Browse Definitions :
Definition

cone of uncertainty

Contributor(s): Matthew Haughn

The cone of uncertainty is a graphic depiction of the increasing accuracy that is possible for estimates as the details of a project become more known over time. Project managers and developers use the cone of uncertainty to guide estimates manage expectations.

During the development process a project starts out with a large degree of variability. An estimate may be accurate but that cannot be assumed. Generally, any estimates will be very loose and may be wildly inaccurate. As decisions are made, research is conducted and more of the project is completed, the degree of variability decreases. This is why project might start out with estimates varying by plus or minus 40 percent at the start but see that variance decrease over time. Understanding this variability is key to developing realistic project plans. 

The most common representation of the cone of uncertainty is in the form of a graph with time on the horizontal axis and estimate variance on the vertical. As the graph is followed to the right with the progress of time, the lines representing the range of overestimation converge to near zero. The large end of the cone – where uncertainty is greatest – is at the start of the project timeline and the small end of the cone at the end, where all details are known.

cone of uncertainty

The cone of uncertainty was originally created by the American Association of Cost Engineers to assist estimations for engineering and construction. The tool is applied to a variety of phenomena such as hurricanes, for example, in which the system’s course is less certain when predicted further into the future and more certain as time goes on and the system gets closer.

This was last updated in March 2015

Continue Reading About cone of uncertainty

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close