Home arrow Site Administration arrow Risky Business (part 2)

Risky Business (part 2)

Now that you've analyzed the risks inherent to your project and come up with a plan to tackle them, it's time to put your risk management plan into practice. In this concluding article, examine the processes of implementing, monitoring and auditing a software risk management plan, together with a case study that demonstrates how it works in the real world.

TABLE OF CONTENTS:
  1. Risky Business (part 2)
  2. Plan B
  3. Getting Down To Business
  4. Big Brother Is Watching
  5. Time After Time
  6. Banking On It
  7. Endgame
By: Joanarc, (c) Melonfire
Rating: starstarstarstarstar / 2
May 28, 2003

print this article
SEARCH DEV SHED

TOOLS YOU CAN USE

advertisement
In the first part of this article, I introduced you to the science of software risk management, explaining how an effective risk management plan can go a long way towards ensuring the success of your software project. I also intriduced you to the six phases of software risk management, and discussed the first three - risk identification, analysis and plan development - in detail.

In this second (and concluding) article, I will continue this discussion with a focus on the phases of plan implementation, monitoring and audit. And with the theoretical discussion done with, I'll also bring all this into the real world, with a case study and a flowchart that you can use in your next project.



 
 
>>> More Site Administration Articles          >>> More By Joanarc, (c) Melonfire
 

blog comments powered by Disqus
escort Bursa Bursa escort Antalya eskort
   

SITE ADMINISTRATION ARTICLES

- Coding: Not Just for Developers
- To Support or Not Support IE?
- Administration: Networking OSX and Win 7
- DotNetNuke Gets Social
- Integrating MailChimp with Joomla: Creating ...
- Integrating MailChimp with Joomla: List Mana...
- Integrating MailChimp with Joomla: Building ...
- Integrating MailChimp with Joomla
- More Top WordPress Plugins for Social Media
- Optimizing Security: SSH Public Key Authenti...
- Patches and Rejects in Software Configuratio...
- Configuring a CVS Server
- Managing Code and Teams for Cross-Platform S...
- Software Configuration Management
- Back Up a Joomla Site with Akeeba Backup

Developer Shed Affiliates

 


Dev Shed Tutorial Topics: