Book description
This book provides an understanding of the complexity and comprehensiveness of the total productive maintenance (TPM) process. It supplements works by Japanese authors with guidance and detail on how the TPM process relates to North American plants or facilities.
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Publisher’s Message
- Preface
- 1 Introduction
- 2 Success of TPM in Japan—JIPM
-
3 Preparatory Stage of TPM
- Step One: Launch an Educational Campaign to Introduce TPM to the Organization
- Step Two: Create an Organizational Structure to Promote TPM
- Step Three: Announce Upper Management’s Decision to Introduce TPM
- Step Four: Establish Basic TPM Policies and Goals
- Step Five: Form a Master Plan for Implementing TPM
- Step Six: Kick Off TPM
-
4 Implementation Stage of TPM
- Step Seven: Improve the Effectiveness of Each Critical Piece of Equipment
- The Importance of Small Groups
- Step Eight: Set Up and Implement Autonomous Maintenance
- Step Nine: Establish a Planned Maintenance System in the Maintenance Department
- Step Ten: Provide Training to Improve Operator and Maintenance Skills
- Step Eleven: Develop an Early Equipment Management Program
- Step Twelve: Perfect TPM Implementation and Raise TPM Levels
- 5 The Seven Levels of Autonomous Maintenance
- 6 Unions and TPM
- 7 Measuring Overall Equipment Effectiveness
- 8 TPM and Theory of Constraints / Continuous Flow Manufacturing
- 9 TPM and Benchmarking
- 10 Successful TPM Companies
- Appendix: Typical TPM Master Plan
- About the Authors
- Index
Product information
- Title: Implementing TPM
- Author(s):
- Release date: August 2020
- Publisher(s): Productivity Press
- ISBN: 9781000162073
You might also like
article
From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI
Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. …
book
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Break down the misconceptions of the Internet of Things by examining the different security building blocks …
book
Building Secure Firmware: Armoring the Foundation of the Platform
Use this book to build secure firmware. As operating systems and hypervisors have become successively more …
book
Network Vulnerability Assessment
Build a network security threat model with this comprehensive learning guide Key Features Develop a network …