Upload
stephen-scott
View
214
Download
1
Tags:
Embed Size (px)
Citation preview
1
an unrealistic deadline established by someone outside the software development group
changing customer requirements that are not reflected in schedule changes;
an honest underestimate of the amount of effort and/or the number of resources that will be required to do the job;
predictable and/or unpredictable risks that were not considered when the project commenced;
technical difficulties that could not have been foreseen in advance;
human difficulties that could not have been foreseen in advance;
miscommunication among project staff that results in delays; a failure by project management to recognize that the project is
falling behind schedule and a lack of action to correct the problem
2
compartmentalization—define distinct tasks interdependency—indicate task interrelationship effort validation—be sure resources are
available defined responsibilities—people must be
assigned defined outcomes—each task must have an
output defined milestones—review for quality
3
determine type of project assess the degree of rigor required identify adaptation criteria select appropriate software
engineering tasks
4
PERT Program Evaluation and Review Technique Developed by U.S. Navy for Polaris missile project Developed to handle uncertain activity times
CPM Critical Path Method Developed by Du Pont & Remington Rand Developed for industrial projects for which activity times generally
were known Today’s project management software packages have combined the
best features of both approaches.
5
PERT and CPM have been used to plan, schedule, and control a wide variety of projects:R&D of new products and processesConstruction of buildings and highwaysMaintenance of large and complex equipmentDesign and installation of new systems
6
PERT/CPM is used to plan the scheduling of individual activities that make up a project.
Projects may have as many as several thousand activities.
A complicating factor in carrying out the activities is that some activities depend on the completion of other
activities before they can be started.
7
Project managers rely on PERT/CPM to help them answer questions such as: What is the total time to complete the project? What are the scheduled start and finish dates for each
specific activity? Which activities are critical and must be completed
exactly as scheduled to keep the project on schedule? How long can noncritical activities be delayed before they
cause an increase in the project completion time?
8
A project network can be constructed to model the precedence of the activities.
The nodes of the network represent the activities.
The arcs of the network reflect the precedence relationships of the activities.
A critical path for the network is a path consisting of activities with zero slack.
9
Immediate Completion
Activity Description Predecessors Time (days)
A Initial Paperwork --- 3
B Build Body A 3
C Build Frame A 2
D Finish Body B 3
E Finish Frame C 7
F Final Paperwork B,C 3
G Mount Body to Frame D,E 6
H Install Skirt on Frame C 2
10
Project Network
11
StartStart FinishFinish
BB
33 DD
33
AA
33
CC
22
GG
66 FF
33
HH
22
EE77
12
13
What can go wrong?What can go wrong?What is the likelihood?What is the likelihood?What will the damage be?What will the damage be?What can we do about it?What can we do about it?
project team reacts to risks when they occur
mitigation—plan for additional resources in anticipation of fire fighting
fix on failure—resource are found and applied when the risk strikes
crisis management—failure does not respond to applied resources and project is in risk
14
formal risk analysis is performed organization corrects the root causes of
riskTQM concepts and statistical SQAexamining risk sources that lie beyond the
bounds of the softwaredeveloping the skill to manage change
15
16
RISK
controlcontrol
identifyidentify
analyzeanalyze
planplan
tracktrack
Product size—risks associated with the overall size of the software to be built or modified.
Business impact—risks associated with constraints imposed by management or the marketplace.
Customer characteristics—risks associated with the sophistication of the customer and the developer's ability to communicate with the customer in a timely manner.
Process definition—risks associated with the degree to which the software process has been defined and is followed by the development organization.
Development environment—risks associated with the availability and quality of the tools to be used to build the product.
Technology to be built—risks associated with the complexity of the system to be built and the "newness" of the technology that is packaged by the system.
Staff size and experience—risks associated with the overall technical and project experience of the software engineers who will do the work.
17
1. Size estimate may be significantly low2. Larger number of users than planned3. End-users resist system4. Delivery deadline will be tightened5. Funding will be lost6. Customer will change requirements7. Technology will not meet expectations8. Lack of training on tools9. Staff in experienced10. Staff Turn-over will be high
11. Inherent schedule flaws - Software development, given the intangible nature and uniqueness of software, is inherently difficult to estimate and schedule.
12. Requirements Inflation - As the project progresses more and more features that were not identified at the beginning of the project emerge that threaten estimates and timelines.
13. Employee Turnover - Key personnel leave the project taking critical information with them that significantly delays or derails the project.
14. Specification Breakdown - When coding and integration begin it becomes apparent that the specification is incomplete or contains conflicting requirements.
15. Poor Productivity - Given long project timelines, the sense of urgency to work in earnest is often absent resulting to time lost in early project stages that can never be regained.
1. Product Size2. Product Size/Staff Size and experience3. Business Impact4. Business Impact5. Business Impact6. Customer Characteristics7. Technology to be built8. Development Environment9. Staff Size and experience10. Staff Size and experience11. Process Definition12. Process Definition/Customer Characteristics13. Staff Size and experience14. Process definition15. Staff Size and Experience
Have top software and customer managers formally committed to support the project?
Are end-users enthusiastically committed to the project and the system/product to be built?
Are requirements fully understood by the software engineering team and their customers?
Have customers been involved fully in the definition of requirements?
Do end-users have realistic expectations?
22
Is project scope stable? Does the software engineering team
have the right mix of skills? Are project requirements stable? Does the project team have experience
with the technology to be implemented? Is the number of people on the project
team adequate to do the job? Do all customer/user constituencies
agree on the importance of the project and on the requirements for the system/product to be built?
23
mitigation—how can we avoid the risk? monitoring—what factors can we track
that will enable us to determine if the risk is becoming more or less likely?
management—what contingency plans do we have if the risk becomes a reality?
24
performance risk—the degree of uncertainty that the product will meet its requirements and be fit for its intended use.
cost risk—the degree of uncertainty that the project budget will be maintained.
support risk—the degree of uncertainty that the resultant software will be easy to correct, adapt, and enhance.
schedule risk—the degree of uncertainty that the project schedule will be maintained and that the product will be delivered on time.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200526
Risk projection, also called risk estimation, attempts to rate each risk in two ways the likelihood or probability that the risk is real the consequences of the problems associated
with the risk, should it occur. The are four risk projection steps:
establish a scale that reflects the perceived likelihood of a risk
delineate the consequences of the risk estimate the impact of the risk on the project and
the product, note the overall accuracy of the risk projection so
that there will be no misunderstandings.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200527
RiskRisk ProbabilityProbability ImpactImpact RMMMRMMM
RiskRiskMitigationMitigationMonitoringMonitoring
& & ManagementManagement
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200528
Estimate the probability of occurrence Estimate the impact on the project on a
scale of 1 to 5, where 1 = low impact on project success 5 = catastrophic impact on project success
sort the table by probability and impact
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200529
The overall risk exposure, RE, is determined using the following relationship [HAL98]:
RE = P x C
where P is the probability of occurrence for a risk, and C is the cost to the project should the risk occur.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200530
Risk identification. Only 70 percent of the software components scheduled for reuse will, in fact, be integrated into the application. The remaining functionality will have to be custom developed.
Risk probability. 80% (likely). Risk impact. 60 reusable software components were
planned. If only 70 percent can be used, 18 components would have to be developed from scratch (in addition to other custom software that has been scheduled for development). Since the average component is 100 LOC and local data indicate that the software engineering cost for each LOC is $14.00, the overall cost (impact) to develop the components would be 18 x 100 x 14 = $25,200.
Risk exposure. RE = 0.80 x 25,200 ~ $20,200.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200531
mitigation—how can we avoid the risk? monitoring—what factors can we track
that will enable us to determine if the risk is becoming more or less likely?
management—what contingency plans do we have if the risk becomes a reality?
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200532
• • estimated size of the product in LOC or FP?estimated size of the product in LOC or FP?
• • estimated size of product in number of programs, estimated size of product in number of programs, files, transactions?files, transactions?
• • percentage deviation in size of product from percentage deviation in size of product from average for previous products?average for previous products?
• • size of database created or used by the product?size of database created or used by the product?
• • number of users of the product?number of users of the product?
• • number of projected changes to the requirements number of projected changes to the requirements for the product? before delivery? after delivery?for the product? before delivery? after delivery?
• • amount of reused software?amount of reused software?
Attributes that affect risk:Attributes that affect risk:
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200533
• • affect of this product on company revenue?affect of this product on company revenue?
• • visibility of this product by senior management?visibility of this product by senior management?
• • reasonableness of delivery deadline?reasonableness of delivery deadline?
• • number of customers who will use this product number of customers who will use this product
• • interoperability constraintsinteroperability constraints
• • sophistication of end users?sophistication of end users?
• • amount and quality of product documentation that amount and quality of product documentation that must be produced and delivered to the customer?must be produced and delivered to the customer?
• • governmental constraintsgovernmental constraints
• • costs associated with late delivery?costs associated with late delivery?
• • costs associated with a defective product?costs associated with a defective product?
Attributes that affect risk:Attributes that affect risk:
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200534
• • Have you worked with the customer in the past?Have you worked with the customer in the past?
• • Does the customer have a solid idea of requirements?Does the customer have a solid idea of requirements?
• • Has the customer agreed to spend time with you? Has the customer agreed to spend time with you?
• • Is the customer willing to participate in reviews?Is the customer willing to participate in reviews?
• • Is the customer technically sophisticated?Is the customer technically sophisticated?
• • Is the customer willing to let your people do their Is the customer willing to let your people do their job—that is, will the customer resist looking over your job—that is, will the customer resist looking over your shoulder during technically detailed work?shoulder during technically detailed work?
• • Does the customer understand the software Does the customer understand the software
engineering process?engineering process?
Questions that must be answered:Questions that must be answered:
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200535
• • Have you established a common process framework? Have you established a common process framework?
• • Is it followed by project teams?Is it followed by project teams?
• • Do you have management support for Do you have management support for software engineering software engineering
• • Do you have a proactive approach to SQA? Do you have a proactive approach to SQA?
• • Do you conduct formal technical reviews?Do you conduct formal technical reviews?
• • Are CASE tools used for analysis, design and Are CASE tools used for analysis, design and testing?testing?
• • Are the tools integrated with one another?Are the tools integrated with one another?
• • Have document formats been established?Have document formats been established?
Questions that must be answered:Questions that must be answered:
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200536
• • Is the technology new to your organization?Is the technology new to your organization?• • Are new algorithms, I/O technology required?Are new algorithms, I/O technology required? • • Is new or unproven hardware involved?Is new or unproven hardware involved?
• • Does the application interface with new software?Does the application interface with new software?
• • Is a specialized user interface required? Is a specialized user interface required?
• • Is the application radically different?Is the application radically different?• • Are you using new software engineering methods?Are you using new software engineering methods?
• • Are you using unconventional software development Are you using unconventional software development methods, such as formal methods, AI-based approaches, methods, such as formal methods, AI-based approaches,
artificial neural networks?artificial neural networks?
• • Are there significant performance constraints?Are there significant performance constraints?
• • Is there doubt the functionality requested is "do-able?"Is there doubt the functionality requested is "do-able?"
Questions that must be answered:Questions that must be answered:
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200537
• • Are the best people available?Are the best people available?• • Does staff have the right skills?Does staff have the right skills?• • Are enough people available?Are enough people available?• • Are staff committed for entire duration?Are staff committed for entire duration?• • Will some people work part time? Will some people work part time? • • Do staff have the right expectations?Do staff have the right expectations?• • Have staff received necessary training?Have staff received necessary training?• • Will turnover among staff be low?Will turnover among staff be low?
Questions that must be answered:Questions that must be answered:
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 200538
Project:Project: Embedded software for XYZ system Embedded software for XYZ systemRisk type:Risk type: schedule risk schedule riskPriority (1 low ... 5 critical):Priority (1 low ... 5 critical): 4 4Risk factor:Risk factor: Project completion will depend on tests which require Project completion will depend on tests which require hardware component under development. Hardware component hardware component under development. Hardware component delivery may be delayeddelivery may be delayedProbability:Probability: 60 % 60 %Impact: Impact: Project completion will be delayed for each day that Project completion will be delayed for each day that hardware is unavailable for use in software testinghardware is unavailable for use in software testingMonitoring approach:Monitoring approach: Scheduled milestone reviews with hardware groupScheduled milestone reviews with hardware groupContingency plan:Contingency plan: Modification of testing strategy to accommodate delay usingModification of testing strategy to accommodate delay using software simulationsoftware simulationEstimated resources:Estimated resources: 6 additional person months beginning 7-1-96 6 additional person months beginning 7-1-96