Solved

MS Project / Change Requests

Posted on 2011-09-13
5
392 Views
Last Modified: 2012-06-21
Hello, my company is implementing a Project (Meaningful Use) using LeanPM. They want to avoid Tasks in MS Project that are less than 8hrs.
Basically under the Monitoring and Controlling Phase.
My question is how to put in a Change Request Structure (Cleanest and Best Practice)?

Real life Steps:
1) Change Request to PM (email)
2) Team Evaluates (1hr meeting)
3) Approval (sign off)
4) Update Project Plans (1hr)

I appreciate the views of some more experience PM's.
Thank you!
0
Comment
Question by:CitySunrise
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 12

Expert Comment

by:Dr. Thomas Henkelmann
ID: 36537786
Hi,

can you shed some more light on this? Is your question about how to get change requests (where ever they are captured) into a Microsoft Project plan?
The initial requirement to not plan below 1 day sounds very reasonable but is more a process and organisational measure than a software issue.

Any additional detail would help!

Thomas
0
 

Author Comment

by:CitySunrise
ID: 36546291

Thomas,
Hello, thanks for looking at the question.
I just want to see how it should look in the Project Plan.
Right now the plan I inherited looks like the following.
And the weeks go on for the length of the Project. so each group is really long.
Is that how other people are doing it?
Maybe but it seemed like there must be an easier way to me.

Change Request  
  Goes to PM
     Goes to PM (week 1)
     Goes to PM (week 2)
     Goes to PM (week 3)
     Goes to PM (week 4)
  Team Evaluates
     (week 1)
     (week 2)
     (week 3)
     (week 4)
  Sponsor Approval
     (week 1)
     (week 2)
     (week 3)
     (week 4)
  Change in Project Plan
     (week 1)
     (week 2)
     (week 3)
     (week 4)

Thanks.
     
0
 
LVL 12

Accepted Solution

by:
Dr. Thomas Henkelmann earned 500 total points
ID: 36557481
Hi, this sounds more like a check list for the weekly CR process. I wonder if you need these 4 steps as separate tasks because you want to either assign different resources to them (if at all) and/or need to update and track them separately. Both would be a level of detail that's difficult to maintain!

Would it work if you insert a RECURRING task into your schedule and have the information about the 4 steps in the notes of the task? Sorry if I'm boring you with this and you tried it already... Insert-recurring-task.docx
0
 

Author Comment

by:CitySunrise
ID: 36587857
thausla,

Thank you!
I think this a a great idea!
I just didn't know how to approach it. And I knew about recurring task but I havn't seen them used this efficiently. Perfect!

Have a great day!
0
 

Author Closing Comment

by:CitySunrise
ID: 36587865
So gald to have a solution to this.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
PMP prep 5 118
Best software for IT issue documentation 4 263
Can I crop a diagram in Visio 2013? 9 2,034
Functionality:  Waterfall vs. Agile 1 150
Article by: x-men
Where used to see Gantt charts for illustrating project timelines, but what if I wanted to visualize passed timed events? Here's how.
"Disruption" is the most feared word for C-level executives these days. They agonize over their industry being disturbed by another player - most likely by startups.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question