New PM Articles for the Week of August 15 – 21

New project management articles published on the web during the week of August 15 – 21, 2011.  We read all of this stuff so you don’t have to!  Recommended:

  • Vincent McGevna continues his series on realistic schedules.  “… a properly created schedule is based on the entire project plan — that it must reflect risk, quality and procurement.”
  • Elizabeth Harrin reviews two more books: “Leadership Principles for Project Success,” by Thomas Juli, and “Rescue the Problem Project,” by Todd Williams.
  • Barney Austen observes several ways in which we dig ourselves into holes, as project managers.
  • John Reiling suggests we focus on our strengths, rather than our weaknesses.
  • Kerry Wills has been peeking over our shoulders, and reports on three common ways we manage out Emails.  I’m the “taxonomy” type; your mileage may vary.
  • Robbie Mac Iver reports from the Agile2011 Conference in Salt Lake City.  Sorry I missed it.
  • Johanna Rothman was also a presenter at Agile2011, and she says she failed miserably.  All because a simulation failed, which, let’s face it, is why we do simulations.
  • Craig Strong argues that the path to product success is not a straight line.  “Why do so many stakeholders and project managers get so caught up in sticking to the original plan at the cost of change.”
  • Geoff Crane explains that “negotiation is never about you,” in several parts.
  • Bruce Benson shares a tale of two cell phone manufacturers and their respective CEO’s responses to observations about whose phones their folks were using.
  • Rick Freedman offers some tips on migrating from PMBOK, CMM-style software development to Agile methods.
  • Peter Saddington reports on the mix of Scrum and Kanban in use at Wooga, developers of Online games.
  • Balraj Bipat has published a short description of his study of public sector IT projects and “the influence of political involvement [on] project managers’ adaptive behavior.”  In other words, how we respond to opportunities and threats.

Enjoy!

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>