{"version":"1.0","provider_name":"Welingkar Blog: Beyond the Walls","provider_url":"https:\/\/www.welingkar.org\/blogs","author_name":"weschool","author_url":"https:\/\/www.welingkar.org\/blogs\/author\/weschool\/","title":"Guest Session on Theory of Constraints - Welingkar Blog: Beyond the Walls","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"V11Qsjh7GP\"><a href=\"https:\/\/www.welingkar.org\/blogs\/guest-session-on-theory-of-constraints\/\">Guest Session on Theory of Constraints<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.welingkar.org\/blogs\/guest-session-on-theory-of-constraints\/embed\/#?secret=V11Qsjh7GP\" width=\"600\" height=\"338\" title=\"&#8220;Guest Session on Theory of Constraints&#8221; &#8212; Welingkar Blog: Beyond the Walls\" data-secret=\"V11Qsjh7GP\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"http:\/\/www.welingkar.org\/blogs\/wp-content\/uploads\/2024\/04\/guest.webp","thumbnail_width":1200,"thumbnail_height":545,"description":"Introduction to basics of theory of constraint. Discussion on guidelines to identify constraints.\u00a0 5 processes of process improvement Identify the system constraintDec Decide how to exploit the system constraint\u00a0 Subordinate everything else to the exploitation decision\u00a0 Elevate the system constraint\u00a0 If in the previous step has constraint then move to the first constraint\u00a0 Discussion on [&hellip;]"}