New project management articles published on the web during the week of August 19 – 25. And this week’s video: Mike Clayton summarizes a few of the key points of his new book, Project Governance: A guide for project managers. 10 minutes, safe for work.

Information protection has become more central to the practice and knowledge base of IT project management. I’ve been linking to at least two or three related articles each week under various headings, so I’ve replaced the section Research and Insights with a new topic heading: Cybersecurity and Data Protection. I’ll include content links related to news, techniques, trends, and legislation. I’ve also resurrected the Pot Pourri section to replace Working and the Workplace; expect to find interesting things that didn’t fit any of the more specific headings.

Business Acumen and Strategy

Bob van Luijt explains how the notion of an API—an interface for delivering digital services—became the basis for entire business models. 7 minutes to read.

Bob van Luijt explains how the notion of an API—an interface for delivering digital services—became the basis for entire business models. 7 minutes to read. Jasper Dekker justifies the requirement for autonomous cars to drive like a local. If people in Taipei don’t drive like people in London, why should robots drive like people in California? 3 minutes to read.

Vanessa Bates Ramirez summarizes Peter Diamandis’s presentation on meta-trends at the Singularity University Global Summit. 6 minutes to read.

Managing Projects

Emily Peterson selected some of the Q&A following Steve Marjot’s webinar to discuss the Royal Bank of Scotland transformation journey from traditional project portfolio management to Lean portfolio management. 7 minutes to read.

Ronald Smith follows up his article on misconceptions about Critical Path with a lesson how to avoid a slippery 5 minutes to read.

Kiron Bondale answers the rhetorical question: Does closeout vary between projects following an adaptive, rather than a predictive life cycle? 3 minutes to read.

Luís Gonçalves presents the business case for outsourcing software development, with options, potential mistakes, and management best practices. 16 minutes to read.

Elizabeth Harrin shares her thoughts (and a template) on benefits management. 3 minutes to read.

The nice folks at Clarizen describe the seven integrated characteristics of high-performance agile IT teams. 3 minutes to read.

Leigh Espy shows how to create a Pareto chart, one of the most easily understood visual tools for decision support. 4 minutes to read.

Managing Software Development

Stefan Wolpers curates his weekly list of Agile content, from enabling engineer decision making to estimation to tracking value in an agile transformation. 7 outbound links, 3 minutes to read.

Stefan Wolpers curates his weekly list of Agile content, from enabling engineer decision making to estimation to tracking value in an agile transformation. 7 outbound links, 3 minutes to read. Kristin Jackovny continues her series, explaining how HTTPS works, from encryption to cookies and tokens. With more to come next week! 3 minutes to read.

Johanna Rothman concludes her series on where agile is headed; 8 minutes to read. Her summary of the series is here; 7 minutes to read.

Ashan Fernando describes web application security with a broad view—from external requirements like PCI and GDPR to assessments, code reviews, and audits. 7 minutes to read.

Sounderrajan Seshadri suggests an approach to budget management for agile projects. 4 minutes to read.

Applied Leadership

Alison Coleman coaches us on uniting the multi-generational workforce. 5 minutes to read.

Emily Luijbregts shares four tips for dealing with difficult team members. 4 minutes to read.

Tom Cagely continues his series on saying no, including five prerequisites for safely saying no and a simple process for saying no. About 5 minutes to read both.

Cybersecurity and Data Protection

Bobby Allyn reports on a ransomware attack that hit 22 municipalities in Texas. And Nalneesh Gaur recommends a decision framework for deciding whether to pay. Each 5 minutes to read.

Bobby Allyn reports on a ransomware attack that hit 22 municipalities in Texas. And Nalneesh Gaur recommends a decision framework for deciding whether to pay. Each 5 minutes to read. Joan Goodchild tells us about cyber-risk insurance, another component of a comprehensive risk management program that is growing in acceptance. 4 minutes to read.

Mariarosaria Taddeo and Francesca Bosco make the case for treating cybersecurity like a public good, where the public sector shares in the cost and responsibility.

Ben Dickson reports on the impact of flawed disclosure and reporting of software security flaws. 4 minutes to read.

Pot Pourri

Andy Jordan coaches us on dealing with the disappointments that will come along with our career successes. 7 minutes to read.

Darius Foroux lists seven professional skills that we should develop in order to maximize both our effectiveness and our income. 5 minutes to read.

Esther Cohen tutors us on retention marketing: How to get clients to stay. It’s not just about delivering on time and on budget. 8 minutes to read.

Enjoy!

Share this: Tumblr

Pinterest

Twitter

Print

Facebook

Pocket

LinkedIn

Reddit



Like this: Like Loading...