Flylib.com
List of Exhibits
Previous page
Table of content
Chapter 1: Introduction
Exhibit 1-1: A comparison of IT and non-IT project characteristics.
Chapter 2: The Foundations of Project Management
Exhibit 2-1: Traditional management functions.
Exhibit 2-2: Project management functions.
Exhibit 2-3: Indented WBS.
Exhibit 2-4: Graphical WBS format.
Exhibit 2-5: Sample work breakdown structure.
Exhibit 2-6: Sample precedence table.
Exhibit 2-7: A precedence diagram.
Exhibit 2-8: Network showing early schedule.
Exhibit 2-9: Completed network showing late schedule and critical path.
Exhibit 2-10: A sample Gantt chart.
Exhibit 2-11: Earned value terms, definitions, and formulas.
Exhibit 2-12: Earned value graph.
Chapter 3: Information Technology Project and Systems Life Cycles: Project Management and Team Activities
Exhibit 3-1: Typical IT project life.
Exhibit 3-2: The project and systems development life cycles and activities.
Exhibit 3-3: A sample project charter outline.
Exhibit 3-4: System alternative evaluation parameters.
Exhibit 3-5: Trade-off analysis process.
Chapter 4: Identifying and Developing Customer Requirements
Exhibit 4-1: Tips for writing good statements of work.
Exhibit 4-2: A statement of work format.
Exhibit 4-3: A checklist for making a bid/no-bid decision.
Exhibit 4-4: A sample requirements matrix.
Chapter 5: Organizing the Project Team
Exhibit 5-1: Emotional intelligence competencies.
Exhibit 5-2: The stakeholder management process.
Exhibit 5-3: Stakeholder analysis form.
Exhibit 5-4: Project charter outline.
Chapter 6: Developing the Information Technology Project Plan
Exhibit 6-1: A generic project plan format.
Exhibit 6-2: Risk analysis and contingency strategy matrix.
Exhibit 6-3: Sample schedule and cost-estimating process.
Chapter 7: Risk Management in Information Technology Projects
Exhibit 7-1: A risk management model.
Exhibit 7-2: Path convergence in a network analysis.
Exhibit 7-3: Risk management plan format.
Exhibit 7-4: Cause-and-effect diagram for analyzing risk.
Exhibit 7-5: The risk-filtering process.
Exhibit 7-6: Changing subjective ratings into percentages.
Exhibit 7-7: Comparative risk-ranking form.
Exhibit 7-8: Risk comparisons.
Exhibit 7-9: Weighted risk comparisons.
Exhibit 7-10: Research and development decision tree.
Exhibit 7-11: Research and development decision tree analysis.
Chapter 8: Systems Engineering: The Hub of Project Management
Exhibit 8-1: Systems engineering management is the hub of project management.
Exhibit 8-2: Key system engineering process elements.
Exhibit 8-3: Developing architectures against system functions and requirements.
Exhibit 8-4: Rating alternative architectures.
Exhibit 8-5: The systems engineering process.
Exhibit 8-6: Relationship between project management and systems engineering management.
Chapter 9: Project Monitoring and Control
Exhibit 9-1: Determining PV and EV for task work progress.
Exhibit 9-2: Earned value analysis of an IT project.
Exhibit 9-3: Earned value analysis table.
Exhibit 9-4: CPI and SPI table for controlling the project.
Exhibit 9-5: Tracking CPI and SPI.
Exhibit 9-6: Sample status report format.
Exhibit 9-7: A sample change control process.
Exhibit 9-8: A sample change request form.
Chapter 10: Rapid Development in IT Projects
Exhibit 10-1: Partial example of waterfall development.
Exhibit 10-2: Example of a modified waterfall development.
Chapter 11: Principles of Project Closeout
Exhibit 11-1: A WBS for the closeout phase.
Exhibit 11-2: Activities for closing out a project.
Exhibit 11-3: Sample final project audit format.
Chapter 12: Customer Service—Finishing the Project
Exhibit 12-1: The customer service development process.
Exhibit 12-2: Identifying, understanding, and correcting plan obstacles.
Exhibit 12-3: Elements of superior service tactics.
Exhibit 12-4: Survey response measurement tools.
Exhibit 12-5: Sample customer scorecard.
Exhibit 12-6: Sample report and survey card.
Exhibit 12-7: Keys to effective survey question design.
Previous page
Table of content
Managing Information Technology Projects: Applying Project Management Strategies to Software, Hardware, and Integration Initiatives
ISBN: 0814408117
EAN: 2147483647
Year: 2003
Pages: 129
Authors:
James Taylor
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Welcome to DarkBASIC
Introduction to Computer Programming
Programming the Keyboard, Mouse, and Joystick
Loading and Saving Information Using Files
Playing Intro Movies and Cut-Scenes
Interprocess Communications in Linux: The Nooks and Crannies
Creating a Process
Introduction
Out of Band Messages
A.2. Manual Page Format
D.2. Sample Program for Profiling
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
Appendix A Solutions to Exercises
Appendix C Using the Bouncy Castle API for Elliptic Curve
Special Edition Using Crystal Reports 10
Troubleshooting
Considering Subreport Execution Time and Performance
Planning Considerations When Deploying Crystal Enterprise
Interaction Between the WCS and the WC
Using Crystal Enterprise with NAT
File System Forensic Analysis
Hard Disk Data Acquisition
File System Category
Bibliography
Other Attribute Concepts
Other Topics
FileMaker 8 Functions and Scripts Desk Reference
Exact()
Get(ActiveSelectionSize)
Get(WindowWidth)
Left()
PMT()
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies