Which document should list and describe all of the deliverables required for the project?

An Architectural Design Approach

Anthony C. Caputo, in Digital Video Surveillance and Security (Second Edition), 2014

Project Management

Project management provides direction, monitoring, and control of all project personnel, including the customer. This is a valuable addition to the overall project in maintaining timely project communications and reporting and avoiding scope creep. Here we discuss the various activities and tasks required to manage a project, with more on how to manage the project in Chapter 10.

Project management maintains project communication among all parties, enforcing documentation and procedural standards for the project and requiring that players actively participate in project status meetings (in person, online, and teleconferences); preparing, presenting, and submitting status reports, and reviewing and administering the project change control process. If the project is out of scope, it’s up to the project manager to let everyone know and present ideas for how that can be handled.

Successful DVS project managers will review the SOW and associated documents and even if they do not understand the technology and/or meaning, they can decipher the activities and tasks, along with the associated hours and working with the technical engineers to coordinate and manage the technical activities. The project manager should track and monitor delivery of equipment, review inventory, and establish and maintain communication with vendors, suppliers, subcontractors, and technical engineers.

The project manager also takes ownership of the project plan, measuring, tracking, resolving deviations, and evaluating progress against the schedule presented in the SOW and the initial project plan developed during the initiation of the project. At what is sometimes referred to as kick-off meeting, the project manager will introduce the project participants, reviewing project team roles and responsibilities along with the project objectives and methodology. A primary action item for this meeting is the development of a project plan, with the proposed schedule for individual activities and tasks based on responsibilities laid out in the SOW (usually included in some form of an implementation plan), with any milestones and dependencies, security and safety procedures, and security clearances.

An architectural review of the design will be carried out with any limitations and conclusions, inviting and confirming attendance of all intended participants, including various decision-making levels in the security, information technology, and operations management areas.

This is an ongoing activity until project implementation is completed, at which point the project manager leads project closure.

Document Deliverables

The document deliverables include the finalization of the statement of work, requirements definition, work breakdown structure, bill of materials, a final acceptance test plan, and all the documents required during implementation, such as site survey results, proposed schedule, testing results, and training materials. All the required deliverables should be listed in the statement of work, along with their associated costs.

Documentation includes the written materials, work papers, configurations manuals, and other work products that set forth the technical and functional specifications and operating information for the applicable software, deliverable, developed material, or goods prepared for the specific project. See the “Project Documentation Deliverables” section in Chapter 10, “Project Implementation,” for more information.

Read full chapter

URL: //www.sciencedirect.com/science/article/pii/B978012420042500006X

Site Survey

Anthony C. Caputo, in Digital Video Surveillance and Security, 2010

Digital Camera

The site survey typically becomes a document deliverable and as such it requires details on the findings and recommendations. Thanks to digital photography, recording area of coverage, obstacles, discoveries, and specific camera installation locations is fast, cheap, and easy. A single photograph of an obstruction is worth a thousand words of description. Always bring a digital camera whenever doing a site survey.

Digital Camera Power

There you are with your customer, walking the area of coverage where he points out those unique areas that he needs monitored to improve the security and safety of the facility(s). These are very select locations and there are many. Good thing you have your digital camera to record these nuances in the customer's system requirements, but alas, upon pulling out your fancy digital pocket camera, you discover the rechargeable battery is dead. This is why I always carry a spare high-quality digital pocket camera that uses AA batteries and extra batteries.

Read full chapter

URL: //www.sciencedirect.com/science/article/pii/B9781856177474000068

Site Surveys

Anthony C. Caputo, in Digital Video Surveillance and Security (Second Edition), 2014

Digital Camera

The site survey typically becomes a document deliverable and as such, it requires details on the findings and recommendations. Thanks to digital photography, photographically recording area-of-coverage, obstacles, discoveries, and specific camera installation locations is fast, cheap, and easy. A single photograph of an obstruction includes the thousand words of description an image can provide. Always bring a digital camera whenever you’re doing a site survey. It also helps to write notes that cross-reference your photos, to refresh your memory later.

DIGITAL CAMERA POWER

There you are, with your customer, walking the area of coverage where she points out those unique areas that she needs monitored to improve the security and safety of the facility(s). These are very select locations, and they are many. Good thing you have your digital camera to record these nuances in the customer’s system requirements, but alas, upon pulling out your fancy digital pocket camera, you discover that the rechargeable battery is dead.

This is why I always carry a spare high-quality digital pocket camera that uses AA batteries and carry extra batteries with me. I went through two sets of AAs in Dallas just this week.

Read full chapter

URL: //www.sciencedirect.com/science/article/pii/B9780124200425000071

Project Implementation

Anthony C. Caputo, in Digital Video Surveillance and Security (Second Edition), 2014

Project Documentation Deliverables

Status reports are part of the project’s document deliverables. Documentation is an essential part of any project and becomes even more important the more complex the project. Unfortunately, I’ve been thrown into integration situations where there were no documents, diagrams, as-builts, or even manuals for the existing equipment. I had to assume this was a scheduling (budgetary) issue and not a purposeful attempt to conceal information. At that point, reverse engineering was the only means of understanding how the proprietary system worked and whether there was any integration potential.

I believe (and it’s not because I’m an author) that document deliverables are important to all projects for the simple fact that they show the customer all the work that was accomplished for their money. Rarely will there be a customer representative watching each stage or task of the project. Document deliverables record many of those monumental obstacles that were cleared and the numerous decisions, workarounds, and typical issues that are part of any system implementation. There isn’t that much time available for someone who already faces a day full of regular duties and responsibilities to communicate every little decision. The document deliverables show customers that they are getting their money’s worth.

The types of document deliverables vary dramatically and are solely based on the specific requirements of the implementation, but it is best practice to leave (at the very least) a “cheat sheet” of how to use the VMS software. This way, anyone, new or old, can learn how to use the very basic features of the DVS system (if they’re authorized).

Table 10.5 provides an overview of the types of documents that may be required as deliverables, depending on the organization and size of the project.

Table 10.5. Project Documentation and Descriptions

TypeDescription
Administrative documentation Documents pertaining to the administrative operations of the project, including documents for funding, personnel, staffing, equipment licenses and warranties, etc.
Analyses and recommendations Documents describing a specific problem or scenario and the anticipated impact and/or recommended course(s) of action.
Contract management documentation Documents associated with the solicitation, administration, and management of the contractors supporting the project.
Correspondence and communications Documents sent to or received from any organization external to the project, including the sponsor, control agencies, federal stakeholders, counties, advocates, and the public.
Email Critical email is retained, such as important information received from contractors or other outside sources related to the project. Project staff should not use email for formal communication or decision making on the project (because email is a binding contract in a court of law). Any critical email should be archived and noncritical email purged at the user’s discretion.
Plans and processes Documents describing the purpose and approach to the project, including the plans and processes that describe how the project will be executed and managed.
Presentations Documents used in training or briefing project staff, city or county staff, or stakeholders.
Reference materials Documents generated by an external organization that provide insight, guidance, or examples of pertinent information, such as legislation, policy, regulations, handbooks, standards, etc.
Status documentation Documents describing the current status of planned and actual activities for the project, including funding, contract, schedule, issue and risk status, and meeting minutes describing decisions, action items, and concerns.
Working papers Early drafts, notes, or reference materials used to create another document. Working papers may or may not be retained, at the author’s discretion.

Table 10.6 shows several actual documents produced for a number of DVS projects, their descriptions, inputs, and the tools used to create the documents. The use of these documents as part of a DVS implementation is entirely based on the requirements and size of the installation. The larger the size of the install, the more project management will be required to control and monitor the progress.

Table 10.6. Project Document Deliverables

DeliverableDescriptionInputsTools
Design and configuration plan A document that includes the overall design concepts and the individual configurations of the proposed equipment DVS requirements document, statement of work from all stakeholders, all site survey forms and documentation, conceptual design documentation Microsoft Word, Visio Professional
Implementation plan A documented approach to the delivery of the DVS system DVS requirements document, statement of work from all stakeholders, design documentation Microsoft Word, Visio Professional
Detailed project plan A documented task list, calendar timetable (with associated costs for internal use) for completion (produced in Microsoft Project) DVS requirements document, statement of work from all stakeholders, WBS, all site survey forms and documentation and design documentation Microsoft Project Professional and Word
Communication management plan A documented approach to networking maintainability DVS requirements document, statement of work from all stakeholders, WBS, all site survey forms and documentation and design documentation Microsoft Project, Visio Professional, and Word
Quality assurance plan A plan outlining the quality philosophy of the project, its subcontractors, and a detailed approach to ensuring that contractual requirements are met DVS requirements document, statement of work from all stakeholders, WBS, all site survey forms and documentation and design documentation Microsoft Project, Visio Professional, and Word
Risk management plan An account of how risks will be recognized, confirmed, documented, and handled Detailed project plan, DVS requirements document, statement of work from all stakeholders Microsoft Project, Visio Professional, and Word
Project team An organizational chart of all stakeholders, their positions, duties, and responsibilities Project plan, DVS requirements document, quality assurance plan, risk management plan Microsoft Project, Visio Professional, and Word
“As-built” system documentation Detailed documented evidence of the actual installation/integration DVS requirements document, statement of work from all stakeholders, all site survey forms and documentation, conceptual design documentation Microsoft Office Suite
Final acceptance test plan First article testing procedures, confirming system is in operational mode at system launch DVS requirements document, quality assurance plan, statement of work from all stakeholders, all site survey forms and documentation, risk management plan, project plan, conceptual design documentation, as-builts Microsoft Word, Excel, and PowerPoint (if a separate presentation)

Read full chapter

URL: //www.sciencedirect.com/science/article/pii/B9780124200425000101

Project Implementation

Anthony C. Caputo, in Digital Video Surveillance and Security, 2010

Example Tables for Document Deliverables

Below are examples of tables that can be used to track document deliverables.

Version number 2.0
Document name Document and Procedural Standards v2.0
File name 10102010_DocumentProceduralStandards_v2.doc
Repository/Access

NameFunctionApproval Date
Approvers
Customer Approvers

Revision STATUS

VersionDateChanges
1.0 XX/XX/XXX Preliminary draft
2.0 XX/XX/XXX Description of revision

Prepared By: [Author's Name] __________________________________ ________________
Signature Date
Reviewed By: [Project Manager] __________________________________ ________________
Signature Date

A revision status block should be provided for all submitted documents including maps, diagrams, floor plans, and conduit pathway plans. The revision block should identify the revision number/letter, date of revision, a description of the change, the creator of the document, and the person adding the revision change.

Read full chapter

URL: //www.sciencedirect.com/science/article/pii/B9781856177474000093

The Components of TOGAF Architecture

Philippe Desfray, Gilbert Raymond, in Modeling Enterprise Architecture with TOGAF, 2014

3.5 Deliverables

3.5.1 Description and use

Deliverables play a special role in the progress of an ADM cycle. The approval of deliverables by stakeholders establishes formal consensus and defines a state of results from which future work can be carried out. This does not mean that each deliverable is provided and validated by one single phase. On the contrary, many deliverables are developed over the course of several phases, each progressively adding to and consolidating the deliverable in question. In this case, deliverables can be viewed as the gateways that involve the review and acceptance of outputs from one phase/activity as input into the next. This is the case for the “architecture definition document,” whose different parts are developed during phases B, C, and D for the chapters dedicated to business architecture, system architecture, and technology architecture, respectively.

Deliverables are mostly documents, put together from architecture elements, “building blocks,” and artifacts. However, certain deliverables are represented directly by models. This is the case for the “ABB” deliverable, whose aim is to formalize an architecture model.

TOGAF defines 22 deliverables and provides a description and a template for each. As an example, the template for the “architecture definition document” deliverable presents as follows:

Scope

Goals and constraints

Architecture principles

Baseline architecture

Architecture models

Business architecture models

Data architecture models

Application architecture models

Technology architecture models

Rationale and justification for architectural approach

Mapping to the architecture repository

Mapping to the architecture landscape

Mapping to reference models

Mapping to standards

Reuse assessment

Gap analysis

Impact assessment

As we can see (and possibly regret), TOGAF provides a highly succinct description of the document template. It is described more as a typical table of contents, which must be further specified if it is to be effectively used within a particular organization.

Note that this deliverable includes several diagrams from business, application, and technological models.

3.5.2 Deliverables and ADM phases

Table 3.1 presents the main deliverables resulting from the different ADM phases.

Table 3.1. Deliverables and ADM Phases

No.DeliverableADM Phases
L01 Request for Architecture Work Pr
L02 Architecture Principles Pr
L03 Tailored Architecture Framework Pr
L04 Business Principles, Business Goals, and Business Drivers Pr, A, B
L05 Architecture Vision A
L06 Statement of Architecture Work A
L07 Communication Plan A
L08 Architecture Definition Document B, C, D
L09 Architecture Requirements Specification B, C, D, E, F
L10 Architecture Roadmap B, C, D, E, F
L11 Transition Architecture E, F
L12 Implementation and Migration Plan E, F
L13 Architecture contract F
L14 Capability Assessment A, E
L15 Compliance Assessment G
L16 Change Request H

In this table, we have chosen to highlight the major deliverables corresponding to each ADM phase, without taking into account possible updates or adjustments that can always occur in other phases.

We have not included the architecture repository in our table. Although TOGAF classifies this as a deliverable, it is rather an information container, which is only validated through the documents that result from its contents (the same is true for ABB and SBB).

Deliverables linked to architecture work management

The Tailored Architecture Framework (L03), developed during the preliminary phase, plays a special role. Typically, it enables the TOGAF framework to be adapted to the enterprise’s context. It is one of the results of the preliminary phase, which initiates the elements that are to be implemented by transformation projects on different levels: approach, contents, repository, and governance.

The Request for Architecture Work (L01), which results from the preliminary phase, triggers the start of a new ADM cycle. Note here that the response may be negative and the enterprise may decide not to start the architecture change ADM cycle (go-no go).

During phase A, the Statement of Architecture Work (L06) describes all the elements necessary to the organization of the ADM cycle, based on the request for architecture work: management, procedures, cycle planning, and scope.

The Communication Plan (L07), also produced in phase A, provides the internal communication framework: means, tools, and procedures.

Deliverables linked to principles, goals, and requirements

The Architecture Principles (L02), defined during the preliminary phase, establish the general architecture principles that apply to all ADM cycles.

The Business Principles, Business Goals, and Business Drivers (L04) specify the context and goals of an ADM cycle. Initialized during the preliminary phase, they are added to and consolidated during phases A and B (vision and business).

Requirements are recorded in the Architecture Requirements Specification document (L09).

Architecture description deliverables

During phase A, the Architecture Vision (L05) initiates future work by providing a macroscopic and cross-organizational view: goals, requirements, baseline, and target architectures.

The Architecture Definition Document (L08) is the main deliverable of the architecture development phases: B (Business), C (Information System), and D (Technology). In particular, it contains information on architecture (baseline and target), gap analysis, and impact analysis.

Deliverables dedicated to architecture transition

The Architecture Roadmap (L10) results from the development phases B, C, and D and establishes the progression of the transition, the definition of each stage, and macroscopic planning. These elements will be defined by the two following deliverables, during phases E and F.

The Transition Architecture (L11) describes the different stages of transition, and the breakdown of work into work packages, each with its content and dependencies. It also details the architecture expected at each stage.

The Implementation and Migration Plan (L12) provides the detailed schedule, implementation project, resources, and budget.

Deliverables linked to implementation

Architecture contracts (L13) formalize implementation project commitments with regard to the architecture board (phase F).

The results of compliance reviews are recorded in the Compliance Assessment document (L15). These reviews are conducted during phase G.

Once the new architecture has been deployed (phase H), Change Requests (L16) can be sent to and assessed by the architecture board.

Read full chapter

URL: //www.sciencedirect.com/science/article/pii/B9780124199842000033

Towards an Adaptive e-Assessment System Based on Trustworthiness

D. Baneres, ... X. Baró, in Formative Assessment, Learning Data Analytics and Gamification, 2016

3 Adaptive Trust-Based Model

In this section, we define an adaptive trust-based model that measures the level of confidence (or trust level) of the learner. The measurement is performed by analyzing evidences collected from the learner through different activities and interactions. Such trust level is basically represented as a score, dynamically updated according to the collected evidences during the period of time the learner is in the university.

Evidences stem from analyzing the behavior of the learner during his or her studies. The security mechanisms placed in the VLE, in the assessment activities, and in the FEs provide automatic evidences to update the trust score. Note that, not all evidences come from automatic systems. Instructors could also provide manual evidences from his interaction with the learners.

The model cannot be applied in a straightforward manner throughout a program. The assessment activities and the FEs of individual subjects should be globally designed to deploy different security mechanisms, from on-site face-to-face to fully virtual activities, throughout the program. Each activity may have multiple designs and each design may deploy a different set of security mechanisms. Note that, this adaptation of an activity to multiple designs may be difficult, and one fundamental objective is that the evaluated knowledge and competences should be equivalent for all designs. These designs will be triggered depending on the current trust score of a learner. For instance, an activity may be evaluated using an interview for learners with a low trust score, but just as a deliverable document for learners with a higher trust score.

Fig. 2.1 shows the flow of the model on an assessment activity. During the pre-process activity phase, the score dynamically decides which design of the activity should be performed by the learner based on the security mechanisms that need to be raised depending on the trust level of the learner.

Figure 2.1. Model flow.

At the end of each activity, during the post-process activity phase, each security mechanism outputs different evidences. In the most common scenario, the system cannot definitely decide that an infraction has happened. Often, automated security mechanisms can only provide a probability of infraction depending on the collected data. This probability depends on the learner's actions, since some of them might be flagged as suspicious, but with reasonable doubt. The final probability is used to calculate a partial trust score, which will impact the learner's global score. On the other hand, it is possible that the mechanism detects an infraction beyond any reasonable doubt. In this scenario, there is no partial trust score. A penalty is inflicted on the learner and his global trust score is automatically lowered to 0. Collected evidences are used to justify the penalty to the learner.

Fig. 2.2 illustrates an example of the model behavior through a program. Let us assume a learner starts a program under this model. Therefore, assessment activities have been designed including a broad set of different security mechanisms. The chart shows the evolution of the trust score through different semesters where the Y-axis denotes the learner's global score and the X-axis denotes the semesters. We can observe that each semester has different assessment activities (represented by a dot).

Figure 2.2. Example of application of the model.

When a learner starts the program, the score is set to 0. There is no evidence of confidence. Therefore, the learner should demonstrate through his behavior that the institution can trust him. The subjects of the first semester set up the trust score and the selected security mechanisms through the design of the activities will tend to be strict, that is, an on-site FE or interviews. Given the partial activity scores, at some point, the score could increase. In this case, other types of mechanisms may be used for new activities (see fourth semester in Fig. 2.2), adapting the assessment activities to the learner's behavior.

Note that, the objective of this model is not to penalize learners with a low level of confidence, but rather to benefit learners with higher levels. The designs defined as hard are the default assessment activities in a program without this model. If a learner does not demonstrate any evidence of trust, the standard process of evaluation is followed, whereas a learner with a higher level benefits from other less exhaustive evaluation activities. Based on this idea, this model needs constant information to maintain the score, that is, the score decreases on semesters where the learner is not enrolled in any course (see fifth and sixth semester in Fig 2.2).

Read full chapter

URL: //www.sciencedirect.com/science/article/pii/B9780128036372000026

Which document should list and describe all of the deliverables?

A scope statement should list the products or services that are to be provided at the conclusion of the project, in order to meet the project's objectives. Deliverables should be described in enough detail to avoid confusion or misinterpretation by stakeholders.

Which document describes the project's deliverables and the work required to create those deliverables?

The scope statement details the project deliverables and describes the major objectives. The objectives should include measurable success criteria for the project.

Which document contains a deliverable oriented?

A work breakdown structure (WBS) is a deliverable-oriented grouping of the work involved in a project that defines the total scope of the project.

What documents are used in a project scope?

In short, your project scope document should include:.
Project goals..
Assumptions..
Constraints..
Major deliverables..
Requirements..
Key milestones..

Toplist

Latest post

TAGs