New York University

Computer Science Department

Courant Institute of Mathematical Sciences

 

Course Title: Software Engineering                                         Course Number: g22.2440-001

Instructor: Jean-Claude Franchitti                                            Session: 10

 

 

Assignment #4 – Technical Risks and Iteration Planning

 

I.          Due     

            May 1, 2014 at the beginning of class.

           

II.         Objectives

  1. Learn how to identify and mitigate risks.
  2. Learn how to create an iteration plan.

 

Disclaimer: The artifacts created in this assignment will be used to drive forward subsequent technical planning in terms of deliverables. It is therefore important to create and record the artifacts as formally as possible.

 

III.       References

           

  1. Slides and handouts posted on the course Web site.

           

IV.       Software Required

None

 

V.        Assignment

1.      Problem Statements:

 

See Problem Scenarios #1 and #2 outlined in Assignment #2.

 

2.      Technical Risks:

 

For each problem scenario in section 1 above, provide an informal risk list that you believe could “endanger” or “hinder” the timely completion of the project

 

    1. List the technical risks
    2. Define a set of risk mitigation / avoidance strategies that you believe will address the technical risks you have identified.

 

3.      Iteration Planning:

 

For each problem scenario in section 1 above, provide an informal iteration plan documenting the order in which you will deliver the use cases developed in homework #2.  A use case typically represents an individual “unit of work” within a specific iteration, in the majority of cases.

 

a.       Develop a simple iteration plan, in this plan describe the following:

                                                               i.      What use cases will I build in a given iteration?

                                                             ii.      How long will a given iteration take?

                                                            iii.      What activities should take place in earlier / later iterations?

                                                           iv.      What technical resources will I need for a given iteration?

                                                             v.      Which iterations address the most “architecturally significant” use cases? Should they be done earlier or later?

                                                           vi.      What iterations involve the greatest degree of risk? Should they be done earlier or later?

 

VI.       Deliverables

 

  1. Electronic:
    Your assignment files (Assignment4 files) must be emailed to the TA.  The files must be sent by the beginning of class.  After the class period, the assignment is late.  The email clock is the official clock.
  2. Written:
    Printout of your assignment solution.
    The cover page supplied on the next page must be the first page of your assignment file

      Fill in the blank area for each field.       

 

NOTE:

The sequence of the hardcopy submission is:

1.      Cover sheet

2.      Risk list and mitigation strategy documentation for each scenario

3.      Iteration plan for each scenario


Name ________________________  Username: ______________   Date: ____________
            (last name, first name, username is SID)
Section: ___________

Assignment 4 Assessment

Assignment Layout

 

o Assignment is neatly assembled on 8 1/2 by 11 paper.

o Cover page with your name (last name first followed by a comma then first name), email, and section number with a signed statement of independent effort is included.

o Risk lists and mitigation strategies are satisfactory.

o Iteration plans are satisfactory.
o File names are correct.

 

Risk Lists

o Word document.

o Completeness of risk lists for each problem scenario.

o Appropriateness of risk lists for each problem scenario.

 

Mitigation Strategies

o Follow examples provided in session 4 main slide set or sub-topic 1 presentation.
o Assumptions provided when required. 

o Completeness of mitigation strategies for each problem scenario.

o Appropriateness of mitigation strategies for each problem scenario.

 

Iteration Plans

o Follow examples provided in session 4 main slide set or sub-topic 1 presentation.

o Completeness of iteration plans for each problem scenario.


Total points                                                                            ___________________
Professor Comments:





Affirmation of my Independent Effort: _____________________________

                                                                                    (Sign here)