Sunday, January 31, 2010

Right Size:

Matching tooling and equipment to the job and space requirements of lean production is called Right Size. Right sizing is a process that challenges the complexity of equipment by examining how equipment fits into an overall vision for workflow through a factory. When possible, right sizing favors smaller, dedicated machines rather than large, multipurpose batch processing ones.

Thursday, January 28, 2010

Coco-Cola History:

On May 8, 1886, at Jacob's Pharmacy in Atlanta, Ga., Dr. John Stith Pemberton mixed carbonated water with a syrup he'd invented. The result was the world's first glass of Coca-Cola. The price for one glass was five cents, and Pemberton advertised it as a health tonic.
The name "Coca-Cola" comes from two of its original ingredients -- the coca leaf and the kola nut. The coca leaf is used in cocaine production, and from 1886 until 1905, Coca-Cola contained traces of cocaine.
Today, caffeine is the chemical responsible for Coca-Cola's energy jolt.
Pemberton didn't work alone -- his bookkeeper, Frank Robinson, suggested the product's name, which he wrote using sweeping, cursive letters. This became the product's logo, and you can see it on bottles, cans, trucks and signs today. While the Coca-Cola Company has introduced many new products and used numerous marketing slogans throughout its history, this logo has remained virtually unchanged for more than 120 years. It's identifiable in much of the world, and it's one of the reasons that Coca-Cola is one of the world's most-recognized brands.
This worldwide recognition didn't come overnight, though. At first, Pemberton sold only a few glasses of Coca-Cola per day. In 1887, the Coca-Cola Company distributed coupons for free samples -- it claims that it was the first to use this method of attracting new customers. In 1894, candy
Maker Joseph Biedenharn became the first person to bottle Coca-Cola. Suddenly, the beverage became available to people who didn't have easy access to a soda counter.
Bottling proved to be the key to the soda's success. The Coca-Cola Company started developing its global bottling network in the late 1800s. Between 1890 and 1900, Coca-Cola syrup sales shot up 4,000 percent. By 1919, the company had bottling plants in Europe and Asia, and in 1920, there were more than 1,000 bottling plants in the United States.
Today, Coca-Cola is one of the most prevalent brands in the world. The company sells more than 1.3 billion drinks every day in 200 countries worldwide.
According to the Coca-Cola press site, if you put all of the Coca-Cola ever produced into 8-ounce contour bottles, you'd have a total of six trillion bottles. Placed end to end, these bottles would make a tower 85 times taller than Mount Everest, which could reach to the moon and back 1,677 times.

Wednesday, January 27, 2010

Scan Integrity:

The quality of the inventory and pricing data that ensures that items have been added deleted and correctly priced is called Scan Integrity.

Tuesday, January 26, 2010

Detail about an email:

If you are looking to find out details about an email message, such as the servers it was routed through and when, first open the message and choose View - Show - Page Source from the Notes menus. This will open a new window with detailed information about the MIME/HTML contents of the message. This is very useful when trying to track down mail routing issues, or figuring out if something is SPAM, etc.

Thursday, January 21, 2010

5 Whys:

The 5 Whys is a simple problem-solving technique that helps users to get to the root of the problem quickly. Made popular in the 1970s by the Toyota Production System, the 5 Whys strategy involves looking at any problem and asking: "Why?" and "What caused this problem?"
Very often, the answer to the first "why" will prompt another "why" and the answer to the second "why" will prompt another and so on; hence the name the 5 Whys strategy.
Benefits of the 5 Whys include:
It helps to quickly determine the root cause of a problem
It is easy to learn and apply
How to use the tool:
When looking to solve a problem, start at the end result and work backward (toward the root cause), continually asking: "Why?" This will need to be repeated over and over until the root cause of the problem becomes apparent.
Example:
Following is an example of the 5 Whys analysis as an effective problem-solving technique:
1. Why is our client unhappy? Because we did not deliver our services when we said we would.
Why were we unable to meet the agreed-upon timeline or schedule for delivery? The job took much longer than we thought it would.
Why did it take so much longer? Because we underestimated the complexity of the job.
Why did we underestimate the complexity of the job? Because we made a quick estimate of the time needed to complete it, and did not list the individual stages needed to complete the project.
Why didn't we do this? Because we were running behind on other projects. We clearly need to review our time estimation and specification procedures.
Key Points:
The 5 Whys strategy is an easy and often-effective tool for uncovering the root of a problem. Because it is so elementary in nature, it can be adapted quickly and applied to most any problem. Bear in mind, however, that if it doesn't prompt an intuitive answer, other problem-solving techniques may need to be applied.

Wednesday, January 20, 2010

Hide/Unhide Rows or Columns:

To hide/unhide a row(s):
To hide a row(s), select a cell(s) and press Ctrl+9.
To unhide a row(s), select the cells containing the range of the hidden row(s) and press Ctrl+Shift+(.
To hide/unhide a column(s):
To hide a column(s), select a cell(s) and press Ctrl+0.
To unhide a column(s), select the cells containing the range of the hidden column(s) and press Ctrl+Shift+).
To unhide rows & columns in a sheet:
1. Press Ctrl+A to select all cells in the sheet (in Excel 2003, press Ctrl+A+A from a cell in the Current Region/List range) or click Select All at the top-left intersection of the rows and columns.
2. Press Ctrl+Shift+( and then Ctrl+Shift+).

Tuesday, January 19, 2010

Salvage:

Product containers/shippers (bales, pallets, containers) that must be returned or recycled to defray operational costs is termed as Salvage.

Monday, January 18, 2010

Top 20 Practical Testing Tips:

1) Learn to analyze your test results thoroughly. Do not ignore the test result. The final test result may be ‘pass’ or ‘fail’ but troubleshooting the root cause of ‘fail’ will lead you to the solution of the problem. Testers will be respected if they not only log the bugs but also provide solutions.
2) Learn to maximize the test coverage every time you test any application. Though 100 percent test coverage might not be possible still you can always try to reach near it.
3) To ensure maximum test coverage break your application under test (AUT) into smaller functional modules. Write test cases on such individual unit modules. Also if possible break these modules into smaller parts.
4) While writing test cases, write test cases for intended functionality first i.e. for valid conditions according to requirements. Then write test cases for invalid conditions. This will cover expected as well unexpected behavior of application under test.
5) Think positive. Start testing the application by intend of finding bugs/errors. Don’t think beforehand that there will not be any bugs in the application. If you test the application by intention of finding bugs you will definitely succeed to find those subtle bugs also.
6) Write your test cases in requirement analysis and design phase itself. This way you can ensure all the requirements are testable.
7) Make your test cases available to developers prior to coding. Don’t keep your test cases with you waiting to get final application release for testing, thinking that you can log more bugs. Let developers analyze your test cases thoroughly to develop quality application. This will also save the re-work time.
8) If possible identify and group your test cases for regression testing. This will ensure quick and effective manual regression testing.
9) Applications requiring critical response time should be thoroughly tested for performance. Performance testing is the critical part of many applications. In manual testing this is mostly ignored part by testers due to lack of required performance testing large data volume. Find out ways to test your application for performance. If not possible to create test data manually then write some basic scripts to create test data for performance test or ask developers to write one for you.
10) Programmers should not test their own code. Basic unit testing of developed application should be enough for developers to release the application for testers. But testers should not force developers to release the product for testing. Let them take their own time. Everyone from lead to manger know when the module/update is released for testing and they can estimate the testing time accordingly. This is a typical situation in agile project environment.
11) Go beyond requirement testing. Test application for what it is not supposed to do.
12) While doing regression testing use previous bug graph (Bug graph - number of bugs found against time for different modules). This module-wise bug graph can be useful to predict the most probable bug part of the application.
13) Note down the new terms, concepts you learn while testing. Keep a text file open while testing an application. Note down the testing progress, observations in it. Use these notepad observations while preparing final test release report. This good habit will help you to provide the complete unambiguous test report and release details.
14) Many times testers or developers make changes in code base for application under test. This is required step in development or testing environment to avoid execution of live transaction processing. Note down all such code changes done for testing purpose and at the time of final release make sure you have removed all these changes from final client side deployment file resources.
15) Keep developers away from test environment. This is required step to detect any configuration changes missing in release or deployment document. Some times developers do some system or application configuration changes but forget to mention those in deployment steps. If developers don’t have access to testing environment they will not do any such changes accidentally on test environment and these missing things can be captured at the right place.
16) It’s a good practice to involve testers right from software requirement and design phase. These way testers can get knowledge of application dependability resulting in detailed test coverage. If you are not being asked to be part of this development cycle then make request to your lead or manager to involve your testing team in all decision making processes or meetings.
17) Testing teams should share best testing practices, experience with other teams in their organization.
18) Increase your conversation with developers to know more about the product. Whenever possible make face-to-face communication for resolving disputes quickly and to avoid any misunderstandings. But also when you understand the requirement or resolve any dispute - make sure to communicate the same over written communication ways like emails. Do not keep any thing verbal.
19) Don’t run out of time to do high priority testing tasks. Prioritize your testing work from high to low priority and plan your work accordingly. Analyze all associated risks to prioritize your work.
20) Write clear, descriptive, unambiguous bug report. Do not only provide the bug symptoms but also provide the effect of the bug and all possible solutions.

Sunday, January 17, 2010

Color your Text:

One of the most effective ways to make text stand out is to use colours. This is easy to do using keyboard shortcuts.
First, select the text you want to colour. Second, press ALT+T to open the Text menu. This will show you the list of operations you can perform on the selected text. Notice the "C" on Color is underlined.
Third, press "C" to open the Color submenu. Finally, press the letter that corresponds to the colour you want to use.
So for example, to turn the highlighted text Red, you would press ALT+T, then C, then R.

Thursday, January 14, 2010

Right the first time:

The concept that it is beneficial and more cost effective to take the necessary steps up front to ensure a product or service meets its requirements than to provide a product or service that will need rework or not meet customer needs. In other words, an organization should engage in defect prevention rather than defect detection.

Tuesday, January 12, 2010

Short cuts to copy data from Adjacent Cells:

Copy data from adjoining cells
Fill down à Ctrl + D
Fill right à Ctrl + R
Copy formula from above à Ctrl + '
Copy value from above à Ctrl + "

Monday, January 11, 2010

Reclamation Center:

A distribution center department that sorts and processes damaged or outdated products, sent by stores, for reimbursements is called Reclamation center.

Sunday, January 10, 2010

Top 5 Google Killer – That didn’t

Google began as a project headed by Stanford graduate students Larry Page and Sergey Brin. Their goal was to create the most powerful, accurate and comprehensive search engine on the Web. Their hard work paid off -- today, many people refer to the act of performing a Web search as "googling."
But Google isn't the only search engine game in town. Several companies and developers have created Web search tools. Some have even admitted to setting their sights on Google. We'll look at five Web products that journalists have described as Google killers.

5. Wikia Search
A wiki is a site that uses a special kind of software that makes it easy for people to create and edit collaborative Web pages. The most famous wiki on the Web is Wikipedia, the collaborative encyclopedia. One of the co-founders of Wikipedia is Jimmy Wales. Wales saw the success of collaborative work on the Web -- often called crowdsourcing -- and decided to apply that approach to search. That's how Wikia Search was born.
Wales hoped to create a search engine that harnessed the power of collaboration to produce the best, most relevant search results on the Web. Ideally, the collaborative process would be transparent and it would be hard for companies to game the system. Any registered user would be able to see who had made changes to search results pages and intervene if necessary.
In March 2009, Wales announced that his company was discontinuing the Wikia Search project indefinitely. The economic recession had hit the tech industry hard. As a result, there just wasn't enough money in the budget to support the development of Wikia Search. But we may still see the search engine resurface in the future.
4. Cuil
In the summer of 2008, a new search engine emerged onto the scene and began to make headlines. Headed by Web veterans -- including former Google employees -- this new search engine seemed poised to take on Google in a head-to-head competition. The engine's name was Cuil -- pronounced "cool."
Cuil takes a different approach to searching and ranking Web sites. Google's strategy is to search sites for keywords and then rank the sites based upon popularity. The more popular a Web site is, the higher it will rank on a Google results page. The philosophy behind this approach is pretty simple: If a lot of people link to a page, it must be pretty good.
Cuil attempts to rank pages not based upon popularity but by relevance. The search engine crawls through Web pages looking for keywords and searches for context. It looks not just for the phrase or word you search for but also the rest of the content on the page. Theoretically, you should receive results that are most relevant to your query.
The problem was that Cuil didn't quite live up to user expectations when it launched. And while Cuil is still around, it hasn't been able to wrest away the search engine crown from Google.
3. WolframAlpha
Sometimes tech journalists will call a new service a Google killer even when it's not a search engine. That's the case with WolframAlpha. It's easy to confuse WolframAlpha with a search engine. It has a field into which you type a query and it searches its database for answers. But that's where the similarity ends.
Search engines provide users links to Web sites that presumably hold information the user wants. WolframAlpha consults an enormous database to bring data directly to the user. You won't receive a list of links when you execute a query on WolframAlpha. Instead, you'll be greeted with charts and graphs populated with data related to the keywords you entered.
Because WolframAlpha pulls back data rather than links, it's not in direct competition with Google.
2. Bing
Out of all of Google's potential rivals, one stands above all others: Microsoft. As Google tries to edge into Microsoft's territory with products like Google Docs, Microsoft is doing the same thing to Google through search.
Microsoft has offered Web search engines under several names. The latest incarnation is called Bing. Bing has a snazzy interface and a simple navigation menu. You can search for Web site results, images, video, news and more. While Google search offers similar services, Bing's presentation has more style.
Bing enjoyed a big spike in user activity shortly after it debuted. Journalists remarked on the search result quality, particularly for images and videos. But later reports suggested that Bing's surge in popularity was short-lived. It appears that users just need search to be "good enough" without any of the bells and whistles you find in Bing.
1. Twitter Search
Twitter is the messaging service that spans across cell phones and the Web. One of the more useful Twitter applications is Twitter Search. Type a keyword into Twitter Search right from the Twitter home page and you'll see the most recent public tweets that contain that keyword. You can take the pulse of the Twitter audience instantly. A quick glance at the time stamp on each tweet tells you if the topic you're searching for is generating a lot of interest or is dead in the water.
And Twitter Search results update as you plow through them, while Google search results take more time to update. But Twitter limits messages to 140 characters in length. Most of the time, you'll find more helpful information using Google. Exceptions include breaking news or tweets that contain links to sites that Google has yet to index.
There are lots of useful search engine tools on the Internet. Some of them even rival Google -- there might even be a few that are arguably better at returning searches than Google. But it looks like it's going to take more than a good search results page to topple this Goliath.

Wednesday, January 6, 2010

Registration to Standards:

A process in which an accredited, independent third-party organization conducts an on-site audit of a company’s operations against the requirements of the standard to which the company wants to be registered. Upon successful completion of the audit, the company receives a certificate indicating it has met the standard requirements. In countries outside the United States, this is generally known as certification.

Tuesday, January 5, 2010

Summing values from Cells in Different Sheets:

In this example, we have a workbook with four successive sheets: January, February, March and April.

1. Select a cell and type =SUM(.

2. Select the tab for the first sheet, January.

3. Hold the Shift key, and then select the tab for the last sheet, April.

4. Select cell B2, and then press Enter.

The formula is now =SUM(January:April!B2).

Monday, January 4, 2010

Quick Response (QR):

Quick Response is a partnership strategy in which manufacturers and retailers work together to respond rapidly to fill a product order on demand and within a short period of time.

Sunday, January 3, 2010

How Location Tracking Works:

As children playing hide and seek, there seemed to be so many places where we could hide and never be found. With the world bec¬oming ever smaller through technology, hiding is increasingly difficult. Cameras peer down on us at red lights, in our workplace, in stores and even at home. Now, those cameras are being augmented by new technologies that track our cars, cell phones and possibly any product we buy.
This location-tracking technology also is being used to streamline supply chains for corporations, seeking to move products to the market faster, and to monitor assets and prevent inventory loss.
¬Soon, companies also will be able to track your location. Imagine walking through your local supermarkets, and as you pass through the aisle, an electronic coupon for your favorite cereal is beamed to your phone.
Current technologies being used to create location-tracking and location-based systems include:
• Geographic Information Systems (GIS) - For large-scale location-tracking systems, it is necessary to capture and store geographic information. Geographic information systems can capture, store, analyze and report geographic information.

• Global Positioning System (GPS) - A constellation of 27 Earth-orbiting satellites (24 in operation and three extras in case one fails). A GPS receiver, like the one in your mobile phone, can locate four or more of these satellites, figure out the distance to each, and deduce your location through trilateration. For trilateration to work, it must have a clear line of sight to these four or more satellites. GPS is ideal for outdoor positioning, such as surveying, farming, transportation or military use.

• Radio Frequency Identification (RFID) - Small, battery-less microchips that can be attached to consumer goods, cattle, vehicles and other objects to track their movements. RFID tags are passive and only transmit data if prompted by a reader. The reader transmits radio waves that activate the RFID tag. The tag then transmits information via a pre-determined radio frequency. This information is captured and transmitted to a central database. Among possible uses for RFID tags are a replacement for traditional UPC bar codes.

• Wireless Local Area Network (WLAN) - Network of devices that connect via radio frequency, such as 802.11b. These devices pass data over radio waves and provide users with a network with a range of 70 to 300 feet

Any location tracking or location-based service system will use one or a combination of these technologies.

The words location tracking can lead many to worry about privacy. Some may worry about the government knowing t¬heir whereabouts, stalkers spying on them or even a spouse monitoring their movements. Although the technology could allow anyone to find you at any given moment, measures are being taken to prevent this kind of abuse.