• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31
  32. 32
    32
  33. 33
    33
  34. 34
    34
  35. 35
    35
  36. 36
    36
  37. 37
    37
  38. 38
    38
  39. 39
    39
  40. 40
    40
  41. 41
    41
  42. 42
    42
  43. 43
    43
  44. 44
    44
  45. 45
    45
  46. 46
    46
  47. 47
    47
  48. 48
    48
  49. 49
    49
  50. 50
    50
  51. 51
    51
  52. 52
    52
  53. 53
    53
  54. 54
    54
  55. 55
    55
  56. 56
    56
  57. 57
    57
  58. 58
    58
  59. 59
    59
  60. 60
    60
  61. 61
    61
  62. 62
    62
  63. 63
    63
  64. 64
    64
  65. 65
    65
  66. 66
    66

An Assessment on the Impact of Theories of Constraints to Seagate Technology.

Extracts from this document...

Introduction

An Assessment on the Impact of Theories of Constraints to Seagate Technology.

By

Kevin McDermott

image10.png

Magee Campas

B.A.Hons. Business Studies with Specialisms

Supervisor: - Edel O’Niell

Date:  03 – May - 2001

Contents

Acknowledgements

Abstract

Chapter 1

Introduction to the Topic

Seagate Technology Introduction

Aims & Objectives

Research Hypothesis

Hypothesis 1

Hypothesis 2

Research Significance

Chapter 2

Literature Review

Operations Management

Taylorism

Peter Drucker

Lean manufacturing

Overall Equipment Effectiveness (OEE)

The History and Evolution of TOC

Theories Of Constraints

Key Stages in TOC

Drum Buffer Rope Analogy

Expected Results from the Application of TOC

TOC Compared to Lean Manufacturing

Capacity

Summary

Chapter 3

Methodology

Research Questions

Research Methodology

Choice of Research Collection

Questionnaire Distribution

Questionnaire Design

Restrictions of Questionnaires

In – Depth Structured Interview

Interview Design

Restrictions of Interviews

Case Study

Seagate Springtown Case Study

Hitachi Introduction

Philips Introduction

Chapter 4

Findings and Analysis

Seagate’s application of Theories of Constraints in comparison.

Seagate in Detail

Acknowledgements

The road has been long and dusty with more chicanes than straights.  I have stumbled upon many people along that road, many of which I would like to thank, as I deeply know without their help, I could not have reached this point.

Many thanks to Patrick Miskelly, who set the wheels in motion.  Thanks to Jimmy Logue, who’s support, friendship and advice picked me up when the going got tough.  Thanks to Edel O’Niell who’s mentoring and tutoring proved invaluable in the compilation of this research.  Thanks to everyone else who helped in my research including those in Hitachi and also in Seagate whom I have tormented for the past few months.  I would also like to thank Eamon my Manager, who provided me with enough time to conduct this research.

To my parents, who have waited long and patiently for this day.

Thanks to my role models, brother Shane and sister Michelle.

I would like to thank my wife Shauna, whose cups of tea and renowned toast have provided me with the energy to burn late into the night.

...read more.

Middle

image30.png

O.E.E. would provide an excellent cornerstone to T.O.C.  

The objective of the OEE study is to develop recommendations and ideas that improve OEE at the bottleneck tool/area.  In general, bottlenecks are found where there is both chronic high WIP coupled with chronic high tool utilization.  The bottleneck tool is identified to allow primary focus on the area with the greatest return for the effort.

The History and Evolution of TOC

Theories of Constraints was developed in the early 80s by a company, which sold ‘production scheduling software’.  E.M. Goldratt was at the time the Chairman of the company.  The product which they developed formally known as OPT (Optimised Production Technology) was a hybrid approach to manufacturing that managed restricted resources and optimised the utilisation of the most constraining ones, the bottlenecks.

Goldratt’s motivation for conveying and developing his theories is outlined.

“Most of our clients were willing to testify that by using our software, were able to increase production, while decreasing inventory.  We had very reputable clients, Bendix, Kodak, Philips Lucas…. I was frustrated that we didn’t have thousands of such clients.  Every company was busy installing computer packages and our product was the only finite capacity application that really worked.  I had an idea which was to convey my method through a novel about manufacturing”

Eliyahu M. Goldratt. “My Saga to Improve Production.” Pg.1

The Goal, Goldratt’s first business novel conveyed the message of TOC and the novels success in selling over 2 million copies, paved the way for other novels further streamlining Goldratt’s theories.  It was not until the second edition of The Goal that he refined this into a five-step process of ongoing improvement.

...read more.

Conclusion

Figure 4.4

image25.pngimage02.pngimage03.pngimage02.png

Figure 4.5 presents Seagate’s WIP levels with Cycle Time.  From the Cycle Time data at its highest point measured against its lowest point equates to an improvement of 15.3%.  As the WIP levels fall it is predictable that Cycle Time will follow as there will be less WIP in the line decreasing queue time at machines, rework and static.  This makes the organisation more responsive towards the customer which tie into the primary research in which all respondents apart from those who didn’t know, believed TOC achieved what it set out to achieve or passed its goals.

Figure 4.5

image26.pngimage06.pngimage03.pngimage04.pngimage05.png

I cannot feature or disclose financial data due to Seagate’s Confidentiality, however, the results suggest immense savings with reduced cycle – times and WIP and increased customer shipments.  However these savings should be offset against the cost of implementing TOC!

This example of the Gold machine is just one of many TOC projects which has been carried out.  Thomas Logue, (interviewee) however has made it clear that although TOC has been applied many time over, there has always been a  constraint within the manufacturing process. When asked to expand on this, he believed it was due to the nature of the environment in which Seagate operates as product life cycles of 6 months introduces new products on a monthly basis, which shifts the capacity requirements of the machines.

Summary

This chapter presented and analysed data based in the methodology in Chapter 3.  Each of the objectives was addressed in a manner to fulfil the aims laid out in chapter 1.  The analysis presented a critical evaluation of Seagate Technology’s approach to Theories of Constraints.  Part one of this chapter contrasted features of Seagate’s Theories of Constraints application with another manufacturing organisation.

Theories of Constraints

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Design a web based online Appointment System for vehicle service centres in town to ...

    "Register.php" will call register_form.inc.php and user_register()fucntion <?php session_start(); $_SESSION['cus_name']=firstname; // store session data ?><?php // Include init file include 'func/init.php'; include 'func/user_functions.php'; if (!isset($_POST['submit'])){ // Show the form include 'register_form.inc.php'; exit;} else { // Check if any of the fields are missing if (empty($_POST['email'])

  2. Traffic Light Simulation and Machine Code Program.

    For example : The IBM PC VGA screen base address is B800:0000 followed by 4000 more bytes. Binary Base two numbers used by digital systems. Count with two symbols [ 0 1 ] Binary numbers are composed of noughts and ones.

  1. Network Design

    192.168.107.0/24 192.168.107.0 192.168.107.255 4 Main switch 192.168.040.0/24 192.168.040.0 192.168.040.255 Class 1 192.168.108.0/24 192.168.108.0 192.168.108.255 Class 2 192.168.109.0/24 192.168.109.0 192.168.109.255 Class 3 192.168.110.0/24 192.168.110.0 192.168.110.255 5 Main switch 192.168.050.0/24 192.168.050.0 192.168.050.255 Meeting room 192.168.111.0/24 192.168.111.0 192.168.111.255 Conference hall 192.168.112.0/24 192.168.112.0 192.168.112.255 Staff Room 192.168.202.0/24 192.168.202.0 192.168.202.255 6 Main Switch 192.168.060.0/24 192.168.060.0

  2. OMC-R and CBSC ATP Overview

    Please Wait... 777 TEST #0 PASSED SUCCESSFULLY board 0, frames: 778 sent, 777 received, elapsed time 10 secs 25. Execute the following command to verify the memory size. cfstatus -uV slice-0.cpu0 26.

  1. Examine the many micro operations and their activities in Brussels airport.

    It will be the OD's responsibility to translate these objectives into implications for the operations performance objectives - quality, speed, dependability, flexibility and cost3. * Quality - "To do things right". Not only does it lead to external customer satisfaction, but equally important is keeping the internal customers satisfied.

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Yeates, D. & Wakefield, T. (2004). RUP a derivative of the object-oriented approach "...is described as a 'software engineering' and a 'configurable process framework', referring to the fact that it can be modified to accommodate the specific needs, characteristics, constraints, and history of the organisation, culture, and domain in which it is used."

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    Thus each license plate has following details on it viz., Registration Number, Registration Valid Info and State Information. Figure 3.1 California License Plate This design includes five primary algorithms used for identifying the license plate characters: 1. Image Processing - Simple Algorithm, which converts the pixel value to either 0 or 255, based on the set threshold.

  2. This report will discuss the benefits and constraints of network systems and topologies.

    That is, there are specific software applications enabling users to use certain protocol specifications. - Hardware specific software. Software machine dependent for helping users to configure devices. - Another important group of software covers network health monitoring and back-up procedures.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work