Traditional PM

Project management chart with arrows, and abstract background

Resources for project managers following traditional processes and methodologies.


Fresh from the web

Last Friday I published a long list of books that I referenced in a recent presentation. A reader asked if I might narrow the list. Here are my top five recommendations from that… Continue reading → [...]

Because data security has become a top concern for most businesses, the primary debate is now focused on which techniques are best for achieving your ultimate goal. Risk assessment methods and programs should be key components of your security plan, as they guide your team in establishing a strong framework for compliance. In addition, effective risk assessment methods allow your business to be better prepared for emergent risks and changes to compliance regulations.To help your security [...]

Check out some of the interesting things being said and delivered via PM and business strategy this week!Check back every week for more interesting content... and feel free to suggest content through my contact form. [...]

I heard this the other day – can’t remember where.But the concept of the statement is great. Someone is inspired to be better due to someone else’s excellence or perceived excellence. How would you like to hear this statement made to you? Especially from someone you know and respected. It would be great. What a boost. Perhaps almost life changing. If you agree then don’t be stingy with your compliments. You like how hard your kids are working on a task or chore? Tell the [...]

​An increase in cybersecurity threats characterizes the growth of an organization. As such, institutions endeavor to improve their risk management techniques to ensure that all the information is protected from malicious individuals. One such measure involves the automation of most of the company’s documentation processes to comply with various security regulations.The rapid evolution in technology has been utilized by cybercriminals to develop sophisticated techniques to phish data [...]

Whatever you do, don’t criticize or correct. You might damage someone’s self-esteem. (Sarcasm intended.) Bolstering, maintaining, and protecting self-esteem is the sacred cow of modern society. It’s a grievous evil to do anything… Continue reading → [...]

It’s not about doing your best. It’s about doing your best for someone else. Since reading, “High Performance Habits, by Brendon Burchard, I’ve been paying attention to the reasons leaders do what they… Continue reading → [...]

Critical chain is not dead, but after many years of it being the primary technique for analyzing schedules and prioritizing tasks, there’s a better alternative today.  As many project managers increasingly abandoned the much-hated, cumbersome to maintain, too long, and unclear Gantt chart, they subsequently discontinued using critical chain. A typical Gantt chart could easily […] The post RIP Critical Chain?   appeared first on Proggio. [...]

The code of tribal wisdom says that when you discover you are riding a dead horse, the best strategy is to dismount. In the [project office], we often try other strategies with dead horses, including the following: Buying a stronger whip; Changing riders; Saying things like ‘this is the way we’ve always ridden the horse; Appointing a committee to study the horse; Arranging a visit to [...]

MindGenius 2019 is ready. The best mind mapping tool for your project needs just got better and it's time for you to see how it can help you work and plan better.The big focus in MindGenius 2019 is on new ways you can share MindGenius content.Social Media SharingNow you can send a picture of a MindGenius map directly to Twitter or Facebook, automatically generating a post.Sharing Maps with the MindGenius CommunityIf you have a map that could be useful to other MindGenius users, now it’s ea [...]

Visit our Facebook page