In: Computers and Technology

Submitted By prudhviraj
Words 370
Pages 2
This is not necessarily a large project, but the installation of 10 wireless access points in a company is a complex undertaking that has the potential to impact a lot of stakeholders and also incur a lot of company resources and cost. The Work Breakdown Structure (WBS) is known as the “foundation” of the project (Mathis, 2008). The WBS helps break down the complex tasks into progressively smaller pieces. Basically a $100,000 could be made to look like a bunch of $5000-$10,000 projects. This activity has the scope of most departments in the organization; the WBS assists in coordination and communication with the different departments. What the WBS does best is provide visibility and awareness into any project. This essentially translates into the project teams and sponsors having a good view on the schedule estimates, and also to effectively manage the schedule to ensure that the project gets completed on time. The WBS should be designed with consideration for its eventual uses. The WBS design should try to achieve certain goals:
• Be compatible with how the work will be done and how costs and schedules will be managed,
• Give visibility to important or risky work efforts,
• Allow mapping of requirements, plans, testing, and deliverables,
• Foster clear ownership by managers and task leaders,
• Provide data for performance measurement and historical databases, and
• Make sense to the workers and accountants (Chapman, 2004).
The activity of creating a project plans ensures that the project team has given enough though to all the key areas, and is well prepared to execute the project, thus enabling complex tasks to be broken down and managed in an effective manner. From a communication perspective as well, the work breakdown structure looks at the various tasks that are being performed by different stakeholders and organizes the required communication,…...

Similar Documents

Title Is My Fcing Ttl processes. The big innovation presented by this implementation was the integration of the recruitment and commercial processes, contributing to an automatic adaptation of these needs. The implementation of 2 applications to manage the optimization of the business processes in Noesis was essential. This implementation was only possible with a previous work to standardize and centralize the information. This work will permit the HR department to optimize their work and will contribute to the satisfaction of the company’s clients. The flexibility presented by the solution leaves the door open to new needs that will appear in the future. 8. References 1. 2. 3. 4. 5. 6. SoftwareEngineering/UCDOM_summary.html cia.html#iconix 3 ...

Words: 1168 - Pages: 5

Ingenieria Del Software

...Software Practice for Business (Kra99) H. Krasner, ―The Payoff for Software Process Improvement: What It Is and How to Get It,‖ presented at Elements of Software Process Assessment and Improvement, 1999. (Lyu96) M.R. Lyu, Handbook of Software Reliability Engineering, Mc-Graw-Hill/IEEE, 1996. (Mad94) N. Madhavji et al., ―Elicit: A Method for Eliciting Process Models,‖ presented at Proceedings of the Third International Conference on the Software Process, 1994. (Mas95) S. Masters and C. Bothwell, ―CMM Appraisal Framework - Version 1.0,‖ Software Engineering Institute CMU/SEI-TR-95-001, 1995, available at 01.95.pdf. (Rag89) S. Raghavan and D. Chand, ―Diffusing SoftwareEngineering Methods,‖ IEEE Software, July 1989, pp. 8190. (Rog83) E. Rogers, Diffusion of Innovations, Free Press, 1983. (Sch99) E. Schein, Process Consultation Revisited: Building the Helping Relationship, Addison-Wesley, 1999. (SEI95) Software Engineering Institute, The Capability Maturity Model: Guidelines for Improving the Software Process, Addison-Wesley, 1995. (SEL96) Software Engineering Laboratory, Software Process Improvement Guidebook, Software Engineering Laboratory, NASA/GSFC, Technical Report SEL-95-102, April 1996, available at do (McG94) F. McGarry et al., ―Software Process Improvement in the NASA Software Engineering Laboratory,‖......

Words: 99648 - Pages: 399

Apple Inc 2008

...perspectives affect cybersecurity perceptions, RAND researchers interviewed the chief security officers of six companies in the Internet supply chain. These leaders revealed vastly different attitudes about the role of security in the context of their corporate goals. The analysis suggests that a company’s culture and approach to market discipline can predict corporate attitudes about cybersecurity. To understand these security approaches, the RAND team considered a business framework that could help explain the interview results and also identify which one of three market disciplines companies embrace to compete in the marketplace: operational excellence, product leadership, or customer intimacy.1 This framework has been useful in other softwareengineering contexts in which it has assisted 1 Michael Treacy and Frederik D. Wiersema, The Discipline of Market Leaders: Choose Your Customers, Narrow Your Focus, Dominate Your Market, Reading, Mass.: Addison-Wesley, 1995. technology adoption within the context of corporate culture. In addition, the authors believe that the framework can be used not only to analyze existing security attitudes but also to predict likely future cybersecurity actions and attitudes. An operationally excellent company strives to provide both high-quality customer service and the lowest prices for its goods and services. It emphasizes efficiency and dedication to quality control along with a carefully managed supply chain. Because security......

Words: 2167 - Pages: 9

Magi : Sinbad no Bouken OVA Subtitle Indonesia | Kite Movie | Gentleman MTV Unplugged 2014.