background-position: 50% 31px; text-align:center; font:x-small Verdana, Arial, Sans-serif; color:#aabbcc; font-size/* */:/**/small; font-size: /**/small; } /* Page Structure ----------------------------------------------- */ #outer-wrapper { background:url(" width:700px; margin:0 auto; text-align:left; font:normal bold 100% Georgia, Times, serif; } #header-wrapper { display: none; } #main-wrapper { width:450px; float:right; padding:100px 0 20px; font-size:85%; word-wrap: break-word; /* fix for long text breaking sidebar float in IE */ overflow: hidden; /* fix for long non-text content breaking IE sidebar float */ } #main { background:url(" padding:20px 10px 15px; } #sidebar-wrapper { width:200px; float:left; font-size:85%; padding-bottom:20px; word-wrap: break-word; /* fix for long text breaking sidebar float in IE */ overflow: hidden; /* fix for long non-text content breaking IE sidebar float */ } #sidebar { background:url(" padding:40px 10px 15px; width:200px; width/* */:/**/180px; width: /**/180px; } /* Title & Description ----------------------------------------------- */ .Header h1 { margin:0 0 .5em; line-height: 1.4em; font: normal bold 250% Georgia, Times, serif; color: #88dddd; } .Header h1 a { color:#88dddd; text-decoration:none; } .Header .description { margin:0 0 1.75em; color: #99cc77; font: normal normal 100% Helvetica, Arial, Sans-serif; } /* Links ----------------------------------------------- */ a:link { color:#ddaa77; } a:visited { color:#779999; } a:hover { color:#779999; } a img { border-width:0; } /* Posts ----------------------------------------------- */ h2.date-header { margin:0 0 .75em; padding-bottom:.35em; border-bottom:1px dotted #556677; text-transform: lowercase; letter-spacing:.3em; color: #77bbcc; font: normal bold 100% Verdana, Sans-serif; } .post { margin:0 0 2.5em; } .post h3 { margin:.25em 0; line-height: 1.4em; font: normal bold 95% Verdana,Sans-serif; font-size: 130%; font-weight: bold; color:#99cc77; background:url(" no-repeat left .25em; padding-top:0; padding-right:0; padding-bottom:1px; padding-left:45px; } .post h3 a { text-decoration:none; color: #99cc77; } .post h3 a:hover { color: #aabbcc; } .post .post-body { margin:0 0 .75em; line-height:1.6em; } .post-body blockquote { line-height:1.3em; } .post-footer { margin:0; } .uncustomized-post-template .post-footer { text-align: right; } .uncustomized-post-template .post-author, .uncustomized-post-template .post-timestamp { display: block; float: left; margin-right: 4px; text-align: left; } .post-author, .post-timestamp { color:#99cc77; } a.comment-link { /* IE5.0/Win doesn't apply padding to inline elements, so we hide these two declarations from it */ background/* */:/**/url(" padding-left:15px; } html>body a.comment-link { /* Respecified, for IE5/Mac's benefit */ background:url(" padding-left:15px; } .post img { margin-top:0; margin-right:0; margin-bottom:5px; margin-left:0; padding:4px; border:1px solid #556677; } .feed-links { clear: both; line-height: 2.5em; } #blog-pager-newer-link { float: left; } #blog-pager-older-link { float: right; } #blog-pager { text-align: center; } /* Comments ----------------------------------------------- */ #comments { margin:0; } #comments h4 { margin:0 0 10px; border-top:1px dotted #556677; padding-top:.5em; line-height: 1.4em; font: bold 110% Georgia,Serif; color:#9c7; } #comments-block { line-height:1.6em; } .comment-author { background:url(" margin:.5em 0 0; padding-top:0; padding-right:0; padding-bottom:0; padding-left:20px; font-weight:bold; } .comment-body { margin:0; padding-top:0; padding-right:0; padding-bottom:0; padding-left:20px; } .comment-body p { margin:0 0 .5em; } .comment-footer { margin:0 0 .5em; padding-top:0; padding-right:0; padding-bottom:.75em; padding-left:20px; color:#996; } .comment-footer a:link { color:#996; } .deleted-comment { font-style:italic; color:gray; } /* More Sidebar Content ----------------------------------------------- */ .sidebar h2 { margin:2em 0 .75em; padding-bottom:.35em; border-bottom:1px dotted #556677; line-height: 1.4em; font: normal bold 95% Verdana,Sans-serif; text-transform:lowercase; color:#77bbcc; } .sidebar p { margin:0 0 .75em; line-height:1.6em; } .sidebar ul { list-style:none; margin:.5em 0; padding:0 0px; } .sidebar .widget { margin: .5em 0 1em; padding: 0 0px; line-height: 1.5em; } .main .widget { padding-bottom: 1em; } .sidebar ul li { background:url(" margin:0; padding-top:0; padding-right:0; padding-bottom:5px; padding-left:15px; } .sidebar p { margin:0 0 .6em; } /* Profile ----------------------------------------------- */ .profile-datablock { margin: 0 0 1em; } .profile-img { float: left; margin-top: 0; margin-right: 8px; margin-bottom: 5px; margin-left: 0; border: 4px solid #345; } .profile-data { margin: 0; line-height: 1.5em; } .profile-textblock { clear: left; margin-left: 0; } /* Footer ----------------------------------------------- */ #footer { clear:both; padding:15px 0 0; } #footer p { margin:0; } /* Page structure tweaks for layout editor wireframe */ body#layout #sidebar, body#layout #main, body#layout #main-wrapper, body#layout #outer-wrapper, body#layout #sidebar-wrapper { padding: 0; } body#layout #sidebar-wrapper, body#layout #sidebar { padding: 0; width: 240px; } -->

Wednesday, August 19, 2009

Task2

1.] What is Risk?

Risk is a concept that denotes precise probability of specific eventualities. Technically, the notion of risk is independent from the notion of value and, as such, eventualities may have both beneficial and adverse consequences.

2.] Identify at least 5 software risk? Discuss each.

Identify: Before risks can be managed, they must be identified. Identification surfaces risks before they become problems. The SEI has developed techniques for surfacing risks by the application of a systematic process that encourages project personnel to raise concerns and issues. One such method, the SRE, is described in a subsequent section.

Analyze: Analysis is the conversion of risk data into risk decision-making information. Analysis provides the basis for the project manager to work on the “right” and most critical risks.

Plan: Planning turns risk information into decisions and actions. Planning involves developing actions to address individual risks, prioritizing risk actions, and creating an integrated risk management plan. The plan for a specific risk can take many forms. For example: • Mitigate the impact of the risk by developing a contingency plan (along with an identified triggering event) should the risk occur.
• Avoid a risk by changing the product design or the development process.
• Accept the risk and take no further action, thus accepting the consequences if the risk occurs.
• Study the risk further to acquire more information and better determine its characteristics to enable wiser decision-making. The key to risk action planning is to consider the future consequences of a decision made today.

Track: Tracking consists of monitoring the status of risks and the actions taken to ameliorate them. Appropriate risk metrics are identified and monitored to enable the evaluation of the status of as well as of risk mitigation plans. Tracking serves as the “watchdog” function of management.

Control: Risk control corrects deviations from planned risk actions. Once risk metrics and triggering events have been chosen, there is nothing unique about risk control. Risk control melds into project management and relies on project management processes to control risk action plans, corrects for variations from plans, responds to triggering events, and improves risk management processes.

Communicate: Risk communication lies at the center of the model to emphasize both its pervasiveness and its criticality. Without effective communication, no risk management approach can be viable. While communication facilitates interaction among the elements of the model, there are higher level communications to consider as well. In order to be analyzed and managed correctly, risks must be communicated to and between the appropriate organizational levels.

3.] Identify risk management strategies.

Risk Management Strategies include the following:
Risk Avoidance

Risk Abatement

Risk Retention

Risk Transfer

Risk Allocation


Risk Avoidance is just that, avoiding the risk associated with a specific task, activity or project. Often, following the review of a contract, it is determined that a project is just too risky. The client may decide not to bid the work at all, or remove that element of the work from their bid, sometimes using an alternate deduct to delineate the exclusion. Risk avoidance is strictly a business decision, and sometimes a very good strategy if construction documents are unclear, ambiguous or incomplete.

Risk Abatement is the process of combining loss prevention or loss control to minimize a risk. This risk management strategy serves to reduce the loss potential and decrease the frequency or severity of the loss. Risk abatement is preferably used in conjunction with other risk management strategies, since using this risk management method alone will not totally eliminate the risk.

Risk Retention is a good strategy only when it is impossible to transfer the risk. Or, based on an evaluation of the economic loss exposure, it is determined that the diminutive value placed on the risk can be safely absorbed.

Risk Transfer is the shifting of the risk burden from one party to another. This can be done several ways, but is usually done through conventional insurance as a risk transfer mechanism, and through the use of contract indemnification provisions.

Risk Allocation is the sharing of the risk burden with other parties. This is usually based on a business decision when a client realizes that the cost of doing a project is too large and needs to spread the economic risk with another firm.

4.] You are asked by your manager to deliver software to a schedule which you know can only be met by asking your project team to work unpaid overtime. All team members have young children. Discuss whether you should accept this demand from your manager or whether you should persuade your team to give their time to the organisation rather that thier families. What factors might be significant in your decision?



5.] As an IT student that has been trained for Java Programming, you are offered a home based job as a project manager for a certain software project, but you feel that you can make more effective contribution in a technical specifically doing progamming module using Java for the project rather than a managerial role. Discuss whether you should accept the job.




6. Send me your email add to Yn.logoff@gmail.com, including your name. This is to enable me to send lecture notes and presentations in you.

Monday, August 17, 2009

May Ann L. Martinez
BSIT-III


1.] What is Risk?
Risk is a concept that denotes the precise probability of specific eventualities. Risks can come from uncertainty in financial markets, project failures, legal liabilities, credit risk, accidents, natural causes and disasters as well as deliberate attacks from an adversary.

Task2

May Ann L. MArtinez
BSIT-III

Wednesday, August 12, 2009

IT 121//August 11, 2009
May Ann L. Martinez
BSIT-III


IT 121//August 12, 2009
May Ann L. Martinez
BSIT-III