SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Andrei Dragota
An I master TI
The Critical Chain/Buffer Management (CC/BM)
approach originally introduced by E. Goldratt in his novel
“Critical Chain”, written in 1997 as an application of the
“Theory of Constraints”, is a project management
technique that introduces some novel ideas on top of the
well-known and generally accepted resource-constrained
project scheduling principles. It introduces the idea of
buffering projects, rather than individual activities, in a
clever way in order to guarantee that the project deadline is
met, and can therefore be considered as a new approach to
assure better project control through project and feeding
buffer management.
This presentation gives an overview of the Critical
Chain/Buffer Management (CC/BM) approach of project
scheduling and will be briefly explained along the
following six steps:

o   Step 1. Come up with aggressive estimates
o   Step 2. Construct an ALAP schedule
o   Step 3. Identify the critical chain
o   Step 4. Determine appropriate buffer positions
o   Step 5. Determine appropriate buffer sizes
o   Step 6. Insert buffers into the schedule
Based on the general idea that the protection of the
project deadline is the primary goal rather than the
protection of each individual project activity, the activity
durations should be set to an aggressive estimate to avoid
that the work of an activity is smoothed out over a longer
duration than really necessary. Goldratt mentions three
main reasons why project activity durations often are
smoothed out over longer durations, as follows:
 o Murphy’s law: If something can go wrong, it will
 o Student syndrome: Wait until urgency
 o Parkinson’s law: Work expands to fill the allotted time
  Aggressive time estimates refer to time estimates where
the probability of exceedance is relatively large, e.g. the
50% percentile.
In contrast to the commonly used earliest start
scheduling approach mostly used in traditional project
management and scheduling , it is suggested to schedule
each project activity as-late-as-possible nearby its
predefined project deadline. This latest start schedule is
quite risky since it makes every project activity part of the
critical path which might put, in combination with the
aggressive activity time estimates, the project deadline into
danger.
Similar to the critical path concept that distinguishes
between critical and non-critical activities, a resource-
feasible project schedule has a so-called critical chain
defined as the longest chain in the project that determines
the total project duration. The main difference with the
critical path concept is that it takes the limited availability
of renewable resources into account.
The new idea of the CC/BM technique lies in the clever
positioning of buffers to protect the project deadline
through the use of three types of buffers. Each buffer has a
specific goal and needs to be positioned at the right place to
protect the right part of the project data, as follows:
 o Project buffer: A unique and single buffer to protect the
    project deadline
 o Feeding buffer: Multiple buffers to protect parts of the
    critical chain
 o Resource buffer: Multiple artificial buffers that act as
    warning signals to assure the availability of resources
Sizing buffers as a way to put safety time in the project is
a crucial step of the CC/BM approach. Both the project and
all the feeding buffers need to be sized appropriately to be
able to act as buffers against delay. Although Goldratt
initially proposed to use the simple 50% rule (i.e. the size of
the buffers is equal to 50% of the duration of the project
activities it should protect), a more clever way should be
used that sizes buffers according to the risk of the activities
it should protect.
Inserting buffers into the project schedule creates a
buffered project baseline schedule that can act as a tool to
measure performance and provides dashboards (i.e. the
buffers) that need to be monitored to trigger corrective
actions.

Weitere ähnliche Inhalte

Was ist angesagt?

Critical Chain Project Management
Critical Chain Project ManagementCritical Chain Project Management
Critical Chain Project ManagementFred Wiersma
 
Project Management Ch11 Project Scheduling Critical Chain
Project Management Ch11 Project Scheduling Critical ChainProject Management Ch11 Project Scheduling Critical Chain
Project Management Ch11 Project Scheduling Critical ChainIzah Asmadi
 
DCMA 14-Point Schedule Quality Check
DCMA 14-Point Schedule Quality CheckDCMA 14-Point Schedule Quality Check
DCMA 14-Point Schedule Quality CheckSHAZEBALIKHAN1
 
Major Projects - Faster Better Cheaper
Major Projects - Faster Better CheaperMajor Projects - Faster Better Cheaper
Major Projects - Faster Better CheaperIan Heptinstall
 
The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...
The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...
The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...Association for Project Management
 
Project Time Estimation 6 Powerful Tips & Tricks
Project Time Estimation 6 Powerful Tips & TricksProject Time Estimation 6 Powerful Tips & Tricks
Project Time Estimation 6 Powerful Tips & TricksSHAZEBALIKHAN1
 
Critical Chain Project Management
Critical Chain Project ManagementCritical Chain Project Management
Critical Chain Project ManagementGreta Blash
 
Interview questions-answers-for-planning-engineers-r.00
Interview questions-answers-for-planning-engineers-r.00Interview questions-answers-for-planning-engineers-r.00
Interview questions-answers-for-planning-engineers-r.00Praveen Krishna
 
SDPM - Lecture 7 - Project monitoring and control
SDPM - Lecture 7 - Project monitoring and controlSDPM - Lecture 7 - Project monitoring and control
SDPM - Lecture 7 - Project monitoring and controlOpenLearningLab
 
MS Project Terminology -Top 20 terms everyone must know
MS Project Terminology -Top 20 terms everyone must knowMS Project Terminology -Top 20 terms everyone must know
MS Project Terminology -Top 20 terms everyone must knowSHAZEBALIKHAN1
 
Most Popular 20 Evergreen Project Management Terms
Most Popular 20 Evergreen Project Management TermsMost Popular 20 Evergreen Project Management Terms
Most Popular 20 Evergreen Project Management TermsSHAZEBALIKHAN1
 
Project Management Tools and Techniques (PERT- Project Evaluation and Review ...
Project Management Tools and Techniques (PERT- Project Evaluation and Review ...Project Management Tools and Techniques (PERT- Project Evaluation and Review ...
Project Management Tools and Techniques (PERT- Project Evaluation and Review ...Zulfiquer Ahmed Amin
 
How Does MS Project Works 6- Task Controlling Factors
How Does MS Project Works 6- Task Controlling FactorsHow Does MS Project Works 6- Task Controlling Factors
How Does MS Project Works 6- Task Controlling FactorsSHAZEBALIKHAN1
 

Was ist angesagt? (20)

Critical Chain Project Management
Critical Chain Project ManagementCritical Chain Project Management
Critical Chain Project Management
 
An introduction to Critical Chain Project Management (CCPM)
An introduction to Critical Chain Project Management (CCPM)An introduction to Critical Chain Project Management (CCPM)
An introduction to Critical Chain Project Management (CCPM)
 
Project Management Ch11 Project Scheduling Critical Chain
Project Management Ch11 Project Scheduling Critical ChainProject Management Ch11 Project Scheduling Critical Chain
Project Management Ch11 Project Scheduling Critical Chain
 
Critical chain project management - Gary Palmer
Critical chain project management - Gary PalmerCritical chain project management - Gary Palmer
Critical chain project management - Gary Palmer
 
DCMA 14-Point Schedule Quality Check
DCMA 14-Point Schedule Quality CheckDCMA 14-Point Schedule Quality Check
DCMA 14-Point Schedule Quality Check
 
Major Projects - Faster Better Cheaper
Major Projects - Faster Better CheaperMajor Projects - Faster Better Cheaper
Major Projects - Faster Better Cheaper
 
The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...
The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...
The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...
 
CSRA Havranek Hostetter Palisade 2012
CSRA Havranek Hostetter Palisade 2012CSRA Havranek Hostetter Palisade 2012
CSRA Havranek Hostetter Palisade 2012
 
TOC instuments for IT projects
TOC instuments for IT projectsTOC instuments for IT projects
TOC instuments for IT projects
 
Project Time Estimation 6 Powerful Tips & Tricks
Project Time Estimation 6 Powerful Tips & TricksProject Time Estimation 6 Powerful Tips & Tricks
Project Time Estimation 6 Powerful Tips & Tricks
 
Critical Chain Project Management
Critical Chain Project ManagementCritical Chain Project Management
Critical Chain Project Management
 
Questions
QuestionsQuestions
Questions
 
Interview questions-answers-for-planning-engineers-r.00
Interview questions-answers-for-planning-engineers-r.00Interview questions-answers-for-planning-engineers-r.00
Interview questions-answers-for-planning-engineers-r.00
 
SDPM - Lecture 7 - Project monitoring and control
SDPM - Lecture 7 - Project monitoring and controlSDPM - Lecture 7 - Project monitoring and control
SDPM - Lecture 7 - Project monitoring and control
 
MS Project Terminology -Top 20 terms everyone must know
MS Project Terminology -Top 20 terms everyone must knowMS Project Terminology -Top 20 terms everyone must know
MS Project Terminology -Top 20 terms everyone must know
 
Pmp6
Pmp6Pmp6
Pmp6
 
Most Popular 20 Evergreen Project Management Terms
Most Popular 20 Evergreen Project Management TermsMost Popular 20 Evergreen Project Management Terms
Most Popular 20 Evergreen Project Management Terms
 
Project Management Tools and Techniques (PERT- Project Evaluation and Review ...
Project Management Tools and Techniques (PERT- Project Evaluation and Review ...Project Management Tools and Techniques (PERT- Project Evaluation and Review ...
Project Management Tools and Techniques (PERT- Project Evaluation and Review ...
 
How Does MS Project Works 6- Task Controlling Factors
How Does MS Project Works 6- Task Controlling FactorsHow Does MS Project Works 6- Task Controlling Factors
How Does MS Project Works 6- Task Controlling Factors
 
Project Estimating
Project EstimatingProject Estimating
Project Estimating
 

Andere mochten auch

Andere mochten auch (9)

Common pond hawk dragonfly presentation slide
Common pond hawk dragonfly presentation slideCommon pond hawk dragonfly presentation slide
Common pond hawk dragonfly presentation slide
 
Planning and facilitating focus groups - University of Cambridge
Planning and facilitating focus groups - University of CambridgePlanning and facilitating focus groups - University of Cambridge
Planning and facilitating focus groups - University of Cambridge
 
Dragonfly Case study
Dragonfly Case studyDragonfly Case study
Dragonfly Case study
 
Apics Pdm Buffer Mgt. 1 09 07
Apics Pdm Buffer Mgt. 1 09 07Apics Pdm Buffer Mgt. 1 09 07
Apics Pdm Buffer Mgt. 1 09 07
 
Case Dragonfly
Case DragonflyCase Dragonfly
Case Dragonfly
 
How to-use-buffer-by-ella
How to-use-buffer-by-ellaHow to-use-buffer-by-ella
How to-use-buffer-by-ella
 
Project Management - Critical path method
Project Management - Critical path methodProject Management - Critical path method
Project Management - Critical path method
 
Critical Path Ppt
Critical Path PptCritical Path Ppt
Critical Path Ppt
 
Project planning and project work plan
Project planning and project work planProject planning and project work plan
Project planning and project work plan
 

Ähnlich wie Critical chain and buffer management

SDPM (Success Driven Project Management)
SDPM (Success Driven Project Management)SDPM (Success Driven Project Management)
SDPM (Success Driven Project Management)Peter Mello
 
PM Session 6
PM Session 6PM Session 6
PM Session 6dmdk12
 
Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...
Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...
Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...HIMADRI BANERJI
 
Project management Using Pert
Project management Using PertProject management Using Pert
Project management Using PertVishnu RC Vijayan
 
Project SizingNo two projects are the same. Projects vary va.docx
Project SizingNo two projects are the same. Projects vary va.docxProject SizingNo two projects are the same. Projects vary va.docx
Project SizingNo two projects are the same. Projects vary va.docxwoodruffeloisa
 
Definition Of Project Management
Definition Of Project ManagementDefinition Of Project Management
Definition Of Project ManagementMostafa Ewees
 
Criticalchainprojectmanagement
CriticalchainprojectmanagementCriticalchainprojectmanagement
Criticalchainprojectmanagementkaton808
 
Complex Project Crashing Algorithm
Complex Project Crashing AlgorithmComplex Project Crashing Algorithm
Complex Project Crashing AlgorithmIOSR Journals
 
PROJECT PLANNING METHODOLOGIES.pdf
PROJECT  PLANNING METHODOLOGIES.pdfPROJECT  PLANNING METHODOLOGIES.pdf
PROJECT PLANNING METHODOLOGIES.pdfSurashmie Kaalmegh
 
UNIT-01_Fundamentals_ Project management
UNIT-01_Fundamentals_ Project managementUNIT-01_Fundamentals_ Project management
UNIT-01_Fundamentals_ Project managementsdbhosale860
 
An Introduction To The Resource Constrained Project Scheduling Problem Solvin...
An Introduction To The Resource Constrained Project Scheduling Problem Solvin...An Introduction To The Resource Constrained Project Scheduling Problem Solvin...
An Introduction To The Resource Constrained Project Scheduling Problem Solvin...Courtney Esco
 

Ähnlich wie Critical chain and buffer management (20)

topic9.pdf
topic9.pdftopic9.pdf
topic9.pdf
 
SDPM (Success Driven Project Management)
SDPM (Success Driven Project Management)SDPM (Success Driven Project Management)
SDPM (Success Driven Project Management)
 
PM Session 6
PM Session 6PM Session 6
PM Session 6
 
Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...
Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...
Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...
 
Module :-5 project scheduling and resource levelling
Module :-5 project scheduling and resource levellingModule :-5 project scheduling and resource levelling
Module :-5 project scheduling and resource levelling
 
PERT
PERTPERT
PERT
 
ch09s.ppt
ch09s.pptch09s.ppt
ch09s.ppt
 
Project management Using Pert
Project management Using PertProject management Using Pert
Project management Using Pert
 
Pm final01
Pm final01Pm final01
Pm final01
 
Pm chapter 5...
Pm chapter 5...Pm chapter 5...
Pm chapter 5...
 
Project SizingNo two projects are the same. Projects vary va.docx
Project SizingNo two projects are the same. Projects vary va.docxProject SizingNo two projects are the same. Projects vary va.docx
Project SizingNo two projects are the same. Projects vary va.docx
 
Rachhu
RachhuRachhu
Rachhu
 
Rachhu
RachhuRachhu
Rachhu
 
Definition Of Project Management
Definition Of Project ManagementDefinition Of Project Management
Definition Of Project Management
 
Criticalchainprojectmanagement
CriticalchainprojectmanagementCriticalchainprojectmanagement
Criticalchainprojectmanagement
 
Complex Project Crashing Algorithm
Complex Project Crashing AlgorithmComplex Project Crashing Algorithm
Complex Project Crashing Algorithm
 
PROJECT PLANNING METHODOLOGIES.pdf
PROJECT  PLANNING METHODOLOGIES.pdfPROJECT  PLANNING METHODOLOGIES.pdf
PROJECT PLANNING METHODOLOGIES.pdf
 
UNIT-01_Fundamentals_ Project management
UNIT-01_Fundamentals_ Project managementUNIT-01_Fundamentals_ Project management
UNIT-01_Fundamentals_ Project management
 
An Introduction To The Resource Constrained Project Scheduling Problem Solvin...
An Introduction To The Resource Constrained Project Scheduling Problem Solvin...An Introduction To The Resource Constrained Project Scheduling Problem Solvin...
An Introduction To The Resource Constrained Project Scheduling Problem Solvin...
 
Ch6 resources
Ch6 resourcesCh6 resources
Ch6 resources
 

Kürzlich hochgeladen

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Critical chain and buffer management

  • 2. The Critical Chain/Buffer Management (CC/BM) approach originally introduced by E. Goldratt in his novel “Critical Chain”, written in 1997 as an application of the “Theory of Constraints”, is a project management technique that introduces some novel ideas on top of the well-known and generally accepted resource-constrained project scheduling principles. It introduces the idea of buffering projects, rather than individual activities, in a clever way in order to guarantee that the project deadline is met, and can therefore be considered as a new approach to assure better project control through project and feeding buffer management.
  • 3. This presentation gives an overview of the Critical Chain/Buffer Management (CC/BM) approach of project scheduling and will be briefly explained along the following six steps: o Step 1. Come up with aggressive estimates o Step 2. Construct an ALAP schedule o Step 3. Identify the critical chain o Step 4. Determine appropriate buffer positions o Step 5. Determine appropriate buffer sizes o Step 6. Insert buffers into the schedule
  • 4. Based on the general idea that the protection of the project deadline is the primary goal rather than the protection of each individual project activity, the activity durations should be set to an aggressive estimate to avoid that the work of an activity is smoothed out over a longer duration than really necessary. Goldratt mentions three main reasons why project activity durations often are smoothed out over longer durations, as follows: o Murphy’s law: If something can go wrong, it will o Student syndrome: Wait until urgency o Parkinson’s law: Work expands to fill the allotted time Aggressive time estimates refer to time estimates where the probability of exceedance is relatively large, e.g. the 50% percentile.
  • 5. In contrast to the commonly used earliest start scheduling approach mostly used in traditional project management and scheduling , it is suggested to schedule each project activity as-late-as-possible nearby its predefined project deadline. This latest start schedule is quite risky since it makes every project activity part of the critical path which might put, in combination with the aggressive activity time estimates, the project deadline into danger.
  • 6. Similar to the critical path concept that distinguishes between critical and non-critical activities, a resource- feasible project schedule has a so-called critical chain defined as the longest chain in the project that determines the total project duration. The main difference with the critical path concept is that it takes the limited availability of renewable resources into account.
  • 7. The new idea of the CC/BM technique lies in the clever positioning of buffers to protect the project deadline through the use of three types of buffers. Each buffer has a specific goal and needs to be positioned at the right place to protect the right part of the project data, as follows: o Project buffer: A unique and single buffer to protect the project deadline o Feeding buffer: Multiple buffers to protect parts of the critical chain o Resource buffer: Multiple artificial buffers that act as warning signals to assure the availability of resources
  • 8. Sizing buffers as a way to put safety time in the project is a crucial step of the CC/BM approach. Both the project and all the feeding buffers need to be sized appropriately to be able to act as buffers against delay. Although Goldratt initially proposed to use the simple 50% rule (i.e. the size of the buffers is equal to 50% of the duration of the project activities it should protect), a more clever way should be used that sizes buffers according to the risk of the activities it should protect.
  • 9. Inserting buffers into the project schedule creates a buffered project baseline schedule that can act as a tool to measure performance and provides dashboards (i.e. the buffers) that need to be monitored to trigger corrective actions.