article thumbnail

A Quick Guide to Business Process Mapping

ProjectManager.com

There’s also compliance with the Sarbanes-Oxley Act of 2002 , also known as the Public Company Accounting Reform and Investor Protection Act of 2002. Manage Process: Now the process must be maintained and stored, but also reviewed routinely as well as monitoring the process for changes. Types of Business Process Maps.

Process 200
article thumbnail

Risk Management Resources

Herding Cats

3, March 2002. 11 November 2002. Conrow, Cutter IT Journal , February 2002. “A “A Risk Management Methodology for Project Risk Dependencies,” Tak Wah Kwan and Hareton K.N., IEEE Transactions on Software Engineering , Vol. 5, September/October 2011. Evaluation of the Risk Analysis and Cost Management (RACM) Model,” Matthew S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Compendium of Risk Management Resources

Herding Cats

3, March 2002. 11 November 2002. Conrow, Cutter IT Journal , February 2002. “A “A Risk Management Methodology for Project Risk Dependencies,” Tak Wah Kwan and Hareton K.N., IEEE Transactions on Software Engineering , Vol. 5, September/October 2011. Evaluation of the Risk Analysis and Cost Management (RACM) Model,” Matthew S.

article thumbnail

The 23 Best Project Management Books For Upgrading Your Career in 2020

Planio

Monitoring and Controlling: Tracking and communicating progress on tasks and milestones. Project Management for the Unofficial Project Manager follows the same structure as the PMBOK: Initiate, Plan, Execute, Monitor and Control, Close. Monitoring key tasks and benchmarks. Published date: 2002. Author: Patrick Lencioni.

2020 148
article thumbnail

Estimating is a Learned Skill

Herding Cats

Planning and Executing Time-Bound Projects,” Eduardo Miranda, IEEE Computer , March 2002, pp. Story Point Estimating,” Richard Carlson, ALEA, Agile and Lean Associates, 2013. Koren and Marek Vokác, International Symposium on Empirical Software Engineering , 2002. Dobbs, Naval Postgraduate School, December 2002. “An

article thumbnail

Defensive Programming Grows Up

Leading Agile

In a 2002 piece entitled The Law of Leaky Abstractions , Joel Spolsky observed that abstractions over any implementation can leak details of that implementation. There’s a desire for rapid delivery. ” This generally results in more bugs delivered in less time. Nothing, however, gives us a guarantee of correctness.

article thumbnail

Software Estimating Resources

Herding Cats

SW Cost Estimation: Measuring Model Performance of Arbitrary Function Approximators,” Erik Stensrud, Ingunn Myrtveit, Discussion Paper 5/2002, Handelshøyskolen, Norwegian Business School, BI Open Archive. ko, Software Quality Analysis, Monitoring, Improvement, and Applications, August 29?31, Sharon and D. and Marjan Heri?ko,