e-book
CPM in Construction Management
The original purpose of this book, in 1965, was to present and discuss the
critical path method (CPM) and its use in the construction industry. At
that time, CPM was a young but proven technique—usually considered
to be optional. When the second edition was published in 1971, the network
approach to scheduling was becoming a regular requirement in construction
contracts. The third edition, published after 25 years of
experience in the application of CPM, described highlights of that experience
and its significance to the practical use of CPM.
The basic strength of CPM continues to be its ability to represent
logical planning factors in network form. One reviewer noted: “Perhaps
the most ironic aspect of the critical path method is that after you understand
it, it is self-evident. Just as an algebra student can apply the
rules without full appreciation of the power of the mathematical concepts,
so can the individual apply CPM or its equivalent without fully
appreciating the applicability of the method.”
The book first describes the development of CPM and its practical use
in the construction industry. The basic technique is described in sufficient
depth for the reader to apply it to practical construction situations.
The John Doe case study is used throughout the book to describe basic
CPM network techniques and then to illustrate such special functions
as updating, cost control, resource planning, and delay evaluation.
Optimum methods of specifying the use of CPM are described in sufficient
detail to be incorporated directly into construction specifications.
Since the second edition, CPM has become widely utilized as an analytical
tool in the evaluation, negotiation, resolution, and/or litigation of
construction claims. This aspect is thoroughly explored in the current edition.
Legal precedents for the use of CPM during litigation are provided.
In the 1980s, computer calculation shifted from mainframe programs
to personal computers (PCs). PCs were the wave of the past two decades.
The ubiquity in the 2000s of the internet and the wave of additional
interconnectivity linking individual PCs now has the appearance of
coming full circle and bringing back to CPM many of the strengths and
weaknesses of the era of the mainframe. However, the approaches and
procedures suggested in the first five editions are, almost without exception,
still valid.
Tidak ada salinan data
Tidak tersedia versi lain