Browse Definitions :
Definition

pick two (pick any two)

Contributor(s): Ivy Wigmore

Pick two, sometimes expressed as pick any two, is the principle that in many sets of three desirable qualities, those qualities will be somewhat mutually exclusive.

One of the classic “pick two” scenarios is the triple constraint of project management and product development, which consists of these elements: schedule, scope and cost. Each constraint defines a boundary of the project and none can be altered without affecting at least one of the others. For example, if a software product must be developed quickly, it will probably be necessary to cut back on features or increase development resources.

(Image republished with permission of Compass Creative)

The Venn diagram above illustrates the pick two concept. Clients typically want products or projects to be delivered quickly and cheaply but also to be of high-quality. The areas of overlap between in the diagram indicate the combinations that are likely to be possible. The product can be: great and cheap -- but not fast; fast and cheap -- but not great, great and fast -- but not cheap. The client is advised to pick two: Decide which two of the three requirements are most important and be a little more flexible with the third one. 

This was last updated in March 2015

Continue Reading About pick two (pick any two)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close