estimating-work
Estimating Work
Estimation Approaches
Story Points
Relative complexity, not time.
| Points | Complexity |
|---|---|
| 1 | Trivial, well understood |
| 2 | Simple, minor unknowns |
| 3 | Moderate complexity |
| 5 | Complex, some unknowns |
| 8 | Very complex, significant unknowns |
| 13 | Extremely complex, many unknowns |
| 21+ | Too big, needs decomposition |
T-Shirt Sizing
For high-level estimates.
More from nguyenhuuca/assessment
compliance
Ensure regulatory compliance. Use when implementing GDPR, HIPAA, PCI-DSS, or SOC2 requirements. Covers compliance frameworks and controls.
20requirements-analysis
Analyze and refine product requirements. Use when clarifying scope, identifying gaps, or validating requirements. Covers requirement types and analysis techniques.
16identity-access
Implement identity and access management. Use when designing authentication, authorization, or user management. Covers OAuth2, OIDC, and RBAC.
13security-review
Conduct security code reviews. Use when reviewing code for vulnerabilities, assessing security posture, or auditing applications. Covers security review checklist.
13execution-roadmaps
Create execution roadmaps for projects. Use when planning multi-phase projects or feature rollouts. Covers phased delivery and milestone planning.
12cloud-native-patterns
Apply cloud-native architecture patterns. Use when designing for scalability, resilience, or cloud deployment. Covers microservices, containers, and distributed systems.
12