"Perfection is not attainable, but if we chase perfection we can catch excellence”,
Vince Lombardi, Head Coach, Green Bay Packers



Collaborative Strategy
and Planning

Assess and specify value

Lean states that the first step is defining value from the customer’s perspective and express that value in terms of a specific product or service. We start with a discovery and assessment of your systems, processes and functions based on your Medullus LeanCash Score and your LeanCash Gap Analysis (Do not have this yet? Get it for free here

Design and map the value stream

Once the value is specified, all current processes that bring a product or service to the customer, are decomposed into smaller steps which are then mapped as value-added and non-value-added activities. We decompose our discovery and assessments and map them into a value stream based on the 5 components of LeanCash. During this process, we create a map of the Current State and the Future State of the value stream. We also identify and categorize waste in the Current State, and eliminate it in our design. We rerun yourLeanCash score to see if there will be gains based on the proposed value stream.This can be iterative till we achieve the desired result.


Continuous Integration Continuous Deployment

Configure, Integrate & Establish Flow

Lean takes the value stream and establishes a continuous flow of products, services and information, end to end throughout the product’s and service’s value stream. We take the Current and Future value streams and configure our products and services to deliver the results. During this process, we integrate with your existing systems, processes and functions. This is the where all our “value-added” work gets done.

Implement Pull

Lean states that nothing should be done upstream until the downstream customer signals the need so that actual value-adding demand pulls product/service through the value stream. We operate and project manage based on this principle so that we minimize work-in-process and only concentrate on tasks that add value to the project that is being implemented. Using our Project Management tools, DevOps, CICD and Agile principles we ensure that our implementation brings continuous ROI to the prior mapped value stream.


Security and

Built-in security

The prime most important component of all our software solution is security. We believe in “built-in” security rather than “added-on” security. From the very first assessment meeting, we do our discovery sessions with security in mind. As we implement solutions we ensure that we build-in security. Our 4S Security model ensures 360 coverage of our solutions as it pertains to security – Device security, Data security, Application security & Network security.

Intelligent logging & compliance

Our solutions log every single entry, touch and end points for all data and our intelli-log audits continuously monitors all the audits to bring out issues proactively before they can occur. This brings big value-add especially during security audits. Our software will work with all your compliance systems, because we proactively assess your compliance and regulatory systems and processes during our discovery sessions.We have been working with various compliance boards to enable bullet-proof solutions for legacy updates and built-in solutions for new enhancements. We do automated testing that includes security test cases (intrusion detection) as well.

Integrated documentation

With all our solutions we provide integrated documentation. This is part of our LeanCash principle – where we believe that good documentation leads to good controls and reduces waste in operations. All our software is developed with integrated software architecture document so your IT can further integrate or develop in it (if you so choose). We provide in-line help so you do not have to dig fat manuals to find out answers. We build short videos to highlight how our software works and what business problem it solves. Our documentation lists include LeanCash documentation – how it works for you, Business Requirements Document with Entity-Relationship and Design documents, Software Design Document and Database schema documents with column level details and user manuals/video help. We also provide a “wiki” that can grow with our software.


Monitor and Control

Continuous improvement

While developing, we build “feedback loops” into all our solutions. These feedback loops give us the data we need to provide continuous improvements as the solutions are being used. For example, clicks, swipes, touch on mobile apps are analyzed using tools (application insights is one of them) to better understand app usage behavior. This is used to further improve the app by suggesting alternative U/X, improve performance and reduce waste or unnecessary actions/events.

Proactive support

We use tools to continuously monitor all our applications. These send automatic tickets to our helpdesk so that issues are fixed before they surface to end users. We monitor usage, database performance, cloud performance, intrusion reports and application insights to fix problems, if any, before they actually become a problem.

Quality assurance as opposed to quality control

We develop with quality “built in” to all our solutions. This ensures near error-free applications. For example, test-driven development and extreme programming allows our development teams to manage quality in the most effective manner. When solutions are delivered they run through automated testing in our development-test-deploy pipes. This ensures proper version controlling as well as a continuous-integration-continuous-deployment cycle.

Let's help you!

As Taiichi Ohno, the father of Lean Manufacturing has said “All we are doing is looking at the time line, from the moment the customer gives us an order to the point where we collect the cash. And we are reducing the time line by reducing the non-value added wastes.