Browse Definitions :
Definition

cone of uncertainty

Contributor(s): Matthew Haughn

The cone of uncertainty is a graphic depiction of the increasing accuracy that is possible for estimates as the details of a project become more known over time. Project managers and developers use the cone of uncertainty to guide estimates manage expectations.

During the development process a project starts out with a large degree of variability. An estimate may be accurate but that cannot be assumed. Generally, any estimates will be very loose and may be wildly inaccurate. As decisions are made, research is conducted and more of the project is completed, the degree of variability decreases. This is why project might start out with estimates varying by plus or minus 40 percent at the start but see that variance decrease over time. Understanding this variability is key to developing realistic project plans. 

The most common representation of the cone of uncertainty is in the form of a graph with time on the horizontal axis and estimate variance on the vertical. As the graph is followed to the right with the progress of time, the lines representing the range of overestimation converge to near zero. The large end of the cone – where uncertainty is greatest – is at the start of the project timeline and the small end of the cone at the end, where all details are known.

cone of uncertainty

The cone of uncertainty was originally created by the American Association of Cost Engineers to assist estimations for engineering and construction. The tool is applied to a variety of phenomena such as hurricanes, for example, in which the system’s course is less certain when predicted further into the future and more certain as time goes on and the system gets closer.

This was last updated in March 2015

Continue Reading About cone of uncertainty

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other ...

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • storage at the edge

    Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of ...

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

Close