Home arrow Site Administration arrow Page 7 - Risky Business (part 2)

Endgame - Administration

Now that you've analyzed the risks inherent to your project and come up with a plan to tackle them, it's time to put your risk management plan into practice. In this concluding article, examine the processes of implementing, monitoring and auditing a software risk management plan, together with a case study that demonstrates how it works in the real world.

  1. Risky Business (part 2)
  2. Plan B
  3. Getting Down To Business
  4. Big Brother Is Watching
  5. Time After Time
  6. Banking On It
  7. Endgame
By: Joanarc, (c) Melonfire
Rating: starstarstarstarstar / 2
May 28, 2003

print this article


With its constantly changing user requirements and the need for quality deliverables at the speed of light, the software industry is living on the edge. The number of risks associated with a project increase with its complexity. Risk management techniques help to reduce the cost associated with a given software project.

In the absence of a sound risk management plan, the magnitude of loss to the organization could range from miniscule to monumental. Uncertainties are always present, and they take the form of risks that can delay or damage a software project. Uncertainties cannot be predicted, nor can they be avoided with infallibility; they can, however, be analyzed and quantified, and strategies devised to combat them.

The recommended approach, thus, is to consider a risk as an opportunity to avert perils. By adopting a positive approach, having a shared product vision, and working with the sole aim of combating the threats to the project, an organization can achieve success in its goal of minimal business disruption.

If you'd like to read more about risk management, you should consider visiting the following links:

A guide to risk management concepts and principles by the Software Engineering Institute at Carnegie Mellon University, at http://www.sei.cmu.edu/programs/sepm/risk/

An informative article on risk management processes by Barry Boehm, at http://www.itq.ch/pdf/RM__ITProjekteV211.pdf

A discussion of software cost estimation techniques, at http://www.sqmmagazine.com/issues/2003-01/costest.html

Risk management for IT, at http://www.itq.ch/pdf/RM__ITProjekteV211.pdf

See you soon!

Note: Examples are illustrative only, and are not meant for a production environment. Melonfire provides no warranties or support for the source code described in this article. YMMV!

>>> More Site Administration Articles          >>> More By Joanarc, (c) Melonfire

blog comments powered by Disqus
escort Bursa Bursa escort Antalya eskort


- Coding: Not Just for Developers
- To Support or Not Support IE?
- Administration: Networking OSX and Win 7
- DotNetNuke Gets Social
- Integrating MailChimp with Joomla: Creating ...
- Integrating MailChimp with Joomla: List Mana...
- Integrating MailChimp with Joomla: Building ...
- Integrating MailChimp with Joomla
- More Top WordPress Plugins for Social Media
- Optimizing Security: SSH Public Key Authenti...
- Patches and Rejects in Software Configuratio...
- Configuring a CVS Server
- Managing Code and Teams for Cross-Platform S...
- Software Configuration Management
- Back Up a Joomla Site with Akeeba Backup

Developer Shed Affiliates


Dev Shed Tutorial Topics: