While we are analyzing the target process we will identify non-value added activities and risks and we will propose best in class solutions to optimize the process output.
In fact we will combine IATF 16949 requirements, lean approach and cybersecurity best practices to analyze and review your process to align it to automotive industry requirements, remove activities without value-added and improve your cybersecurity while we will advise you how to digitally transform your processes.
We have auditors and experts in processes optimization, management and IT security, we can perform audits as per your request.
Analyze and plan
Our team will analyze with you the process and propose a concept which includes improvement ideas based on BIC (best in class) practices from automotive industry.
During analyze and (re)design of processes we use UML language to define and establish with you system functions and requirements, including deployment.
The analysis is performed according the following steps:
- Perform process analysis
- Document process by flow chart and use case chart
- Document interface – concept
- Document Deployment diagram
- If necessary document system status chart
During analysis and optimization we will check compatibility with main standards and regulations which you may have implemented like IATF 16949, customer-specific requirements, GDPR and so on.
UML means Unified Modeling Language.
UML is a standardized modeling language consisting of an integrated set of diagrams, developed to help system and software developers for specifying, visualizing and documenting software-based systems.
The UML includes several diagrams and models that support the design of different aspects of the solution. The most used are:
Use Case Diagram
The main purpose of the use-case diagram is to help development teams visualize the functional requirements of a system, including the relationship of “actors” (human beings who will interact with the system) to essential processes, as well as the relationships among different use cases.
The deployment diagram shows how a system will be physically deployed in the hardware environment. Its purpose is to show where the different components of the system will physically run and how they will communicate with each other.
The class diagram shows how the different entities (people, things, and data) relate to each other; in other words, it shows the static structures of the system.
This diagram defines the permitted states and transitions as well as the events that effect these transitions for a system.
- Chart the process and analysis activities
- Identification of customers and customer value
- Identification of non-value added activities
- Identification of security breaches if this analysis is combined with a cybersecurity audit or search for manufacturing process, management systems improvement by including an audit
- Propose alternate solutions including process digital transformation to replace non-value added activities with automatically data transfer