Home > Articles > Business & Management

This chapter is from the book

Planning the BI Project

Project planning is not a one-time activity. Since a project plan is based on estimates, which are frequently no more than best guesses, project plans must be adjusted constantly. The number one telltale sign that a project is not being managed is a static project plan on which estimates and milestones have never changed from the day they were first developed.

Here is the sequence of activities for preparing a project plan.

  1. Create a work breakdown structure listing activities, tasks, and subtasks.

  2. Estimate the effort hours for these activities, tasks, and subtasks.

  3. Assign resources to the activities, tasks, and subtasks.

  4. Determine the task dependencies.

  5. Determine the resource dependencies.

  6. Determine the critical path based on the dependencies.

  7. Create the detailed project plan.

Activities and Tasks

BI projects are composed of many activities, each with a long checklist of tasks. Regardless of how experienced the project manager is, it is impossible for any person to remember all the tasks that need to be performed on a BI project. At a minimum, the project manager must rely on some existing comprehensive list of the most necessary activities. Naturally, not all activities have to be performed on every project. Not even every step has to be performed on every project. The project manager selects the minimum number of steps and activities needed to produce an acceptable deliverable under the imposed constraints.

Table 3.3: Issues Log

Issue No.

Issue Date

Issue Description

Assigned To

Action Taken

Action Date

Resolution

Closed Date

001

7/23/2003

Delay of server installation expected. Problem with supplier. Impact on project deadline could be one month or more.

Bill

Met with Ron Leard from tech. support to discuss alternatives. He may be able to switch to another supplier. Follow-up in one week.

7/24/2003

Switched suppliers. Delay to the project schedule: only three weeks. Delay accepted by Robert Black (sponsor).

8/21/2003

 

 

 

 

Received call from Ron Leard. He will be able to get a server from another supplier. Delivery date is in one week.

7/31/2003

 

 

 

 

 

 

Called Ron Leard. Server is installed and being tested. Expected to be available next week.

8/14/2003

 

 

 

 

 

 

Received call from Ron Leard. Server is available.

8/21/2003

 

 


The development approach in Business Intelligence Roadmap is neither as linear nor as rigorous as that followed in traditional methodologies. It is a much more dynamic approach to application development. When using our development approach, it may often look and feel like you are working on a prototype—but it is not a prototype. The same discipline applied under a traditional methodology must be applied to BI projects in terms of controlling scope, mitigating risks, and time-boxing weekly activities. (Time-boxing refers to planning, assigning, and managing activities on a detailed level in weekly increments.) Despite the discipline, you must expect constant rework during the development cycle and build time for it into the project plan. For example, analysis activities can show up on your project plan as early as Step 3, Project Planning, and as late as Step 12, Application Development. Or you may want to plan another short iteration through database design activities during Step 11: Extract/Transform/Load Development.

The project plan must reflect this dynamic nature of application development. Since changes and setbacks are to be expected, certain "completed activities" will have to be revisited and reworked. The project plan should anticipate that and reflect it on the schedule. The easiest way to plan for these internal iterations is to use the concept of "looping" or "refactoring" by dividing the project into multiple small subprojects, each with a deliverable, albeit not completed. Then revisit and revise each deliverable, adding more data and more functionality until the entire BI application is completed with the desired deliverable. This iterative refinement approach gives the project development effort the feeling of prototyping.

Estimating Techniques

Once you have selected the activities and tasks for the project and organized the project into subprojects, you can derive the base estimates by using one of three methods:

  1. Historical, based on learned patterns (how long it took on the last project)

  2. Intuitive, based on intuition and experience ("gut" estimating)

  3. Formulaic, based on the average of possibilities (Figure 3.2)

    Figure 2Figure 3.2: Formula-Based Estimating

Estimating BI project activities is much more difficult than estimating traditional projects because no two BI projects are alike. For example, you may use a new tool, work with new team members, or have no experience with a new design method. All three estimating techniques listed above expect you to relate to some prior project experience.

The historical estimating technique expects you to have statistics on how long similar projects took in the past—but you may not have had a similar project before.

The intuitive estimating technique expects you to predict, or guess, based on prior experience how long it will take to complete a similar activity—but you may have never performed a similar activity.

The formula-based estimating technique expects you to know the longest time it may take to complete an activity, the shortest time, and the most probable time—but you would not know what the longest, shortest, and most probable times for an activity could be if you had never performed that activity before.

In all those cases, it is best to consult with other people (in-house staff or outside consultants) who have already developed a similar BI application because your own uneducated guesses may be gross underestimates. This also demonstrates how important it is to track actual time on BI projects. You will need that information for estimating your next BI project.

Resource Assignment

Effort estimates cannot be completed until the activities and tasks are assigned because the estimates must take into consideration each team member's skills and subject matter expertise as well as the environmental factors that affect him or her.

Skills—the ability to perform specific tasks. Has the team member done this type of work before?

Table 3.4: Environmental Factors That Can Affect Team Members' Availability

Administrative Factors

Non-Work-Related Factors

Lack of computer access

Vacation

Time required to troubleshoot other systems

Illness

Meetings

Jury duty

E-mails and in-baskets

Personal time off

Training seminars

Medical appointments

 

Religious holidays


Subject matter expertise—the possession of facts or concepts about a specific subject matter. Is the team member an expert in this business area?

Environmental factors—administrative and non-work-related activities. Table 3.4 lists some examples.

Task Dependencies

Not all activities and tasks have to be performed serially—many can be performed in parallel as long as there is sufficient staff. The first step in determining which tasks can be performed in parallel is to identify task dependencies and develop the critical path. Most project-planning tools support the four types of task dependencies (Figure 3.3). Finish to Start and Start to Start are the most common task dependencies; Start to Finish is the most infrequent.

Figure 3Figure 3.3: Task Dependencies

  1. Finish to Start indicates that Task 2 cannot start until Task 1 finishes.

  2. Start to Start indicates that Task 2 can start at the same time as Task 1.

  3. Finish to Finish indicates that Task 2 cannot finish until Task 1 finishes.

  4. Start to Finish indicates that Task 2 cannot finish until Task 1 starts.

The more tasks that can be performed simultaneously, the faster the project will get done. To take advantage of task dependencies, you need the right number of resources with the right skills at the right time.

Resource Dependencies

A shortage of staff can quickly reverse the benefits of having few task dependencies. For example, tasks that could have been performed in parallel but cannot be assigned to multiple staff members because of a staff shortage must revert to being executed in sequence. Figure 3.4 shows how four tasks can be accomplished in 10 days with adequate staffing; Figure 3.5 shows that it will take 14 days to complete the same tasks if only one person is available to work on them. (Note that in Figure 3.5 the time required to compile the findings is reduced by one day because there is no longer a need for two analysts to collaborate.)

Figure 4Figure 3.4: Elapsed Days When Two People Can Work on the Tasks

Figure 5Figure 3.5: Elapsed Days When Only One Person Is Available

Critical Path Method

Once you have identified the task dependencies and leveled the resources (that is, assigned the tasks and adjusted the dependencies for the available resources), use the critical path method (CPM) to outline task duration, indicating any lag time for tasks not on the critical path (Figure 3.6). This provides the visibility needed to reassign resources or to renegotiate project constraints.

Figure 6Figure 3.6: Critical Path Method

In this example, the task "Identify resources available" can be performed in parallel with the tasks "Analyze cost-benefit of new project" and "Determine critical success factors." Since the task "Identify resources available" is estimated to take 4 days, and the other two tasks combined are estimated to take only 3 days, the task "Identify resources available" is on the critical path. If this task were to take 5 days to complete instead of 4, it would delay the milestone "Project approval" by one day. However, if either of the other two tasks were delayed by one day, it would not affect the milestone "Project approval."

Project Schedules

Once you have determined all the tasks, resources, dependencies, and estimates, you can schedule the project on the calendar. The most common and most familiar representation of a project schedule is a Gantt chart. Figure 3.7 shows an example.

Figure 7Figure 3.7: Example of a Gantt Chart

Creating a useful project plan requires some effort, but maintaining the project plan (adjusting it) is not as labor intensive as it used to be prior to the availability of project management tools. Becoming proficient on a sophisticated project management tool takes some time and requires a solid understanding of project management principles.

Once you key into the tool all the planning components (e.g., tasks, estimates, resources, dependencies), any adjustments you subsequently make to the components automatically cascade through the entire project plan, updating all charts and reports. Although the results must still be reviewed and validated, an experienced project manager who is skilled on the project management tool does not need to become a slave to the tool or to the project planning activities.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020