Browse Definitions :
Definition

critical path method (CPM)

The critical path method (CPM) is a step-by-step project management technique for process planning that defines critical and non-critical tasks with the goal of preventing time-frame problems and process bottlenecks. The CPM is ideally suited to projects consisting of numerous activities that interact in a complex manner.

In applying the CPM, there are several steps that can be summarized as follows:

  • Define the required tasks and put them down in an ordered (sequenced) list.
  • Create a flowchart or other diagram showing each task in relation to the others.
  • Identify the critical and non-critical relationships (paths) among tasks.
  • Determine the expected completion or execution time for each task.
  • Locate or devise alternatives (backups) for the most critical paths.

The origins of CPM:
The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects. Since that time, the CPM has been adapted to other fields including hardware and software product research and development. Various computer programs are available to help project managers use the CPM.

This was last updated in January 2015

Continue Reading About critical path method (CPM)

Join the conversation

3 comments

Send me notifications when other members comment.

Please create a username to comment.

Very nice explanation. Thank you very much.
Cancel
Simple and complete. Nothing to say more. Thanks for presentation
Cancel
Thank you very much for this great explanation.

Cancel

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close