11-1 Critical Chain Project Scheduling Chapter 11 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.

Slides:



Advertisements
Similar presentations
BUS 394 Systems Analysis & Design. What is Information Systems Analysis and Design? A method used by companies to create and maintain systems that perform.
Advertisements

“Critical Chain” Project Management Presentation for KCMPUG March 19, 2003 Dave Higgins Consulting, Inc. Website:
6-1 Goldratt’s Critical Chain  In 1997, Goldratt introduced the Critical Chain Project Management (CCPM) methodology to apply the theory of constraints.
MGMT 483 – Week 11.  The issues involved in developing a project plan and schedule in the face of constrained resources (people or facilities)  Critical.
Critical Chain Project Management
11-1 Critical Chain Project Scheduling Chapter 11 © 2007 Pearson Education.
11-1 ELC 347 project management Week Agenda Integrative Project –4 th part due –Outline of deliverables (posted in WebCT)Outline of deliverables.
Critical Chain Project Scheduling. Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall11-2 Theory of Constraints (ToC) A constraint limits.
Critical Chain Project Scheduling
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall o P.I.I.M.T o American University of Leadership Ahmed Hanane, MBA, Eng, CMA, Partner.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall Day 21.
March 20, Dixie Crow Symposium, Warner Robins, GA Slide 1 Critical Chain Management - Reducing Depot Maintenance Flow Days Scott R. Schultz Mercer.
Project Management Workshop By Jonathan W. Powell, CGFM, PMP.
Importance of Project Schedules
4.0 CRITICAL CHANGE IN PROJECT MANAGEMENT 4.1 Why should there be need other methods for Project Management to replace or change? Given the level of project.
7 – 1 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall. Constraint Management 7 For Operations Management, 9e by Krajewski/Ritzman/Malhotra.
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide
Project Management © Wiley 2007.
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Prentice Hall Chain Rule Section 3.6.
MANAGING PROJECT RESOURCES
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall o P.I.I.M.T o American University of Leadership Ahmed Hanane, MBA, Eng, CMA, Partner.
Five Behaviors That Can Reduce Schedule Risk Getting Started Today Craig Peterson, PMP Multi-Discipline System Engineer The MITRE Corporation Co-Author:
Introduction to the Theory of Constraints (TOC) & Critical Chain Project Management (CCPM) Major Mark McNabb.
Midterm Review SE503 Advanced Project Management.
Critical Chain From “Theory of Constraints” Developed by Elihu Goldratt in 1984 Goldratt – Many of his key ideas were first explained via “business novels”
Quick Recap.
Time-Cost Tradeoffs Time-Cost Tradeoff Example Time-Cost Tradeoff Example (cont’d) Project Duration (weeks)Critical Path(s)Task(s) Reduced Total Direct.
File:CCPGS05 CC present Page: 1 ETXPGS
IS 556 Enterprise Project Management 1IS 556 -Spring 2008 Lecture 2 Apr 7, 2008 //48.
More on Scheduling. Recap of Last Class Activity dependencies are shown through CPM/PERT Chart. Critical path Completion date Slack time in non-critical.
1 Critical Chain From “Theory of Constraints” Developed by Elihu Goldratt in 1984 Goldratt – Many of his key ideas were first explained via “business novels”
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall. Quadratic Equations.
Chapter 6: Project Time Management Information Technology Project Management, Fourth Edition Using Critical Chain Scheduling, PERT, and MS Project 2003.
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Prentice Hall 6.3 Antidifferentiation by Parts.
MEM 612 Project Management Chapter 6 Allocating Resources to the Project.
Scheduling Work I love deadlines. I love the sound they make as they fly by. -- Douglas Adams.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley. Chapter 5 Integration.
Prepared by Scott M. Shafer, Updated by William E. Matthews and Thomas G. Roberts, William Patterson University Copyright 2007 John Wiley & Sons, Inc.5-1.
Critical Chain Method These sides and note were prepared using 1. The book Streamlined: Building Lean Supply Chain Using the Theory of Constraints. Srinivasan.
Critical Chain Project Management. Outline Overview of Theory of Constraints Revisit conventional project management (Critical Path Management) Overview.
1 Allocating Resources to the Project Expediting a Project Fast-Tracking a Project Resource Loading Allocating Scare Resources.
Critical Chain A Novel by Eliyahu Goldratt Copyright 1997.
Critical Chain A Novel by Eliyahu Goldratt Copyright 1997.
SE503 Advanced Project Management Dr. Ahmed Sameh, Ph.D. Professor, CS & IS Critical Chain Project Management.
9-1 ELC 347 project management Day 22. Agenda Integrative Project –Part 5 Feedback Posted –Part 6 (page 378) Due Dec 9 –Completed project plan and presentation.
1 Critical Chain Project Management  A modern approach to dealing with uncertainty in project management (an alternative to PERT)  Developed by Goldratt.
The Inverse Trigonometric Functions (Continued)
Introduction to the Theory of Constraints (TOC) & Critical Chain Project Management (CCPM) Major Mark McNabb.
Scheduling Resources and Costs
Critical Chain Project Scheduling
Section 9.1 Polar Coordinates
Advanced topics in planning and scheduling
Building Exponential, Logarithmic, and Logistic Models from Data
Equations Quadratic in Form Absolute Value Equations
ELC 347 project management
Section 8.3 The Law of Cosines
Section 11.8 Linear Programming
Critical Chain Project Scheduling
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
Mathematical Models: Building Functions
Copyright © 2008 Pearson Prentice Hall Inc.
SE503 Advanced Project Management
Copyright © 2008 Pearson Prentice Hall Inc.
Quadratic Equations in the Complex Number System
Properties of Rational Functions
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
The Inverse Trigonometric Functions (Continued)
Presentation transcript:

11-1 Critical Chain Project Scheduling Chapter 11 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11-2 Theory of Constraints & Critical Chain Project Scheduling A constraint limits any system’s output. The Goal – Goldratt TOC Methodology 1.Identify the constraint 2.Exploit the constraint 3.Subordinate the system 4.Elevate the constraint 5.Repeat the process Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11-3 Variation Common Cause Inherent in the system Special Cause Due to a special circumstance Managers should Understand the difference between the two types Not adjust the process if variation is common cause Not include special cause variation in risk simulation Not aggregate discrete project risks Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11-4 CCPM and the Causes of Project Delay How safety is added to project activities 1.Individual activities overestimated 2.Project manager safety margin 3.Anticipating expected cuts from management time 25% 50% 80% 90% Gaussian (lognormal) Distribution Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11-5 Wasting Extra Safety Margin 1.The Student Syndrome a.Immediate deadlines b.Padded estimates c.High demand 2.Failure to pass along positive variation a.Other tasks b.Overestimation penalty c.Perfectionism 3.Multitasking 4.Path Merging Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11-6 Critical Chain Solutions  Central Limit Theorem  Activity durations estimated at 50% level  Buffer reapplied at project level –Goldratt rule of thumb (50%) –Newbold formula  Feeder buffers for non-critical paths Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11-7 CCPM Changes  Due dates & milestones eliminated  Realistic estimates – 50% level not 90%  “No blame” culture  Subcontractor deliveries & work scheduled ES  Non critical activities scheduled LS  Factor the effects of resource contention  Critical chain usually not the critical path  Solve resource conflicts with minimal disruption Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11-8 Critical Chain Solutions Bob Feeder Buffer Project Buffer Bob Buffers protect constraints and prevent delays Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11-9 Critical Chain Project Portfolios Drum – system-wide constraint that sets the beat for the firm’s throughput – company policy – one person – a department/work unit – a resource Capacity constraint buffer – safety margin between projects Drum buffer – extra safety before the constraint Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11-10 Applying CCPM to Project Portfolios 1.Identify the drum 2.Exploit the drum a.Prepare a schedule for each project b.Determine priority for the drum c.Create the drum schedule 3.Subordinate the project schedules (next slide) 4.Elevate the capacity of the drum 5.Go back to step 2 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11-11 Subordinating Project Schedules Schedule projects based on drum Designate critical chain Insert capacity constraint buffers Resolve any conflicts Insert drum buffers so the constraint is not starved Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11-12 CCPM Critiques  No milestones used  Not significantly different from PERT  Unproven at the portfolio level  Anecdotal support only  Incomplete solution  Overestimation of activity duration padding  Cultural changes unattainable Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11-13