SlideShare a Scribd company logo
GETTING SYSTEM FOR
THE NEXT FISCAL YEAR.
JEFFERY FELIX BROWN
AUGUST 13, 2013
American Intercontinental University
Inspire
Others
Work Smart
Exceptional
Results
THE CORE VALUES
This Introduction main
Goal is to get the
Company with 30,000
Employees to get their
system Up so that it will
be Running for the Next
Fiscal Year.
PROJECT MANAGER HIGH RISKS
 Missing Requirements: These requirements is needed by the System to be
developed to meet the Company Goals and Objectives of the project.
 Key and Critical Resources: Are lost to the project with a potential impact of
losing resources for any given period of Time will go beyond the will become
critical.
 Missing or Incomplete Skills Sets: This results in Risks events will remain
the same as the results in a bad estimate.
CUSTOMERS HIGH RISKS
Requirements are only partly known at the beginning of the project. The Customers
may not allocate the sufficient resources when exploring these requirements. These
customers may not accept the delivery of the system, when it really doesn’t meet
the goals. As Project Team should always update these regularly and reviewed by
customers from Time to Time.
ARCHITECT HIGH RISKS
There are Two Levels of Risks that is considered:
1. Initial Level of Risk – This risk is categorized for prior in determine and
inadquated the Mitigating actions.
2. Residual Level of Risk – In this type of risk is also categorized after
implemented of mitigating actions “if any”.
THE OUTLINE PART ONE:
Plan:
• Identify Participants.
• Establish Guidelines and Procedures.
• Assign all Roles.
• Establish entry Criteria and then exit the Criteria base on the event-
driven Schedule.
Familiarize:
• Always have an overview of the Company vision within your
meetings.
THE OUTLINE PART TWO
Pre – Review:
• Location 1 Examine Data
• Location 2 Analyze Data.
• Location 3 Tracking
every document for
analysis.
Click on the globe to start
“Always Give You As Project Manager and Team enough
Time to Review your Project Plan!”
~Jeffery F. Brown, Author, Atlanta, Georgia
THE OUTLINE OF THREE
Review:
Examine all data and analysis, make sure to Record to classify findings.
An Address key issues to identify any pre-review activity.
Give asses of Security of Problems within the review.
Then recognized all of the action Items.
Resolve:
Give Each the Assign Responsibility
OUTLINE PART FOUR
Follow Ups:
• Track Action Items and Issues
• Track Action Items for Completion Trends
• In every Document and Distribution of all
results. This will help in the Planning,
Familiarize, Pre-review, Review, and
Resolve.
Plan
ReviewFamiliarize
SUMMARY OF WEEK 4 INDIVIDUAL PROJECT
Within this Scenario the IT Project Plan, the Company gave a task to come up with a System
that meets the Four Companies in other States Vision. The Issues that will arise for this Project
Team, is base on collecting all necessary Data to be able to gather enough information to
begin. If you look at the First Constraint “Time” is will be off if these Companies doesn’t deliver
the requirements. Next in the Constraint you have the “Cost” where the risk can easily go
higher than what the Budget was set by Company Financial Board. And not least but last on the
Constraint is your “Scope” that if these other Four Companies start sending information that
going to be used within the Project Plan; if you try to alter the plan you can cause the 3
Constraint “known as the Triangle”; this would make this IT Project Plan to go in another
Direction. What I call going “Offline” Meaning taking the Project Plan from what the Company
vision set to accomplish.
REFERENCE:
• Nielson, D. (2008, November 06). Identifying risks to software projects.
Retrieved from http://ezinearticles.com/?Identifying-Risks-to-Software-
Projects&id=2671133
• Robbins, J. (2004). Risk management during requirements. Retrieved from
http://readyset.tigris.org/nonav/templates/risks.html
• TOGAF information web site. (2011). 7 phase a: Architecture vision.
Retrieved from http://pubs.opengroup.org/architecture/togaf9-
doc/arch/chap07.html
• Cantoria, C. S., & Gundlach, M. (2011, February 28). Risk mitigation
strategies and risk mitigation plan. Retrieved from
http://www.brighthubpm.com/risk-management/47934-risk-mitigation-
strategies-and-risk-mitigation-plan/
WE ARE DEDICATED TO MAINTAINING A SYSTEM,
FOR YOUR FOUR COMPANIES IN A SAFE ENVIRONMENT…
Thanks For Having Me As Your IT Project Manager
Throughout This Important Entrusted Leadership!!!

More Related Content

What's hot

FMEA by AMMARA AFTAB
FMEA by AMMARA AFTABFMEA by AMMARA AFTAB
FMEA by AMMARA AFTAB
University of Karachi
 
The Top 5 DITA Conversion and Authoring Pitfalls (and how to avoid them)
The Top 5 DITA Conversion and Authoring Pitfalls (and how to avoid them)The Top 5 DITA Conversion and Authoring Pitfalls (and how to avoid them)
The Top 5 DITA Conversion and Authoring Pitfalls (and how to avoid them)
JANA, Inc.
 
Sdlc presentation
Sdlc presentation Sdlc presentation
Sdlc presentation
Rohaan Khan
 
Be ea-talk-final
Be ea-talk-finalBe ea-talk-final
Be ea-talk-final
Bruce Edmonds
 
Root Cause Analysis (orgz.info)
Root Cause Analysis (orgz.info)Root Cause Analysis (orgz.info)
Root Cause Analysis (orgz.info)
Justin Pence, Ph.D.
 
The Mythical Man-Month #3 The Surgical Team
The Mythical Man-Month #3 The Surgical TeamThe Mythical Man-Month #3 The Surgical Team
The Mythical Man-Month #3 The Surgical Team
楼閣 砂上
 
RCA Root Cause Analysis
RCA Root Cause AnalysisRCA Root Cause Analysis
RCA Root Cause Analysis
waleed sayed
 
RCA - Root Cause Analysis
RCA - Root Cause AnalysisRCA - Root Cause Analysis
RCA - Root Cause Analysis
Abhishek Agnihotry
 
Mythical Man-Month
Mythical Man-MonthMythical Man-Month
Mythical Man-Month
dandb-technology
 
Root Cause Analysis (RCA) Tools
Root Cause Analysis (RCA) ToolsRoot Cause Analysis (RCA) Tools
Root Cause Analysis (RCA) Tools
Jeremy Jay Lim
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
tqmdoctor
 
Defect Causal Analysis
Defect Causal Analysis Defect Causal Analysis
Defect Causal Analysis
Md. Shamsul Haque
 
Root Cause Analysis | QualiTest Group
Root Cause Analysis | QualiTest GroupRoot Cause Analysis | QualiTest Group
Root Cause Analysis | QualiTest Group
Qualitest
 
Datacap Dashboard_fin
Datacap Dashboard_finDatacap Dashboard_fin
Datacap Dashboard_fintadams76
 
What a waste of money! Orange Paper
What a waste of money! Orange PaperWhat a waste of money! Orange Paper
What a waste of money! Orange Paper
Edward Gould
 
Hpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedbackHpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedback
PMHaas
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
Sunderland City Council
 

What's hot (17)

FMEA by AMMARA AFTAB
FMEA by AMMARA AFTABFMEA by AMMARA AFTAB
FMEA by AMMARA AFTAB
 
The Top 5 DITA Conversion and Authoring Pitfalls (and how to avoid them)
The Top 5 DITA Conversion and Authoring Pitfalls (and how to avoid them)The Top 5 DITA Conversion and Authoring Pitfalls (and how to avoid them)
The Top 5 DITA Conversion and Authoring Pitfalls (and how to avoid them)
 
Sdlc presentation
Sdlc presentation Sdlc presentation
Sdlc presentation
 
Be ea-talk-final
Be ea-talk-finalBe ea-talk-final
Be ea-talk-final
 
Root Cause Analysis (orgz.info)
Root Cause Analysis (orgz.info)Root Cause Analysis (orgz.info)
Root Cause Analysis (orgz.info)
 
The Mythical Man-Month #3 The Surgical Team
The Mythical Man-Month #3 The Surgical TeamThe Mythical Man-Month #3 The Surgical Team
The Mythical Man-Month #3 The Surgical Team
 
RCA Root Cause Analysis
RCA Root Cause AnalysisRCA Root Cause Analysis
RCA Root Cause Analysis
 
RCA - Root Cause Analysis
RCA - Root Cause AnalysisRCA - Root Cause Analysis
RCA - Root Cause Analysis
 
Mythical Man-Month
Mythical Man-MonthMythical Man-Month
Mythical Man-Month
 
Root Cause Analysis (RCA) Tools
Root Cause Analysis (RCA) ToolsRoot Cause Analysis (RCA) Tools
Root Cause Analysis (RCA) Tools
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
 
Defect Causal Analysis
Defect Causal Analysis Defect Causal Analysis
Defect Causal Analysis
 
Root Cause Analysis | QualiTest Group
Root Cause Analysis | QualiTest GroupRoot Cause Analysis | QualiTest Group
Root Cause Analysis | QualiTest Group
 
Datacap Dashboard_fin
Datacap Dashboard_finDatacap Dashboard_fin
Datacap Dashboard_fin
 
What a waste of money! Orange Paper
What a waste of money! Orange PaperWhat a waste of money! Orange Paper
What a waste of money! Orange Paper
 
Hpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedbackHpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedback
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
 

Viewers also liked

Ejercicio 1 seminario 4
Ejercicio 1 seminario 4Ejercicio 1 seminario 4
Ejercicio 1 seminario 4Andrea Raposo
 
Master Class: APP ECONOMICS
Master Class: APP ECONOMICSMaster Class: APP ECONOMICS
Master Class: APP ECONOMICS
Carlos Goga
 
Presentación1
Presentación1Presentación1
Presentación1980721Fory
 
W6A2_Final_Lynn_Casey
W6A2_Final_Lynn_CaseyW6A2_Final_Lynn_Casey
W6A2_Final_Lynn_CaseyLynn Casey
 
Empreendedorismo (administração)
Empreendedorismo (administração)Empreendedorismo (administração)
Empreendedorismo (administração)
RobertoAvelar007
 
Principles of marketing
Principles of marketingPrinciples of marketing
Principles of marketingAnasia Younis
 
Mobil rangsolási faktorok
Mobil rangsolási faktorokMobil rangsolási faktorok
Mobil rangsolási faktorok
Norbert Boros
 
US Navy Instruction Confirms Retirement of Nuclear Tomahawk Cruise Missile
US Navy Instruction Confirms Retirement of Nuclear Tomahawk Cruise MissileUS Navy Instruction Confirms Retirement of Nuclear Tomahawk Cruise Missile
US Navy Instruction Confirms Retirement of Nuclear Tomahawk Cruise Missile
Daniel Ross
 
Power point importância do brincar
Power point   importância do brincarPower point   importância do brincar
Power point importância do brincarinesaalexandra
 
Carnavales de blanco
Carnavales de blancoCarnavales de blanco
Carnavales de blanco
Miguel Onofre García
 
Cach tinh thue_tncn_moinhat
Cach tinh thue_tncn_moinhatCach tinh thue_tncn_moinhat
Cach tinh thue_tncn_moinhat
thuhaothuhao
 

Viewers also liked (11)

Ejercicio 1 seminario 4
Ejercicio 1 seminario 4Ejercicio 1 seminario 4
Ejercicio 1 seminario 4
 
Master Class: APP ECONOMICS
Master Class: APP ECONOMICSMaster Class: APP ECONOMICS
Master Class: APP ECONOMICS
 
Presentación1
Presentación1Presentación1
Presentación1
 
W6A2_Final_Lynn_Casey
W6A2_Final_Lynn_CaseyW6A2_Final_Lynn_Casey
W6A2_Final_Lynn_Casey
 
Empreendedorismo (administração)
Empreendedorismo (administração)Empreendedorismo (administração)
Empreendedorismo (administração)
 
Principles of marketing
Principles of marketingPrinciples of marketing
Principles of marketing
 
Mobil rangsolási faktorok
Mobil rangsolási faktorokMobil rangsolási faktorok
Mobil rangsolási faktorok
 
US Navy Instruction Confirms Retirement of Nuclear Tomahawk Cruise Missile
US Navy Instruction Confirms Retirement of Nuclear Tomahawk Cruise MissileUS Navy Instruction Confirms Retirement of Nuclear Tomahawk Cruise Missile
US Navy Instruction Confirms Retirement of Nuclear Tomahawk Cruise Missile
 
Power point importância do brincar
Power point   importância do brincarPower point   importância do brincar
Power point importância do brincar
 
Carnavales de blanco
Carnavales de blancoCarnavales de blanco
Carnavales de blanco
 
Cach tinh thue_tncn_moinhat
Cach tinh thue_tncn_moinhatCach tinh thue_tncn_moinhat
Cach tinh thue_tncn_moinhat
 

Similar to GETTING SYSTEM FOR THE NEXT FISCAL YEAR

Discard at your own risk
Discard at your own riskDiscard at your own risk
Discard at your own risk
Vincent O'Neil
 
concept of evaluation "Character insight"
concept of evaluation "Character insight"concept of evaluation "Character insight"
concept of evaluation "Character insight"
Shafiyazahoor327
 
Software project planning and monitoring
Software project planning and monitoringSoftware project planning and monitoring
Software project planning and monitoring
Yb Yar
 
importance of resources allocation in formal method of software engineering ...
 importance of resources allocation in formal method of software engineering ... importance of resources allocation in formal method of software engineering ...
importance of resources allocation in formal method of software engineering ...
abdulrafaychaudhry
 
04. Project planning and management.pptx
04. Project planning and management.pptx04. Project planning and management.pptx
04. Project planning and management.pptx
ALI2H
 
Logical framework
Logical  frameworkLogical  framework
Logical framework
Vaidehi Malvi
 
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docxThe Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
todd241
 
Getting it Right
Getting it Right Getting it Right
Getting it Right
Glen Alleman
 
Project Management Overview
Project Management OverviewProject Management Overview
Project Management Overviewcford1973
 
System analysis and design Part2
System analysis and design Part2System analysis and design Part2
System analysis and design Part2
Joel Briza
 
Twelve Risks to Enterprise Software Projects-And What to Do About Them
Twelve Risks to Enterprise Software Projects-And What to Do About ThemTwelve Risks to Enterprise Software Projects-And What to Do About Them
Twelve Risks to Enterprise Software Projects-And What to Do About ThemTechWell
 
Please identify three data collection tools (ex mailphone survey.docx
Please identify three data collection tools (ex mailphone survey.docxPlease identify three data collection tools (ex mailphone survey.docx
Please identify three data collection tools (ex mailphone survey.docx
stilliegeorgiana
 
Identifying a project in trouble and re-planning
Identifying a project in trouble and re-planningIdentifying a project in trouble and re-planning
Identifying a project in trouble and re-planning
mfarbstein
 
Twelve Risks to Enterprise Software Projects—And What to Do about Them
Twelve Risks to Enterprise Software Projects—And What to Do about ThemTwelve Risks to Enterprise Software Projects—And What to Do about Them
Twelve Risks to Enterprise Software Projects—And What to Do about Them
TechWell
 
Project Planning in Software Engineering
Project Planning in Software EngineeringProject Planning in Software Engineering
Project Planning in Software Engineering
Fáber D. Giraldo
 
Why do the Projects fail
Why do the Projects failWhy do the Projects fail
Why do the Projects fail
SwapanK
 
Project initiation
Project initiationProject initiation
Project initiationukrulz4u
 
Effort estimation for software development
Effort estimation for software developmentEffort estimation for software development
Effort estimation for software development
Spyros Ktenas
 

Similar to GETTING SYSTEM FOR THE NEXT FISCAL YEAR (20)

Discard at your own risk
Discard at your own riskDiscard at your own risk
Discard at your own risk
 
concept of evaluation "Character insight"
concept of evaluation "Character insight"concept of evaluation "Character insight"
concept of evaluation "Character insight"
 
Software project planning and monitoring
Software project planning and monitoringSoftware project planning and monitoring
Software project planning and monitoring
 
importance of resources allocation in formal method of software engineering ...
 importance of resources allocation in formal method of software engineering ... importance of resources allocation in formal method of software engineering ...
importance of resources allocation in formal method of software engineering ...
 
04. Project planning and management.pptx
04. Project planning and management.pptx04. Project planning and management.pptx
04. Project planning and management.pptx
 
Logical framework
Logical  frameworkLogical  framework
Logical framework
 
Spm unit 1
Spm unit 1Spm unit 1
Spm unit 1
 
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docxThe Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
 
Getting it Right
Getting it Right Getting it Right
Getting it Right
 
Project Management Overview
Project Management OverviewProject Management Overview
Project Management Overview
 
System analysis and design Part2
System analysis and design Part2System analysis and design Part2
System analysis and design Part2
 
Twelve Risks to Enterprise Software Projects-And What to Do About Them
Twelve Risks to Enterprise Software Projects-And What to Do About ThemTwelve Risks to Enterprise Software Projects-And What to Do About Them
Twelve Risks to Enterprise Software Projects-And What to Do About Them
 
Please identify three data collection tools (ex mailphone survey.docx
Please identify three data collection tools (ex mailphone survey.docxPlease identify three data collection tools (ex mailphone survey.docx
Please identify three data collection tools (ex mailphone survey.docx
 
Identifying a project in trouble and re-planning
Identifying a project in trouble and re-planningIdentifying a project in trouble and re-planning
Identifying a project in trouble and re-planning
 
Twelve Risks to Enterprise Software Projects—And What to Do about Them
Twelve Risks to Enterprise Software Projects—And What to Do about ThemTwelve Risks to Enterprise Software Projects—And What to Do about Them
Twelve Risks to Enterprise Software Projects—And What to Do about Them
 
Project Planning in Software Engineering
Project Planning in Software EngineeringProject Planning in Software Engineering
Project Planning in Software Engineering
 
Thomas Jones Fundamentals Of Grant Writing
Thomas Jones Fundamentals Of Grant WritingThomas Jones Fundamentals Of Grant Writing
Thomas Jones Fundamentals Of Grant Writing
 
Why do the Projects fail
Why do the Projects failWhy do the Projects fail
Why do the Projects fail
 
Project initiation
Project initiationProject initiation
Project initiation
 
Effort estimation for software development
Effort estimation for software developmentEffort estimation for software development
Effort estimation for software development
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

GETTING SYSTEM FOR THE NEXT FISCAL YEAR

  • 1. GETTING SYSTEM FOR THE NEXT FISCAL YEAR. JEFFERY FELIX BROWN AUGUST 13, 2013 American Intercontinental University
  • 2. Inspire Others Work Smart Exceptional Results THE CORE VALUES This Introduction main Goal is to get the Company with 30,000 Employees to get their system Up so that it will be Running for the Next Fiscal Year.
  • 3. PROJECT MANAGER HIGH RISKS  Missing Requirements: These requirements is needed by the System to be developed to meet the Company Goals and Objectives of the project.  Key and Critical Resources: Are lost to the project with a potential impact of losing resources for any given period of Time will go beyond the will become critical.  Missing or Incomplete Skills Sets: This results in Risks events will remain the same as the results in a bad estimate.
  • 4. CUSTOMERS HIGH RISKS Requirements are only partly known at the beginning of the project. The Customers may not allocate the sufficient resources when exploring these requirements. These customers may not accept the delivery of the system, when it really doesn’t meet the goals. As Project Team should always update these regularly and reviewed by customers from Time to Time.
  • 5. ARCHITECT HIGH RISKS There are Two Levels of Risks that is considered: 1. Initial Level of Risk – This risk is categorized for prior in determine and inadquated the Mitigating actions. 2. Residual Level of Risk – In this type of risk is also categorized after implemented of mitigating actions “if any”.
  • 6. THE OUTLINE PART ONE: Plan: • Identify Participants. • Establish Guidelines and Procedures. • Assign all Roles. • Establish entry Criteria and then exit the Criteria base on the event- driven Schedule. Familiarize: • Always have an overview of the Company vision within your meetings.
  • 7. THE OUTLINE PART TWO Pre – Review: • Location 1 Examine Data • Location 2 Analyze Data. • Location 3 Tracking every document for analysis. Click on the globe to start
  • 8. “Always Give You As Project Manager and Team enough Time to Review your Project Plan!” ~Jeffery F. Brown, Author, Atlanta, Georgia THE OUTLINE OF THREE Review: Examine all data and analysis, make sure to Record to classify findings. An Address key issues to identify any pre-review activity. Give asses of Security of Problems within the review. Then recognized all of the action Items. Resolve: Give Each the Assign Responsibility
  • 9. OUTLINE PART FOUR Follow Ups: • Track Action Items and Issues • Track Action Items for Completion Trends • In every Document and Distribution of all results. This will help in the Planning, Familiarize, Pre-review, Review, and Resolve. Plan ReviewFamiliarize
  • 10. SUMMARY OF WEEK 4 INDIVIDUAL PROJECT Within this Scenario the IT Project Plan, the Company gave a task to come up with a System that meets the Four Companies in other States Vision. The Issues that will arise for this Project Team, is base on collecting all necessary Data to be able to gather enough information to begin. If you look at the First Constraint “Time” is will be off if these Companies doesn’t deliver the requirements. Next in the Constraint you have the “Cost” where the risk can easily go higher than what the Budget was set by Company Financial Board. And not least but last on the Constraint is your “Scope” that if these other Four Companies start sending information that going to be used within the Project Plan; if you try to alter the plan you can cause the 3 Constraint “known as the Triangle”; this would make this IT Project Plan to go in another Direction. What I call going “Offline” Meaning taking the Project Plan from what the Company vision set to accomplish.
  • 11. REFERENCE: • Nielson, D. (2008, November 06). Identifying risks to software projects. Retrieved from http://ezinearticles.com/?Identifying-Risks-to-Software- Projects&id=2671133 • Robbins, J. (2004). Risk management during requirements. Retrieved from http://readyset.tigris.org/nonav/templates/risks.html • TOGAF information web site. (2011). 7 phase a: Architecture vision. Retrieved from http://pubs.opengroup.org/architecture/togaf9- doc/arch/chap07.html • Cantoria, C. S., & Gundlach, M. (2011, February 28). Risk mitigation strategies and risk mitigation plan. Retrieved from http://www.brighthubpm.com/risk-management/47934-risk-mitigation- strategies-and-risk-mitigation-plan/
  • 12. WE ARE DEDICATED TO MAINTAINING A SYSTEM, FOR YOUR FOUR COMPANIES IN A SAFE ENVIRONMENT… Thanks For Having Me As Your IT Project Manager Throughout This Important Entrusted Leadership!!!

Editor's Notes

  1. This slide can be used as a background before the presentation begins.