Browse Definitions :
Definition

DMAIC (define, measure, analyze, improve, control)

DMAIC (define, measure, analyze, improve, control) is an approach to problem-solving defined by Motorola as part of the Six Sigma management philosophy. 

DMAIC, which is pronounced "de-may-ick," is a tool for improving an existing process. The steps can be summarized as follows.

  • Define: State the problem, specify the customer set, identify the goals, and outline the target process.
  • Measure: Decide what parameters need to be quantified, work out the best way to measure them, collect the necessary data, and carry out the measurements by experiment.
  • Analyze: Identify gaps between actual and goal performance, determine causes of those gaps, determine how process inputs affect outputs, and rank improvement opportunities.
  • Improve: Devise potential solutions, identify solutions that are easiest to implement, test hypothetical solutions, and implement actual improvements.
  • Control: Generate a detailed solution monitoring plan, observe implemented improvements for success, update plan records on a regular basis, and maintain a workable employee training routine.

DMAIC, which is used to regain control, should not be confused with a similar Six Sigma process called Sigma DMADV. DMADV stands for "define, measure, analyze, design, verify." This set of steps is applied to new processes to make sure that they achieve Six Sigma quality. 

Six Sigma methodologies, which were originally used in manufacturing to improve quality, are now used in many disciplines including project management, education and agile software development. All Six Sigma processes are executed by Six Sigma experts designated according to "belt color," using a scheme similar to the ones used in martial arts.

Dan Delaiarro provides an overview of DMAIC as it applies to the Six Sigma process.

This was last updated in September 2012

Continue Reading About DMAIC (define, measure, analyze, improve, control)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

  • hardware security module (HSM)

    A hardware security module (HSM) is a physical device that provides extra security for sensitive data.

  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close