Reference no: EM131289001
Scholarly Activity Managing Complex Projects
This next phase of the project is meant to build off the previous phases and chapters:
Phase III: More Lessons Learned
Phase III Work Breakdown:
1. Analyze and critique the NMCI project in terms of its:
o risk identification and management,
o its scheduling,
o its budgeting, and
o its manner of project execution and closure.
You are to refer back to your knowledge from previous units to complete this portion.
2. Explain the challenges EDS faced in each of these areas, how and why they went astray, and how EDS might have managed these areas to prevent the problems or at least lessen their impact.
3. Determine whether this project could be judged a success or failure from a stakeholder's perspective. Use the CSU Online Library or your favorite search engine to locate resources that may help you determine this.
Phase III Deliverable
For this assignment, you are to submit a four-page report that presents an analysis, critique, and recommendations/remedies regarding the project management areas of risk management, risk response, scheduling, budgeting and project execution, and closure as they apply to NMCI's performance. The report should also include your post-project evaluation of whether this project is/was a success from the stakeholders' perspectives.
Finally, describe the elements of this project that could have led to its early termination.
Information about accessing the Blackboard Grading Rubric for this assignment is provided below.
Refer to the previous projects you did for Unit III and and Unit IV Scholarly Activity. Also you need to log into my acoount again and use the CSU online library as before. If you don't have let me know. Please use in-text citation and the correct format and the reference only from the library.
What tools are applicable externally with vendors
: What tools are applicable internally? What tools are applicable externally with vendors? Stakeholders on board (e.g., the vendor base, trucking companies, warehouse personnel).
|
Common security weaknesses inherent in unix or linux
: Question A: What are some of the common security weaknesses inherent in Unix or Linux based systems and what techniques can be used to harden these systems against an attack?
|
How you handled or avoided a conflict
: Post a description of how you handled or avoided a conflict, as well as the results of your approach. Explain how would you respond to this conflict today and/or what steps you would take to improve your comfort level and skill for managing confli..
|
What should be the tidal period in the model
: A model of a harbor is made on the length ratio of 360:1. Storm waves of 2 m amplitude and 8 m/s velocity occur on the breakwater of the prototype harbor
|
Explain the challenges eds faced in each of the given areas
: Explain the challenges EDS faced in each of these areas, how and why they went astray, and how EDS might have managed these areas to prevent the problems or at least lessen their impact.
|
What are the torque and thrust for the prototype
: A torque of 20 N m is required to turn the model, and the model thrust is measured to be 245 N. What are the torque and thrust for the prototype?
|
Communication techniques and professionalism
: Summarize the process of addressing prohibited content/activity, and explain privacy, licensing, and policy concepts. Describe proper communication techniques and professionalism when working with users.
|
What is the role of a discount rate in decision-making
: What is the responsibility of the investment manager with respect to the investment portfolio? Distinguish between capital budgeting and capital structure.
|
Have you used an online dating site?
: After reading "Online Dating: Risks and Rewards" in your textbook, reflect and discuss the following:Have you used an online dating site?
|