Wednesday, October 28, 2009

Push/Pull Marketing:

A marketing concept in which product is "pushed" by a manufacturer with a special promotion (advertising, merchandising) and "pulled" out of the store through customers' demand created by the promotion.

Tuesday, October 27, 2009

Fast Copying and Pasting in Adjacent Cells:

1. Select cell B1.
2. Place the mouse on the handle in the bottom right-hand corner of the cell.
3. Double-click when the mouse pointer changes into a plus symbol. Excel copies the constants or formulas in the cell down the length of column B.

Monday, October 26, 2009

Just In Time Training:

The provision of training only when it is needed to all but eliminate the loss of knowledge and skill caused by a lag between training and use is called Just in Time Training.
The advantage to implementing JIT is the shortened time between learning and application. The most basic version of this kind of training is a software, that you can download or purchase as a library. When an employee needs to learn a new function or task, all they have to do is log in to the system and start learning.
JITT (Just in time training) is a way to streamline educating the workforce. Among the benefits of this kind of employee development is that you don't need to engage a teacher to teach the class, you don't need to schedule a class or classroom. The cost benefits of JITT are tremendous, in addition to the ability to train employees in a near automated fashion.
The key to these autonomous learning systems is the ability to train groups of employees in multiple areas on a fully automated basis. Because grading the tests is automated as well, a manager can simply assign a new employee the lessons they need to learn and have the test scores emailed as soon as the test is finished. JITT learning systems are but one of the many innovative methods for training the workforce.

Thursday, October 22, 2009

Rack Robber:

A wholesaler or vendor that orders and delivers product and services a non-food department in a food store on a contract basis, e.g., health and beauty care (HBC).

Wednesday, October 21, 2009

Enter Extended Characters:

When entering text, Lotus Notes allows you to enter what is called "extended characters". There are things like accented characters (â, ä, á, å), symbols (®, ™, ©), fractions (½, ¼, ¾), and more. There are two ways to enter these extended characters.

The first is to press ALT+F1, then press the appropriate "Compose sequence". For example:
™ is created by pressing ALT+F1, then t, then m.
® is created by pressed ALT+F1, then r, then o.
Note: The "compose sequences" are different for Windows and Macintosh.
The second way to create extended characters is a little more complex, but is consistent across Windows and Macintosh. You can press ALT+F1, then ALT+F1 again, then the appropriate "Extended compose sequence". For example:
® is created by pressing ALT+F1, then ALT+F1, then 0-169.
© is created by pressing ALT+F1, then ALT+F1, then 0-184.
For your reference, the list of extended characters available is easily found in your Lotus Notes Help database in the document "Special characters listed by extended compose sequence". Alternatively, you can access the list on web via Special characters listed alphabetically by name of character , or Special characters listed by extended compose sequence.

Tuesday, October 20, 2009

Jidohka:

Jidohka is Stopping a line automatically when a defective part is detected. Any necessary improvements can then be made by directing attention to the stopped equipment and the worker who stopped the operation. The jidohka system puts faith in the worker as a thinker and allows all workers the right to stop the line on which they are working.

Save Filter Criteria:

1. Select a cell from the column containing the criteria you want to filter with.
2. Click the AutoFilter icon
3. Type any text criteria you want into the Custom Views box and click twice to save.
4. Repeat the previous step and save as many filtering criteria as needed from any sheet within the workbook.

Sunday, October 18, 2009

Over & Under:

A management standard for cash-register receipts and for inventory discrepancies, e.g., breakage, price adjustments.

Wednesday, October 14, 2009

Instant Pudding:

A term used to illustrate an obstacle to achieving quality or the supposition that quality and productivity improvement are achieved quickly through an affirmation of faith rather than through sufficient effort and education. W. Edwards Deming used this term, which was coined by James Bakken of Ford Motor Co., in his book Out of the Crisis.

Monday, October 12, 2009

Counting Unique numeric values or unique data in a List:

Solution1:

To count the number of unique values use the SUM, IF, and FREQUENCY functions as shown in the following formula:

= SUM(IF(FREQUENCY(A2:A13,A2:A13)>0,1))


Solution 2:

To count the number of unique data use the SUMPRODUCT and COUNTIF functions as shown the following formula:

=SUMPRODUCT((A2:A13<>"")/COUNTIF(A2:A13,A2:A13&""))

Sunday, October 11, 2009

Product Sampling:

A consumer promotion in which small sizes of products, usually new, are sold at a low price to encourage consumers to try them is called Product Sampling. Free tastings or demonstrations to introduce consumers to a new item also come under this category.

Thursday, October 8, 2009

Highly Accelerated Life test (HALT):

A process for uncovering design defects and weaknesses in electronic and mechanical assemblies using a vibration system combined with rapid high and low temperature changes. The purpose of HALT is to optimize product reliability by identifying the functional and destructive limits of a product at an early stage in product development.

Monday, October 5, 2009

Remote Login:

Until recently, virtual private networks (VPN) were the only way to remotely access work files from home. But VPN access isn't the same as accessing the hard drive of your work computer. VPN gives you access to the local area network (LAN) at your office. With VPN, you're only able to access your PowerPoint presentation files if you've saved them on the network, not just on your computer's hard drive.
Remote login, however, uses simple desktop sharing software to give you a "remote control" for accessing your computer -- and all of its software and hard drive files -- from any Internet-connected device anywhere in the world.
Remote login works exactly the same way as desktop sharing. In desktop sharing, there are two separate parties: the host computer and the remote user. To share a desktop, the host computer allows a remote user to view the contents of the host computer's desktop over the Internet. The host computer can also hand over keyboard and mouse controls to the remote user. With remote log-in, your home or work computer is the host and you (in this case) are the remote user.
Remote login requires three basic components:
• Software download
• Internet connection
• Secure desktop sharing network

For remote login to work, both the host computer and all remote users have to download and install the same desktop sharing software. Desktop sharing software typically includes two distinct programs:
• The desktop sharing client that runs on the host computer
• A viewer program that allows the remote user to view the contents of the host computer's desktop in a resizable window

Remote login will only work if the host computer is powered on, connected to the Internet and running the desktop sharing software. Each time you open and run the desktop sharing software on the host computer, the software starts a new session. Each session has a particular ID and/or password that's required to remotely log in to the host computer. Once the session has been established, most desktop sharing software quietly runs in the background of the host computer until a remote login request is made.¬
To log in to the host computer from home (or while traveling), you'll need to run your version of the same desktop sharing software and enter in the correct session ID or password. Or some services allow you to log in through a Web site. Once you're logged in, both computers will communicate with each other over a secure desktop sharing network. Access to this network can be free or subscription-based, depending on the service. While connected, you'll have access to keyboard controls, mouse controls, all software and all files on the host machine.
For security purposes, all packets of information that are sent over the network are typically encrypted on each end with secure shell (SSH) or 128-bit advanced encryption standard (AES) encoding. For added security, no session IDs or passwords are stored on desktop sharing servers; they're automatically generated by the host machine.

Mail Highlighter:

This works similar to how you'd use a highlighter in real life. First you need to enable the highlighter. You do this by choosing Text - Highlighter - and then selecting which color you want. You will see your mouse cursor change into the highlighter icon.



Next position the highlighter at the start of the text you wish to call attention to, then press (and don't release) the left mouse button, then drag your mouse from left to right over the text you want highlighted, releasing the button when you want to stop.



Unlike a real highlighter, in Notes you can "un-highlight" by moving over the text from right to left. The text will turn "grey" while you are moving over it, but when you release the mouse button it will be back to normal.