Monday, September 21, 2015

Critical-to-quality (CTQ) Tree

A Critical-to-quality Tree - What’s That?

What is the purpose of critical-to-quality trees?
  • To translate abstract customer requirements to measurable steps and targets.

What are the steps required in creating a critical-to-quality tree?
  • Step 1: identify and define the customer need
  • Step 2: identify and define drivers behind the need
  • Step 3: define measurable targets to address each driver

Monday, August 08, 2011

How to save and share excel macros

1. Create all macros as part of a work book
2. Save those to the personal workbook (Personal.xlsb) - On "Create Macro" dialog, chose "Personal Macro Workbook". Macro will then be saved to the location

C:\Users\\AppData\Roaming\Microsoft\Excel\XLSTART

It is opened as a hidden workbook every time you start Excel. Excel saves the personal workbook as Personal.xlsb, in the following folder on Windows 7 and Windows Vista computers:


http://office.microsoft.com/en-us/excel-help/create-and-save-all-your-macros-in-a-single-workbook-HA102174076.aspx

Sunday, January 03, 2010

Daisy Meadows - Wikipedia, the free encyclopedia

Daisy Meadows - Wikipedia, the free encyclopedia

ICDL - International Children's Digital Library

ICDL - International Children's Digital Library

Adventures of a Nepali frog - About This Book

Adventures of a Nepali frog - About This Book

South Asia Picture Books - Kids @ Mount Prospect Public Library

South Asia Picture Books - Kids @ Mount Prospect Public Library

South Asia Facts - Kids @ Mount Prospect Public Library

South Asia Facts - Kids @ Mount Prospect Public Library

NarinderDhami

NarinderDhami

South Asia Fiction - Kids @ Mount Prospect Public Library

South Asia Fiction - Kids @ Mount Prospect Public Library

Sunday, April 13, 2008

Authentication World

All things related to Authentication

http://www.authenticationworld.com/

Sunday, December 16, 2007

Forward Proxy vs Reverse Proxy

Forward Proxy: Proxy server serving the communication from internal client machines to internet.

Reverse Proxy: Proxy server serving the communication from the Internet to the internal content servers.

Reverse proxy:
http://www.ibm.com/developerworks/websphere/library/techarticles/0512_guminy/0512_guminy.html

Forward Proxy (from client machines to internet) vs Reverse Proxy (from internet to the client machines):
http://www.serverwatch.com/sreviews/article.php/1151471

Proxy Servers at Wikipedia
http://en.wikipedia.org/wiki/Proxy_server

Reverse Proxy at Wikipedia
http://en.wikipedia.org/wiki/Reverse_proxy

Tuesday, November 13, 2007

Security Services - Kerberos protocol

Designing an Authentication System: a Dialogue in Four Scenes
http://web.mit.edu/kerberos/www/dialogue.html

How to Kerberize your site
http://www.ornl.gov/~jar/HowToKerb.html

Kerberos Protocol at wikipedia
http://en.wikipedia.org/wiki/Kerberos_(protocol)

Sunday, November 11, 2007

No Cure, No Pay - 12 tough questions (www.Gilb.com)

Twelve Tough Questions
A way to sum up this paper for managers!
1. Numbers
Why isnt the improvement quantified?

2. Risk
What is the degree of risk or uncertainty, and why?

3. Doubt
Are you sure? If not, why not?

4. Source
Where did you get that information? How can I check it out?

5. Impact
How does your idea effect my goals and budgets, measurably?

6. All critical factors
Did we forget anything critical to survival?

7. Evidence
How do you know it works that way? Did it ever?

8. Enough
Have we got a complete solution? Are all requirements satisfied?

9. Profitability first
Are we planning to do the profitable things first?

10. Commitment
Who is responsible for failure, or success?

11. Proof
How can we be sure the plan is working, during the project, early?

12. No cure, no pay
Is it no cure, no pay in a contract? Why not?

© Tom Gilb 2000-4
A full paper on this is available at www.Gilb.com