Page 180 - DCAP304_DCAP515_SOFTWARE_PROJECT_MANAGEMENT
P. 180
Software Project Management
Notes When the sequence of tasks schedule slips and penetrates into the first third of the
buffer.
When the sequence of tasks schedule slips and penetrates into the middle third of the
buffer.
When the sequence of tasks schedule slips and penetrates into the final third of the buffer.
Let’s take a closer look at each of these trigger points and the appropriate action that the CCPM
project manager should take.
Penetration into the First Third of the Buffer
Unlike the project manager using TPM who chases every slippage on the critical path or change
in the critical path, the project manager using CCPM is looking at the performance of a sequence
and is less likely to act in haste. Penetration into the first third of the buffer means that the
cumulative slippage in the sequence is less than one third of the buffer. In this case, the CCPM
project manager will not take any action.
Penetration into the Middle Third of the Buffer
Penetration into the middle third of the buffer does call for some action on the part of the
CCPM project manager. In this case, the correct action is to investigate the cause of the slippage
and put a get-well plan in place. The earlier in the sequence this occurs, the more serious the
problem.
Penetration into the Final Third of the Buffer
Penetration into the final third of the buffer is serious regardless of when in the sequence it
occurs. Obviously, if it is in the first third of the duration of the sequence, it is very serious. If
it occurs late in the final third, there may be little that can be done. In any case, action is called
for.
Task Explain with the help of an example that how do you use buffers?
Self Assessment
Fill in the blanks:
11. ………………… is method is planning and managing projects that puts more emphasis on
the resources required to execute project tasks.
12. Using ………………… Method, projects can be completed more quickly and with greater
scheduling reliability.
13. Penetration into the …………………… of the buffer does call for some action on the part of
the CCPM project manager.
14. The CCPM approach is identical to the ………………… approach up to the point where the
project network diagram is defined and the critical path is identified.
15. ………………… are segments of time that are placed at the end of a sequence of tasks for
the purpose of protecting the schedule of those tasks.
174 LOVELY PROFESSIONAL UNIVERSITY