Premium Essay

Softwareengineering

In:

Submitted By prudhviraj
Words 370
Pages 2
This is not necessarily a large project, but the installation of 10 wireless access points in a company is a complex undertaking that has the potential to impact a lot of stakeholders and also incur a lot of company resources and cost. The Work Breakdown Structure (WBS) is known as the “foundation” of the project (Mathis, 2008). The WBS helps break down the complex tasks into progressively smaller pieces. Basically a $100,000 could be made to look like a bunch of $5000-$10,000 projects. This activity has the scope of most departments in the organization; the WBS assists in coordination and communication with the different departments. What the WBS does best is provide visibility and awareness into any project. This essentially translates into the project teams and sponsors having a good view on the schedule estimates, and also to effectively manage the schedule to ensure that the project gets completed on time. The WBS should be designed with consideration for its eventual uses. The WBS design should try to achieve certain goals:
• Be compatible with how the work will be done and how costs and schedules will be managed,
• Give visibility to important or risky work efforts,
• Allow mapping of requirements, plans, testing, and deliverables,
• Foster clear ownership by managers and task leaders,
• Provide data for performance measurement and historical databases, and
• Make sense to the workers and accountants (Chapman, 2004).
The activity of creating a project plans ensures that the project team has given enough though to all the key areas, and is well prepared to execute the project, thus enabling complex tasks to be broken down and managed in an effective manner. From a communication perspective as well, the work breakdown structure looks at the various tasks that are being performed by different stakeholders and organizes the required communication,

Similar Documents

Free Essay

Title Is My Fcing Ttl

...AUTOMATIZAÇÃO DO PROCESSO DE RECRUTAMENO E RESPOSTA A OPORTUNIDADES COMERCIAIS Tiago Magalhães Keywords: Human Resources Management System, Control, Candidate, Development Process, Information, CMS 1. Context HR Management Systems derive from augmented corporate competition; this new reality demands that all information is integrated within a controlled environment and provides for an optimization of the work performed by employees. The HR Management Systems add value to the employees and the respective employer by means of automating and simplifying non-core processes; accordingly, this additional support allows employees to execute their functions in a more efficient manner. The case study presented in this Master’s Dissertation introduces and analyses the implementation of certain functionalities of an HR Management System, focusing specifically on those related to the automation and integration of recruitment processes and replies to commercial opportunities. The practical inception of this HR Management System was successful and added value to Noesis; the outcome was an increase in the management of candidates and an optimization in the work performed by the HR team. 4. Solution Development In this chapter, I describe the development process that will lead to the solution required by the theme of this thesis and explain all steps taken towards the creation of a generic solution for a PME. 4.1. Development Process ICONIX was the chosen model, because it is considered...

Words: 1168 - Pages: 5

Premium Essay

Apple Inc 2008

...Research Brief Homeland Security A RAN D IN FRAST RUCT URE , SAFE T Y, AN D E N VIRON ME N T PROGRAM Cybersecurity Economic Issues Corporate Approaches and Challenges to Decisionmaking RAND RESEARCH AREAS THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE C ybersecurity economics is an emerging field. There is a significant need for better data, better understanding, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. In two articles, RAND senior scientist Shari Lawrence Pfleeger and her colleagues addressed these key cybersecurity concerns and identified how different types of companies or organizations perceive the importance of cybersecurity and make cybersecurity investment decisions. Abstract The emerging field of cybersecurity economics could benefit from better data, better understanding, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. This research brief presents findings that address these key cybersecurity concerns, perceptions of the importance of cybersecurity, and considerations for cybersecurity...

Words: 2167 - Pages: 9

Free Essay

Ingenieria Del Software

...GUÍA AL CUERPO DE CONOCIMIENTO DE LA INGENIERÍA DEL SOFTWARE VERSIÓN 2004 do r SWEBOK UN PROYECTO DEL COMITÉ DE LA PRÁCTICA PROFESIONAL DEL IEEE COMPUTER SOCIETY Bo rra BORRADOR - ESPAÑOL GUÍA AL CUERPO DE CONOCIMIENTO DE LA INGENIERÍA DEL SOFTWARE VERSIÓN 2004 do r SWEBOK Directores ejecutivos Alain Abran, École de Technologie Superieure James W. Moore, The Mitre Corp. rra Directores Pierre Bourque, École De Technologie Superieure Robert Dupuis, Universite Du Quebec A Montreal Bo Jefe de proyecto Leonard L. Tripp, Chair, Professional Practices Committee, IEEE Computer Society (2001-2003) Copyright © 2004 por The Institute of Electrical and Electronics Engineers, Inc. Todos los derechos reservados. Copyright y permisos de impresión: Este documento puede ser copiado, completo o parcialmente, de cualquier forma o para cualquier propósito, y con alteraciones, siempre que (1) dichas alteraciones son claramente indicadas como alteraciones y (2) que esta nota de copyright esté incluida sin modificación en cualquier copia. Cualquier uso o distribución de este documento está prohibido sin el consentimiento expreso de la IEEE. Use este documento bajo la condición de que asegure y mantenga fuera de toda ofensa a IEEE de cualquier y toda responsabilidad o daño a usted o su hardware o software, o terceras partes, incluyendo las cuotas de abogados, costes del juicio, y otros costes y gastos relacionados que surjan del...

Words: 99648 - Pages: 399