The Neglected Management Activity: Software Risk Management
|
|
|
- Wilfrid Matthew Robbins
- 10 years ago
- Views:
Transcription
1 The Neglected Management Activity: Software Risk Management F. Michael Dedolph Software risk management is a crucial part of successful project management, yet it is often neglected. Why is it important? Why is it neglected? This letter discusses barriers to implementing risk management and provides examples of good (i.e., successful) risk management Lucent Technologies Inc. What is Software Risk Management? Risk management terminology is inconsistent, so it is worthwhile to establish working definitions of risk, risk management, software risk management, and risk exposure (or risk magnitude). Risk can be defined as the possibility of harm or loss. Typically, risks are described as some kind of event that may or may not occur, coupled with a consequence that follows if the event occurs. This definition leads naturally to considering the probability of the risk event and the cost(s) associated with the consequence. Risk management is the set of activities used to manage risks. Ideally, the activities are both systematic and effective (i.e., the overall risk is reduced to a level that is acceptable). Risks are acceptable if the project is willing to accept the worst-case consequences. Risk management activities have three primary goals: identifying, analyzing, and mitigating risks. These activities are typically done using some variant of a Shewart (plan-do-check-act) cycle. Identification and analysis can be formal (e.g., the Bell Labs RiskIQ SM methodology, which is based on extensive checklists and supporting financial models) or informal (e.g., a risk list derived from a brainstorming session followed up by working on the top five or so items on the list). Mitigation, also called control or abatement, can involve taking actions to reduce the probability of the risk event, taking actions to reduce the impact of the risk event, or both. Many mitigation strategies depend upon the characteristics of the specific project for which they are developed, and their design requires considerable creativity. There are also generic mitigation strategies, including: Acceptance (i.e., doing nothing), Buying information (i.e., hiring a consultant, performance modeling, and prototyping user interfaces), Transfer (i.e., outsourcing), Prevention (i.e., canceling the project), and Contingency reserves (i.e., padding the schedule, using budget reserves). The most common risk mitigation strategy is acceptance (or assumption). Use of this strategy is often the unintentional consequence of not managing risks. Risk management practices at Lucent Technologies vary. Typically, projects create a risk list early in the development cycle. Some projects update the list proactively and manage risks closely; others do not. The risks considered are usually technical; organizational and environmental risks are not normally Bell Labs Technical Journal 8(3), (2003) 2003 Lucent Technologies Inc. Published by Wiley Periodicals, Inc. Published online in Wiley InterScience ( DOI: /bltj.10077
2 considered. Team risk management (i.e., risk management involving customers and suppliers) is not generally practiced. Software risk management is risk management applied to the development and/or deployment of software-intensive systems. Risk exposure is the product of the probability of the risk event and the impact of the risk event, measured in financial terms. For example, a.001 probability of an automobile accident with a weighted financial impact of $450,000 has an exposure of $450. (The weighted impact may seem high, but the value includes multimillion-dollar lawsuits as well as fenderbenders). Risk magnitude [1] is based on estimates of probability and impact, like risk exposure. However, risk magnitude, rather than being a calculated estimate of financial impacts, is typically mapped to values of low, medium, high, and (sometimes) catastrophic. The use of magnitude values is appropriate when financial impacts are unknown or quantitative risk data are lacking. If the goal of a project is to pick the top five to ten risks, a simple prioritization of the known risks using any convenient, agreed-upon measure of magnitude is sufficient; but if the project s goal is to motivate investment in risk-management activities or to decide how much investment is appropriate, a more rigorous approach using financial measures of exposure is needed. Why is Software Risk Management Important? The short answer is that unmanaged risks cost money. It is difficult to motivate software risk management during development, because many of the costs are intangible or deferred. While hardware drives many of the most visible development costs (e.g., new ASICs, models, and manufacturing ramp-up), software often drives the schedule, even in hardwareintensive projects. Software schedule slips affect overall product financials indirectly. Slips in software schedules are notorious and widespread. Industry-wide, software development projects are only successful (i.e., on time and on budget) 16.2% of the time. Of the remaining projects, 52.7% are late or delivered with a subset of planned functionality and 31.1% are cancelled before completion [2]. Almost every software development risk event affects schedule, quality, or both. The risk event may be any of a number of things (e.g., overloaded test equipment, requirements churn, performance problems, staff turnover, and integration of third-party software); however, the consequence of the risk event will usually affect the schedule or quality, indirectly affecting the product s financials. The cost of a schedule slip can easily exceed the development cost of a product. The obvious financial impact of a schedule slip is increased staff costs, but an extended schedule slip can cause other, more serious effects, such as delayed receipt of revenue and lost market share. To understand why this is so, consider a hypothetical project that has a 2-year development plan and staff costs of $16M (i.e., $670K per month). The net income is expected to be 10% of $500M in sales over 5 years, or $50M. Sales are expected to be front loaded: $50M per quarter in the first year, dropping to $25M per quarter in years two and three, and $12.5M per quarter in years four and five. A lead customer has imposed a penalty clause of $0.5M if the product is more than 90 days late; further delay will also cause loss of market share. Based on these assumptions, Table I shows the possible financial impacts resulting from different schedule slips. Delivering a product with reduced software functionality a common event can be viewed as one type of quality problem. The effects of doing so, like those of late delivery, are subtle, but they can include increased overall development costs, lost sales, erosion of market share, and expensive retrofits for the installed software base when the deferred functionality is deployed in a later release. If it seems that the message of these data is make the schedule at all costs, it must be remembered that many schedules are unrealistic and cannot be met, because they are established without an understanding of the size and complexity of the software effort. Furthermore, there are significant risks associated 92 Bell Labs Technical Journal
3 Table I. Possible financial impacts of different schedule slips. Risk magnitude Description of effects Financial impact Low Schedule slip 1 month Minimal Medium Schedule slip 2 months $4.6M Staff costs: $1.3M Net profit lost: $3.3M High Schedule slip 4 months $17.2M Staff costs: $2.7M Net profit lost: $6.7M Penalties: $0.5M Lose 20% of remaining market, causing net profit loss of $7.3M Catastrophic Schedule slip 6 months, resulting in project cancellation At least $70.5M Development investment loss: $20M Penalties: $0.5M 100% net profit lost: $50M Unconsidered costs: loss of future sales to lead customer, time value of money, supply chain costs with rushing a product to market. Products delivered on time with major quality problems incur a different set of financial liabilities, which show up during deployment or post-deployment. For example, if defects cause network outages and/or loss of revenue for customers, the supplier of the product may share liability and incur the cost of litigation, which can easily exceed the costs shown in the example above. Why is Software Risk Management Neglected? There are good reasons to manage risks. If we apply industry averages to the hypothetical project discussed above, the product would be late 52.7% of the time, and 31.1% of the time the project would be cancelled. Using the financial impact estimates listed in Table I, a back-of-the-envelope exposure estimate is approximately $27M. If this overall exposure is reduced by only one third, the potential savings are around $9M. Why, then, is software risk management neglected? There are many reasons, but organizational inertia is the most important. Organizations by their nature resist change. There are many things that contribute to this organizational resistance, including: Visible (and tangible) development costs get more attention than intangibles like loss of net profit and downstream liability. The value of risk management cannot easily be proved; the savings do not seem real. Project teams are too busy fire-fighting; there are no resources available for any extra work. Risk management particularly formal methods with a high initial overhead seems difficult. Project teams (and managers) are rewarded for problem-solving, not prevention. Mitigation actions may require organizational or process changes. Attitudes can also stand in the way of doing risk management. Some of the common barriers resulting from attitudes are: Discussing risks goes against cultural norms (e.g., bringing up potential issues is viewed as negative thinking or as causing conflict within the group), Overconfidence (e.g., Lucent only hires really good engineers), and Fatalism (e.g., software is always late anyway; there is no way to change that). The author s consulting experience indicates that groups that do not understand and apply the basics of project management do not manage risks effectively, because they are too busy fire-fighting. Overcoming all these barriers can be done top-down by insistent leadership or bottom-up by Bell Labs Technical Journal 93
4 enlightened project teams. In either case, it requires substantial effort to keep communication open and honest. Examples of Good and Bad Software Risk Management. Examples of bad software risk management abound, as shown by the poor track record for on-time software delivery. The following are some common software risks that will exacerbate almost all others: Unanticipated requirements growth, Setting schedules before the scope of the software effort is known, Not using code inspections for software that must be highly reliable, Shortening test cycles to make ship dates, Not reviewing lessons learned from previous projects, Rubber-stamping (or not having) architecture and gate reviews. The following subsections contain a few examples of good risk management observed by the author. Team Risk Management A large Air Force project had experienced three consecutive late point releases with unacceptable quality. A risk team was formed comprising the developer, customer, systems architecture group, and contract management. An outsider was brought in to do an initial risk evaluation, facilitate monthly team risk meetings, and act as a devil s advocate. The results were twofold: issues were addressed proactively (resulting in three on-time releases with improved quality) and bonuses improved the contractor s net profit. Here, risk management was driven top-down. The notable innovation was using a customer/supplier team to manage risks and creating a forum for open discussion of risks that crossed organizational lines. Creating a Marketing Function A small project was charged with making new software development tools work in the Navy environment and with propagating their use. It piloted the tools on a real project. Requests for information and tool assistance began to interfere with meeting the schedule commitments. The project established a marketing function and staffed it full-time with a senior engineer. The results were no schedule slip and widespread adoption of the tool set. These actions were taken at the project level (i.e., risk management was driven bottom-up). The key insight was noticing that the risks were environmental, so a buffer was needed to shield the project. Building a Platform A platform team was building a platform concurrently with the development of platform applications. Anticipating that necessary changes to the platform would adversely affect the application development schedules, the platform team streamlined its problem resolution process and allocated senior engineers to work directly with the application development teams. These engineers were assigned to support each application throughout development and test. The results were fast problem resolution, minimal schedule slips, and acceptance of the platform. This project was a good example of teaming with customers to reduce the overall risk to both sides. Conclusions Software development is often the determining factor of both the overall schedule and the quality of the system. Therefore, managing software development risks is essential to minimizing both schedule risks and the cost of quality. Unmanaged risks cost money. Schedule slips incur significant financial risk, while software quality problems incur significant post-release liability. Risk management can be viewed as proactive as opposed to reactive management. It can be formal or informal and can be driven top-down or bottom-up, but it requires sustained effort and good communication to be effective. Acknowledgments I owe my risk management colleagues a large debt for most of the ideas presented here. Thanks to Audrey Dorofee, Dick Murphy, Frank Sisti, and Ray Williams of the Software Engineering Institute; Elaine Hall of Level 6 Software; Anwar Kurshid, David Laurance, David Mongeau, Kiron Rao, John Schaefer, and Pat Sciacca of Lucent Technologies. 94 Bell Labs Technical Journal
5 References [1] R. C. Williams, G. J. Pandelios, and S. G. Behrens, Software Risk Evaluation Method V2.0, CMU/SEI-99-TR-029, Software Engineering Institute, Pittsburgh, 1994, < 99.reports/pdf/99tr029-body.pdf>. [2] Standish Group, The Chaos Chronicles: Version 1.0, The Standish Group, West Yarmouth, MA, 1994, < sample_research/chaos_1994_1.php>. Further Reading D. P. Gluch and A. J. Dorofee, A Collaboration in Implementing Team Risk Management, CMU/SEI-95-TR-016, Software Engineering Institute, Pittsburgh, 1995, < 95.reports/pdf/tr pdf>. E. M. Hall, Managing Risk: Methods for Software Systems Development, Addison Wesley Longman Inc., Reading, MA, (Manuscript approved May 2003) F. MICHAEL DEDOLPH is a technical manager in the Software Technology Center (STC) of Bell Labs at Lucent Technologies in Pittsburgh, Pennsylvania, and a member of the System Architecture Review Board (SARB). His primary responsibility is to lead product architecture reviews. He is also the lead instructor for a Lucent class in telecommunications systems architecture and for a new Design for Profitability class. His professional interests include creative problem-solving and the application of team-based strategies for product development, process improvement, and organizational improvement. He has a B.S. degree in mathematics from Texas Tech University at Lubbock and an M.S. degree in computer science from the University of Colorado at Boulder. Bell Labs Technical Journal 95
6
7
PROJECT RISK MANAGEMENT
PROJECT RISK MANAGEMENT DEFINITION OF A RISK OR RISK EVENT: A discrete occurrence that may affect the project for good or bad. DEFINITION OF A PROBLEM OR UNCERTAINTY: An uncommon state of nature, characterized
Continuous Risk Management Guidebook
Carnegie Mellon Software Engineering Institute Continuous Guidebook Audrey J. Dorofee Julie A. Walker Christopher J. Alberts Ronald P. Higuera Richard L. Murphy Ray C. Williams The ideas and findings in
Risk Mitigation: The X Factor in Contingent Workforce Management
Risk Mitigation: The X Factor in Contingent Workforce Management Perspective Article In this perspective article, Bartech the leading workforce management solutions provider examines the pivotal role of
Moving from BS 25999-2 to ISO 22301. The new international standard for business continuity management systems. Transition Guide
Transition Guide Moving from BS 25999-2 to ISO 22301 The new international standard for business continuity management systems Extract from The Route Map to Business Continuity Management: Meeting the
A Taxonomy of Operational Risks
Sponsored by the U.S. Department of Defense 2005 by Carnegie Mellon University A Taxonomy of Operational Risks Brian Gallagher Director, Acquisition Support page 1 Operational Risk By its nature, the uncertainty
Motivations. spm - 2014 adolfo villafiorita - introduction to software project management
Risk Management Motivations When we looked at project selection we just took into account financial data In the scope management document we emphasized the importance of making our goals achievable, i.e.
15 Principles of Project Management Success
15 Principles of Project Management Success Project management knowledge, tools and processes are not enough to make your project succeed. You need to get away from your desk and get your hands dirty.
Supply Chain Maturity and Business Performance: Assessment and Impact
Supply Chain Maturity and Business Performance: Assessment and Impact Abstract When evaluating your supply chain, no gap should exist between where your suppliers capabilities end and your capabilities
Essential Elements for Any Successful Project
In this chapter Learn what comprises a successful project Understand the common characteristics of troubled projects Review the common characteristics of successful projects Learn which tools are indispensable
Top 3 Reasons To Outsource Product Development By Ralph Paul Director of Product Engineering MPR Product Development
Top 3 Reasons To Outsource Product Development By Ralph Paul Director of Product Engineering MPR Product Development Copyright 2014 MPR Associates, Inc. All Rights Reserved In today s environment, almost
How To Manage Project Cost Management
Chapter 7 Project Cost Management (1) Dr. Feng-Jen Yang Objectives Understand the importance of project cost management Explain basic project cost management principles, concepts, and terms Discuss different
Best Practices: B2B Small Business Accounts Receivable
Best Practices: B2B Small Business Accounts Receivable Best Practices: B2B Small Business Accounts Receivable By Dan Drechsel For most business to business companies, their largest asset is also the most
bout your HOUSE Hiring a contractor
A bout your HOUSE Hiring a contractor CE 26 a At some time, most homeowners will hire someone for repairs or renovations. Even a homeowner experienced in home repairs may have to hire a contractor or renovator
B.2.2. Project Management Principles
B.2.2. Project Management Principles Project management is the application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations
RISK MANAGEMENT FOR INFRASTRUCTURE
RISK MANAGEMENT FOR INFRASTRUCTURE CONTENTS 1.0 PURPOSE & SCOPE 2.0 DEFINITIONS 3.0 FLOWCHART 4.0 PROCEDURAL TEXT 5.0 REFERENCES 6.0 ATTACHMENTS This document is the property of Thiess Infraco and all
Lean Software Development
Lean Software Development Alexandre Boutin Responsable Stratégie International Développement Logiciel chez Yahoo Scrum Master & Practitioner Certifié Coach Agile Blog : www.agilex.fr Président du Club
Portfolio Management 101:
THOUGHT LEADERSHIP WHITE PAPER In partnership with Portfolio Management 101: Moving from Just Project Management to True PPM A lot of organizations claim that they carry out project & portfolio management
Using Leading Indicators to Drive Sustainability Performance. Responding to changing circumstances and improving future performance
QUALITY TOOLBOX Using Leading Indicators to Drive Sustainability Performance Companies tend to report their sustainability results (both internally and externally) with the idea that these measurements
Risk Management (3C05/D22) Unit 3: Risk Management. What is risk?
Risk Management (3C05/D22) Unit 3: Risk Management Objectives To explain the concept of risk & to develop its role within the software development process To introduce the use of risk management as a means
Deploying Resilient Customer Relationship Management Applications
IBM Global Services June 2003 Deploying Resilient Customer Relationship s Anju Bhargava, Jackye Malloy Jones, Frank Rodegeb, Rob Bucci Page 2 Contents 2 Introduction - CRM is a Corporate Strategy 3 CRM
Analyzing the Security Significance of System Requirements
Analyzing the Security Significance of System Requirements Donald G. Firesmith Software Engineering Institute [email protected] Abstract Safety and security are highly related concepts [1] [2] [3]. Both
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504 Dipak Surie, Email : [email protected] Computing Science Department Umea University, Umea, Sweden Abstract. During software development,
SOFTWARE RISK MANAGEMENT
SOFTWARE RISK MANAGEMENT Linda Westfall The Westfall Team [email protected] PMB 383, 3000 Custer Road, Suite 270 Plano, TX 75075 972-867-1172 (voice) 972-943-1484 (fax) SUMMARY This paper reviews the basic
Software Risk Management Practice: Evidence From Thai Software Industry
INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 10 Software Risk Management Practice: Evidence From Thai Software Industry Tharwon
Course 4: Managing Cash Flow
Excellence in Financial Management Course 4: Managing Cash Flow Prepared by: Matt H. Evans, CPA, CMA, CFM This course provides an introduction to cash flow management. This course is recommended for 2
Root Cause Analysis Concepts and Best Practices for IT Problem Managers
Root Cause Analysis Concepts and Best Practices for IT Problem Managers By Mark Hall, Apollo RCA Instructor & Investigator A version of this article was featured in the April 2010 issue of Industrial Engineer
How to Select and Implement an ERP System
How to Select and Implement an ERP System Prepared by 180 Systems Written by Michael Burns 180 Systems WHAT IS ERP?... 3 ANALYSIS... 4 VENDOR SELECTION... 6 VENDOR DEMONSTRATIONS... 8 REFERENCE CALLS...
Understanding the Financial Value of Data Quality Improvement
Understanding the Financial Value of Data Quality Improvement Prepared by: David Loshin Knowledge Integrity, Inc. January, 2011 Sponsored by: 2011 Knowledge Integrity, Inc. 1 Introduction Despite the many
Software Engineering for Software-Intensive Systems: III The Development Life Cycle
Software Engineering for Software-Intensive Systems: III The Development Life Cycle Assistant Professor Dr. Room E 3.165 Tel. 60-3321 Email: [email protected] Outline I Introduction II Foundations III The Development
Selecting Arbitrators in Construction & Surety Cases
Selecting Arbitrators in Construction & Surety Cases Practical Considerations in the Selection of Arbitrators in Construction and Surety Cases "Industry Insight" articles like this one below are submitted
Telecom at a Crossroad, The Role of Innovation Catherine Bentley, Senior Consultant, Innovation 360 November 2014
If you had to choose between your mobile phone and your automobile, which would you keep? A video of interviews asking people from around the world this question launched the Innovation 360 seminar,. Resoundingly,
Project management. Objectives. Topics covered. Organizing, planning and scheduling software projects DISCUSSION
Project management 1 Objectives 2 Organizing, planning and scheduling software projects DISCUSSION Project Managers? To introduce software project management and to describe its distinctive characteristics
BITS GUIDE TO CONCENTRATION RISK
BITS GUIDE TO CONCENTRATION RISK IN OUTSOURCING RELATIONSHIPS BITS A DIVISION OF THE FINANCIAL SERVICES ROUNDTABLE 1001 PENNSYLVANIA AVENUE, NW SUITE 500 SOUTH WASHINGTON, DC 20004 202-289-4322 WWW.BITS.ORG
Risk Management. 1 The Risk Management Practice
The proactive management of risks throughout the software development lifecycle is important for project success. In this chapter, we will explain the following: the risk management practice, which involves
The Business Case for Outsourcing Software Testing to a Separate Vendor
The Business Case for Outsourcing Software Testing to a Separate Vendor How an independent software testing company can help you improve your quality and time-to-market while reducing risk and cost Introduction...
Risk Management Framework
Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR-2010-017 Acquisition Support Program Unlimited distribution subject to the copyright.
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis Cristine Martins Gomes de Gusmão Federal University of Pernambuco / Informatics Center Hermano Perrelli de Moura Federal University of Pernambuco
Leading Indicators for Project Management
Leading Indicators for Project Management Project Headlights Dave Card [email protected] Agenda Motivation Headlights Strategies for Leading Indicators Common Leading Indicators Back-up Lights Summary
A Guide to Carrying Out a SWOT Analysis Introduction
A Guide to Carrying Out a SWOT Analysis Introduction Resource 1.4 A SWOT (strengths, weaknesses, opportunities and threats) analysis is often done as part of the process of developing a business plan or
Performance and Supply Chain Management
Fresh thinking Performance and Supply Chain Management FOR THE SOFTWARE TELCO A WHITE PAPER HOW TO BECOME A SOFTWARE TELCO? Many network operators are currently engaged in the transformation to become
Customer analytics case study: T-Mobile Austria
mwd a d v i s o r s Best Practice Insight Customer analytics case study: T-Mobile Austria Helena Schwenk Premium Advisory Report April 2011 This report examines T-Mobile Austria s use of Portrait Customer
Integrated Risk Management. Balancing Risk and Budget
Integrated Risk Management The Current Risk Landscape Organizations which depend upon information systems are challenged by serious threats that can exploit both known and unknown vulnerabilities in systems.
Step by Step Project Planning
Step by Step Project Planning Contents Introduction The Planning Process 1 Create a Project Plan...1 Create a Resource Plan...1 Create a Financial Plan...1 Create a Quality Plan...2 Create a Risk Plan...2
The Call to Off-shore
Ever dial a 1-800 number and have your call routed directly to India? In as little time as it takes to say hello, many organizations outsourced their IT functions and projects overseas with high hopes
Contracting for Agile Software Projects
Contracting for Agile Software Projects Author: Peter Stevens As a customer or supplier of software services at the beginning of a Software Development Project, you know that there is too much at stake
The Enterprise Project Management Office
The Enterprise Project Management Office A Conceptual Review Dick Patterson [email protected] 1 Report Overview Almost all enterprises are confronted by accelerating change. An effective, Enterprise
Problems that haven t happened yet Why is it hard? Some are wary of bearing bad news. Define a strategy early in your project
1 Problems that haven t happened yet Why is it hard? Some are wary of bearing bad news No one wants to be the messenger Or seen as a worrier Define a strategy early in your project 2 Identification, Analysis,
Project Zeus. Risk Management Plan
Project Zeus Risk Management Plan 1 Baselined: 5/7/1998 Last Modified: N/A Owner: David Jones/Zeus Project Manager Page Section 1. Introduction 3 1.1 Assumptions, Constraints, and Policies 3 1.2 Related
Seven Steps To Measure Supplier Performance
SUPPLY CHAIN MANAGEMENT Seven Steps To Measure Supplier Performance by Sherry Gordon Every organization knows it should be assessing supplier performance. Most are deploying some sort of supplier performance
Starting and Running a Successful Small Business 10 Tips
Starting and Running a Successful Small Business 10 Tips This Guide has been prepared by DAN W. KEHR, ESQ. for informational purposes only and does not constitute advertising, a solicitation, or legal
FlyntGroup.com. Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk
Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk 2012 The Flynt Group, Inc., All Rights Reserved FlyntGroup.com Enterprise Risk Management and Business
Business Proposal: Recommendation for Implementation of the SAGE Enterprise Suite. Debbie Miksiewicz. Elaine Kithcart BSA 375. Mr.
Business Proposal: Recommendation for Implementation of the SAGE Enterprise Suite Debbie Miksiewicz Elaine Kithcart BSA 375 Mr. Andrew Mahaney April 17, 2011 Business Proposal 2 Table of Contents Introduction
Data Loss in a Virtual Environment An Emerging Problem
Data Loss in a Virtual Environment An Emerging Problem Solutions to successfully meet the requirements of business continuity. An Altegrity Company 2 3 4 5 Introduction Common Virtual Data Loss Scenarios
Rolling Wave Planning: Manage Projects Without Going Under
Rolling Wave Planning: Manage Projects Without Going Under Rolling Wave Planning: Manage Projects Without Going Under W. Charles Slaven MBA PMP CSSBB CPA (inactive) Director, Lean Deployment and Continuous
Utilizing Predictive Supplier Performance Information for Successful Non- Core Supplier Management
Utilizing Predictive Supplier Performance Information for Successful Non- Core Supplier Management Jeff Baron Director, Open Ratings, Inc. 928 Commonwealth Avenue Boston, MA 02215 (617) 582.5100 [email protected]
Main Page Search August 25, 2010
1 of 6 8/25/2010 5:22 PM Main Page Search August 25, 2010 Association News Features/Substantive Law Spotlight/Profiles Departments Classifieds The Hennepin Lawyer Kenneth Ross August 24, 2010 Headlines
Know Your Enemy: Software Risk Management 1
Know Your Enemy: Software Risk Management 1 Karl E. Wiegers Process Impact 716-377-5110 www.processimpact.com Software engineers are eternal optimists. When planning software projects, we often assume
How Cisco IT Uses Software Configuration Management to Minimize Business Risk
How Cisco IT Uses to Minimize Business Risk Application change management process improves software quality and developer productivity. Cisco IT Case Study / Business Management / : This case study describes
Delivering Energy Projects Predictably
Delivering Energy Projects Predictably Pete Luan & John Wray, Westney Consulting Group Knut Eriksen and Greg Dodson, NATCO Group 1 Introduction Project delivery systems are those business processes that
Six Key Principles for Measuring Human Capital Performance in Your Organization
Six Key Principles for Measuring Human Capital Performance in Your Organization By Brian E. Becker State University of New York at Buffalo Mark A. Huselid Rutgers University Dave Ulrich University of Michigan
Lean Principles by Jerry Kilpatrick
Lean Principles by Jerry Kilpatrick Introduction Lean operating principles began in manufacturing environments and are known by a variety of synonyms; Lean Manufacturing, Lean Production, Toyota Production
Project Management Issues in the Finance Transformation Arena
Project Management Issues in the Finance Transformation Arena Projects, and the ability to deliver them on time and on budget, not only represent an ongoing challenge for any organization, but also require
How To Ensure Security In A System
Software Assurance vs. Security Compliance: Why is Compliance Not Enough? Carol Woody, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2012 Carnegie Mellon University
Unit 15: Risk Management
Unit 15: Risk Management Objectives Ð To explain the concept of risk & to develop its role within the software development process Ð To introduce the use of risk management as a means of identifying &
High-Reliability Health Care: Getting There from Here
High-Reliability Health Care: Getting There from Here MARK R. CHASSIN and JEROD M. LOEB The Joint Commission Context: Despite serious and widespread efforts to improve the quality of health care, many
Best in Class Referral Programs
Take your business to the next level Best in Class Referral Programs Lower cost per sale, Higher Retention, Increased Profits Free Sales and Marketing Audit Call 410-977-7355 Best in Class Customer Referral
So, What Exactly is Risk Management?
So, What Exactly is Risk Management? By Paul Wielgus, Managing Director, GDS Associates, Inc. Buyers, sellers, and others in the energy business need to understand the risks in this very uncertain environment
Using ISO 9001 or ISO 14001 to Gain a Competitive Advantage
Using ISO 9001 or ISO 14001 to Gain a Competitive Advantage Spencer Hutchens Jr. Introduction To be competitive on both a national and a global basis, organizations must adopt a forward-thinking approach
Examples of Behavior Statements- What does "below", "meets" and "exceeds" expectations really mean?
Examples of Behavior Statements- What does "below", "meets" and "exceeds" expectations really mean? Manager Role MANAGER ROLE: Supports OU s strategic objectives by accomplishing results through others.
Presentation title Partnering in the Delivery of IT Services in Parliaments
Presentation title Partnering in the Delivery of IT Services in Parliaments House of Commons / CANADA Mr. Soufiane Ben Moussa Chief Technology Officer 2 The House of Commons Context 308 Members of Parliament
Chapter 3: Project Cost Management
Chapter 3: Project Cost Management Learning Objectives o Understand the importance of project cost management. o Explain basic project cost management principles, concepts, and terms. o Discuss different
Much attention has been focused recently on enterprise risk management (ERM),
By S. Michael McLaughlin and Karen DeToro Much attention has been focused recently on enterprise risk management (ERM), not just in the insurance industry but in other industries as well. Across all industries,
Community Futures Management Consultant in a Box
Community Futures Management Consultant in a Box Strategic Business Planning Purpose of this Document The purpose of this document is to provide you with the process that a management consultant would
Serena Dimensions CM. Develop your enterprise applications collaboratively securely and efficiently SOLUTION BRIEF
Serena Dimensions CM Develop your enterprise applications collaboratively securely and efficiently SOLUTION BRIEF Move Fast Without Breaking Things With Dimensions CM 14, I am able to integrate continuously
