New PM Articles for the Week of September 30 – October 6

New project management articles published on the web during the week of September 30 – October 6. And this week’s video: Harry Hall explains how to categorize risks for a more comprehensive view of the project risk profile. 8 minutes, safe for work.

Business Acumen and Strategy

  • Nicolas Crouzet and Janice Eberly found that companies are investing less in “property, plant, and equipment” and more in intangible assets like software and intellectual property. 6 minutes to read.
  • Peter Williamson and Arnoud De Meyer explains how to (and why you should) monetize a business ecosystem. 4 minutes to read.
  • The World Economic Forum has published their Regional Risks for Doing Business 2019 report. 40 pages of data and analysis, well worth the read.

Managing Projects

  • Mike Clayton goes through the elements of the project planning process in a simplified sequence. Video, 12 minutes, safe for work.
  • Brenda Taylor explains the concept and value of component-based work breakdown structures. 8 minutes to read.
  • Thomas Redman and Roger Hoerl tell us how to identify and conduct analytics projects that don’t require a lot of data but deliver a lot of value. 5 minutes to read.
  • John Goodpasture pooh-poohs percent complete as a worthless metric; remaining effort, however, is actionable. Just 1 minute to read.
  • Tammy Graves makes the case for defining and aligning key roles from the start of large, complex projects. 4 minutes to read.
  • Dave Prior interviews Mike Anderson on the case for the role of the agile project manager. Podcast, 35 minutes, safe for work.

Managing Software Development

  • Stefan Wolpers curates his weekly list of Agile content, from discussion gridlock to coach assessments better product decisions. 7 outbound links, 3 minutes to read.
  • Tom Cagley delineates five types of meetings and then maps them to Scrum ceremonies. Each post about 2 minutes to read.
  • RJ Gazarek reports on what’s new and what’s changed in the newest iteration of the Scaled Agile Framework, SAFe 5.0. 7 minutes to read.
  • Mike Cohn and Brendan Wovchko collaborate to present three free (for a short time) Kanban training videos. 3 minutes to read, 15 minutes for the first video, 10 for the second.
  • Songtham Tung provides a few examples of refactoring to reduce technical debt. 3 minutes to read.
  • Piet Hadermann assesses the cost of waiting for feedback in software development. 5 minutes to read.

Applied Leadership

  • Leigh Espy gives us detailed coaching on keeping the inevitable team conflict productive and non-destructive. 7 minutes to read.
  • David Dye coaches us on what to do when our team resists changes. 3 minutes to read.
  • Anne Shaw shares an infographic on making a globally distributed team feel a “local” bond. 2 minutes to read.

Cybersecurity and Data Protection

  • Ericka Chickowski identifies five disruptive trends transforming cyber security, from Cloud sprawl to micro-services and API’s. 5 minutes to read.
  • Isaac Kohen catalogs twenty security risks. Most organizations face nearly all of them. 7 minutes to read.
  • Robert Muggah analyzes the threat to city governments and urban infrastructure posed by cyber attacks. More than 70% of all reported ransomware attacks in the US target state and local governments. 7 minutes to read.
  • Seth Godin points out the superstition and security theater behind most corporate password rules. 2 minutes to read.

Pot Pourri

  • Sharlyn Lauby shares an infographic showing the key components of both types of non-disclosure agreements. Vital for every contract negotiation! 4 minutes to read.
  • Radhika Chugh tutors us on Heat maps and how to use them in analyzing traffic to a website. Include a link to an ebook. 8 minutes to read.
  • Stav Ziv tutors us on the three most common resume formats and explains how to choose the right one. 8 minutes to read.

Enjoy!

New PM Articles for the Week of September 9 – 15

New project management articles published on the web during the week of September 9 – 15. And this week’s video: Jon Acampora tutors us on using the VLOOKUP function in Excel. Jon provides a sample file that you can download and use to follow along. One of the best Excel tutorials I’ve ever seen, for one of the most useful (and widely used) spreadsheet functions. 22 minutes, safe for work.

Business Acumen and Strategy

  • Greg Satell explains why change management so often fails. Don’t prepare for battle by crafting a sales pitch! 5 minutes to read.
  • Mike Clayton reviews Positive Psychology in Business, by Sarah Lewis. 3 minutes to read. He even includes a video with more details—6 minutes, safe for work.
  • The nice folks at Clarizen point out that Brexit will also upend UK employment law, from precedent to current cases to legislation needed to replace EU law. 3 minutes to read.
  • Suzanne Lucas reports on California legislation that may reclassify gig workers as employees. Not just Uber—software companies need to pay attention! 3 minutes to read.

Managing Projects

  • Kiron Bondale points out some of the underlying causes of ineffective project risk management. 2 minutes to read.
  • Elizabeth Harrin tells us how to hold a brilliant project kick-off meeting. My project’s so bright, I gotta wear shades. 10 minutes to read.
  • Cornelius Fichtner interviews PMI Head of Certification Products Sierra Hampton-Simmons on the coming changes to the PMP exam, as of July 1, 2020. Podcast, 30 minutes, safe for work.
  • Marina Pilipenko briefly summarizes six common techniques for making project estimates. 4 minutes to read.
  • Emmie Anderson shares her infographic on Zombie PMOs, showing symptoms and effective treatments. Good information, overused metaphor. 3 minutes to read.
  • Peter Taylor celebrates the 10th anniversary of publishing The Lazy Project Manager by making the Kindle version available for free. 178 pages. And: Laura Barnard interviews Peter on business agility and the PMO. Podcast, 40 minutes, safe for work.

Managing Software Development

  • Stefan Wolpers curates his weekly list of agile content, from internalizing design thinking to the meaning of ‘bugs’ in an agile context to idea validation. 7 outbound links, 3 minutes to read.
  • Mike Cohn explains why the Fibonacci sequence works so well with Planning Poker. 4 minutes to read.
  • Johanna Rothman responds to a reader comment on last week’s post: measuring both cycle time and velocity lets a team try to beat a goal. Can opener, meet worms! 4 minutes to read.
  • Nilanjan Bhattacharya points out some of the problems we should anticipate when integrating infrastructure as code (AWS, Azure, Google Cloud) into DevOps. 5 minutes to read.
  • Alister Scott describes the evolution of his team’s Agile story wall, from a Kanban board to a timeline to something even more detailed. 3 minutes to read.
  • John Cutler shares an agenda that will guide your team toward an actionable definition of a Minimum Viable Product. No, really. 4 minutes to read.

Applied Leadership

  • Sharlyn Lauby identifies five different roles you want on your team, and why you want each of them—even the Naysayer. 3 minutes to read.
  • Frank Sonnenberg contemplates the value of credibility and explains how to earn 3 minutes to read.
  • François Ortalo-Magné, Dean of the London Business School, recommends three self-development actions for leaders to be more effective. 3 minutes to read.

Cybersecurity and Data Protection

  • Daniel Dobrygowski reports on the growth of corporate cybersecurity alliances. 6 minutes to read.
  • Emam explains the details of the Deep Fake Detection Challenge, intended to create a realistic dataset that can be used to train AI models. 2 minutes to read.
  • Joan Goodchild updates us on the latest phishing and spear-phishing attack vectors. Email is an open window, even if you lock all the doors. 5 minutes to read.

Pot Pourri

  • Nancy Settle-Murphy examines ghosting—”the practice of ignoring or severing a business relationship by suddenly withdrawing from all communication.” 6 minutes to read.
  • Martha Jeong summarizes research into how leaders are perceived when they change their minds. 4 minutes to read.
  • Charlotte Jee reports that Amazon is now soliciting answers for questions that Alexa can’t handle from the general public. This could get ugly. 2 minutes to read.

Enjoy!

New PM Articles for the Week of August 19 – 25

New project management articles published on the web during the week of August 19 – 25. And this week’s video: Mike Clayton summarizes a few of the key points of his new book, Project Governance: A guide for project managers. 10 minutes, safe for work.

Information protection has become more central to the practice and knowledge base of IT project management. I’ve been linking to at least two or three related articles each week under various headings, so I’ve replaced the section Research and Insights with a new topic heading: Cybersecurity and Data Protection. I’ll include content links related to news, techniques, trends, and legislation. I’ve also resurrected the Pot Pourri section to replace Working and the Workplace; expect to find interesting things that didn’t fit any of the more specific headings.

Business Acumen and Strategy

  • Bob van Luijt explains how the notion of an API—an interface for delivering digital services—became the basis for entire business models. 7 minutes to read.
  • Jasper Dekker justifies the requirement for autonomous cars to drive like a local. If people in Taipei don’t drive like people in London, why should robots drive like people in California? 3 minutes to read.
  • Vanessa Bates Ramirez summarizes Peter Diamandis’s presentation on meta-trends at the Singularity University Global Summit. 6 minutes to read.

Managing Projects

  • Emily Peterson selected some of the Q&A following Steve Marjot’s webinar to discuss the Royal Bank of Scotland transformation journey from traditional project portfolio management to Lean portfolio management. 7 minutes to read.
  • Ronald Smith follows up his article on misconceptions about Critical Path with a lesson how to avoid a slippery 5 minutes to read.
  • Kiron Bondale answers the rhetorical question: Does closeout vary between projects following an adaptive, rather than a predictive life cycle? 3 minutes to read.
  • Luís Gonçalves presents the business case for outsourcing software development, with options, potential mistakes, and management best practices. 16 minutes to read.
  • Elizabeth Harrin shares her thoughts (and a template) on benefits management. 3 minutes to read.
  • The nice folks at Clarizen describe the seven integrated characteristics of high-performance agile IT teams. 3 minutes to read.
  • Leigh Espy shows how to create a Pareto chart, one of the most easily understood visual tools for decision support. 4 minutes to read.

Managing Software Development

  • Stefan Wolpers curates his weekly list of Agile content, from enabling engineer decision making to estimation to tracking value in an agile transformation. 7 outbound links, 3 minutes to read.
  • Kristin Jackovny continues her series, explaining how HTTPS works, from encryption to cookies and tokens. With more to come next week! 3 minutes to read.
  • Johanna Rothman concludes her series on where agile is headed; 8 minutes to read. Her summary of the series is here; 7 minutes to read.
  • Ashan Fernando describes web application security with a broad view—from external requirements like PCI and GDPR to assessments, code reviews, and audits. 7 minutes to read.
  • Sounderrajan Seshadri suggests an approach to budget management for agile projects. 4 minutes to read.

Applied Leadership

  • Alison Coleman coaches us on uniting the multi-generational workforce. 5 minutes to read.
  • Emily Luijbregts shares four tips for dealing with difficult team members. 4 minutes to read.
  • Tom Cagely continues his series on saying no, including five prerequisites for safely saying no and a simple process for saying no. About 5 minutes to read both.

Cybersecurity and Data Protection

  • Bobby Allyn reports on a ransomware attack that hit 22 municipalities in Texas. And Nalneesh Gaur recommends a decision framework for deciding whether to pay. Each 5 minutes to read.
  • Joan Goodchild tells us about cyber-risk insurance, another component of a comprehensive risk management program that is growing in acceptance. 4 minutes to read.
  • Mariarosaria Taddeo and Francesca Bosco make the case for treating cybersecurity like a public good, where the public sector shares in the cost and responsibility.
  • Ben Dickson reports on the impact of flawed disclosure and reporting of software security flaws. 4 minutes to read.

Pot Pourri

  • Andy Jordan coaches us on dealing with the disappointments that will come along with our career successes. 7 minutes to read.
  • Darius Foroux lists seven professional skills that we should develop in order to maximize both our effectiveness and our income. 5 minutes to read.
  • Esther Cohen tutors us on retention marketing: How to get clients to stay. It’s not just about delivering on time and on budget. 8 minutes to read.

Enjoy!