the US National Institute of Standards and Technology, explain how to deploy, operate, and maintain a major component of current network security solutions. Citing case studies of pioneering implementations, they illustrate its use in securing electronic business communications and transactions. Annotation c. Book News, Inc., Portland, OR (booknews.com)



No comments: