just-in-time manufacturing (JIT manufacturing

Search Thousands of Tech Definitions

Circuit switched services equipment and providers

Security threats and countermeasures

Business intelligence – business analytics

just-in-time manufacturing (JIT manufacturing)

just-in-time manufacturing (JIT manufacturing)

The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws.

mobile application management (MAM)

voice recognition (speaker recognition)

hands-off infrastructure management

Microsoft Windows Insider Program for Business

VMware vCenter Server (formerly VMware VirtualCenter)

Advanced Message Queuing Protocol (AMQP)

Just-in-time (JIT) manufacturing is a production model in which items are created to meet demand, not created in surplus or in advance of need. The purpose of JIT production is to avoid the waste associated with overproduction, waiting and excess inventory, three of theseven wastecategories defined in the Toyota Production System (known in North America as thelean productionmodel).

The JIT concept was described by Henry Ford in his 1923 book,My Life and Work:

We have found in buying materials that it is not worthwhile to buy for other than immediate needs. We buy only enough to fit into the plan of production, taking into consideration the state of transportation at the time. If transportation were perfect and an even flow of materials could be assured, it would not be necessary to carry any stock whatsoever. The carloads of raw materials would arrive on schedule and in the planned order and amounts, and go from the railway cars into production. That would save a great deal of money, for it would give a very rapid turnover and thus decrease the amount of money tied up in materials.

Toyota adopted JIT in the Toyota Production System (TPS), as a means of eliminating the seven wastes. However, it was not at the Ford Motor Company that Toyota representatives saw the JIT model in action. When Toyota toured plants in the United States in 1956, Ford had not yet fully implemented the JIT model. It was at Piggly Wiggly, the first self-service grocery chain, that Toyota representatives saw JIT demonstrated and that was the model they based their system on.

In the major alternative to JIT manufacturing, inventory in excess of immediate need is managed. That model is sometimes referred to as just-in-case (JIC) manufacturing.

See also:demand-driven manufacturingkanban

This was last updated inJanuary 2015

Continue Reading About just-in-time manufacturing (JIT manufacturing)

Overcoming lean manufacturing challenges

Read more about the philosophy behind just-in-time manufacturing

See our Fast Guide to acronyms used in manufacturing

Manufacturing requirements planning: The four critical questions answered

Additive manufacturing delivers unexpected green benefits

Competitive advantage is the favorable position an organization seeks in order to be more profitable than its rivals.See complete definition

Gross revenue is the total of all money generated by a business, without taking into account any part of that total that has been…See complete definition

Project scope is the part of project planning that involves determining and documenting a list of specific project goals, …See complete definition

Send me notifications when other members comment.

No problem! Submit your e-mail address below. Well send you an email containing your password.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.Privacy

A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine …

Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if …

Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and …

In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

A macro virus is a computer virus written in the same macro language used for software programs, including Microsoft Excel or …

The HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 is legislation that was created to …

Epic Systems is one of the largest providers of health information technology, used primarily by large U.S. hospitals and health …

An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties …

Business continuity and disaster recovery (BCDR) are closely related practices that describe an organizations preparation for …

A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue …

A call tree — sometimes referred to as a phone tree — is a telecommunications chain for notifying specific individuals of an …

A cloud storage service is a business that maintains and manages its customers data and makes that data accessible over a …

Cloud hosting is the process of outsourcing an organizations computing and storage resources to a service provider that offers …

Hybrid cloud storage is an approach to managing storage that uses both local and off-site resources.

A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.