Welcome!

Government Cloud Authors: Pat Romanski, Elizabeth White, Dana Gardner, Liz McMillan, Gopala Krishna Behara

Article

Tips And Common Practices For Project Managers

Tips And Common Practices For Project Managers

Nowadays almost any manager uses some kind of project planning software and the reason for this is simple: software can help and ease a lot the work of any person.

Many experienced project managers have created over time a knowledge base of tips and tricks that they can use. However novices are not that lucky. They need to gain all these in time. In this article we shall try to present some of the most encountered ones.

Keep your project as dynamic as possible

Projects tend to move and change in time and for this reason there must be an easy way to update it. If it is created using hard constraints a simple shift in time might actually be a very hard to do operation. Here are some things that you should take into consideration:

Use of constraints. Constraints on tasks impose certain restrictions in the scheduling algorithm because it relates to certain dates. Fixed dates should be avoided as much as possible since this links the project to a certain time period. Instead of using dates to specify the sequence of tasks you should rather think at adding dependencies between them.

Creating dependencies. If certain gaps must be created in the sequence of tasks within a project then these should always be represented using dependencies with “leads” or “lags”. This is very useful in case of shifting the project in time. Do not simulate them using false tasks or hard constraints. Using false tasks will result in an increased total work and constraints will make the project to be connected to certain dates. Furthermore dependencies should be avoided to be used to resolve resource overallocations.

Task start or finish dates. Manually setting start or end dates for tasks will actually impose constraints on the tasks, therefore limiting the dynamic nature of your project schedule. The distribution in time should be done naturally using dependencies. In a well done project plan, almost every task is driving another task. If a task is not influenced by other events then it should only depend on the start date or the end date of the project (in case of start to finish scheduling and finish to start respectively).

Things to be avoided

Task naming. Avoid using duplicate task names since this will increase the ambiguity of the project. In case certain tasks are repeated in multiple phases then appropriate names should be used. Even more a naming convention should be used if possible.

Formatting. A consistency regarding formatting data is preferable. This way everyone will better understand the projects. Using different formats and rules for presenting data might get to misunderstanding and confusion.

Assigning resources. When assigning resources to a task it results an amount of work that must be completed by those resources. Milestones and phases are a special type of tasks. Milestones are used to represent deliverables and have no duration while phases are a collections of related activities. For this reason neither should have resources assigned to them.

Linking phases. A phase is a collection of tasks.  When you say an activity depends on an entire phase that activity depends on all the tasks from that phase. However when a phase depends on another phase things become more complicated since any tasks from the second phase depend on all the tasks from the first phase. This increases the risk of creating circular dependencies. A solution to this problem would be to insert a milestone at the end of the phase and use that for linking.

More tips on project management software can be read on RationalPlan’s project management blog.

More Stories By Lucian Loan

Lucian Loan studied at a technical facility and has an MS in Computer Science. He is now working in the software industry for Stand By Soft, a software company that specializes in building desktop applications and components.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...