Assessment Description (178 words. Pls not more than 180 words max)
Please write on SCRUM only. Question 3 only. Thanks.
This is a Collaborative Learning Community (CLC) assignment.
According to the textbook, there are more than 8,000 project management methodologies from which to choose. So, how do IT project teams know which one is right? Teams that successfully use a vision statement to adopt a project management methodology have an 89 percent chance of completing the project. IT project teams that struggle with the connection of the vision statement to the methodology are only 36 percent successful. The Project Management Institute (PMI) estimates that a poor relationship between vision statement a methodology can cost over $109 million for every $1 billion invested in IT projects and programs.
When the IT project teams develop a relationship between the vision statement and a selected project management methodology, relationships are successful. Choose 2 project management methodologies to research, one primary and one alternate from the list below:
Create a 3slide digital presentation highlighting your vision statement from the Topic 1’s “CLC-IT Project Discovery and Selection” assignment and your selections from the list above.
Within the speaker notes, address the following for the primary and alternate methodologies in 178words using solid research:
- Explain the importance of using an IT project vision statement to develop or select an existing project management methodology.
- Explain how each of the chosen methodologies connects to the vision statement.
- Discuss how each of the chosen management methodologies will help to initiate, plan, execute, monitor, control, and close the IT project. (FOR SCRUM ONLY)
- Title slide, reference slide, and presenter’s notes.
vision statement from the Topic 1’s “CLC-IT Project
Project Proposal – On-premises Data Center Upgrade & Cloud Migration
Vision Statement.
The project team updates the current on-premises data then migrates it to a cloud provider, ensuring optimal functionality throughout the migration, and resulting in increased data access and security.