Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1
TABLES OF CONTENT
TASK 1
Overview
Project management……………………………………………………5
Definition……………………………………………………………….5
Benefits of using a project management development lifecycle……….6
The Waterfall Model……………………………………………………7
The Boehm’s Spiral Model……………………………………………..8
Comparing and contrasting the difference between each model, their
strength and weakness………………………………………………….10
TASK 2
Overview
Configuration management…………………………………………….11
Functions of configuration management……………………………….11
o Configuration Planning
o Configuration Control
o Configuration Status accounting
o Configuration Identification or Verification…………………….12
Benefit of Configuration management…………………………………13
Configuration control process………………………………………….13
Forms for Authorisation of changes to software design…………….15-16
TASK 3
Introduction
Risk …………………………………………………………………… 17
Process of risk analysis …………………………………………..……18
Risk Evaluation ………………………………………………………..20
Risk Estimation…………………………………………………………20
Using risk to asses the impact of problems…………………………….20
Work example of Risk matrix………………………………………….22
Contingency planning process…………………………………………………23
2
TASK 4
Introduction
Procurement…………………………………………………………….24
Checklist of criteria……………………………………………………..27
TASK 5
Introduction
Visual communication
Value of visual methods to capture and communicate project works…29
REFERENCING
BIBLOGRAPY
APPENDIX
NOTES
3
ABSTRACT
4
TASK 1
Overview
PROJECT MANAGEMENT
As a discipline, project management developed from different
fields of application including construction, engineering, and
defence.
DEFINITION
Project Management is the application of knowledge, skills, tools
and techniques to project activities to meet project requirements.
Scope
Q
Scope
ua
lit
y
Cost Time
5
The time constraint refers to the amount of time available to complete a
project. The cost constraints refer to the budget amount available for the
project. The scope constraint refers to what must be done to produce the
project’s end result. These three constraints are often the competing
constraints: increase scope typically means increase time and increase cost ,
a tight time could mean increase and reduced scope, and a tight budget could
mean increase time and reduced scope..
6
THE WATERFALL MODEL
The waterfall life or model was the first attempt at the definition of a
software development lifecycle. To follow, one proceeds from one phase to
the next in a purely sequential manner as shown in the diagram below.
After the last two stages are completed that is, implementation and
integration phases, the software product is tested and debugged. Any fault
introduced in earlier phases are removed, then the software product is
installed, and later maintained to introduce new functionality and remove
bugs.
7
BOEHM’S SPIRAL MODEL
This extends the ideas of prototyping and iterative development but it also
recognise that one of the major problems that is faced in any development
project is an initial lack of understanding of the scope and technical
difficulty of the project.
The Boehm’s Model explicitly includes a risk analysis stage at each rotation
of the spiral. The risk analysis provides the information needed to help
management decide whether to proceed.
8
9
COMPARING AND CONTRASTING THE DIFFERENCE BTWEEN
EACH MODEL, THEIR STENGTH AND WEAKNESS.
It is difficult to estimate time and cost for each phase of the waterfall
model but is not difficult for the Spiral model.
I will choose the Boehm’s spiral model because the final loop of the spiral is
effectively equivalent to a conventional waterfall linear development
lifecycle.
10
TASK 2
OVERVIEW
CONFIGURATION MANAGEMENT
A project is part of a programme a configuration management has
greater importance. No business entity can be fully efficient or
effective unless it manages its resources, particularly if the
resources are vital to the running of the organisation’s business.
11
CONFIGURATION PLANNING
Planning configuration management activity is the critical component in
configuration management process. Identifying activity is most important
step in configuration management plan phase. Time and effort invested in
this specific step guarantees an increased potential for success.
CONFIGURATION CONTROL
This phase concerns the management of changes to configuration items
during the software product life cycle. The process starts when new changes
are identified with a change request. Change request can be initiated by users
and developers of the software. A standard procedure for handling change
request should be created. This document should describe the formal
procedures for the deposit and recording of change request, for evaluation of
cost and impacts, and finally for the acceptation, modification, or rejection
of those, request.
12
CONFIGURATION IDENTIFICATION
The goal of this activity is to identify the product items that need to
be controlled; this is based on the product structure modelling
process. This is the process of breaking down the product
(baseline) into several parts and items (software configuration
items). Also identification schemes are created for configuration
items and their versions (part of versions and variant management).
All the controlled items should be stored in a central
Configuration Library. This centralised space keeps track of all
versions and documentation of related software configuration
items.
13
CONFIGURATION CONTROL PROCESS
- Change request
1. Record / classify
2. Assess
3. Plan
4. Build / Test
5. Implement
6. Close / Gain Acceptance
A formal request is received for something (usually in the client’s
to be changed, known as the “Change Initiation”).
- emergency updates
• Release control
• Variant handling.
14
FORMS FOR THE AUTHORISATION OF CHANGES TO
SOFTWARE DESIGN
JIKMOIMIO
CUSTOMER SURVEY FORM REGISTRATION
First Name *
Last Name *
Email *
Organization *
Phone *
Required Field *
15
CUSTOMER SURVEY
To help us better serve your needs. Please take a moment to answer the following
questions. All information is confidential as describe in our Privacy Policy.
What is your primary job function? You may select from the list or enter your
own job function
How many paper forms does your organization receive per month from
customers / general public?
How many people are employed at this location and in your entire
organization?
How many statements, bills or other forms does your organization send to
customers per month.
16
TASK 3
INTRODUCTION
RISK
William J. Stevenson p.197, 2005, wrote in his book (Operations
Management) that, an environment in which certain future events
share probable outcomes is risk or certain parameters have
probabilistic outcomes in known as RISK.
17
Risk reduction can take a number of forms. Much depends on the
nature and scope of a project. “Redundant” (Backup)
Systems can sometimes be used to reduce the risk of failure. For
example, an emergency generator could supply power in the event
of an electricity failure.
18
• Unrealistic deadlines
• Lack of commitment
• Use of contractors
• New approach
• Geographical split.
19
(ii) RISK EVALUATION
Is the process of deciding whether the level of each risk
is acceptable or not and, if not, what actions can be
taken to make it more acceptable
It covers:
a. Assessing the acceptable level of each risk
b. Generating alternative paths of action for risk
which do not meet acceptable criteria;
c. Sorting the risk into a final order of priority
d. Crossing-referencing them to the identified
education potions.
20
USING RISK MATRIX TO ASSESS THE IMPACT OF PROBLEMS
A tool used in the Risk Assessment process, it allows the severity of the risk
of an event occurring to be determined. A risk is the total of each of the
hazards that contribute to it. The risk of any particular hazard H, can be
defined as it probability, p, multiplied by its consequence, c. in layman’s
terms; how likely it is to happen and how bad it would be if it happened.
Hazard = PH * CH.
Therefore the total risk, R, of an event, e, is the sum of the n potential
hazards that would results in that event.
n
R E = Σ Hi
i=0
The consequences can be defined as;
• Catastrophic – Multiple Deaths
• Critical – One Death or Multiple Severe Injuries
• Marginal – One Sever Injury or Multiple Minor in juries
• Negligible – One Minor Injury
21
WORK EXAMPLE OF RISK MATRIX
Any company or organisation would calculate what levels of Risk they can
take with different events. This would be done by weighing up the risk of
event occurring against the cost to implement safety and the benefit gained
from it.
22
CONTIGENCY PLANNING PROCESS.
• Escalation
This may be defined as the difference between the final cost or latest
estimate and the original definitive estimate. Factors which contribute to
cost escalation are;
1. inefficiency
2. inflation
3. characteristics of two information
4. changes in the contract
5. forms of contracts
Some of these escalations are avoidable, others are not, and thus an
allowance must be made the project estimate under contingencies.
23
TASK 4
INTRODUCTION
PROCUREMENT
It includes all activities required in order to get the product from the
suppliers to it final destination. It encompasses the purchasing function,
stores, traffic and transportation, in coming inspection and control and
assurance. Salvage and environmental issues (as they are related to
materials) as a part of procurement. Porter regards Procurement as a support
activity.
24
FORMAL PROCUREMENT PROCESS FOR GOODS AND
SERVICES
All activities need to be performed in such a way that the total value
generated by the company is more than the sum of its costs.
• PRIMARY ACTIVITIES
The procurement function should be able to meet the material
requirements related to inbound and outbound logistics. And often
more importantly, related to operations. Operations may have a
different structure among manufacturing companies. Usually
manufacturing processes can be characterised according to the
following categories.
25
multipurpose machinery. Requiring highly skilled operators, for
example large customer-specific installations.
Support activities
Procurement processes may be also related to supply products
and services for the other support functions some examples are
the buying of
26
CHECKLIST OF CRITERIA
1. Are all criteria expressed in measurable terms?
2. Have all levels of users. Operations and those for maintenance been
canvassed for their criteria?
3. Do the user criteria cover the following areas?
COST
a. development cost
b. operational cost
PERFORMANCE
a. major functions to be performed
b. ease of use
c. quality of user staff required
d. response times
e. documented turn around times
f. availability of the system
g. quality and accuracy
h. error trapping
i. error reporting and recovery
j. mean time between failures
k. mean time to repair
l. security
CAPACITY
a. volumes of data to be compressed.
b. Volumes of permanent data to be stored
c. Volumes of transient data to be stored
PRICE should not be necessarily the main criteria for selection because the
deliverables should basically based on the specific requirement and it fit for
the purpose it was designed for or it must also check for consistency
between the specification, data models and other user documents as well as
ensuring that the product function will be acceptable to the user. The
external interface of the products should be put under scrutiny.
28
TASK 5
INTRODUCTION
Visual communication
VALUE OF VISUAL METHODS TO CAPTURE AND
COMMUNICATE PROJECT WORKS.
Recent research in the field has focused on web design and graphically
oriented usability. Graphic designers use methods of visual communication
in their professional practice.
29
To capture information about all aspects of an organization, users of System
Architect build visual models using numerous industry-standard notations,
such as the ;
30
AN ACTIVITY NETWORK AND AN ASPECT OF WEBSITE DESIGN
AND DEVELOPMENT
A B
C D
A- 5 days
B- 9 days
C- 13 days
31
32
REFERENCE
Systems Development
William J. Stevenson
33
BIBLIOGRAPHY
WC1V 7AA.
Systems Development.
INTERNET
34
Encyclopedia: www.en.wikipedia.com
APPENDIX
35
NOTES
36
NOTES
37