- Is starting immediately with a “No” a good approach?
- When trying to ask what the end result will look like, is attempting to over-please rather than understand the business goal appropriate?
- Is both the client facing person and the project manager on the same team as the expert?
- Were any attempts made to negotiate for an acceptable best alternative?
- Is this project setup to succeed?
- Is this a productive meeting?
The middle management is a transformational change agent exhibiting industry expertise, business acumen, negotiation skills, empowerment skills, and strategic leadership, according to my post-doctoral TONES research. I present my ongoing observations to demonstrate my commitment to continuous learning. For more games, thought leadership, book, and KOL talks, please visit my site.
Search This Blog
Wednesday, December 30, 2015
Starting the Problem Half solved: Strategic about Successful requirements gathering
Wednesday, September 30, 2015
Abuser Stories:What shouldn't the software do?
The general tendency of the requirements document has predominantly focused on what the software should do. In project charters and scope control documents, sometimes we also write what features will be out of scope. The UML diagrams and use cases discuss how the classes should interface, and modules should interoperate, for instance. The agile paradigm discusses persona approaches drilling down DEEP property for describing backlog features and INVEST principle elaborating on the characteristics of a user story. Even test cases that focus on negative testing use a requirement traceability matrix to the requirements limitedly testing the functionality of what a system shouldn't do.
But, when a system is hacked or inappropriately accessed, the loopholes rests on the inefficiencies in how the system was designed to allow such loopholes to exist. So, how do you avoid these vulnerabilities so that the hacker doesn't exploit these "working as designed" gaps?
While volunteering at the Agile 2015 conference, I chose to attend a section on Abuser stories by Judy Neher from Celebrity Technical Services. It was a great session introducing the concept that a persona of a hacker or disgruntled employee could potentially have a malicious intent to deliberately break the system. The speaker suggested describing user stories that specifically could break the system or expose the system for malicious intent. The participants in an activity gave examples for a simple user authentication such as the stringent password recycle policy, the use of a double password and picture identification, the use of external devices such as phone, email, or mobile texting to use tokens for validation within a short timeframe before the account is locked, the creation alerts for maintenance for incorrect and frequent access to multiple accounts, the enforcement of HR exit policies on employment dates before the role based access can be authenticated, the validation of human versus robot logging by tracking the speed of password entry, etc. Imagine having such stories to bulletproof the system against malicious attacks on standard user stories and have automation capabilities to constantly check for these loopholes.
I am sure one would say that this would add more time to the scheduled release or limit the stories written per iteration/sprint. Of course, like non-functional stories that add some time, the abuser stories also will add time. The need to develop hunches on the type of regulations in the industry, the type of technical platforms used, the time to market considerations, etc. However, the question shouldn't be whether to do them or not but when to do them. If we fail to do them, we are increasing the technical debt. A couple of alternatives are to dedicate a sprint or a portion of every sprint to address these abuser stories.
I really think this is an important component of combined technical and product ownership to ensure we see the persona of other types of users and see the system from that view. As good project managers turn assumptions into risks and control quality, the technical and product owners should be accountable for products that preclude vulnerabilities by design. Abuser stories are a great start. Don't you think so? Share your thoughts.
References
Neher, J. (2015). Abuser Persona. Agile 2015 Conference.
Sunday, August 30, 2015
Attention or Time Management
Flying over India returning from Mumbai to Chennai, I was browsing the Jet Airways magazine. Often filled with travel recommendations and shopping suggestions, these in-flight magazines have only created a browsing pleasure. But this magazine had a topic on achieving more with less perking my interest to explore.
It was an interesting read as the article began discussing how time management pretty much shouldn't be the focus of smart managers. Instead, the article focused on attention management. Based on the time of the day, people can manage difficult tasks that require deep thinking, strategy, etc. when their attention to detail is at its peak. Then, as the energy winds down, their attention takes a deep dive. This time should be used for tasks that require less critical thinking. Between these extremes is the reactive attention seeking time zone that should be used for other tasks that require a balance of the two.
I agree that it is a good idea and that tasks require different levels of thinking. For instance, planning for the project, evaluating strategies to grow accounts, or grooming the product backlog with new features based on the market and reactions from customers and users require thinking different from task or resource management.
However, the article said the urgency of the tasks shouldn't be a criterion for attention management. This begs some thinking as depending upon the role of an individual manager, the urgency of the task, such as a grieving customer on the phone, an infrastructure deficiency leading to business continuity management, or a delayed or poor-quality work impacting deployment readiness of a project is not something that can be ignored.
The earlier approach on using Scrumban to think a couple of steps ahead and plan can be combined with attention management to better compartmentalize take at hand and energy/attention requirements to better manage productivity.
Thoughts?
Monday, March 30, 2015
Value of Microsoft Project Schedule in Agile Environment
Saturday, January 31, 2015
Risk Managemeent: Key to Advancing into Program Management
The Project Management Institute (PMI) introduced the principles behind program management with a critical focus on maximizing benefits. Often project management focuses on controlling scope and schedule using available workflow tools that they miss an important component of not understanding the value of the project on a larger scale.
The question to ask here is what role did the project play in increasing the value to the performing organization, customer, and the society? When we think about this and focus on the benefits, we step into the next stage of ensuring the project risk is constantly monitored. There are various tools to managing risk but constantly keeping focus and most importantly the risk register.
Understanding these risks is a critical element to the next stage called program management. Why? This is because the program management focuses on what an individual project can't deliver. The impact on value maximization is high in program management. If the risk is not more actively monitored, there will be too many interproject dependencies that may impact these projects more. So, when advancing to program management, active risk management is critical and is a sine qua non for project management excellence.
Furthermore, risk management is at the epicenter of value management. While project management focuses on delivering products, services, or results, program management focuses on benefits delivery. Since the extent to which businesses and customers derive the benefits describes value, in delivering products or benefits, lean principles advocate flow by avoiding delays. As the day passes, value should be incrementally built. Even when the project may not have been launched and the anticipated benefits realized, we monitor the progression of work so that projects don’t slip, tasks don’t wait, or decisions are not delayed. From the discipline of earned value management, this is why we even look at the 'value' earned in a snapshot in time!
One thing that I was very proud of in my current workplace is that there was an all-hands meeting from all account managers, project managers, development representatives, script writers, creative artists, testing team, and operational team members. The project management team was responsible for holding this meeting on a weekly basis at a predetermined time on Tuesday with remote representatives and traveling account managers on the telephone bridge. This meeting served as the 'synchronization' meeting where everyone synched on raising their part of the risks and issues as well as the impact to the project, client, and the revenue to be recognized by the company! Everyone was willing to pivot accordingly because there is only limited capacity of time/resources available!
Now, will synchronization alone contribute to seamless value flow? Let us see. While each team had their independent meetings to discuss what was in their backlog. The creative team had a weekly meeting to discuss department specific projects and client specific projects. The development team had its daily standup with the onshore and offsite engineers. The account management team had their own retreats (that's the name they used) to discuss client and deal with specific issues. So, each team had its own cadence on when to meet, what to discuss, etc.
Therefore, although both cadence and synchronization were present, some of the challenges that we repeatedly discussed in the synchronization meeting emphasized that there were other forces at play impeding value flow. The most common things that came up are the following:
- Lack of Visibility: There was no combined backlog or a visible backlog of what happened inside every team. If a team discussed a new project that is slowing work for other initiatives, that was a surprise!
- Multitasking: Some teams had a single person working on multiple things. For example, a creative artist was assigned to more than project extending the amount of time taken for both projects. This diffused the need for more resources required to meet the increasing demand. Delays in projects slowed value delivery and revenue recognition.
- Size of the Work Commitments: Some work commitments made were large. There was not enough questioning of the estimates to the commitments made. Sometimes, there was only one single person available to do such work introducing the key candidate risk.
- Complicated Workflow: Some review and approval steps in the process were unnecessary, increasing the amount of time taken for people to wait on those steps. The time zone and the manual processes fueled this fire further.
I believe value is proportional to the waste reduced (value = f (waste reduced)). Some of these value blocking forces causing waste are common in many companies. We tried to address it by having cross-functional representatives in other cadence meetings, consolidating tools on a single ALM tool, introducing role-plays with team members rotating with others, and reviewing steps in the workflow to minimally required to ensure compliance. What other techniques could have worked? Please share.
Monday, June 30, 2014
RACI: An important tool to manage project outcome and stakeholder expectations
A few
years back in a 2-day workshop on organizational strategy to structure, I saw
the facilitator came up with the RACI chart and fumble on the RACI explanation
confusing “A” in RACI to “Aid.” In a different situation, the vice president of
a client management group was referring to giving copyrights to his manager for
coming up with the RACI model. Recently, when I saw the RACI matrix for a
process map on a sales-to-execution role definition, I saw processes where the
same owner was both responsible and accountable and some areas where there was
no person was identified as accountable. The more I am in management, the
more I am feeling that key important stakeholders should become trained on
fundamentals of project management, such as the tools associated with Project
Management, so that they can position the projects for success and even
inadvertently don’t derail the projects.
There are several reasons why a RACI chart is required. The most common ones include when the organization is large enough that simple project communication tools alone would not eliminate role ambiguities efficiently controlling costs to the organization. The subtle reason for requiring a RACI becomes essential when the organization is siloed where several members are working on similar tasks creating waste and not making the organization lean. From a project, program, product, & portfolio management perspective, this RACI tool surfaces to the top of managing risks to these strategic initiatives as middle management wonders if they have the authority to implement their job or projects experience schedule slippage, scope creep, cost overrun, and escaped defects.
So, how does this manage strategic initiative from project to portfolio management? Now that we realize the importance of the tool, let us ground our thoughts here in relating this tool to stakeholder and risk management. Here are my thoughts!
Role |
Description |
Stakeholder |
Responsible |
The individual performing an activity. |
This
person does the work. It may be a developer, tester, data analyst, or network
administrator in software development or a project manager in a project. In the Power-Interest grid, the R members are mapped to the "Keep Informed" (Low Power, High interest) quadrant for the most part. |
Accountable |
The
individual ultimately accountable. |
This
person is answerable to the management in managing the client and the
project’s profitability. An account manager, product manager, project
manager, executive sponsor, functional manager are all examples. This person
should also use the risk register effectively by mapping the risk owner to the
RACI. In the Power-Interest grid, the A members are mapped to the "Manage Closely" (High Power, High interest) quadrant for the most part. |
Consulted |
The
individual required to offer input and contribute to the activity. |
This
person offers 2-way communication and is a domain expert. This person should
hold both “Responsible” and “Accountable” person in check if only they consult.
This person alternative risk management techniques like the root cause
analysis, force field analysist, and SWIFT (Structured What If Thinking)
promoting thoughts that may otherwise be missed impeding flow. May be able to
roll up the sleeves to do what these above roles should do. Can take on the
roles of Director, Proposition Manager, Business Architect, Project Manager,
etc. In the Power-Interest grid, the C members are mapped to the "Keep Satisfied" (High Power, Low interest) quadrant for the most part. But they could also come from any other quadrant. |
Informed |
The
individual that needs to be informed of the decision and its impact. |
These
are the people that PMBOK calls as stakeholders that can be positively or
negatively impacted by the project’s outcome. These stakeholders must be
managed so that unnecessary escalation and project derailment does not
happen. The “Informed” is not limited to organizational employees and
business units but customers, vendors, partners, and end-users depending upon
projects or product’s goals. In the Power-Interest grid, the C members are mapped to the "Monitor Marginally" (Low Power, Low interest) quadrant for the most part. But they could also come from any other quadrant. |
Every tool in the Project Management Book of Knowledge is so critical that it has its place in managing the project’s outcome. Understanding its purpose and utilizing it appropriately is critical to any organization’s job. RACI is an important asset to any management to eliminate waste, increase efficiency, and enhance stability.
Now, how do you foresee its use in your organization, business unit, and product or project management? Share your thoughts!
References
Project Management Institute (2013). Project Management Book of Knowledge. Fifth Edition. New Town Square, PA: Project Management Institute.