{domain:"www.qualitydigest.com",server:"169.47.211.87"} Skip to main content

User account menu
Main navigation
  • Topics
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Videos/Webinars
    • All videos
    • Product Demos
    • Webinars
  • Advertise
    • Advertise
    • Submit B2B Press Release
    • Write for us
  • Metrology Hub
  • Training
  • Subscribe
  • Log in
Mobile Menu
  • Home
  • Topics
    • 3D Metrology-CMSC
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Login / Subscribe
  • More...
    • All Features
    • All News
    • All Videos
    • Contact
    • Training

Time-Based Maintenance

Large Image Caption

Photo by Crystal Kwok on Unsplash

  • Read more about Time-Based Maintenance
  • Add new comment

Facility and equipment maintenance is most effective when performed proactively and regularly. This kind of routine maintenance can take many forms, ranging from the most basic approaches to complicated strategies using sensors and data to trigger maintenance.

22 Million Reasons to Accommodate Work-From-Home Requests

Large Image Caption

Photo by charlesdeluvio on Unsplash

  • Read more about 22 Million Reasons to Accommodate Work-From-Home Requests
  • Add new comment

The recent $22.1 million verdict in the case of Billesdon vs.

Ten Security Steps Every Remote Worker Should Follow

Large Image Caption

You should be paying as much attention to your cybersecurity as you are to this picture. Credit: “Cyberattacks Tokyo” by PLANETART

  • Read more about Ten Security Steps Every Remote Worker Should Follow
  • Add new comment

Remote work is now an essential part of the modern workplace, offering flexibility and convenience to millions of employees worldwide. However, with this shift to home offices and flexible workspaces comes a new set of security challenges.

Facing the Facts to Keep Our Biometrics Secure

Large Image Caption

NIST researcher Mei Lee Ngan disguised herself to look like the TV character Ron Swanson and was unable to unlock her phone with this disguise. Credit: NIST

  • Read more about Facing the Facts to Keep Our Biometrics Secure
  • Add new comment

I once transformed my face to look like Ron Swanson—for science.

Equipping Doctors With AI Assistants

Large Image Caption

MIT alumni-founded Ambience is being used across roughly 40 health systems in the U.S. by clinicians in over 100 subspecialties. Image credit: iStock

  • Read more about Equipping Doctors With AI Assistants
  • Add new comment

Most doctors go into medicine because they want to help patients.

When ISO 9001 Fails

Large Image Caption

Failure can have many root causes, even with great products and methods. Photo by Julien L on Unsplash

  • Read more about When ISO 9001 Fails
  • 3 comments
  • Add new comment

You’ve finally gotten ISO 9001 certification. Congratulations!

Use Internal Controls for More Than Just Compliance

  • Read more about Use Internal Controls for More Than Just Compliance
  • Add new comment

W ithin the utility industry, regional entities increasingly focus on internal controls as a measuring stick for overall compliance performance.

The Importance of Using Technology to Attract New BMETs

Large Image Caption

Technology can make a career more attainable and desirable. Photo by Designtoasty on Unsplash

  • Read more about The Importance of Using Technology to Attract New BMETs
  • Add new comment

Biomedical equipment technicians (BMETs) are facing increased workloads and staffing shortages that are expected to get worse as the current workforce retires.

Identity Management: What You Need to Know

  • Read more about Identity Management: What You Need to Know
  • Add new comment

Modern-day security breaches, such as the SolarWinds or T-Mobile attacks, aren’t one-off events; they are prime examples of how someone can steal your organization’s credentials and use them to gain illegitimate privileged access to sensitive assets.

Weber’s Law at the <em>Gemba</em>

Large Image Caption

Intensity can change your perception. Photo by Brendan Church on Unsplash

  • Read more about Weber’s Law at the Gemba
  • Add new comment

In this article, I’m looking at Weber’s Law. It’s named after Ernst Heinrich Weber (1795–1878), a German physician who was one of the pioneers of experimental psychology.

Pagination

  • Previous page ‹‹
  • Page 7
  • Next page ››
Subscribe to Risk Management Article
      

© 2025 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute Inc.

footer
  • Home
  • Print QD: 1995-2008
  • Print QD: 2008-2009
  • Videos
  • Privacy Policy
  • Write for us
footer second menu
  • Subscribe to Quality Digest
  • About Us
  • Contact Us