article thumbnail

Implications of Artificial Intelligence on Project Management

The IIL Blog

By Eugene Bounds and Steve Ackert Recently, the buzzword artificial intelligence (AI) has been on everyone’s minds, not just in the tech world but across many industries, including project management. For over a quarter of a century, the Standish Group has tracked, reported, and improved software-intensive project success rates. [1]

article thumbnail

100+ Tech Conferences and Events to Attend in Europe 2020

Teamweek

In their words: Founded in 2005 as an intimate gathering of friends DLD (Digital – Life – Design) has developed into Europe’s leading innovation conference for visionaries from around the globe. In their words: Global 2020 is the most important event for startups, tech leaders, and big brands at the forefront of innovation. London, UK.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is a PMO? (Infographic)

Wrike

The percentage of project managers who report to the PMO increased from 42% in 2012 to 52% in 2016. Emerging technologies like smart machines, AI (Artificial Intelligence), and the IoT (Internet of Things) could eliminate many of the PMO’s day-to-day functions. Balance the need for innovation with the need for stability.

PMO 64
article thumbnail

Software Estimating Resources

Herding Cats

“Benchmarking Effort Estimation Models Using Archetypal Analysis,” Nikolaos Mittas, Vagia Karpenisi, and Lefteris Angelis, ACM PROMIS ’14, September 17, 2014. Effort Estimation for Mobile Applications Using Use Case Point (UCP),” Anureet Kaur and Kulwant Kaur, Smart Innovations in Communication and Computational Sciences.

article thumbnail

Estimating is a Learned Skill

Herding Cats

Andreou, 3rd Artificial Intelligence Techniques in Software Engineering Workshop , 7 October, 2010, Larnaca, Cyprus. Analysis of Empirical Software Effort Estimation Models,” Saleem Basha and Dhavachelvan P, (IJCSIS) International Journal of Computer Science and Information Security , Vol. 3, August 2012. 30–41, 2012.