New project management articles published on the web during the week of September 2 – 8. And this week’s video: Sorrel Gilbert begins a series on the basics of project risk management. This segment is about risk categorization; 4 minutes to watch. She also posted a video on the risk life cycle, 6 minutes to watch. And Harry Hall posted his insights on qualitative risk analysis. 3 minutes, all safe for work.
Those are lenticular clouds over Mt. Rainier in the photo below. Sorry, UFO watchers!
Business Acumen and Strategy
Jay Chapel looks at the three common “as a service” models—SaaS, PaaS, and IaaS—in terms of providers, market share, and market trends. 4 minutes to read.
Curt Nickisch interviews Nobel-winning economist Oliver Hart and colleague Kate Vitasek on the use of relational contracts for complicated relationships, like outsourcing. Podcast, 23 minutes, or read the transcript in about 14 minutes.
Ann Saphir reports that trade policy uncertainty has reached levels not seen since the 1970’s, estimating lost output of roughly US$850B. Defensive tactics are in order. 3 minutes to read.
John Goodpasture reports on his recent experience as a participant and observer of a group of small teams, engaged in a self-organizing 2 minutes to read.
Dale Howard shows how to add useful details to tasks in MS Project, using the Task Form. 5 minutes to read.
Mike Clayton shares five tips for keeping stakeholders engaged in your project. Video, 9 minutes, safe for work.
Dmitriy Nizhebetskiy defines 15 project management terms. 7 minutes to read, or watch the video—13 minutes, safe for work.
Brook Appelbaum makes the business case for Lean Project Portfolio Management. 5 minutes to read.
Ankit Rathi reflects on the reasons why artificial intelligence projects fail. 4 minutes to read.
Managing Software Development
Stefan Wolpers curates his weekly list of agile content, from the “demise” of Six Sigma to Zombie Scrum to product roadmaps that suck. 7 outbound links, 3 minutes to read.
Johanna Rothman tells us why she prefers to measure cycle time rather than velocity. 4 minutes to read.
Chris Arend maps out three developing trends for commercial chatbots. 2 minutes to read.
Patrick Lee Scott explains why complex architectures and solutions should be avoided, or at least mitigated. 4 minutes to read.
Ron Jeffries argues that the primary defining characteristic of Agile and Scrum is working software. 5 minutes to read.
Glen Alleman adds some clarifying detail to Ron Jeffries’ post on “doing” Agile and Scrum. Just a minute to read.
Kathryn Heath and Brenda Wensil share the results of their research into creating a diverse culture. As it turns, out we need to begin with our meetings. 5 minutes to read.
Scott Steinberg coaches us on telling our teams about a management decision that they won’t like, when you don’t like it, either. 4 minutes to read.
Dan Rockwell points out three natural (more or less) human behaviors that can make a leader behave badly. 2 minutes to read.
Cybersecurity and Data Protection
Ayodeji Onibalusi defines and explains the benefits of Zero Trust Networking. 4 minutes to read.
Terry Sweeney walks us through eight ways to spot an insider threat. Good news: negligence is more common that malicious intent. 10 minutes or so to flip through all nine pages.
Adam Levin says that companies can have their identities stolen, too. Or at least, damaged: think about the hack of Jack Dorsey’s Twitter account—even the CEO isn’t safe? 4 minutes to read.
George Williams tutors us on how to defend our corporate data against ransomware attacks. 4 minutes to read.
Loren Grush reports on the failed communications between SpaceX and the European Space Agency that added risk to what should have been a routine maneuver. 5 minutes to read.
MIT Technology Review describes a proof-of-concept AI system that identified a new potential drug to treating fibrosis in 46 days. Just over a minute to read.
Martin Armstrong reports on a Glassdoor UK survey of the most hated bits of office jargon. Punch a puppy?WTF? Just a minute to read.
New project management articles published on the web during the week of August 19 – 25. And this week’s video: Mike Clayton summarizes a few of the key points of his new book, Project Governance: A guide for project managers. 10 minutes, safe for work.
Information protection has become more central to the practice and knowledge base of IT project management. I’ve been linking to at least two or three related articles each week under various headings, so I’ve replaced the section Research and Insights with a new topic heading: Cybersecurity and Data Protection. I’ll include content links related to news, techniques, trends, and legislation. I’ve also resurrected the Pot Pourri section to replace Working and the Workplace; expect to find interesting things that didn’t fit any of the more specific headings.
Business Acumen and Strategy
Bob van Luijt explains how the notion of an API—an interface for delivering digital services—became the basis for entire business models. 7 minutes to read.
Jasper Dekker justifies the requirement for autonomous cars to drive like a local. If people in Taipei don’t drive like people in London, why should robots drive like people in California? 3 minutes to read.
Vanessa Bates Ramirez summarizes Peter Diamandis’s presentation on meta-trends at the Singularity University Global Summit. 6 minutes to read.
Emily Peterson selected some of the Q&A following Steve Marjot’s webinar to discuss the Royal Bank of Scotland transformation journey from traditional project portfolio management to Lean portfolio management. 7 minutes to read.
Ronald Smith follows up his article on misconceptions about Critical Path with a lesson how to avoid a slippery 5 minutes to read.
Kiron Bondale answers the rhetorical question: Does closeout vary between projects following an adaptive, rather than a predictive life cycle? 3 minutes to read.
Luís Gonçalves presents the business case for outsourcing software development, with options, potential mistakes, and management best practices. 16 minutes to read.
Elizabeth Harrin shares her thoughts (and a template) on benefits management. 3 minutes to read.
New project management articles published on the web during the week of July 29 – August 4. And this week’s video: Nicole Eagan, Darktrace Ltd. chief executive officer, discusses the Capital One data breach and the reality behind cyber hacks with Bloomberg’s Emily Chang. Excellent insights, real-world context. 4 minutes, safe for work.
Business Acumen and Strategy
Rosamond Hutt recaps the International Monetary Fund’s July update on the world economic outlook. They list five areas of concern. 3 minutes to read.
Alex Brammer reviews the impact of GDPR compliance on how business is done. Lawmakers have realized that the internet can be regulated. 6 minutes to read.
Kevin Coleman looks at the strategic implications of emerging technologies, including the projects that implement organizational strategy. 4 minutes to read.
Harry Hall helps us prepare for those critical risks that metastasize into issues on those ambitious projects that always seemed like a stretch. 4 minutes to read.
Dale Howard coaches us on using the Task Entry view in MS Project—where the advanced users go first when things don’t look quite right. 4 minutes to read.
Francesco Marcatto takes us on a high-level walk through the process of creating a project plan. 5 minutes to read.
Ben Aston and Kelly Suter discuss tools and techniques for managing stakeholders, in the context of Kelly’s new job. Podcast, 36 minutes, safe for work.
John Goodpasture directs our attention to an old professional journal article on the unintended consequences of metrics, grouped into eight types. 2 minutes to read.
Elizabeth Harrin answers the question: what do I do when my sponsor is too busy to meet with me or even respond to my Emails? 5 minutes to read.
The nice folks at Clarizen list what they believe to be the six most common mistakes in project management, and how to avoid them. 3 minutes to read.
Managing Software Development
Stefan Wolpers curates his weekly list of Agile content, from the need for apex predators in agile transformations to Zombie Scrum to communicating product changes to customers. 7 outbound links, 3 minutes to read.
Mike Cohn tells us how to overcome four common objections to the daily Scum. 6 minutes to read.
Tom Cagely begins a series on daily standup meetings, from failure modes to why daily meetings might not always be the right answer. 2 minutes each.
Andrew Burleson tells how his team gamified their bug-tracking process and got their backlog to zero. 5 minutes to read.
Johanna Rothman rethinks her support for generalizing specialists, as teams become more effective at collaboration. 3 minutes to read.
Tamás Török interviews Katie Womersley, VP of Engineering at Buffer, on managing remote developer teams. 11 minutes to read.
Mike Clayton explains emotional intelligence, from its academic origins to the details of Daniel Goleman’s model of the associated skills. Video, 6 minutes, safe for work.
Ash Carter, former US Secretary of Defense, shares five lessons on managing high-stakes situations. 6 minutes to read.
Andy Kaufman explores the first rule of conflict: don’t make things worse. Video, 2 minutes, safe for work.
Research and Insights
Cassie Kozyrkov introduces us to a new academic discipline with powerful business implications—decision intelligence. 13 minutes to read.
Igor Piatnytskyi digs into data security from a business perspective. As in most things, we need to prioritize in order to maximize value. 7 minutes to read.
Aaron Gershwin provides a nerd-level explanation of the Stuxnet virus, possibly the most sophisticated cyber weapon ever discussed in public. 7 minutes to read.
Working and the Workplace
David Dye tells us how to talk with the boss when we totally disagree on something. 5 minutes to read.
Leigh Espy coaches us on applying the Osborne-Parnes creative problem-solving process. 7 minutes to read.
Suzanne Lucas got stuck in the middle of a zip line. She then realized that it was a metaphor for her career. 3 minutes to read.