Professional Documents
Culture Documents
3. 1 Management Activities:
Software Project Management consists of many activities, that includes planning of the
project, deciding the scope of product, estimation of cost in different terms,
scheduling of tasks, etc.
The list of activities are as follows:
1. Project planning and Tracking
2. Project Resource Management
3. Scope Management
4. Estimation Management
o Quality
o Hardware
o Communication
o Training
o Skilled manpower
o Adjustment of resources.
6. Project Risk Management: Risk management consists of all the activities like
identification, analyzing and preparing the plan for predictable and unpredictable risk
in the project.
Several points show the risks in the project:
o The Experienced team leaves the project, and the new team joins it.
o Changes in requirement.
o Market competition.
o Baseline
o Change Control
o Risk analysis
Software Project planning starts before technical work start. The various steps of
The size is the crucial parameter for the estimation of other activities. Resources
requirement are required based on cost and development time. Project schedule
may prove to be very useful for controlling and monitoring the progress of the project.
This is dependent on resources & development time.
7. Determine the critical path. A critical way is the group of activities that decide the
duration of the project.
The first method in scheduling a software plan involves identifying all the functions
required to complete the project. A good judgment of the details of the project and
the development process helps the supervisor to identify the critical role of the project
effectively. Next, the large functions are broken down into a valid set of small activities
which would be assigned to various engineers. The work breakdown structure
formalism supports the manager to break down the function systematically after the
project manager has broken down the purpose and constructs the work breakdown
structure; he has to find the dependency among the activities. Dependency among the
various activities determines the order in which the various events would be carried
out. If activity A necessary for the results of another activity B, then activity A must be
scheduled after activity B. In general, the function dependencies describe a partial
ordering among functions, i.e., each service may lead a subset of other functions, but
some functions might not have any precedence ordering describe between them
(called concurrent function). The dependency among the activities is defined in the
pattern of an activity network.
Once the activity network representation has been processed out, resources are
allocated to every activity. Resource allocation is usually done using a Gantt chart.
After resource allocation is completed, a PERT chart representation is developed. The
PERT chart representation is useful for program monitoring and control. For task
scheduling, the project plan needs to decompose the project functions into a set of
activities. The time frame when every activity is to be performed is to be determined.
The end of every action is called a milestone. The project manager tracks the function
of a project by audit the timely completion of the milestones. If he examines that the
milestones start getting delayed, then he has to handle the activities carefully so that
the complete deadline can still be met.
Risk Management
A software project can be concerned with a large variety of risks. In order to be adept
to systematically identifying the significant risks which might affect a software project,
it is essential to classify risks into different classes. The project manager can then check
which risks from each class are relevant to the project.
There are three main classifications of risks which can affect a software project:
1. Project risks
2. Technical risks
3. Business risks
1. Project risks: Project risks concern different forms of budgetary, schedule,
personnel, resource, and customer-related problems. A vital project risk is schedule
slippage. Since the software is intangible, it is very tough to monitor and control a
software project. It is very tough to control something which cannot be identified. For
any manufacturing program, such as the manufacturing of cars, the plan executive can
recognize the product taking shape.
2. Technical risks: Technical risks concern potential methods, implementation,
interfacing, testing, and maintenance issues. It also consists of an ambiguous
specification, incomplete specification, changing specification, technical uncertainty,
and technical uselessness. Most technical risks appear due to the development team's
insufficient knowledge of the project.
3. Business risks: This type of risks contain risks of building an excellent product that
no one need, losing budgetary or personnel commitments, etc.
Other risk categories
Proactive risk management is a concept that aims to reduce the chances of any
accident or malicious attack occurring in the future by identifying each business’
situation or process to determine potential threats.
It is creative thought for those looking to protect their organization’s valuables and is
currently the most common method of risk management strategy because of its
effectiveness.
Why choose a Proactive Strategy?
The ‘prevention is better than the cure’ is true with regard to a proactive strategy, and
this can apply to an entire host of occupations that possess a risk management plan.
You’d argue that fire prevention is much preferable to actual firefighting. This also
applies to businesses, where retailers (etc) can safeguard their valuables from threats
online by utilizing a proactive risk management method, rather than managing the
threat.
The incident is investigated, and measures are implemented to avoid similar events
from attacking the business in the future.
It saves company time that is poured into the research and analysis of risk mitigation
and forces a company’s hand to adapt in certain situations, which can be risky.
Reactive concepts also save a lot of time and energy that a proactive approach would
take. It is also argued that, a situation that a proactive strategy has not prepared for
may arise, in which case the strategy is rendered surplus to requirements.
A proactive risk strategy generally consists of focusing efforts on justifying the risk of
pre-emptive threat occurrences.
This involves devising plans to protect critical assets via educating the business about
the who, what, where, why, and how threats can potentially expose their valuable,
sensitive assets.
By summarizing each asset, businesses can also easily prioritize, plan and tackle
incidents accordingly should they threaten to compromise their assets.
Software metrics are valuable for many reasons, including measuring software
performance, planning work items, measuring productivity, and many other uses.
first study the problems faced by previous projects. Study the project plan properly
and check for all the possible areas that are vulnerable to some or the other type of
risks. The best ways of analyzing a project plan is by converting it to a flowchart and
identify the known unknowns that can affect the project. Any decision taken related
evaluated properly.
In this phase of Risk management, you have to define processes that are important
for risk identification. All the details of the risk such as unique Id, the date on which it
RE = P x C
Risk refinement: During the early stages of project planning, a risk may be
stated quite generally. As time passes and more is learned about the project and the risk, it may be
possible to refine the risk into a set of more detailed risks.
One way to do this is to represent the risk in condition-transition-consequence (CTC) format . That
is, the risk is stated in the following form:
Given that <condition> then there is concern that (possibly) <consequence>.
=============
Given that all reusable software components must conform to specific design standards and that
some do not conform, then there is concern that (possibly) only 70 percent of the planned reusable
modules may actually be integrated into the as-built system, resulting in the need to custom
engineer the remaining 30 percent of components.
Subcondition 1. Certain reusable components were developed by a third party with no knowledge
of internal design standards.
Subcondition 2. The design standard for component interfaces has not been tough and may not
conform to certain existing reusable components.
Subcondition 3. Certain reusable components have been implemented in a language that is not
supported on the target environment.
The consequences associated with these refined subconditions remains the same ( i.e., 30 percent of
software components must be customer engineered), but the refinement helps to isolate the
underlying risks and might lead to easier analysis and response.
Risk mitigation:
Risk mitigation simply means to reduce adverse effects and impact of risks
that are harmful to project and Business continuity. It includes introducing
measures and step taken into a project plan to mitigate, reduce, eliminate, or
control risk. Risk mitigation means preventing risks to occur (risk avoidance).
Following are measures and steps to be taken for mitigating risks:
Communicate with concerned staff to find probable risks.
Identify and eliminate all those causes and issues that can create
risk before the beginning of project work.
Develop policy in an organization that will help to continue the project
even though some staff leaves the organization.
Everybody in the project team should be acquainted i.e. should be
aware of and familiar with current development activity.
Maintain corresponding documents in a timely manner. This
documentation should be strictly followed as per standards set by the
organization.
Conduct timely reviews in order to speed up work.
For conducting every critical activity during software development,
provide additional staff is required.
Risk monitoring:
As the project proceeds, risk monitoring activities commence. The project
manager monitors factors that may provide an indication of whether the risk is
becoming more or less likely.
In the case of high staff turnover, the following factors can be monitored:
General attitude of team members based on project pressures.
Interpersonal relationships among team members.
Potential problems with compensation and benefits.
The availability of jobs within the company and outside it.