The document discusses project management and control techniques including earned value analysis, monitoring project performance, prioritizing monitoring activities, getting a project back on target by shortening the critical path or altering precedence requirements, maintaining the business case, change control procedures, changes in system scope, and the role of a configuration librarian.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
18 views
UNIT IV - Session 4
The document discusses project management and control techniques including earned value analysis, monitoring project performance, prioritizing monitoring activities, getting a project back on target by shortening the critical path or altering precedence requirements, maintaining the business case, change control procedures, changes in system scope, and the role of a configuration librarian.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23
PROJECT
MANAGEMENT AND CONTROL UNIT IV CONT..
milestone technique: where a task is given a value based on the
achievement of milestones that have been assigned values as part of the original budget plan; percentage complete: in some cases there may be a way of objectively measuring the amount of work completed The baseline budget The first stage in setting up an earned value analysis is to create the baseline budget. CONT.. The baseline budget is based on the project plan and shows the forecast growth in earned value through time. Baseline budget calculation in a diagram CONT..
Monitoring earned value
Having created the baseline budget, the next task is to monitor earned value as the project progresses. This is done by monitoring the completion of tasks. As well as recording EV, the actual cost of each task can be collected as actual cost (AC). This is also known as the actual cost of work performed (ACWP). CONT..
Schedule variance (SV)
The schedule variance is measured in cost terms as EV – PV and indicates the degree to which the value of completed work differs from that planned. Time variance (TV) This is the difference between the time when the achievement of the current earned value was planned to occur and the time now. CONT..
Cost variance (CV)
This is calculated as EV – AC and indicates the difference between the earned value or budgeted cost and the actual cost of completed work. Performance ratios Two ratios are commonly tracked: the cost performance index (CPI = EV/AC) and the schedule performance index (SPI = EV/PV). 7
Suppose a project is to be completed in one year at the cost of
£100,000. After three months, you realize that the project is 30% complete at a cost of £40,000. Assess the performance of the project. PRIORITIZING MONITORING
however, that monitoring takes time and uses resources that
might sometimes be put to better use! we list the priorities we might apply in deciding levels of monitoring. Critical path activities : Any delay in an activity on the critical path will cause a delay in the completion date for the project. – Highest priority CONT..
Activities with no free float A delay in any activity with no free
float will delay at least some subsequent activities Activities with less than a specified float If any activity has very little float it might use up this float before the regular activity monitoring brings the problem to the project manager’s attention. Close monitoring required High-risk activities Activities using critical resources GETTING THE PROJECT BACK TO TARGET
Almost any project will, at one time or another, be subject to
delays and unexpected events.
In most cases, the project manager, at least initially, tries to
ensure that the scheduled project end date remains unaffected.
There are two main strategies to consider when drawing up plans
to bring a project back on target – shortening the critical path or altering the activity precedence requirements. SHORTEN THE CRITICAL PATH The overall duration of a project is determined by the current critical path, so speeding up non-critical path activities will not bring forward a project completion date. However, there are several ways in which this might be done. Adding resources – especially staff - Exhorting staff to ‘work harder’ might have some effect, such as increasing the resources available for some critical activity. Increase use of current resources - Resource levels can be increased by making them available for longer. CONT..
Reallocate staff to critical activities - The project manager
might consider allocating more efficient staff to activities on the critical path or swapping resources between critical and non- critical activities. Reduce scope The amount of work to be done could be reduced by reducing the scope of the functionality to be delivered. Reduce quality Some quality-related activities such as system testing could be curtailed. RECONSIDER THE PRECEDENCE REQUIREMENTS
If attempting to shorten critical activities proves insufficient, the
next step is to consider the constraints by which some activities have to be deferred pending completion of others. One way to overcome precedence constraints is to subdivide an activity into a component that can start immediately and one that is still constrained as before. If we do decide to alter the precedence requirements in such a way, it is clearly important to be aware that quality might be compromised and to make a considered decision to compromise quality where needed. MAINTAINING THE BUSINESS CASE
In making decisions about the management of the project, the
main concern of the project sponsor, that is, the stakeholder who is putting up the money for the project, is whether the business case for the project has been preserved. Exception planning The project manager will normally be allowed to change the detail of a plan as long as the agreed project outcomes are produced on time and within budget. CONT..
Some changes to the plan might have an impact on the delivery
date, project scope or costs. One approach, adopted by PRINCE2, is to require the project manager to write an exception report that explains the reasons for the deviation from the existing plan. Project manager will be producing a more detailed exception plan. CHANGE CONTROL
When a document such as the user requirements is being
developed there may be many different versions of the document as it undergoes cycles of development and review. Any change control process at this point would be very informal and flexible. At some point what is assumed to be the final version will be created. This is baselined, effectively frozen. CHANGE CONTROL PROCEDURES
A simple change control procedure for operational systems might
have the following steps: 1. One or more users might perceive a need for a modification to a system and ask for a change request to be passed to the development staff. 2. The user management would consider the change request and, if they approve it, pass it to the development management. 3. There would be one person within the development area who would receive and process RFCs. CONT.. 4. The development representative would report back to the user management on the findings and the user management would decide whether, in view of the cost quoted, they wish to go ahead. 5. There would be some individual or group who represented the major stakeholders, both users and developers and also the project sponsor, who would have the authority to prioritize the RFCs for action. 6. Once an RFC has been approved for action, one or more developers are authorized to take copies of the master products that are to be modified. CONT.. 7. The copies are modified. In the case of software components this would involve modifying the code and recompiling and testing it. 8. When the development of new versions of the product has been completed the user management will be notified and copies of the software will be released for user acceptance testing. 9. When the user is satisfied that the products are adequate they will authorize their operational release. The master copies of configuration items will be replaced. CHANGES IN SCOPE OF A SYSTEM
A common occurrence with IS development projects is for the
size of the system gradually to increase. One cause of this is changes to requirements that are requested by users. The scope of a project needs to be carefully monitored and controlled. One way is to re-estimate the system size in terms of SLOC or function points at key milestones CONFIGURATION LIBRARIAN’S ROLE
Control of changes and documentation ought to be the
responsibility of someone who may variously be named the configuration librarian, the configuration manager or the project librarian. CONT.. Among this person’s duties would be: The identification of all items that are subject to change control; The establishment and maintenance of a central repository of the master copies of all project documentation and software products; The setting up and running of a formal set of procedures to deal with changes; The maintenance of records of who has access to which library items and the status of each library item THANK YOU