Page 180 - DCAP304_DCAP515_SOFTWARE_PROJECT_MANAGEMENT
P. 180

Software Project Management




                    Notes             When the  sequence of tasks  schedule slips  and  penetrates into  the first  third of  the
                                       buffer.

                                      When the sequence of tasks schedule slips and penetrates into the middle  third of the
                                       buffer.
                                      When the sequence of tasks schedule slips and penetrates into the final third of the buffer.
                                   Let’s take a closer look at each of these trigger points and the appropriate action that the CCPM
                                   project manager should take.

                                   Penetration into the First Third of the Buffer

                                   Unlike the project manager using TPM who chases every slippage on the critical path or change
                                   in the critical path, the project manager using CCPM is looking at the performance of a sequence
                                   and is less likely to act in haste. Penetration into the first third of the buffer  means that  the
                                   cumulative slippage in the sequence is less than one third of the buffer. In this case, the CCPM
                                   project manager will not take any action.

                                   Penetration into the Middle Third of the Buffer

                                   Penetration into the middle third of the buffer does call for some action on the part of the
                                   CCPM project manager. In this case, the correct action is to investigate the cause of the slippage
                                   and put a get-well plan in place. The earlier in the sequence this occurs, the more serious the
                                   problem.

                                   Penetration into the Final Third of the Buffer

                                   Penetration into the final third of the buffer is serious regardless of when in the sequence it
                                   occurs. Obviously, if it is in the first third of the duration of the sequence, it is very serious. If
                                   it occurs late in the final third, there may be little that can be done. In any case, action is called
                                   for.




                                      Task  Explain with the help of an example that how do you use buffers?

                                   Self Assessment

                                   Fill in the blanks:
                                   11.  ………………… is method is planning and managing projects that puts more emphasis on
                                       the resources required to execute project tasks.
                                   12.  Using …………………  Method, projects can be completed more quickly and with greater
                                       scheduling reliability.

                                   13.  Penetration into the …………………… of the buffer does call for some action on the part of
                                       the CCPM project manager.
                                   14.  The CCPM approach is identical to the …………………  approach up to the point where the
                                       project network diagram is defined and the critical path is identified.
                                   15.  ………………… are segments of time that are placed at the end of a sequence of tasks for
                                       the purpose of protecting the schedule of those tasks.





          174                               LOVELY PROFESSIONAL UNIVERSITY
   175   176   177   178   179   180   181   182   183   184   185