Browse Definitions :
Definition

pick two (pick any two)

Contributor(s): Ivy Wigmore

Pick two, sometimes expressed as pick any two, is the principle that in many sets of three desirable qualities, those qualities will be somewhat mutually exclusive.

One of the classic “pick two” scenarios is the triple constraint of project management and product development, which consists of these elements: schedule, scope and cost. Each constraint defines a boundary of the project and none can be altered without affecting at least one of the others. For example, if a software product must be developed quickly, it will probably be necessary to cut back on features or increase development resources.

pick-two
(Image republished with permission of Compass Creative)

The Venn diagram above illustrates the pick two concept. Clients typically want products or projects to be delivered quickly and cheaply but also to be of high-quality. The areas of overlap between in the diagram indicate the combinations that are likely to be possible. The product can be: great and cheap -- but not fast; fast and cheap -- but not great, great and fast -- but not cheap. The client is advised to pick two: Decide which two of the three requirements are most important and be a little more flexible with the third one. 

This was last updated in March 2015

Continue Reading About pick two (pick any two)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other ...

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • storage at the edge

    Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of ...

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

Close