A contingency in project management is a reaction plan to an untoward event; in short, we plan ahead for the failure of a given task. In order for a trigger to “fire,” we must set a threshold value that activates the trigger; otherwise, the trigger should never fire. Thresholds can be set based on financial, […]

Risks need to be assessed in regard to their business impacts, so that business decisions can be made promptly.  Strategies should be built and decided based on the quantitative value of the risk. Managers must decide on whether to spend $500,000 to avoid a delay in a project.  How long that delay is impacts the […]

We would like to thank those that have sent us some ideas. To sweeten the pot, we make the offer below. We have decided to extend our story acquisition for the configuration management book.  Please send your stories and techniques to my email address at Jon.Quigley@valuetransform.com Elaborate all that you can (2-15 pages) without divulging […]

Many organizations have a series of activities or processes (design reviews, analyses, verifications, validations, etc.) that they go through to produce the end product or service. The work will start with some kind of development process, which may be a matter of days, months or years, depending on the complexity of the product or service. […]

The trigger is a new concept to those acquainted with the FMEA approach to problem elimination. The trigger event (or threshold) is how we know we need to invoke our risk reduction activities and is direct responsibility of the person monitoring. Risk Response and Contingency Budgets Each risk dollar amount at stake is multiplied by […]

Experience suggests risk management happens after we have already encountered numerous and severe risks.  We can see engineers bringing “risks” to the project manager when we are already witnessing the symptoms and the impact to the project is inevitable. To be relevant, risk management has to occur when there is time to plan actions that […]

Once we are using a configuration management (CM) system, how do we ascertain the status of our engineering change? Configuration status accounting (CSA) is the method by which we accomplish this record tracking. We can get software support by using a dedicated tool or implementing a dedicated database that tracks what we want tracked: Approved/rejected […]

One of the principal roles of configuration management (CM) is to protect us from ourselves. In so doing, we also protect our suppliers and our customers. When high school or college students first encounter bills of materials, they experience shock and awe. An automotive wire harness with 368 leads must have a bill of materials […]

We have hardly seen instances of this issue being discussed. We are painfully aware of the large extent we often require of configuration management because we have to work with tools in the embedded environment called “cross-compilers.” These tools allow the developer to work in a familiar programming language such as C and then produce […]

We have discussed some issues regarding configuration management already and we will continue to discuss this underlying topic in this blog—it is that important! Mass customization presents specific issues. Mass customization occurs when set up our systems such that customers have the ability to request substantial modifications. Mass customization works when we take some sensible […]