SlideShare a Scribd company logo
Page 1Classification: Restricted
Business Analysis Training
Agile- User Stories
Page 2Classification: Restricted
Agenda
• AGILE - DEFINITION
• AGILE - BENEFITS
• AGILE - INVEST CRITERION
• AGILE - FORMAT
• AGILE - SIZE OF A USER STORY
• AGILE - USAGE OF STORIES
• AGILE - COMMON STORY MISTAKES
• AGILE - SUPPORTING ARTIFACTS
• CA Agile Central: User Story
A user story represents a small piece of business value that a team can deliver in an iteration.
DEFINITION
• The brief description of the need
• The conversations that happen during backlog grooming and iteration planning to solidify the details
• The tests that confirm the story's satisfactory completion
3 STEPS
Keep yourself expressing business value
Avoid introducing detail too early that would prevent design options and inappropriately lock developers into one solution
Avoid the appearance of false completeness and clarity
Get to small enough chunks that invite negotiation and movement in the backlog
Leave the technical functions to the architect, developers, testers, and so on
BENEFITS
Independent : We want to be able to develop in any sequence
Negotiable : Avoid too much detail; keep them flexible so the team can adjust how much of the story to implement.
Valuable : Users or customers get some value from the story.
Estimable : The team must be able to use them for planning.
Small : Large stories are harder to estimate and plan. By the time of iteration planning, the story should be able to be designed, coded, and
tested within the iteration.
Testable : Document acceptance criteria, or the definition of done for the story, which lead to test cases.
INVEST CRITERION
As a <user type>, I want to <function> so that <benefit>
Example:
As a consumer, I want shopping cart functionality to easily purchase items online.
As an executive, I want to generate a report to understand which departments need to improve their productivity.
FORMAT
• A story should be small enough to be coded and tested within an iteration—ideally just a few days.
• When a story is too large, it is called an epic.
• Backlog items tend to start as epics when they are lower priority. For release planning, epics should be broken down into smaller chunks, but
not so small that you have moved into detailed design.
SIZE OF A USER
STORY
BROAD:
• A team member can view iteration status.
DETAILED:
• A team member can view a table of stories with rank, name, size, package, owner, and status.
• A team member can click a red button to expand the table to include detail, which lists all the tasks, with rank, name, estimate, owner,
status.
PERFECT:
• A team member can view the iteration's stories and their status with main fields.
• A team member can view the current burndown chart on the status page, and can click it for a larger view.
• A team member can view or hide the tasks under the stories.
• A team member can edit a task from the iteration status page.
EXAMPLE
• How do I add details to a user story ?
• How Definition of Done is Validated ?
• Who converts Acceptance Criteria's to Acceptance Test ?
• Is it Product owners responsibility to list as many acceptance criteria as possible in order to clarify the intent of the story ?
Answer Key: Acceptance Criteria . Acceptance Criteria . QA . Yes
Q&A
CREATION:
The customer, customer proxy, product owner, and anyone else who identifies a need for the product can contribute user stories.
OWNERSHIP AND MAINTATINANCE:
The product owner owns the user stories and is responsible for writing, gathering, maintaining, and prioritizing.
USAGE:
Developers, testers, technical writers use user stories to be able to know what to implement and when they are done. Product owners track
overall progress based on the status of the user stories. Management tends to track user stories rolled up to epics or features.
USAGE OF STORIES
Too formal or too much detail.
• Product owners with good intentions often try to write extremely detailed user stories. If a team sees a story at iteration planning that looks
like an IEEE requirements document, they often assume that all the details are there and will skip the detailed conversation.
Technical tasks masquerading as stories.
• Much of the power of Agile comes from having a working increment of software at the end of each iteration. If your stories are really just
technical tasks, you often do not end up with working software at the end of each iteration, and you lose flexibility in prioritization.
Skipping the conversation.
• Stories are intentionally vague before iteration planning. If you skip the acceptance criteria conversation, you risk moving in the wrong
direction, missing edge cases or overlooking customer needs.
COMMON STORY
MISTAKES
TECHNQUES:
story maps, workflow diagrams, storyboards, sketches, and mockups.
TECHNICAL REQUIREMENTS:
Include architectural element like a component or details like what a service should do
Support by Technical User Stories
Include UML
NOTE:
User stories is worthwhile when you develop software that’s likely to be reused.
User stories are not about documenting requirements; they want to enable you to move fast and develop software as quickly as possible—not
to impose any overhead.
SUPPORTING ARTIFACTS
CA Agile Central: User Story
THANK YOU!

More Related Content

Similar to Agile - User Stories

IIT Academy: 204 User stories and acceptance criteria
IIT Academy: 204 User stories and acceptance criteriaIIT Academy: 204 User stories and acceptance criteria
IIT Academy: 204 User stories and acceptance criteria
Steven HK Ma | 馬國豪
 
Agile Network India | Effective User story writing and story mapping approach
Agile Network India | Effective User story writing and story mapping approachAgile Network India | Effective User story writing and story mapping approach
Agile Network India | Effective User story writing and story mapping approach
AgileNetwork
 
User stories in agile software development
User stories in agile software developmentUser stories in agile software development
User stories in agile software development
Sandra Svanidzaitė, PhD, CBAP
 
Story of user story
Story of user storyStory of user story
Story of user story
Balaji Sathram
 
Agile for product owners v12
Agile for product owners  v12Agile for product owners  v12
Agile for product owners v12
Ravi Tadwalkar
 
Product Backlog - Refinement and Prioritization Techniques
Product Backlog - Refinement and Prioritization TechniquesProduct Backlog - Refinement and Prioritization Techniques
Product Backlog - Refinement and Prioritization Techniques
Vikash Karuna
 
Splitting User Stories
Splitting User StoriesSplitting User Stories
Splitting User Stories
DCG Software Value
 
Story Cards
Story CardsStory Cards
Story Cards
Ayoub Babiker
 
7-Epic, Story and Bug Reporting(updated).pptx
7-Epic, Story and Bug Reporting(updated).pptx7-Epic, Story and Bug Reporting(updated).pptx
7-Epic, Story and Bug Reporting(updated).pptx
BishalKarki33
 
User stories — how to cook a cat?
User stories — how to cook a cat?User stories — how to cook a cat?
User stories — how to cook a cat?
Vladimir Tarasov
 
Product backlog
Product backlogProduct backlog
Product backlog
Mahmoud Asadi
 
User Stories
User StoriesUser Stories
User Stories
chetrathod
 
User Stories Training
User Stories TrainingUser Stories Training
User Stories Training
Clarion Marketing
 
Effective User Story Writing
Effective User Story WritingEffective User Story Writing
Effective User Story Writing
Ahmed Misbah
 
User Stories explained
User Stories explainedUser Stories explained
User Stories explained
Martin Lapointe, M.T.I.
 
Project scope preparation
Project scope preparationProject scope preparation
Project scope preparation
Dimitar Bakardzhiev
 
Scrum Basics - User Stories.pdf
Scrum Basics - User Stories.pdfScrum Basics - User Stories.pdf
Scrum Basics - User Stories.pdf
NarasimhaL2
 
Successful Business Sponsorship of Agile IT Projects
Successful Business Sponsorship of Agile IT ProjectsSuccessful Business Sponsorship of Agile IT Projects
Successful Business Sponsorship of Agile IT Projects
Chris Mundy
 
Use Cases and Use in Agile world
Use Cases and Use in Agile worldUse Cases and Use in Agile world
Use Cases and Use in Agile world
Ravikanth-BA
 
User Story Writing & Estimation For Testers By Mahesh Varadharajan
User Story Writing & Estimation For Testers By Mahesh VaradharajanUser Story Writing & Estimation For Testers By Mahesh Varadharajan
User Story Writing & Estimation For Testers By Mahesh Varadharajan
Agile Testing Alliance
 

Similar to Agile - User Stories (20)

IIT Academy: 204 User stories and acceptance criteria
IIT Academy: 204 User stories and acceptance criteriaIIT Academy: 204 User stories and acceptance criteria
IIT Academy: 204 User stories and acceptance criteria
 
Agile Network India | Effective User story writing and story mapping approach
Agile Network India | Effective User story writing and story mapping approachAgile Network India | Effective User story writing and story mapping approach
Agile Network India | Effective User story writing and story mapping approach
 
User stories in agile software development
User stories in agile software developmentUser stories in agile software development
User stories in agile software development
 
Story of user story
Story of user storyStory of user story
Story of user story
 
Agile for product owners v12
Agile for product owners  v12Agile for product owners  v12
Agile for product owners v12
 
Product Backlog - Refinement and Prioritization Techniques
Product Backlog - Refinement and Prioritization TechniquesProduct Backlog - Refinement and Prioritization Techniques
Product Backlog - Refinement and Prioritization Techniques
 
Splitting User Stories
Splitting User StoriesSplitting User Stories
Splitting User Stories
 
Story Cards
Story CardsStory Cards
Story Cards
 
7-Epic, Story and Bug Reporting(updated).pptx
7-Epic, Story and Bug Reporting(updated).pptx7-Epic, Story and Bug Reporting(updated).pptx
7-Epic, Story and Bug Reporting(updated).pptx
 
User stories — how to cook a cat?
User stories — how to cook a cat?User stories — how to cook a cat?
User stories — how to cook a cat?
 
Product backlog
Product backlogProduct backlog
Product backlog
 
User Stories
User StoriesUser Stories
User Stories
 
User Stories Training
User Stories TrainingUser Stories Training
User Stories Training
 
Effective User Story Writing
Effective User Story WritingEffective User Story Writing
Effective User Story Writing
 
User Stories explained
User Stories explainedUser Stories explained
User Stories explained
 
Project scope preparation
Project scope preparationProject scope preparation
Project scope preparation
 
Scrum Basics - User Stories.pdf
Scrum Basics - User Stories.pdfScrum Basics - User Stories.pdf
Scrum Basics - User Stories.pdf
 
Successful Business Sponsorship of Agile IT Projects
Successful Business Sponsorship of Agile IT ProjectsSuccessful Business Sponsorship of Agile IT Projects
Successful Business Sponsorship of Agile IT Projects
 
Use Cases and Use in Agile world
Use Cases and Use in Agile worldUse Cases and Use in Agile world
Use Cases and Use in Agile world
 
User Story Writing & Estimation For Testers By Mahesh Varadharajan
User Story Writing & Estimation For Testers By Mahesh VaradharajanUser Story Writing & Estimation For Testers By Mahesh Varadharajan
User Story Writing & Estimation For Testers By Mahesh Varadharajan
 

More from Sunil-QA

Step by Step Guide to Learn SDLC
Step by Step Guide to Learn SDLCStep by Step Guide to Learn SDLC
Step by Step Guide to Learn SDLC
Sunil-QA
 
Workflow Diagram
Workflow DiagramWorkflow Diagram
Workflow Diagram
Sunil-QA
 
Business Functional Requirements
Business Functional RequirementsBusiness Functional Requirements
Business Functional Requirements
Sunil-QA
 
Agile User Stories
Agile  User StoriesAgile  User Stories
Agile User Stories
Sunil-QA
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise Analysis
Sunil-QA
 
SDLC
SDLCSDLC
SDLC
Sunil-QA
 
Introduction to Business Analysis
Introduction to Business Analysis Introduction to Business Analysis
Introduction to Business Analysis
Sunil-QA
 
Types of Databases
Types of DatabasesTypes of Databases
Types of Databases
Sunil-QA
 
Introduction to UML
Introduction to UMLIntroduction to UML
Introduction to UML
Sunil-QA
 
Stakeholder Analysis
Stakeholder AnalysisStakeholder Analysis
Stakeholder Analysis
Sunil-QA
 
Developing A Business Case
Developing A Business CaseDeveloping A Business Case
Developing A Business Case
Sunil-QA
 
Business Analysis Techniques
Business Analysis TechniquesBusiness Analysis Techniques
Business Analysis Techniques
Sunil-QA
 
Requirement Elicitation Techniques
Requirement Elicitation TechniquesRequirement Elicitation Techniques
Requirement Elicitation Techniques
Sunil-QA
 
Case Study British Airways Stakeholder Analysis
Case Study British Airways Stakeholder AnalysisCase Study British Airways Stakeholder Analysis
Case Study British Airways Stakeholder Analysis
Sunil-QA
 
Introduction to Agile
Introduction to AgileIntroduction to Agile
Introduction to Agile
Sunil-QA
 
Case Study British Airways Stakeholder Analysis
Case Study British Airways Stakeholder AnalysisCase Study British Airways Stakeholder Analysis
Case Study British Airways Stakeholder Analysis
Sunil-QA
 
Business Analysis Question and Answers
Business Analysis Question and AnswersBusiness Analysis Question and Answers
Business Analysis Question and Answers
Sunil-QA
 
Types of Databases
Types of DatabasesTypes of Databases
Types of Databases
Sunil-QA
 
Database Normalization
Database NormalizationDatabase Normalization
Database Normalization
Sunil-QA
 
Database Keys
Database KeysDatabase Keys
Database Keys
Sunil-QA
 

More from Sunil-QA (20)

Step by Step Guide to Learn SDLC
Step by Step Guide to Learn SDLCStep by Step Guide to Learn SDLC
Step by Step Guide to Learn SDLC
 
Workflow Diagram
Workflow DiagramWorkflow Diagram
Workflow Diagram
 
Business Functional Requirements
Business Functional RequirementsBusiness Functional Requirements
Business Functional Requirements
 
Agile User Stories
Agile  User StoriesAgile  User Stories
Agile User Stories
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise Analysis
 
SDLC
SDLCSDLC
SDLC
 
Introduction to Business Analysis
Introduction to Business Analysis Introduction to Business Analysis
Introduction to Business Analysis
 
Types of Databases
Types of DatabasesTypes of Databases
Types of Databases
 
Introduction to UML
Introduction to UMLIntroduction to UML
Introduction to UML
 
Stakeholder Analysis
Stakeholder AnalysisStakeholder Analysis
Stakeholder Analysis
 
Developing A Business Case
Developing A Business CaseDeveloping A Business Case
Developing A Business Case
 
Business Analysis Techniques
Business Analysis TechniquesBusiness Analysis Techniques
Business Analysis Techniques
 
Requirement Elicitation Techniques
Requirement Elicitation TechniquesRequirement Elicitation Techniques
Requirement Elicitation Techniques
 
Case Study British Airways Stakeholder Analysis
Case Study British Airways Stakeholder AnalysisCase Study British Airways Stakeholder Analysis
Case Study British Airways Stakeholder Analysis
 
Introduction to Agile
Introduction to AgileIntroduction to Agile
Introduction to Agile
 
Case Study British Airways Stakeholder Analysis
Case Study British Airways Stakeholder AnalysisCase Study British Airways Stakeholder Analysis
Case Study British Airways Stakeholder Analysis
 
Business Analysis Question and Answers
Business Analysis Question and AnswersBusiness Analysis Question and Answers
Business Analysis Question and Answers
 
Types of Databases
Types of DatabasesTypes of Databases
Types of Databases
 
Database Normalization
Database NormalizationDatabase Normalization
Database Normalization
 
Database Keys
Database KeysDatabase Keys
Database Keys
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 

Agile - User Stories

  • 1. Page 1Classification: Restricted Business Analysis Training Agile- User Stories
  • 2. Page 2Classification: Restricted Agenda • AGILE - DEFINITION • AGILE - BENEFITS • AGILE - INVEST CRITERION • AGILE - FORMAT • AGILE - SIZE OF A USER STORY • AGILE - USAGE OF STORIES • AGILE - COMMON STORY MISTAKES • AGILE - SUPPORTING ARTIFACTS • CA Agile Central: User Story
  • 3. A user story represents a small piece of business value that a team can deliver in an iteration. DEFINITION • The brief description of the need • The conversations that happen during backlog grooming and iteration planning to solidify the details • The tests that confirm the story's satisfactory completion 3 STEPS Keep yourself expressing business value Avoid introducing detail too early that would prevent design options and inappropriately lock developers into one solution Avoid the appearance of false completeness and clarity Get to small enough chunks that invite negotiation and movement in the backlog Leave the technical functions to the architect, developers, testers, and so on BENEFITS
  • 4. Independent : We want to be able to develop in any sequence Negotiable : Avoid too much detail; keep them flexible so the team can adjust how much of the story to implement. Valuable : Users or customers get some value from the story. Estimable : The team must be able to use them for planning. Small : Large stories are harder to estimate and plan. By the time of iteration planning, the story should be able to be designed, coded, and tested within the iteration. Testable : Document acceptance criteria, or the definition of done for the story, which lead to test cases. INVEST CRITERION As a <user type>, I want to <function> so that <benefit> Example: As a consumer, I want shopping cart functionality to easily purchase items online. As an executive, I want to generate a report to understand which departments need to improve their productivity. FORMAT
  • 5. • A story should be small enough to be coded and tested within an iteration—ideally just a few days. • When a story is too large, it is called an epic. • Backlog items tend to start as epics when they are lower priority. For release planning, epics should be broken down into smaller chunks, but not so small that you have moved into detailed design. SIZE OF A USER STORY BROAD: • A team member can view iteration status. DETAILED: • A team member can view a table of stories with rank, name, size, package, owner, and status. • A team member can click a red button to expand the table to include detail, which lists all the tasks, with rank, name, estimate, owner, status. PERFECT: • A team member can view the iteration's stories and their status with main fields. • A team member can view the current burndown chart on the status page, and can click it for a larger view. • A team member can view or hide the tasks under the stories. • A team member can edit a task from the iteration status page. EXAMPLE
  • 6. • How do I add details to a user story ? • How Definition of Done is Validated ? • Who converts Acceptance Criteria's to Acceptance Test ? • Is it Product owners responsibility to list as many acceptance criteria as possible in order to clarify the intent of the story ? Answer Key: Acceptance Criteria . Acceptance Criteria . QA . Yes Q&A CREATION: The customer, customer proxy, product owner, and anyone else who identifies a need for the product can contribute user stories. OWNERSHIP AND MAINTATINANCE: The product owner owns the user stories and is responsible for writing, gathering, maintaining, and prioritizing. USAGE: Developers, testers, technical writers use user stories to be able to know what to implement and when they are done. Product owners track overall progress based on the status of the user stories. Management tends to track user stories rolled up to epics or features. USAGE OF STORIES
  • 7. Too formal or too much detail. • Product owners with good intentions often try to write extremely detailed user stories. If a team sees a story at iteration planning that looks like an IEEE requirements document, they often assume that all the details are there and will skip the detailed conversation. Technical tasks masquerading as stories. • Much of the power of Agile comes from having a working increment of software at the end of each iteration. If your stories are really just technical tasks, you often do not end up with working software at the end of each iteration, and you lose flexibility in prioritization. Skipping the conversation. • Stories are intentionally vague before iteration planning. If you skip the acceptance criteria conversation, you risk moving in the wrong direction, missing edge cases or overlooking customer needs. COMMON STORY MISTAKES
  • 8. TECHNQUES: story maps, workflow diagrams, storyboards, sketches, and mockups. TECHNICAL REQUIREMENTS: Include architectural element like a component or details like what a service should do Support by Technical User Stories Include UML NOTE: User stories is worthwhile when you develop software that’s likely to be reused. User stories are not about documenting requirements; they want to enable you to move fast and develop software as quickly as possible—not to impose any overhead. SUPPORTING ARTIFACTS
  • 9. CA Agile Central: User Story