Improving Integrated Master Schedule (IMS) Task Duration Estimates

, , , ,
Improving Integrated Master Schedule (IMS) Task Duration Estimates

One of the top reasons projects fail is because of poor task duration estimating for an integrated master schedule (IMS). Without accurate and consistent estimates, project outcomes can become unpredictable, leading to missed deadlines, budget overruns, and overall project failure. A realistic schedule is required to place the necessary resources in the correct timeframe to adequately budget the work as well as to produce credible estimates to complete and to forecast completion dates. While missed deadlines and budget overruns are detrimental for any project, there can be additional business ramifications when producing schedules in an Earned Value Management System (EVMS) contractual environment.

While there are effective methods available to improve task duration estimates, they are often underutilized. A common reason for this oversight is the lack of time allocated to developing the project schedule and determining task durations.

During the proposal phase, initial durations are typically estimated at a more summary level than the detailed execution phase. The proposed work is often defined at a level one to two steps higher than where the actual tasks will be performed. After project initiation, the team’s initial effort is to break the work down into more manageable tasks. This decomposition is crucial for achieving more accurate estimates. It’s no surprise, then, that the initial breakdown efforts often result in duration estimates that don’t align with the proposed durations.

Parkinson’s Law tells us that work expands to fill the time available. If task durations are excessively long, costs will inevitably rise. To counter this, it’s important to require estimators to provide both the estimated effort and the duration needed to accomplish the task. This approach helps to gain a better understanding of the scope of the task and to avoid unrealistic estimates. If you see a task that requires 10,000 hours with a duration of 2 weeks, then you immediately would suspect something is wrong with the estimates.

Techniques for Developing More Accurate Task Duration Estimates

What are your options? H&A earned value consultants and senior master schedulers often employ the following techniques to help a client produce a more realistic IMS.

  1. Establish a Probability Goal. It is essential to set clear expectations for the estimating team. Without guidance, teams may default to estimates with a 50/50 probability of success, which is a recipe for failure. Instead, directing the team to aim for estimates within a 75% to 80% probability range can lead to better outcomes.
  2. Break Down Tasks. Decompose tasks into smaller, more manageable components. The further out the task’s horizon, the greater the variability in estimates. For example, asking someone to estimate the drive time from Washington, DC, to Boston without specifying the vehicle, route, limitations, or conditions introduces unnecessary uncertainty.
  3. Use Professional Judgment. Engage someone with experience in the specific type of work required for the task. A seasoned expert will provide more accurate duration estimates based on their knowledge and experience. Often, we ask the potential task manager to do the estimate, but that person may not be the one with the most related experience or knowledge about the work.
  4. Leverage Historical Data. If the task or a similar one has been done before, use that historical data to inform the estimate. This approach provides a realistic benchmark for future estimates.
  5. Use generative AI. If you have access to an AI capability along with access to historical data, that could be an option to leverage the source data using specific prompts to glean relevant information. As with all AI tools, always verify the generated results to ensure it is a useful basis to substantiate the estimate.
  6. Apply Parametric Estimating. When possible, use parametric analysis to estimate the durations. For example, if it took a specific number of days to clean up a certain amount of toxic waste under similar conditions, this data can be used to estimate the duration of a new but comparable task.
  7. Engage Multiple Estimators. Gathering estimates from more than one person helps to reduce individual biases and provides a more rounded estimate.
  8. Apply the Delphi Method. This technique involves three knowledgeable individuals providing estimates or three-point estimates. The initial estimates are analyzed, and the results are shared with the estimators without attributing specific values to any individual. After discussing the findings, the estimators revise their estimates based on the collective insights, leading to a more refined and accurate duration estimate.
  9. Use Three-Point Estimates. Ask estimators to provide best-case (BC), most likely (ML), and worst-case (WC) durations, along with their reasoning. Applying a formula like the Program Evaluation and Review Technique (PERT) duration formula (1BC+4ML+1WC)/6 can yield an adjusted and realistic estimate. You can vary the best and worst case estimate for risk if you have information on that.

    To see how this simple approach can work, walk through this exercise. Ask yourself how long it takes you to drive to work most of the time. Let’s say the answer is 45 minutes. Then ask yourself how long it would take on a Sunday morning in the summer when the roads were dry (the best case). Let’s say your answer is 25 minutes. Then ask yourself how long it would take on a Monday morning in the winter during a moderate snow event (the worst case). You tell yourself 90 minutes. Now you have enough information to calculate the PERT duration.

    Best Case = 25 minutes
    Most likely = 45 minutes
    Worst Case = 90 minutes
    PERT Duration = (25 + 180 + 90)/6 = 49 minutes

    Finally, let’s say you ask yourself how likely it is that you end up on the high side instead of the low side. If your answer is it is much more likely to encounter conditions that slow you down, you would modify the formula to use one and a half times the worst case (25 + 180 + 135)/6 = 57 minutes. That longer duration shows the impact of your impromptu risk analysis and provides a duration that has a much higher probability of being achievable.

    Now think about the same scenario but conducted by you interviewing three people who drive the same route to work. That would approximate the Delphi method.
  1. All or something less. It may not be necessary to analyze every task to the degree suggested. Even if you could do the analysis along the top several critical paths that would be an improvement. If you were to apply numerical factors to the tasks in related portions of the project that would be impactful. For example, all mechanical design tasks or all software development tasks.

What is the best approach?

You will need to analyze your project and determine which approach or approaches would yield useful information at a reasonable cost. If you apply your own thinking on how to improve your duration estimates, you will undoubtedly find a method most suitable for your situation. Depending on a project’s complexity and risk factors, you may also find it useful to take a more formal approach. Conducting a schedule risk assessment (SRA), a probabilistic assessment of a project’s outcome, can help you gain a better understanding of where the duration risk exists in the schedule.

H&A earned value consultants and scheduling subject matter experts often assist clients to establish basic guidance to help scheduling personnel to get into the habit of adequately defining tasks and using techniques to improve duration estimates. This is critical to be able to produce well-constructed and executable schedules to improve the likelihood of achieving project technical, schedule, and cost objectives.

H&A offers a range of project scheduling training workshops that can help schedulers to implement industry best practices. These workshops also cover how to take the next step to implement advanced scheduling techniques such as schedule risk assessments to ensure the schedule is realistic and achievable. H&A earned value consultants and master schedulers often provide one-on-one mentoring using the scheduling tool of choice to help scheduling personnel work through the learning curve of using advanced network scheduling techniques to produce executable schedules.  

Call us today at (714) 685-1730 to get started.

Improving Integrated Master Schedule (IMS) Task Duration Estimates Read Post »

Merging Earned Value Management System Descriptions

, , ,

Are there best practices that apply when a company with an approved/certified Earned Value Management System (EVMS) acquires another company that also has an approved/certified EVMS in place? What happens with the EVM System Descriptions as well as related processes and procedures? What about the various project control tools being used? How do you level set the project control proficiency levels of personnel using the EVMS? Schedule and cost level of detail and data architecture also come into play. For example, project performance data is often used at the corporate level for financial analysis, portfolio analysis, and external reporting and may require data to be organized in a specific manner. Is the EVMS providing reliable status, forecast completion date (FCD), and estimate at completion (EAC) information to management? 

What are your options?

H&A earned value consultants have observed different approaches and often assist companies with determining their strategy. Assuming you are the acquiring company, you could:

  1. Require the acquired company to use your EVMS. 
  2. Let them continue using their EVMS for an agreed upon timeframe or indefinitely.
  3. Take the best of both and establish a new and improved EVMS.  

Each option has its pros and cons. There are also other implications for at least the acquired company. DCMA will need to conduct an Integrated Baseline Review (IBR) and/or a compliance review if the acquired company’s EVMS assessment is no longer applicable. If you make significant modifications to your EVM System Description, DCMA will need to review the revised System Description to determine whether it still complies with the EIA-748 Standard for EVMS guideline requirements.

Things to Consider

  • What do you want to achieve?

    If the goal is to establish a common EVM System Description across the corporation, the strategy will need to reflect that. Define the business objectives that clearly articulate the benefits of using a standardized approach that can help to create and implement the plan to achieve your goal. In this example, that could narrow your path forward to either option 1 or 3 depending on the state of your EVMS.

  • What is the state of your current EVM design and System Description?

    Do you already have a best in class corporate level system in place? If yes, option 1 is a good fit. The strategy would be to create a plan to transition the acquired company to your EVMS. A single EVMS is easier to maintain and to train people on how to use it effectively. Commonality makes it easier to move personnel between projects.

    Perhaps your company is fine with different EVM Systems at a business unit level. For example, perhaps the business units have a different customer base (DoD versus DOE), and the requirements are different. In this case, it may make sense to go with option 2. We recommend being prepared to do an in-depth assessment of the acquired company’s EVMS to become familiar with it, gain an understanding of how project personnel use it, and evaluate the quality of the schedule and cost data. It is imperative that you have a good understanding of the strengths and weaknesses of the acquired company’s EVMS. You may find best in class practices that you could incorporate into your EVMS. On the other hand, you may discover issues you need to address with a corrective action plan. Some of them may be as simple as providing desktop instructions for the schedulers or control account managers (CAMs). The more difficult are actions taken to change the culture such as resistance to providing visibility into the data.

    Option 3 may be good path in situations where you know there are components in your EVMS that need to be streamlined or enhanced. It provides an opportunity to fix known issues with your EVM design or System Description. It could also be an opportunity to replace a mix of software tools or home-grown tools with a standard set of commercial off the shelf (COTS) schedule, cost, and analysis as well as risk tools. Integration with a standard Agile tool may also come into play. In this case, your strategy may be to create a working group from both companies to create a best in class corporate EVMS. 

  • Structure of the EVM System Description.

    There may be “layers” to it that makes it easier to accommodate unique business unit environments. For example, perhaps you have established a corporate level System Description that states what the company does to comply with the EIA-748 guidelines when an EVMS is contractually required or what is required to satisfy internal management needs for project/portfolio analysis (no external customer management system or reporting requirements). The corporate level system should define specific rules all business units are expected to follow. The business units define how they comply with the corporate requirements (their specific process). A good approach is to also allow project managers to define project directives to specify project unique requirements as long as they comply with the corporate and business unit requirements.

    In this example, option 1 is a good fit. The strategy would be to help the acquired company to establish revised EVM processes that align with the corporate requirements similar to other business units in the corporation.

Other Considerations

Your strategy and tactical plan must address identified risks and opportunities. A common challenge is resistance to change. A potential risk mitigation approach could be to bring in the acquired company’s personnel as part of a joint corporate management team with the goal to create a single best in class EVMS. It is essential to establish ownership in the new or revised process. An example from one H&A client illustrates the importance of taking ownership in the EVMS as part of a successful transition.

“We didn’t force what we had on them, nor did we give in. We have a corporate EVM System Description. When we acquired the company, we brought them in to do a revision of the System Description, as the decision was made that we will operate as one company. They are now using that System Description and are using the same EVM cost tool. We are working other initiatives to harmonize other systems. It was surprisingly not contentious. We incorporated their leads into the organization with minimal disruption. We also have corporate training, which they supported and some of their legacy folks are leading that. The company as a whole changed, rather than forcing our way on them. Not many major differences between us, but inclusion of the folks from the acquired company as well as business groups was key. Frankly, one of our legacy divisions was harder to work with than anyone from the company we acquired.” – EVMS Director, A&D Contractor

While this is an example of where things went well, your risk mitigation approach should be prepared for situations where the teams do not agree upon the documented process, tools, or training that could result in an impasse. Knowledge of the current internal environment and personnel mix can help to determine the best mitigation strategy. A strong leadership team must be in place to ensure teams are working to achieve common objectives and to amicably resolve differences with a target completion date.

The tactical plan must also include a robust training plan that covers the revised EVMS process, procedures, and any new tools. This is critical to ensure project personnel gain a good understanding of what changed, who is responsible for what, workflow, requirements such as data coding or level of data detail, and how to use the tools effectively. Role based training is often useful to ensure project control personnel, schedulers, CAMs, and others are following the documented procedures specific to their day-to-day tasks. Desktop instructions are also useful to ensure project personnel are using the software tools effectively in alignment with the documented process and procedures.

What to do if you find yourself in this situation?

It often helps to start with a gap analysis of your or the acquired company’s EVM design and System Description as well as assess how project personnel implement the system and the quality of the data. H&A earned value consultants often conduct an EVMS gap analysis to provide a fact-based and independent analysis of the EVMS, project personnel proficiency levels, and quality of the schedule and cost data. Once you are able to identify and quantify the strengths and weaknesses of the system, you are in a better position to determine your best strategy that aligns with your corporate business objectives and goals.

Over the years, H&A earned value consultants have observed first-hand what strategies and tactics for designing and implementing a best in class EVMS ensures success in a variety of business environments. We can also help you avoid common pitfalls that can derail the best laid plans – it is often the case a client didn’t realize there were hidden risks, or they had made incorrect assumptions.

We can help you determine the right strategy for your situation. Call us today at (714) 685-1730 to get started.

Merging Earned Value Management System Descriptions Read Post »

EVM and Unified Risk Management

, , , ,

Working with numerous clients, H&A earned value consultants have observed many instances where project management teams consider the risk and opportunity (R&O) management process to be something technical in nature, run by engineers and focused on the technical aspects of the project’s product. Meanwhile, there is often a separate risk process going on much less formally to consider risks in terms of the project’s schedule and cost goals. This bifurcated approach is a source of risk itself.

Procuring agencies such as the DoD, NASA, DOE, and others have published their own risk management guides. The Government Accountability Office (GAO) has various reports on this topic including examples of their findings. DCMA mentions risk in their Business Practice 4  Guideline Evaluation Template (GET) Process/Implementation Verification Points often used by contractors to check whether their earned value management system (EVMS) meets the intent of the EIA-748 Standard for EVMS guidelines. The exact questions asked by DCMA are important but the overall idea that risk and EVMS are co-dependent is the critical aspect. This is also true for the DOE. They identify risk management as one of the 10 subprocesses necessary for an EVMS.

Setting the Stage

Risk is defined as a factor, element, constraint, or course of action that introduces an uncertainty of outcome that should it occur, could negatively impact the ability to meet the project’s planned technical, schedule, or cost objectives. Negative impacts are sometimes called a threat where the objective is to mitigate the risk. A realized risk becomes an issue that must be resolved to minimize the impact. An opportunity is defined as a positive risk where the objective is to capture the beneficial impacts. Opportunities are not as common as threats.

R&O management is defined as the process of identifying, assessing, and responding to risks and opportunities throughout the project’s life cycle. The goal of R&O management is to identify potential risks and opportunities, determine the likelihood or probability the risk or opportunity will occur, and determine the impact should a risk be realized, or an opportunity is captured. Risks and opportunities are prioritized so that those with greater impact and a higher probability of occurring receive a greater share of resources and attention.

In this blog, we are using the term risk with a focus on the negative impacts or threats to a project.

Example of Common Project Risks and Risk Assessment Approach

H&A’s senior management routinely reviews literature, considers our work with clients, and discusses with our earned value consultants the main contributors to project failure. These findings are updated regularly and presented in H&A training materials as an Ishikawa Fishbone Cause and Effect diagram. Figure 1 is an example of this type of diagram. 

Figure 1: Example of an Ishikawa Fishbone Case and Effect Diagram

Figure 1: Example of an Ishikawa Fishbone Case and Effect Diagram

When this approach is used for risk assessments, each contributing risk is assessed, and the response documented. An example of a risk/response table is shown below for the first three identified risks.

Risk ItemGood Example of a Real Project Response to an Identified Risk
Poor communicationsGoals are known and documented. Communications plan is in place. Have an established cadence for weekly internal and customer meetings to quickly resolve issues. An internal project performance management dashboard is updated daily with current data. Updated IMS and risk register are broadcast weekly to the team. A strong business rhythm has been established.
Scope creepWork scope (requirements and SOW) are well defined and a change control process is in place. Performers are trained in spotting scope creep and how to handle potential changes in scope.
Inaccurate cost estimateImplemented a process enabling cost estimators to search historical actual cost data, identify analogous tasks, substantiate, and document the basis of estimate. For high risk areas, techniques such as the Delphi method, SMEs, and non-advocate reviews are used. Performance is constantly monitored to spot work elements where the actual costs do not align with the budgeted costs or the estimate at completion (EAC) is triggering internal variance at completion (VAC) thresholds. 

This same type of approach can be used by the project control team to create risk Ishikawa diagrams to identify technical risks that could impact the ability to achieve schedule and cost goals. Likewise, risk Ishikawa diagrams can be used to identify risks in the integrated master schedule (IMS) and time phased budget or estimate to complete (ETC) and EAC.

A Unified Approach to Risk

A unified approach includes technical, schedule, cost, and other risk identification and assessment that is an integral part of a contractor’s EVMS. R&O management should be integrated into the EVMS subsystems including work organization, planning and scheduling, work authorization and budgeting, management analysis and reporting, and change management. 

Identified risks are analyzed and quantified to develop a risk handling strategy. Where applicable, risk mitigation tasks have been entered into the IMS. Ideally a schedule risk assessment (SRA) has been completed to gain an understanding of duration risks that can help to improve the accuracy of the schedule. Assuming the IMS is resource loaded and leveled, the result is a more accurate time phased budget plan as it incorporates the risk handling strategies when the performance measurement baseline (PMB) is established. The R&O process also provides the necessary rationale for determining the budget amount set aside for management reserve (MR).

The R&O assessments should be a normal part of generating the Variance Analysis Reports (VARs) and updating the ETC and EAC. These assessments can also drive the need for processing baseline change requests (BCRs) as well as determining the best approach for corrective actions. 

Using Directed Searches of Identified Risks

To facilitate a unified approach, we recommend establishing a cadence of standing risk review sessions that are conducted in a methodical way to ensure the project manager, integrated product team (IPT) leads, control account managers (CAMs), schedulers, and financial analysts routinely walk through the identified risks that have the potential to impact the project’s IMS or time phased cost.

The intent is to establish a framework such as Ishikawa diagram to guide the risk review session, a directed search of the identified risks should anything further need to be addressed. It is important that a “does anyone have a risk to suggest” approach is not used. Every topic should be covered in every session by walking the Ishikawa risk items. Most of the time it will be a quick “no change” response. Separate Ishikawa diagrams could be used to guide the discussions for the contributing technical, schedule, and cost risks. The meeting room should have the ability to view the live IMS, cost data, and performance analysis data. Team members should be prepared to take notes during the meeting to compile action items.

Figure 2 is an example of a basic Ishikawa diagram of IMS risks the project control team could focus on for the risk review session. This would reflect the project control team’s identified risks to the IMS they routinely monitor.

Figure 2: Example of an IMS Ishikawa Fishbone Case and Effect Diagram

Figure 2: Example of an IMS Ishikawa Fishbone Case and Effect Diagram

For example, updating the current schedule every reporting period has the potential to compromise the integrity of the IMS to provide accurate forecast information about the project’s remaining work. Perhaps the project control team has identified a list of contributing schedule status risks, risk response, and example directed questions for each review meeting. These questions could be focused at the CAM level. The following table is a simple example. 

Risk ItemRisk ResponseExample Directed Questions
IMS critical or driving pathsVerify logic. Verify traceability exists and has not been damaged by updates. Review constraints, deadlines, and milestones. Perform data quality check, correct errors.Did milestones move? Did the end date move? What were the baseline dates for starts or finishes that fall into the period?What were the forecasted dates for starts and finishes that fall into the period?What did not happen? Why?
RealismCalculate and assess the Baseline Execution Index (BEI) and Current Execution Index (CEI). Compare the ratio of actual performance to the ratio of future performance.Is the BEI/CEI result within goals? Are there performance discrepancies? Does the forecast need to be updated to align with reality? Is the forecast showing the performance the team can achieve based on what has been achieved?
Quality of ETC/EACVerify updates are occurring. Compare current ETC/EAC to previous ETC/EAC.Has the ETC been updated? What changed and why? For example, for activities with material requirements, price or usage variances may impact the ETC/EAC. For activities with labor requirements, availability or personnel changes may impact future work effort ETC/EAC.

The same approach would be used for guided budget and cost risk discussions. Tailored cause and effect diagrams should be created for a company business environment and each project’s unique characteristics.

Interested in learning more?

H&A’s training courses purposely include content on R&O management and integrating it into the EVMS. H&A’s Project Scheduling as well as Advanced Earned Value Management Techniques (AEVMT) workshops in particular include more discussion on R&O topics.

A company’s EVMS should be designed to aid the identification and management of risks and opportunities. For example, during the process of developing the schedule and budget baseline, activity durations, resource requirements, and budget distribution can be refined to reflect identified and assessed risks. Proactively identifying and managing risks improves project performance. The expectation of specific risks occurring leads to contingency plans that lower the likelihood and impact of risks as well as the establishment of schedule margin and MR to address identified and assessed risks.

Call us today at (714) 685-1730 to get started.

EVM and Unified Risk Management Read Post »

Management Reserve Best Practice Tips

, , , , , ,

A recurring theme H&A earned value consultants find themselves discussing with clients is emphasizing that management reserve (MR) is a very precious budget set aside that must be protected and used appropriately. Unfortunately, MR is often used inappropriately, and quickly depleted in the early stages of a project.

What happens when MR is consumed for other uses than what it was intended? There is no budget available for appropriate uses of MR such as for emerging work, rework, redesign, or make/buy adjustments within the scope of the contract when it is needed in the latter stages of a project. When that happens, a project manager is forced to create a “home” for actual costs for these activities. This results in other inadvisable actions such as:

  • Zero budget work packages which are also known as estimate to complete (ETC) only work packages.
  • De earning the budgeted cost for work performed (BCWP) and opening completed work packages to accept charges.
  • Culling budgets from future unopened work packages, and if they exist, planning packages, summary level planning packages (SLPP), and undistributed budget (UB).

These actions will call into question the integrity of the EVMS and EVM data. The customer conducting EVMS surveillance will also be quick to point out this deficiency in the EVMS implementation and raise the issue to ensure it has management’s attention to correct. The inappropriate use of MR has created a cascade of problems that could have been avoided. In some instances, project personnel were simply not following the rules for the use of MR found in the contractor’s EVM System Description. That’s an easier problem to resolve than other root causes.

The Role of Risk and Opportunity Management in Establishing MR

What H&A earned value consultants often uncover as the root cause of inappropriate uses of MR was that a robust risk and opportunity (R&O) management process would have made a difference in establishing a quantified set aside for MR to handle realized risks. Proactively identifying and managing risks improves project performance. The expectation of specific risks occurring leads to risk handling plans that lower the likelihood and impact of risks. It also provides an informed basis to establish an adequate amount of MR that reflects identified and assessed risks.

The risk assessment provides additional information that assists a project manager’s decision making process to validate a request to use MR is appropriate and has the backup data needed to justify the use of MR and the amount of MR allocated. This detail is necessary for the baseline change request (BCR) approval process as well as the Integrated Program Management Report (IPMR) Format 5 or Integrated Program Management Data and Analysis Report (IPMDAR) Performance Narrative Report (PNR). A project manager is required to identify the changes to MR during the reporting period and provide a brief explanation of the change. This explanation has the potential to pique the interest of the customer to gain a better understanding of why MR was used and the potential impact to the integrity of the EVM data.

Note: MR may increase or decrease for a variety of reasons. The primary use of MR is to handle realized risks within a control account that is within the statement of work (SOW) for the contract. All MR debits or credits should be tracked in a log for full traceability for the entire life of the project. Remember that MR can never be a negative value.

Acceptable Uses of MR

As highlighted in an H&A article titled “The Effective Use of Management Reserve,” examples of the appropriate uses of MR include:

  • Newly identified work is authorized and assigned to a control account manager (CAM). It may be that once the work begins, one or more tasks that were missed in the original planning process now need to be scheduled and resource loaded. Newly identified work could also be the result of internal replanning that required a change in approach or resource requirements.

    An example of this could be a project manager issued a work authorization to a CAM to conduct three tests to meet the requirements in the contract SOW. In the middle of the first test, it becomes clear to the CAM and project manager that a fourth test will be necessary. The project manager and CAM should be aware of this potential risk and be prepared to implement their risk handling strategy as a result of the R&O management process. The CAM can quickly prepare a BCR that the project manager can immediately approve to allocate MR budget to complete the fourth test. 
  • It is necessary to redo a task. This may include unanticipated redesign, remake, or retest. Hopefully, the project’s risk register identified the potential risks associated with the original tasks and management was prepared for the realized risk. 
  • Make/buy adjustments.  This could result in an MR debit or credit. 
  • Statement of work transfers from one organization to another. This could result in an MR debit or credit. 

Inadvisable Uses of MR Commonly Allowed

Although it is often allowed in a contractor’s EVM System Description, it is inadvisable to use MR for direct and indirect rate changes in the future. Note: MR should never be used to make any rate adjustments (or any other adjustments) to historical budgeted cost for work scheduled (BCWS) or BCWP data.

A rate change is not a change to the SOW for a CAM. It is merely a change to the cost of that work. Cost variances that occur because of direct and/or indirect rate changes can easily be explained in a Variance Analysis Report (VAR). Ironically, this use of MR is typically treated as a one-way street. Contractors apply MR when the direct and/or indirect rates are going up in the future but do not return to MR when the rates are projected to go down.

When a contractor’s EVM System Description allows MR to be used for future direct and/or indirect rate changes, ideally, the likely rate changes are identified as a risk and quantified when the initial MR is established for a project. This requirement should be noted in the EVM System Description. That way the set aside for MR includes budget for corporate rate adjustments that are outside of the control of the project manager or CAM. 

Another example of a commonly allowed but inadvisable use of MR is to “true up” a purchase order that is in excess of the original budget at completion (BAC) for material, equipment, or purchased services. For example, a project manager issues a work authorization to a CAM that includes purchasing material, equipment, or services from a supplier. The CAM then reaches an agreement with a supplier with scope, schedule, and budget. If that agreement is greater or less than the BAC, MR should not be applied, nor should budget be returned to MR to make the BAC match the PO value. Assuming the scope does not change, then MR should not be used to wipe out a cost variance whether positive or negative. The cost variance can be easily explained and the EAC can be increased or decreased. This is another example where contractors are treating this as a one-way street; they apply MR when it goes up, but do not return to MR when it goes down. A contractor would not “true up” for internal work overruns/underruns so why “true-up” for material or services provided by a supplier? 

Best Practice Tips

The following is a short list of best practices H&A earned value consultants often recommend clients implement for managing MR.

  • The EVM System Description should clearly spell out what are appropriate and inappropriate uses of MR. It should also provide guidance to eliminate instances of the “one way street” debit from MR. If needed, provide supplemental procedures, decision trees, or other work instructions to help project personnel follow EVM best practices and preserve MR for handling realized risks which typically occur in latter stages of a project.
  • Ensure that the R&O management process is integrated with the EVMS and provides the necessary risk identification and assessment information for the project manager to establish a realistic MR set aside based on quantifiable information. Where applicable, ensure likely rate changes are captured as a potential risk to the project and considered when the initial MR for the project is established if they intend to use MR for rate changes in the future.
  • Conduct recurring training to reinforce the purpose for MR and the appropriate use of MR. A recommended approach is to discuss a variety of use cases with project personnel so they know how to handle various situations that may occur on a project. 

Have you noticed “creative” uses of MR that are contrary to EVM best practices? Hopefully, you identified those situations as part of your EVMS self-governance process and were able to quickly implement corrective actions before your customer pointed out the issue to you. H&A earned value consultants often assist clients with producing procedures or work instructions that clearly spell out how to use MR appropriately. We also offer a range of EVMS training to reinforce EVM best practices including the appropriate use of MR. Call us today to get started.

Management Reserve Best Practice Tips Read Post »

Introduction to the Cost and Software Data Reporting (CSDR) Reporting Requirements

, , , ,

A common client request is to assist them with sorting through the various DoD contractual reporting requirements and contract value reporting thresholds that apply. We frequently run into situations where a contractor needs clarification on why they have a Cost and Software Data Reporting (CSDR) requirement and whether they should seek to waive the requirement. Subcontractors to a prime often question the requirement to provide actual cost data directly to the DoD, especially for Firm Fixed Price (FFP) contracts.

Background

CSDRs are the primary means the DoD uses to collect data on the development, production, and sustainment costs incurred by contractors performing DoD acquisition contracts. It is a DoD system for collecting actual costs, software data, and related business data. The resulting data repository serves as the primary source for contract cost and software data for most DoD resource analysis efforts including cost database development, applied cost estimating, cost research, program reviews, analysis of alternatives (AoAs), and life cycle cost estimates.

CSDR reporting requirements are determined by the contract value regardless of the acquisition phase and contract type. In general, CSDR reporting is required for Acquisition Category I-II programs and Information System (IS) programs valued at more than $50M. They can also be required for Middle Tier Acquisition programs (greater than $20M) and other programs (greater than $100M). Risk can also be a determining factor regardless of the contract value.

DoD Instruction (DoDI) 5000.73, Cost Analysis Guidance and Procedures (March 2020), provides additional details about the cost data reporting. Table 1 in the 5000.73 lists the cost reporting requirements contract value thresholds. The DoD Manual 5000.04 Cost and Software Data Reporting (May 2021) is the primary requirements document for the development, implementation, and operation of the DoD CSDR system to ensure data reported is accurate and consistent.

About CADE

The Office of the Secretary of Defense Cost Assessment and Program Evaluation (OSD CAPE) established the Cost Assessment Data Enterprise (CADE), a secure web-based information system that hosts the controlled unclassified CSDR repository, the Defense Acquisition Cost Information Management System, and the forward pricing rate library. CADE also contains a selected acquisition report database, a contracts database, data analytics capabilities, and a library containing cost estimating content such as cost analysis requirement descriptions and cost estimates. CADE is access-controlled, and available through the public-facing CADE Portal website.

Similar to the cost estimating and proposal pricing functions within contractor’s organizations that rely on historical actual costs to assess the validity of a proposed cost estimate, independent and sound cost estimates are vital for effective DoD acquisition decision making and oversight. CADE plays a critical role in capturing the expenditure, technical, and programmatic data after contract execution in a consistent manner to enable independent cost estimating and analysis. This cost estimate data is essential to support efficient and effective resource allocation decisions throughout the planning, programming, budgeting, and execution process for the DoD.

CSDR Reporting Requirements

There are a series of Data Item Descriptions (DIDs) for this reporting requirement.  Some forms are submitted electronically using DoD defined XML schemas, Excel, or JSON encoded data in accordance with a File Format Specification (FFS) and Data Exchange Instruction (DEI). The list of DIDs are as follows. These DIDs can be downloaded from the CADE website.

  • Contract Work Breakdown Structure, DI-MGMT-81334D (May 2011).
  • Cost Data Summary Report, DI-FNCL-81565C (May 2011), DD Form 1921, XML Schema.
  • Functional Cost-Hour Report, DI-FNCL-81566C (September 2015), DD Form 1921-1, XML Schema.
  • Progress Curve Report, DI-FNCL-81567C (May 2011), DD Form 1921-2, XML Schema. 
  • Sustainment Functional Cost-Hour Report, DI-FNCL-81992 (May 2011), DD Form 1921-5, XML Schema.
  • Contractor Business Data Report, DI-FNCL-81765C (March 2021), DD Form 1921-3, Excel. 
  • Software Development Report, DI–MGMT-82035A (October 2022), DD Form 3026-1, XML Schema. 
  • Software Maintenance Report, DI–MGMT-82035A (October 2022), DD Form 3026-2, XML Schema.
  • Enterprise Resource Planning (ERP) Software Development Report, DI-MGMT-82035A (October 2022), DD Form 3026-3, XML Schema.
  • Cost and Hour Report (FlexFile), DI-FNCL-82162 (November 2017), JSON encoded data file following FFS and DEI.
  • Quantity Data Report, DI-MGMT-82164 (November 2017), JSON encoded data file following FFS and DEI.
  • Maintenance and Repair Parts Data Report, DI-MGMT-82163 (November 2017), Excel.
  • Technical Data Report, DI-MGMT-82165 (November 2017), Excel.

The Cost and Hour Report (FlexFile) and Quantity Data Report play a critical role in collecting cost data from contractors for the DoD data repository because they use JSON data encoding to organize the content. They are intended to replace the legacy 1921 series of paper-based formats including the DD 1921, 1921-1, 1921-2, and 1921-5. It also requires contractors to provide significantly more historical cost data than the 1921 formats. As a result, the DoD cost estimating community has additional insight into historical costs. The goal is to establish a common framework and standard nomenclature to collect data from different contractors, all of them with unique cost accounting structures, that are mapped to the DID, FFS, and DEI requirements for use in the data repository.

Establishing a Consistent, Repeatable Process to Produce the CSDR Data Deliverables

For contractors new to the CSDR reporting requirements and in particular, the FlexFile JSON data encoding, can appear to be daunting. That’s where software tools such as those from Midnite Dynamics can help. Midnite Dynamics specializes in assisting contractors with producing the CSDR data deliverables. 

Their software tool, C*CERT+, streamlines, automates, validates, and produces the legacy 1921 family of Excel and XML reports as well as the FlexFile and Quantity Data Report JSON submittals. C*CERT+ eliminates what otherwise is a manually intensive, resource draining, tedious and costly effort subject to recurring rejections. It is one thing to create the required legacy reports or FlexFile JSON files for submittal, it is another to pass the submittal validation process. C*CERT+ provides numerous data validations and analysis reports to ensure the data is 100% compliant before it is submitted. For example, the software includes over 90 FlexFile validations to ensure data compliance as illustrated in Figure 1.

Figure 1: Example of FlexFile data validation results.
Figure 1: Example of FlexFile data validation results.

The software includes a Validation and Remarks utility to analyze the source data details that could result in a Validation Trip. Remarks can be entered directly into the validation module for anything that requires an explanation. This is illustrated in Figure 2. This narrative is included with the data submittal.

Figure 2: Example of providing remarks about the FlexFile data content.

C*CERT+ also interfaces with existing EVM cost tools and accounting systems to produce the existing legacy 1921 reports, the FlexFile, and other data submittals as well as to consolidate separate projects/CLINs/task orders into a single contract report.

Once the C*CERT+ Standard Category Mapping Rules are set up, they can be shared throughout the corporation or business unit to establish a standard and repeatable process for producing the data deliverables. This mapping process translates the contractor’s source data into an output that matches the CSDR data submittal format rules. This saves a tremendous amount of time and makes it much easier to consistently produce the CSDR data deliverables. An example of the Mapping Rules is illustrated in Figure 3.

Figure 3: Mapping Rules translate contractor unique cost data into a format that matches the CSDR data submittal requirements.

Do your process and procedures or training materials need an update to include specific guidance for project control teams to produce required DoD contractual reports or data submittals using your tool sets of choice? Give us a call today at (714) 685-1730 to get started. 

Introduction to the Cost and Software Data Reporting (CSDR) Reporting Requirements Read Post »

Scroll to Top