60.2k views
4 votes
A resource constraint can be exploited using CCPM methodology by: Determining the priority among projects for access to the drum. Resolving any conflicts if the creation of the capacity constraint buffers adversely affects the drum schedule. Scheduling each project to start based on the drum schedule. Designating the critical chain as the chain from the first use of the constraining resource to the end of the project.

1 Answer

6 votes

Answer:

Determining the priority among projects for access to the drum.

Step-by-step explanation:

An Israeli physicist named, Eliyahu M. Goldratt developed the Critical Chain Project Management (CCPM) and introduced it in his book "Critical Chain" in 1997.

The CCPM is a project management methodology used by managers to better manage a project. The CCPM ensures that the project plan is feasible and immune from any uncertainty or statistical fluctuations.

In the CCPM activity network, there are no milestones and all non-critical activities are performed as late as possible.

A resource constraint can be exploited using Critical Chain Project Management (CCPM) methodology by determining the priority among projects for access to the drum (a system wide constraint).

CCPM adopts the use of drum buffers, so as to ensure extra safety is applied to a project immediately before using constrained resource.

User BrokenBenchmark
by
6.8k points