This document discusses quantitative risk analysis methods for project schedules. It introduces concepts like confidence intervals and S-curves that show the probability of completing a task within a certain date range. Monte Carlo simulation is presented as a method to model schedule risk by assigning probability distributions to task durations. The results provide expected values and confidence levels for completion dates. Network architectures with probabilistic nodes that can generate event chains are also proposed to extend Monte Carlo analysis.
Adding quantitative risk analysis your Swiss Army KnifeJohn Goodpasture
The document discusses adding quantitative risk analysis to project schedules. It recommends using statistical distributions and Monte Carlo simulation to model activity durations and understand project risks and outcomes. By breaking down long tasks and modeling their durations probabilistically, the variance of schedule estimates is reduced, providing a more accurate understanding of project risk.
Top Five Ideas -- Statistics for Project ManagementJohn Goodpasture
The document discusses five key ideas from statistics that help project management: 1) most outcomes follow a bell curve distribution, 2) expected value is the best single number to represent average outcomes, 3) all estimates have uncertainty and can be expressed as distributions, 4) Monte Carlo simulation is an effective way to model distributions and outcomes, and 5) dependencies between tasks can increase uncertainty and extend schedules.
Implementing Scrum with Microsoft Team Foundation Service (TFS)Aspenware
This document provides an overview of implementing Scrum using Microsoft Team Foundation Service (TFS). It begins with introductions of the presenters and an agenda. It then covers TFS overviews and comparisons of editions. It discusses setting up code in TFS and Git source control. There is an overview of Scrum principles and processes. Finally, it details activities for Sprint 0 planning such as defining the product backlog, sizing and prioritizing items, and demoing these features in TFS.
Communication is a universal human trait, yet it is also one of the most poorly cultivated traits. The single biggest problem in communication is the illusion that it has taken place. We can cultivate great communication by understanding that it is always "high stakes" and by focusing on the audience, preparing and practicing presentations, empathizing with the audience, and continuously growing communication skills through reading, subscribing to blogs, and following experts.
Integrated Cost / Schedule Risk Analysis presented methods for analyzing risks in project schedules and costs using simulation techniques like Monte Carlo. It discussed how considering duration risks of individual activities and combining them using simulations captures schedule risks better than deterministic critical path methods. It also showed that schedules with parallel paths merging have higher risks (merge bias) than single path schedules due to uncertainties accumulating at merge points.
SPICE MODEL of 11DQ04 (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of 11DQ04 (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
SPICE MODEL of DG1H3 (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of DG1H3 (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
Iirs Artificial Naural network based Urban growth ModelingTushar Dholakia
1) Artificial neural networks were used to model urban growth by reducing subjectivity and calibration time compared to traditional models.
2) The neural network was trained using spatial data on driving factors like distance to roads, city core, and existing development from GIS to predict urban growth probability.
3) The neural network model was able to accurately simulate past urban growth in Dehradun, India in 2001 and 2005 based on maps and data from 1997, 2001, and 2005, demonstrating the ability to predict urban expansion.
Adding quantitative risk analysis your Swiss Army KnifeJohn Goodpasture
The document discusses adding quantitative risk analysis to project schedules. It recommends using statistical distributions and Monte Carlo simulation to model activity durations and understand project risks and outcomes. By breaking down long tasks and modeling their durations probabilistically, the variance of schedule estimates is reduced, providing a more accurate understanding of project risk.
Top Five Ideas -- Statistics for Project ManagementJohn Goodpasture
The document discusses five key ideas from statistics that help project management: 1) most outcomes follow a bell curve distribution, 2) expected value is the best single number to represent average outcomes, 3) all estimates have uncertainty and can be expressed as distributions, 4) Monte Carlo simulation is an effective way to model distributions and outcomes, and 5) dependencies between tasks can increase uncertainty and extend schedules.
Implementing Scrum with Microsoft Team Foundation Service (TFS)Aspenware
This document provides an overview of implementing Scrum using Microsoft Team Foundation Service (TFS). It begins with introductions of the presenters and an agenda. It then covers TFS overviews and comparisons of editions. It discusses setting up code in TFS and Git source control. There is an overview of Scrum principles and processes. Finally, it details activities for Sprint 0 planning such as defining the product backlog, sizing and prioritizing items, and demoing these features in TFS.
Communication is a universal human trait, yet it is also one of the most poorly cultivated traits. The single biggest problem in communication is the illusion that it has taken place. We can cultivate great communication by understanding that it is always "high stakes" and by focusing on the audience, preparing and practicing presentations, empathizing with the audience, and continuously growing communication skills through reading, subscribing to blogs, and following experts.
Integrated Cost / Schedule Risk Analysis presented methods for analyzing risks in project schedules and costs using simulation techniques like Monte Carlo. It discussed how considering duration risks of individual activities and combining them using simulations captures schedule risks better than deterministic critical path methods. It also showed that schedules with parallel paths merging have higher risks (merge bias) than single path schedules due to uncertainties accumulating at merge points.
SPICE MODEL of 11DQ04 (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of 11DQ04 (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
SPICE MODEL of DG1H3 (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of DG1H3 (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
Iirs Artificial Naural network based Urban growth ModelingTushar Dholakia
1) Artificial neural networks were used to model urban growth by reducing subjectivity and calibration time compared to traditional models.
2) The neural network was trained using spatial data on driving factors like distance to roads, city core, and existing development from GIS to predict urban growth probability.
3) The neural network model was able to accurately simulate past urban growth in Dehradun, India in 2001 and 2005 based on maps and data from 1997, 2001, and 2005, demonstrating the ability to predict urban expansion.
SPICE MODEL of PBYR10100 (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of PBYR10100 (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
1. The document discusses the Discrete Cosine Transform (DCT), which is commonly used in image and video processing applications to decorrelate pixel data and reduce redundancy.
2. A typical image/video transmission system first applies a transformation like the DCT in the source encoder to decorrelate pixel values, followed by quantization and entropy encoding to further compress the data.
3. The DCT maps the spatially correlated pixel data into transformed coefficients that are decorrelated. This decorrelation reduces interpixel redundancy and allows more efficient compression of image and video data.
1. The document discusses the Discrete Cosine Transform (DCT), which is commonly used in image and video processing applications to decorrelate pixel data and reduce redundancy.
2. A typical image/video transmission system first applies a transformation like the DCT in the source encoder to decorrelate pixels, followed by quantization, entropy encoding, and channel encoding for transmission.
3. The DCT aims to map spatially correlated pixel data into uncorrelated transform coefficients to exploit the fact that pixel values can be predicted from neighbors, allowing for better data compression compared to the original spatial domain representation.
1. The document discusses the Discrete Cosine Transform (DCT), which is commonly used in image and video processing applications to decorrelate pixel data and reduce redundancy.
2. A typical image/video transmission system first applies a transformation like the DCT in the source encoder to decorrelate pixels, followed by quantization and entropy encoding to further compress the data.
3. The DCT maps the spatially correlated pixel data into transformed coefficients that are largely uncorrelated, allowing more efficient compression by reducing the number of bits needed to represent the image information.
Southwest Airlines began in 1971 with 3 aircraft serving 3 Texas cities. It now serves 64 cities in 32 states with 537 aircraft. The presentation analyzes Southwest's competitive position, internal and external factors, financial performance, strengths/weaknesses, opportunities/threats, and identifies possible strategies like international expansion or mergers.
The document discusses code coverage and provides guidance on how to properly use and interpret code coverage metrics and data. It cautions against aiming for 100% coverage and instead advocates using coverage information to identify areas for improving test cases and finding dead code. The document also warns of potential misuses of code coverage like assuming it guarantees quality or that test generation tools can replace manual testing.
SPICE MODEL of 11EQ10 (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of 11EQ10 (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
This report used in the May 15th Prophecy post titled "The 100% Accuracy of the May 15th Prophecy, The Son & the Foot"
http://lastdaywatchers.blogspot.com/2009/06/100-accuracy-of-may-15th-prophecy-son_30.html
SPICE MODEL of 1N5819 (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of 1N5819 (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
The document summarizes key concepts relating to probability distributions, including discrete and continuous distributions. It provides examples of binomial probability distributions, such as the distribution of the number of inquiries leading to business proposals on a given day. It also discusses the binomial distribution in the context of the number of successful days in a working week. Key characteristics of binomial distributions such as the mean, variance, and standard deviation are defined. Finally, the document solves an example problem using binomial distribution tables.
SPICE MODEL of 1SS377 (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of 1SS377 (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
SPICE MODEL of C4D15120A LTspice Model (Professional Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of C4D15120A LTspice Model (Professional Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
The document provides a device modeling report for a Silicon Carbide Schottky diode. It includes the diode model parameters, forward and reverse current characteristics from circuit simulations and measurements, and comparison graphs and tables showing good agreement between the simulation results and measurements. The forward voltage drop, reverse leakage current, and total capacitance were measured at various current and voltage levels and compared to simulations with less than 5% error in all cases.
The document provides a device modeling report for a Silicon Carbide Schottky diode. It includes the diode model parameters, forward and reverse current characteristics from circuit simulations and measurements, and comparison graphs and tables showing good agreement between the simulation and measurement results. The report also includes the total capacitance characteristics from simulation and measurement with comparison graphs and tables.
The document provides a device modeling report for a Silicon Carbide Schottky diode. It includes the diode model parameters, forward and reverse current characteristics from circuit simulations and measurements, and comparison graphs and tables showing good agreement between the simulation results and measurements. The forward voltage drop, reverse leakage current, and total capacitance were measured at various current and voltage levels and compared to simulations with less than 5% error in all cases.
SPICE MODEL of SCS110AG , TC=125degree , LTspice (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of SCS110AG , TC=125degree , LTspice (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
This is a talk on the compensation for bearing risk in markets for single-name credit as well as structured credit. Presented at the National Forum on Management, organized by HEC, SSHRC and the Canadian Federation of Business School Deans (CFBSD).
SPICE MODEL of C4D20120D LTspice Model (Professional Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of C4D20120D LTspice Model (Professional Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
SPICE MODEL of SCS110AG , TC=25degree , LTspice (Professional Model) in SPICE...Tsuyoshi Horigome
SPICE MODEL of SCS110AG , TC=25degree , LTspice (Professional Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
This document discusses key concepts in risk management. It defines risk as an event, outcome or circumstance with some degree of uncertainty. There are two parameters of risk - the potential impact and the likelihood or confidence of it occurring. While some risks have rules governing them, project risks have no rules so management must intervene. Various risk management strategies are outlined such as ignoring small risks, insuring against large risks, transferring risks, changing aspects to reduce risks, or directly addressing very large risks. The concepts of loose coupling, encapsulation, and top-down versus bottom-up understanding are also covered in relation to risk management.
SPICE MODEL of PBYR10100 (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of PBYR10100 (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
1. The document discusses the Discrete Cosine Transform (DCT), which is commonly used in image and video processing applications to decorrelate pixel data and reduce redundancy.
2. A typical image/video transmission system first applies a transformation like the DCT in the source encoder to decorrelate pixel values, followed by quantization and entropy encoding to further compress the data.
3. The DCT maps the spatially correlated pixel data into transformed coefficients that are decorrelated. This decorrelation reduces interpixel redundancy and allows more efficient compression of image and video data.
1. The document discusses the Discrete Cosine Transform (DCT), which is commonly used in image and video processing applications to decorrelate pixel data and reduce redundancy.
2. A typical image/video transmission system first applies a transformation like the DCT in the source encoder to decorrelate pixels, followed by quantization, entropy encoding, and channel encoding for transmission.
3. The DCT aims to map spatially correlated pixel data into uncorrelated transform coefficients to exploit the fact that pixel values can be predicted from neighbors, allowing for better data compression compared to the original spatial domain representation.
1. The document discusses the Discrete Cosine Transform (DCT), which is commonly used in image and video processing applications to decorrelate pixel data and reduce redundancy.
2. A typical image/video transmission system first applies a transformation like the DCT in the source encoder to decorrelate pixels, followed by quantization and entropy encoding to further compress the data.
3. The DCT maps the spatially correlated pixel data into transformed coefficients that are largely uncorrelated, allowing more efficient compression by reducing the number of bits needed to represent the image information.
Southwest Airlines began in 1971 with 3 aircraft serving 3 Texas cities. It now serves 64 cities in 32 states with 537 aircraft. The presentation analyzes Southwest's competitive position, internal and external factors, financial performance, strengths/weaknesses, opportunities/threats, and identifies possible strategies like international expansion or mergers.
The document discusses code coverage and provides guidance on how to properly use and interpret code coverage metrics and data. It cautions against aiming for 100% coverage and instead advocates using coverage information to identify areas for improving test cases and finding dead code. The document also warns of potential misuses of code coverage like assuming it guarantees quality or that test generation tools can replace manual testing.
SPICE MODEL of 11EQ10 (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of 11EQ10 (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
This report used in the May 15th Prophecy post titled "The 100% Accuracy of the May 15th Prophecy, The Son & the Foot"
http://lastdaywatchers.blogspot.com/2009/06/100-accuracy-of-may-15th-prophecy-son_30.html
SPICE MODEL of 1N5819 (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of 1N5819 (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
The document summarizes key concepts relating to probability distributions, including discrete and continuous distributions. It provides examples of binomial probability distributions, such as the distribution of the number of inquiries leading to business proposals on a given day. It also discusses the binomial distribution in the context of the number of successful days in a working week. Key characteristics of binomial distributions such as the mean, variance, and standard deviation are defined. Finally, the document solves an example problem using binomial distribution tables.
SPICE MODEL of 1SS377 (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of 1SS377 (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
SPICE MODEL of C4D15120A LTspice Model (Professional Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of C4D15120A LTspice Model (Professional Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
The document provides a device modeling report for a Silicon Carbide Schottky diode. It includes the diode model parameters, forward and reverse current characteristics from circuit simulations and measurements, and comparison graphs and tables showing good agreement between the simulation results and measurements. The forward voltage drop, reverse leakage current, and total capacitance were measured at various current and voltage levels and compared to simulations with less than 5% error in all cases.
The document provides a device modeling report for a Silicon Carbide Schottky diode. It includes the diode model parameters, forward and reverse current characteristics from circuit simulations and measurements, and comparison graphs and tables showing good agreement between the simulation and measurement results. The report also includes the total capacitance characteristics from simulation and measurement with comparison graphs and tables.
The document provides a device modeling report for a Silicon Carbide Schottky diode. It includes the diode model parameters, forward and reverse current characteristics from circuit simulations and measurements, and comparison graphs and tables showing good agreement between the simulation results and measurements. The forward voltage drop, reverse leakage current, and total capacitance were measured at various current and voltage levels and compared to simulations with less than 5% error in all cases.
SPICE MODEL of SCS110AG , TC=125degree , LTspice (Standard Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of SCS110AG , TC=125degree , LTspice (Standard Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
This is a talk on the compensation for bearing risk in markets for single-name credit as well as structured credit. Presented at the National Forum on Management, organized by HEC, SSHRC and the Canadian Federation of Business School Deans (CFBSD).
SPICE MODEL of C4D20120D LTspice Model (Professional Model) in SPICE PARKTsuyoshi Horigome
SPICE MODEL of C4D20120D LTspice Model (Professional Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
SPICE MODEL of SCS110AG , TC=25degree , LTspice (Professional Model) in SPICE...Tsuyoshi Horigome
SPICE MODEL of SCS110AG , TC=25degree , LTspice (Professional Model) in SPICE PARK. English Version is http://www.spicepark.net. Japanese Version is http://www.spicepark.com by Bee Technologies.
This document discusses key concepts in risk management. It defines risk as an event, outcome or circumstance with some degree of uncertainty. There are two parameters of risk - the potential impact and the likelihood or confidence of it occurring. While some risks have rules governing them, project risks have no rules so management must intervene. Various risk management strategies are outlined such as ignoring small risks, insuring against large risks, transferring risks, changing aspects to reduce risks, or directly addressing very large risks. The concepts of loose coupling, encapsulation, and top-down versus bottom-up understanding are also covered in relation to risk management.
The document discusses an approach called "Agile in the Waterfall" which combines Agile and traditional waterfall methods. It proposes encapsulating work into "black boxes" that can use different methodologies but synchronize at milestones. The key aspects are maintaining a stationary strategic intent while allowing tactical emergent changes, and prioritizing customer outcomes over plan inputs through governance changes. Milestone planning and commitment to best value delivery are emphasized as ways to synchronize hybrid project streams.
The document provides a template for writing requests for proposals (RFPs). It includes sections for describing the opportunity, terms and conditions, administration, proposal instructions, a draft contract, statement of work, and specifications appendix. The template offers guidance and examples for including information such as payment terms, insurance requirements, quality control processes, and a statement of work in the RFP.
The document describes how to interpret an Agile burn-down chart as a tool for earned value management. It provides examples of setting up baseline burn-down charts for a project with 3 backlog items totaling 120 hours. A series of exercises demonstrates updating the burn-down charts as items are completed, including adding a new 4th item. The appendix summarizes that the project completed 4 items totaling 160 planned hours using 140 actual hours, resulting in an efficiency of 114%.
This document summarizes a presentation on the key questions about agile project management. It discusses what agile is, how to implement agile methods within a traditional waterfall framework, and how to get started with agile. Specifically, it notes that agile prioritizes delivering working software frequently over comprehensive planning. It recommends wrapping agile sprints within a traditional project plan using architecture, interface discipline, and commitments between teams. It also suggests starting with a pilot project and team receptive to agile to demonstrate benefits to customers.
Agile for project managers - a sailing analogy-UPDATEJohn Goodpasture
This document summarizes a presentation about using sailing principles as an analogy for Agile project management. It discusses how sailing requires a plan, small crew, trust, commitment to the team, embracing change, measuring progress toward navigation marks, adapting to wind as a source of risk and energy, and tacking across the layline to accumulate earned value toward reaching objectives. The overall environment is complex and adaptive like projects.
FDD is an agile methodology that focuses on developing small, customer-valued features rapidly. It involves 5 key steps: 1) Developing an overall model of the system and business activities, 2) Building a features list, 3) Planning development by feature, 4) Designing each feature, and 5) Building each feature. Key practices include domain modeling, feature-based development teams, and class ownership. While not imposing rigid timeboxes, FDD aims to deliver features frequently to provide early value. Documentation is valued to support scalability.
Dynamic Systems Development Method (DSDM) is an agile methodology that is process-centric and seeks to provide repeatable project results while delivering customer value incrementally. It is guided by a five step iterative process and nine principles. DSDM employs practices and products like plans, models and scorecards to manage iterations. The methodology directs attention to delivering must-have functionality on time at customer milestones. DSDM has similarities to RUP in principles and practices but offers more flexibility.
Agile for project managers - A presentation for PMIJohn Goodpasture
The document discusses similarities between agile project management and sailing. It describes how small self-organizing teams with proven protocols can work collaboratively like a ship's crew. The backlog represents the "lay-line" course to complete tasks, while risks are like wind shifts that require adjustments. Performance is measured by accumulating value as tasks are completed, similar to a ship progressing along its lay-line. Larger programs can be managed by coordinating multiple teams like coordinating a fleet of ships.
Five risk management rules for the project managerJohn Goodpasture
The document outlines five rules for risk management:
1) There are no objective estimates of the future due to cognitive biases like anchoring and availability. Facts are in the past while estimates rely on perception.
2) Requirements are never fully complete since it's impossible to imagine everything.
3) Central tendency smoothing washes out asymmetrical extremes, with pessimism and optimism balancing out.
4) Confidence in schedules degrades exponentially after work streams merge due to merge bias.
5) Probabilistic risk analysis models like FMEA are needed for systems with many interdependent parts, to understand behavior and failures.
This presentation discusses how to build a personal brand through developing elevator pitches and tags to describe your expertise and accomplishments. It emphasizes maintaining an active online presence on sites like LinkedIn and having something valuable to discuss, like critical thinking skills or knowledge of the latest project management trends. The presentation warns against any unprofessional content online that could damage your brand and encourages continuous learning to keep skills up to date.
Portfolio management and agile: a look at risk and valueJohn Goodpasture
The document is a presentation about portfolio management and agile given to the PMI Central Florida Chapter. It discusses how portfolio value and risk trade-offs can be compatible with agile practices like dynamic backlogs and incremental plans. While portfolio value is planned, agile allows for emergent outcomes. The presentation addresses tensions between portfolio planning and agile emergence, and how portfolios and agile both address value and risk through diversification and frequent deliveries.
Project examples for sampling and the law of large numbersJohn Goodpasture
The document discusses sampling techniques and how they can be used to estimate parameters about a population. Specifically, it provides examples of how sampling can be applied to estimate proportions and continuous data for project management purposes. The key aspects are estimating proportions and descriptive statistics like averages from a sample to help with tasks like scheduling while managing the risk that the sample may not perfectly represent the entire population. Guidelines are provided for determining appropriate sample sizes to achieve desired confidence levels and margins of error.
The document compares key aspects of sailing and Agile project management. It discusses how small collaborative teams are vital in both contexts. Scope is represented by the sailing "mark" or objective, which is analogous to a project's sponsor expectations. Sailing's "lay line" or most efficient course to the mark is comparable to a project's backlog plan. Risks like wind are unpredictable factors that impact progress in both domains. Performance is measured by sailing velocity along the lay line, just as projects measure progress along the backlog. The document provides several other analogies between sailing and Agile concepts like estimating, scheduling and managing larger initiatives at an enterprise level.
Virtual teams present unique risks that must be managed. Key risks stem from the multiple boundaries within and between virtual teams, and the challenges of building effective remote interpersonal relationships without in-person interaction. These relationship risks include a lack of shared values and culture, slow development of trust and cohesion, reduced coherence in communications due to time lags, and weak informal coupling between team members. Recognizing these risks enables project managers to take steps to mitigate them, such as facilitating occasional in-person meetings or shifting work schedules to improve synchronous communications.
Bayes Theorem and Inference Reasoning for Project ManagersJohn Goodpasture
The document discusses Bayes' Theorem and how it can help project managers make inferences about project risks and outcomes. Bayes' Theorem expresses the relationship between a hypothesis (A) and a condition (B) that influences the hypothesis. It helps calculate the probability of a hypothesis being true based on prior beliefs and observed evidence. The document provides an example where a project test (A) may be affected by weather conditions (B). Bayes' Theorem and a Bayes grid can help determine the underlying probability of a test passing, based on observations of test outcomes under different weather conditions.
The document discusses the Kano model and chart method for relating customer attitudes to product features and functions. The Kano model categorizes customer preferences and satisfaction levels into five types: attractive/ah-hah features, one-dimensional/more-is-better features, must-be features, indifferent features, and reverse features. It describes how the Kano chart can be used to visualize these relationships and assist with prioritizing investments and product development. The document also discusses how to apply the Kano analysis to derive business cases, project scope, budgets, and benefit projections.
This document summarizes an Agile Methods presentation by John Goodpasture. It discusses how Agile focuses on delivering value to customers through frequent incremental deliveries, working in small self-managed teams, and establishing a backlog to guide and prioritize work. It emphasizes that requirements will evolve over time and success relies on embracing change rather than fighting it. Value is realized when customers pay or benefit from the project outcomes, with the overall goal of transforming investments into customer value.
This document discusses an alternative approach to earned value management called earned start-finish earned value, which focuses on measuring whether tasks start and finish on schedule rather than cost. It presents the concept, definitions, and an example application to a real project. The results showed improved ability to predict project outcomes by focusing on start and finish performance.
1. Mitigating Risk in Schedules
Quantitative Methods in Project Management
Produced by
Square Peg Consulting, LLC
John C. Goodpasture
Managing Principal
www.sqpegconsulting.com
Copyright 2010, John C Goodpasture, All Rights Reserved
1
2. About Confidence
• Likelihood an event will occur within a range
• A number from 0 to 1
• Cumulative summation of probabilities within the range
Copyright 2010, John C Goodpasture, All Rights Reserved
3. Confidence ―S‖ Curve
1
Cumulative
Probability
0.75
0.5
0.25
0
-3.5 -3 -2.5 -2 -1.5 -1 -0.5 0 0.5 1 1.5 2 2.5 3 3.5
Normalized value
Value / Standard deviation, σ
Normalized cumulative probability from ‗bell‘ curve
Copyright 2010, John C Goodpasture, All Rights Reserved
4. Confidence ―S‖ Curve
1. 68% confidence: value between -1 to +1
2. 16% confidence: value > 1
3. 84% confidence: value < 1
2
1
Cumulative
Probability
0.75
0.5 1
0.25
0
-3.5 -3 -2.5 -2 -1.5 -1 -0.5 0 0.5 1 1.5 2 2.5 3 3.5
3 1 2
Copyright 2010, John C Goodpasture, All Rights Reserved
5. Generating Confidence
Probability Distribution
f(v)
Area = Height (probability) X
Probability
p f(v)
width (Δ Value)
Δ value
0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5
Normalized random variable value
Calculate each ―Area increment‖
Δ value x p
Copyright 2010, John C Goodpasture, All Rights Reserved
6. Sum & Plot area increments
F(v) = 1 is the limiting value
f(v)Δv
F(v)
Area increments summed
Value
F(v) is the area under the f(v) curve
Copyright 2010, John C Goodpasture, All Rights Reserved
7. Schedule Network Architecture 1
What is to be expected at the milestone?
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
1 2 3 4 5 6
Copyright 2010, John C Goodpasture, All Rights Reserved
8. Schedule Network Architecture 1
EV
0.3
0.25
0.2
0.15
0.1
0.05
0
1 2 3 4 5 6 7 8 9 10 11 12
Convolved task probabilities
0.45
0.4
0.35
0.3 EV
0.25
0.2
EVmilestone = Sum (EV in tandem)
0.15
0.1
0.05
0
1 2 3 4 5 6
Copyright 2010, John C Goodpasture, All Rights Reserved
9. Schedule Network Architecture 1
0.3
0.25
0.2
0.15
0.1
0.05
0
1.2 1 2 3 4 5 6 7 8 9 10 11 12
1
0.8
0.6
1.2
0.4
1
0.2
0.8
0
0.6
1 2 3 4 5 6
0.4
0.2
0
Value = 1 2 3 4 5 6 7 8 9 10 11 12
Sum values at a constant confidence
Copyright 2010, John C Goodpasture, All Rights Reserved
10. Monte Carlo simulation
Date 1/1 1/21
1.1
1.2 2/12
1.3 3/15
12 weeks, 60 work days 1.4 3/25
Risk Parameters for each Task:
• Risk distribution: Triangular
• Most optimistic: -10% of ML duration
• Most pessimistic: +25% of ML duration
• ML finish dates shown
Copyright 2010, John C Goodpasture, All Rights Reserved
11. Monte Carlo simulation
Date 1/1 1/21
1.1
1.2 2/12
1.3 3/15
Includes effects of non- 1.4 3/25
working days 10:30:27 PM
Date: 3/9/99
Name: Task 1.4
170 1.0
1.0 Completion Std Deviation: 2.4d
Cumulative Probability
153 0.9
Each bar represents 1d.
136 0.8
119 0.7
102 0.6 Completion Probability Table
Sample Count
85 0.5
0.5 Prob Date Prob Date
0.05 3/25/99 0.55 3/31/99
68 0.4
0.10 3/25/99 0.60 3/31/99
51 0.3 0.15 3/26/99 0.65 4/1/99
34 0.2 0.20 3/26/99 0.70 4/1/99
0.25 3/29/99 0.75 4/1/99
17 0.1
0.30 3/29/99 0.80 4/2/99
3/23/99 3/31/99 4/9/99 0.35 3/29/99 0.85 4/2/99
3/23 3/31 4/9 0.40 3/30/99 0.90 4/5/99
0.45 3/30/99 0.95 4/6/99
Completion Date range 0.50 3/30/99 1.00 4/9/99
Copyright 2010, John C Goodpasture, All Rights Reserved
12. Monte Carlo simulation
Date 1/1 1/21
1.1
1.2 2/12
1.3 3/15
1.4 3/25
Date: 3/9/99 10:30:27 PM
Name: Task 1.4
170 1.0
1.0
Cumulative Probability
153 0.9
136 0.8
Risk Evaluation: 3/25 CPM date is
119 0.7 about 10% probable
102 0.6
Sample Count
85 0.5
0.5
68 0.4
51 0.3
34 0.2
17 0.1
3/23/99 3/31/99
3/31 4/9/99
3/23 4/9
Completion Date range
Copyright 2010, John C Goodpasture, All Rights Reserved
13. Budgets?
• Are the effects on budget totals any different when adding up a
string of $budgets from the WBS work packages?
Copyright 2010, John C Goodpasture, All Rights Reserved
14. Schedule Network Architecture 2
What happens at the milestone?
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
1 2 3 4 5 6
Copyright 2010, John C Goodpasture, All Rights Reserved
15. Schedule Network Architecture 2
What happens at the milestone?
Lots of combinations—36 possible outcomes
0.2
0.18
0.16
0.14
0.12
0.1 Series1
0.08
0.06
0.04
0.02
0
1 2 3 4 5 6 8 9 10 12 15 16 18 20 24 25 30 36
Duration value
‗12‘ combo milestone value could be 4 or 6
Copyright 2010, John C Goodpasture, All Rights Reserved
16. Schedule Network Architecture 2
Durations, d1 and d2
Milestone, m
What happens at the milestone?
•Confidence at the milestone is
the product of the confidences
of the joining paths
1.2
1
0.8
0.6
0.4
0.2
0
1 2 3 4 5 6
Copyright 2010, John C Goodpasture, All Rights Reserved
17. Schedule Network Architecture 2
Durations, d1 and d2
Milestone, m
What happens at the milestone?
Confidence degrades
Shift right to recover confidence
1.2
1
0.8
1.2
0.6
1
0.8 0.4
0.6
0.2
0.4
0
0.2
1 2 3 4 5 6
0
1 2 3 4 5 6
Copyright 2010, John C Goodpasture, All Rights Reserved
18. Schedule Network Architecture 2
Durations, d1 and d2
Milestone, m
What happens at the milestone?
Probability ‗center of gravity‘ shifts right
EV increases from 3.6 to 4.2
Critical path may change
0.6
0.5 EV
0.4
0.3
0.2
0.1
0
1 2 3 4 5 6
Copyright 2010, John C Goodpasture, All Rights Reserved
19. Monte Carlo Simulation
1/21 3/15
1/1 2/12 3/25
3/15
1/21
2/12
Date: 3/9/99 10:30:27 PM 3/25
Name: Task 1.4
170 1.0
1.0
• Milestone distribution for each
Cumulative Probability
153 0.9
136 0.8
119
102
0.7
0.6
independent path
Sample Count
85 0.5
0.5 • 50% confidence of 3/30 completion
68 0.4
51 0.3
34 0.2
17 0.1
3/23/99 3/31/99
3/31 4/9/99
3/23 4/9
Completion Date range
Copyright 2010, John C Goodpasture, All Rights Reserved
20. Monte Carlo Simulation
3/15
3/25
Probability of 3/30 =
Join independent
0.5 x 0.5 = 0.25, or less 3/15 paths at milestone
3/25
Date: 3/8/99 9:31:06 PM
Number of Samples: 2000
Unique ID: 12
Name: Finish Milestone
1.0 Completion Probability Table
0.9
Cumulative Probability
Prob Date Prob Date
0.8 0.05 3/29/99 0.55 4/1/99
0.7 0.10 3/29/99 0.60 4/1/99
0.15 3/30/99 0.65 4/2/99
0.6 0.20 3/30/99 0.70 4/2/99
0.5 0.25 3/30/99 0.75 4/2/99
0.4 0.30 3/31/99 0.80 4/2/99
0.35 3/31/99 0.85 4/5/99
0.3 0.40 3/31/99 0.90 4/5/99
0.2 0.45 3/31/99 0.95 4/6/99
0.1 0.50 4/1/99 1.00 4/12/99
3/24/99 4/1/99 4/12/99
Completion Date
Copyright 2010, John C Goodpasture, All Rights Reserved
21. Event Chain Methodology
• Extension of Monte Carlo simulation method.
• Events occur at probabilistic nodes
• Probabilistic nodes can be in the middle of the task and lead to
task delay, restart, cancellation
• Events can cause other events and generate event chains
p = 0.2
Probabilistic node
Alternative
p = 0.8
Baseline outcome
Copyright 2010, John C Goodpasture, All Rights Reserved
22. Build a path
80 days for the path shown
Task Duration is shown in days (#):
C(15) G(20) I(8)
A(12) Float = 25d
D(21) J(13) L(12)
H(3) O(9)
Start End
E(15) K(21) M(14)
B(11)
Float = 33d
F(18) N(20)
Copyright 2010, John C Goodpasture, All Rights Reserved
23. Build a network schedule
A(12) Every network at least one Critical Path
CP = 80 days; Additional paths are 49, 57, or 63, 73 days < 82 days
C(15) G(20) I(8)
A(12) Float = 25d
D(21) J(13) L(12)
H(3) O(9)
Start End
E(15) K(21) M(14)
B(11)
Float = 33d
F(18) N(20)
Copyright 2010, John C Goodpasture, All Rights Reserved
24. Critical path shifts with variation
B(11) Critical path is 81.5 days
Former path at 50%; new path at 80%
C(15) G(20) I(8)
A(12) Float = 25d
D(21) J(13) L(12)
H(3) O(10)
Start End
E(17) K(23) M(16)
B(12)
Float = 33d
F(18) N(20)
Copyright 2010, John C Goodpasture, All Rights Reserved
25. Critical path shifts with variation
Three milestones will shift the END & change CP probabilities
C(15) G(20) I(8)
A(12) Float = 25d
D(21) J(13) L(12)
H(3) O(10)
Start End
E(17) K(23) M(16)
B(12)
Float = 33d
F(18) N(20)
Copyright 2010, John C Goodpasture, All Rights Reserved
26. ―Critical Chain‖ buffers uncertainty
10 days Project Buffer
Project buffer
15 days 10 days
protects final
milestone
from variation
Task on the critical path
Critical chain is a concept developed in the book
Critical Chain (Goldratt, 1997)
Copyright 2010, John C Goodpasture, All Rights Reserved
27. ―Critical Chain‖ buffers uncertainty
1 2
10 days 11 days 12 days Buffer Project Buffer
Path buffer mitigates
15 days 10 days
“shift right” at the
milestone of joining
path
Task on the critical path
Task with risky duration, not on critical path
Critical chain is a concept developed in the book
Critical Chain (Goldratt, 1997)
Copyright 2010, John C Goodpasture, All Rights Reserved
28. Resources on the CP
Rule # 1: CP work begins at project beginning
Task 1 20d 30d Critical Path = 50d
Task 2 5d 15d
Copyright 2010, John C Goodpasture, All Rights Reserved
29. Resources on the CP
Rule # 2: Resource CP first and then level
Task 1 Mary 20d John 30d Critical Path = 65d
Mary John 15d
Task 2 5d
Float
Copyright 2010, John C Goodpasture, All Rights Reserved
30. CP responds to constraints
Rule # 3: Reorganize the network logic
Mary 20d John 30d Critical Path = 55d
Task 1
Mary
Task 2 John 15d
5d
Work does not begin first on the CP
Copyright 2010, John C Goodpasture, All Rights Reserved
31. Resource consequences
• Resource dependencies
lengthen the schedule
• In fact, any loss of
independence from any
cause will lengthen the
schedule!
• Resource constraints may
require work begin off the CP
Copyright 2010, John C Goodpasture, All Rights Reserved
32. Project manager’s mission:
To defeat an unfavorable forecast and deliver
customer value, taking reasonable risks to do so
Copyright 2010, John C Goodpasture, All Rights Reserved
33. Graphic Earned Schedule, ES
Value
Cumulative
ES Variance
Schedule AT = actual time
ES = earned schedule
Copyright 2010, John C Goodpasture, All Rights Reserved
34. Graphic Earned Schedule, ES
• ES will never be 0 for a late project
• EV schedule variance, EV – PV, will
always be 0 for a completed project EV = PV
Value
Cumulative
ES Variance
Schedule AT
ES
Copyright 2010, John C Goodpasture, All Rights Reserved
35. What‘s been learned?
• Confidence expresses probability over a range
• Confidence is based on the cumulative probability, a.k.a. the ‗area
under the curve‘
• Confidence is constant in tandem strings, whether budget or
schedule, but degrades rapidly at a parallel join
• Monte Carlo simulations give results very close to calculated
‗ideals‘
• Earned schedule will not have a 0 variance when all value is
earned
Copyright 2010, John C Goodpasture, All Rights Reserved