Browse Definitions :
Definition

triple constraint

The triple constraint is a model that describes the three most significant restrictions on any project: scope, schedule and cost.

The triple constraint is sometimes referred to as the project management triangle or the iron triangle. In the typical triangular model, scope, schedule and cost are constraints that form the sides of the triangle, with quality as the central theme. (An alternative to the triangle, the project management diamond, adds quality as the fourth side of the model and changes the central theme to customer expectations.)

The three constraints are interdependent: None of them can be altered without affecting one or both of the others. For example, if the scope of a project is increased, it is likely to take longer and/or cost more. Likewise, an earlier deadline is almost certain to either require more money or a less ambitious scope.

The difficulty of satisfying expectations for all three constraints is sometimes expressed as pick two: the concept that in any set of three desired qualities, only two can be delivered. If, for example, clients want to keep the budget low, the product is likely to take longer or be of lower quality.

An alternative model, STR, defines project scope as the product of time and resources put into it.

This was last updated in November 2020

Continue Reading About triple constraint

Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • IT project management

    IT project management is the process of planning, organizing and delineating responsibility for the completion of an ...

  • chief financial officer (CFO)

    A chief financial officer (CFO) is the corporate title for the person responsible for managing a company's financial operations ...

  • chief strategy officer (CSO)

    A chief strategy officer (CSO) is a C-level executive charged with helping formulate, facilitate and communicate an ...

HRSoftware
Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close