SlideShare a Scribd company logo
1 of 12
Robert R. Betcher PMP, CSM, ACP, CSPO & CSP
www.agileagile.com
© Copyright 2015
1)
Workflow
iT
2) Draw iT/
Wireframe
iT
3)
Research
iT
4) Screen
iT
5) Code iT
(10% at a
Time)
6) Approve
iT
7) Deploy
iT
We are visual
creatures,
who need to
see it
Spike to
Research if the
technology will
work
Build the Forms
and Report
Facades
Code a Small
Chunk (10%) or
less – reusable
dynamic 2 tier
code
Demo the 10%
to the Customer
Deploy it to
Production
Business
must know
the “end to
end” goal
1)
Workflow
iT
2) Draw iT/
Wireframe
iT
3)
Research
iT
4) Screen
iT
5) Code iT
– 10%
6) Approve
iT
7) Deploy
iT
Business
must know
the “end to
end” goal
Before the first line of code,
Business must know the
Process or “end to end” goal.
YOU NEED A MAP!
Will it make money?
Will it save money?
1)
Workflow
iT
2) Draw iT/
Wireframe
iT
3)
Research
iT
4) Screen
iT
5) Code iT
– 10%
6) Approve
iT
7) Deploy
iT
We are visual
creatures,
who need to
see it
Spike to
Research if the
technology will
work
Build the Forms
and Report
Facades
Code a Small
Chunk (10%) or
less – reusable
dynamic 2 tier
code
Demo the 10%
to the Customer
Deploy it to
Production
Business
must know
the “end to
end” goal
Our Minds are designed to
think in pictures, not words.
A PICTURE IS WORTH A THOUSAND WORDS!
No long drawn out requirements
(Use a UX expert)
1)
Workflow
iT
2) Draw iT/
Wireframe
iT
3)
Research
iT
4) Screen
iT
5) Code iT
– 10%
6) Approve
iT
7) Deploy
iT
We are visual
creatures,
who need to
see it
Spike to
Research if the
technology will
work
Build the Forms
and Report
Facades
Code a Small
Chunk (10%) or
less – reusable
dynamic 2 tier
code
Demo the 10%
to the Customer
Deploy it to
Production
Business
must know
the “end to
end” goal
Is the current technology available for a cost effective solution?
CAN IT BE DONE?
1)
Workflow
iT
2) Draw iT/
Wireframe
iT
3)
Research
iT
4) Screen
iT
5) Code iT
– 10%
6) Approve
iT
7) Deploy
iT
We are visual
creatures,
who need to
see it
Spike to
Research if the
technology will
work
Build the Forms
and Report
Facades
Code a Small
Chunk (10%) or
less – reusable
dynamic 2 tier
code
Demo the 10%
to the Customer
Deploy it to
Production
Business
must know
the “end to
end” goal
Build all the faces or facades for review. Give them a Proof of Concept.
PAINT SOME SCREENS!
1)
Workflow
iT
2) Draw iT/
Wireframe
iT
3)
Research
iT
4) Screen
iT
5) Code iT
(10% at a
Time)
6) Approve
iT
7) Deploy
iT
We are visual
creatures,
who need to
see it
Spike to
Research if the
technology will
work
Build the Forms
and Report
Facades
Code a Small
Chunk (10%) or
less – reusable
dynamic 2 tier
code
Demo the 10%
to the Customer
Deploy it to
Production
Business
must know
the “end to
end” goal
1) No or Limited 3rd Party Controls
2) 2 – Tier Architecture to Start
(let’s make sure it works for 1 person before
building for 10,000 users)
3) Inline SQL or Stored Proc. to Start
4) Less than .1 defects per 1K Line of Code
(Clean Coding Standards w/ a 0 defect tolerance
policy)
5) No TDD – Clean Code with visible Defect Boards
6) Code delivered in 10% chunks w/ thorough code
reviews
7) Don’t Hard Code!
If it can’t be changed quickly then it wasn’t written
correctly.
8) Refactor!
Name of the game: “less is more” which equals “fewer points of failure”
KIS! Keep it Simple!
1)
Workflow
iT
2) Draw iT/
Wireframe
iT
3)
Research
iT
4) Screen
iT
5) Code iT
(10% at a
Time)
6) Approve
iT
7) Deploy
iT
We are visual
creatures,
who need to
see it
Spike to
Research if the
technology will
work
Build the Forms
and Report
Facades
Code a Small
Chunk (10%) or
less – reusable
dynamic 2 tier
code
Demo the 10%
to the Customer
Deploy it to
Production
Business
must know
the “end to
end” goal
KIS! Keep it Simple!
There was a time where quality code was developed for massive enterprise systems that did not
require multiple tiers, countless requirements documents or massive testing teams.
There was a time when code worked the first time because developers were diligent.
Fact: Test Driven Development (TDD) was created and abandoned by NASA in
the 60’s. NASA is an organization where each line of code Costs
approximately $800.
Fact: 1 Developer can produce 1000 lines of code using Visible Defect Boards
with less than .1 defects in almost 1/3 of the time for TDD.
Fact: TDD does not fix the root cause of the problem:
Careless Development and Unengaged Product Management
1)
Workflow
iT
2) Draw iT/
Wireframe
iT
3)
Research
iT
4) Screen
iT
5) Code iT
(10% at a
Time)
6) Approve
iT
7) Deploy
iT
We are visual
creatures,
who need to
see it
Spike to
Research if the
technology will
work
Build the Forms
and Report
Facades
Code a Small
Chunk (10%) or
less – reusable
dynamic 2 tier
code
Demo the 10%
to the Customer
Deploy it to
Production
Business
must know
the “end to
end” goal
Show it to the Business!
Get immediate Feedback
1)
Workflow
iT
2) Draw iT/
Wireframe
iT
3)
Research
iT
4) Screen
iT
5) Code iT
(10% at a
Time)
6) Approve
iT
7) Deploy
iT
We are visual
creatures,
who need to
see it
Spike to
Research if the
technology will
work
Build the Forms
and Report
Facades
Code a Small
Chunk (10%) or
less – reusable
dynamic 2 tier
code
Demo the 10%
to the Customer
Deploy it to
Production
Business
must know
the “end to
end” goal
Continuous Delivery
1)
Workflow
iT
2) Draw iT/
Wireframe
iT
3)
Research
iT
4) Screen
iT
5) Code iT
(10% at a
Time)
6) Approve
iT
7) Deploy
iT
We are visual
creatures,
who need to
see it
Spike to
Research if the
technology will
work
Build the Forms
and Report
Facades
Code a Small
Chunk (10%) or
less – reusable
dynamic 2 tier
code
Demo the 10%
to the Customer
Deploy it to
Production
Business
must know
the “end to
end” goal
WASH, RINSE & REPEAT!
(and refactor)
Robert R. Betcher PMP, CSM, ACP, CSPO & CSP
www.agileagile.com
© Copyright 2015

More Related Content

Viewers also liked

Safe use of power tools
Safe use of power tools Safe use of power tools
Safe use of power tools
htmisper
 

Viewers also liked (10)

SAFe® - scaled agile framework in practice
SAFe® - scaled agile framework in practiceSAFe® - scaled agile framework in practice
SAFe® - scaled agile framework in practice
 
Scaled Agile Framework Roadmap Template
Scaled Agile Framework Roadmap TemplateScaled Agile Framework Roadmap Template
Scaled Agile Framework Roadmap Template
 
Scaled Agile Framework (SAFe) Roles and Meetings
Scaled Agile Framework (SAFe) Roles and MeetingsScaled Agile Framework (SAFe) Roles and Meetings
Scaled Agile Framework (SAFe) Roles and Meetings
 
Safe use of power tools
Safe use of power tools Safe use of power tools
Safe use of power tools
 
Enterprise Agile Transformation Strategies
Enterprise Agile Transformation StrategiesEnterprise Agile Transformation Strategies
Enterprise Agile Transformation Strategies
 
Agile Transformation and Cultural Change
 Agile Transformation and Cultural Change Agile Transformation and Cultural Change
Agile Transformation and Cultural Change
 
Scaling Agile With SAFe (Scaled Agile Framework)
Scaling Agile With SAFe (Scaled Agile Framework)Scaling Agile With SAFe (Scaled Agile Framework)
Scaling Agile With SAFe (Scaled Agile Framework)
 
Scaled Agile Framework in 10 minutes (CAS2015)
Scaled Agile Framework in 10 minutes (CAS2015)Scaled Agile Framework in 10 minutes (CAS2015)
Scaled Agile Framework in 10 minutes (CAS2015)
 
An Introduction to Scaled Agile Framework (SAFe)
An Introduction to Scaled Agile Framework (SAFe)An Introduction to Scaled Agile Framework (SAFe)
An Introduction to Scaled Agile Framework (SAFe)
 
Comparing Scaled Agile Framework (SAFe) and Disciplined Agile Delivery (DAD)
Comparing Scaled Agile Framework (SAFe) and Disciplined Agile Delivery (DAD) Comparing Scaled Agile Framework (SAFe) and Disciplined Agile Delivery (DAD)
Comparing Scaled Agile Framework (SAFe) and Disciplined Agile Delivery (DAD)
 

Similar to Bulletproof Development

Resume_PankajTaneja_Infosystem
Resume_PankajTaneja_InfosystemResume_PankajTaneja_Infosystem
Resume_PankajTaneja_Infosystem
Pankaj Taneja
 

Similar to Bulletproof Development (20)

Eliminate 7 Mudas
Eliminate 7 MudasEliminate 7 Mudas
Eliminate 7 Mudas
 
Performance monitoring and call tracing in microservice environments
Performance monitoring and call tracing in microservice environmentsPerformance monitoring and call tracing in microservice environments
Performance monitoring and call tracing in microservice environments
 
Develop Future Proof IoT: Composable Semantics, Security, FuSa, and QoS
Develop Future Proof IoT: Composable Semantics, Security, FuSa, and QoSDevelop Future Proof IoT: Composable Semantics, Security, FuSa, and QoS
Develop Future Proof IoT: Composable Semantics, Security, FuSa, and QoS
 
Pareto will tell you to stop using your ORM - Mateo Collina
Pareto will tell you to stop using your ORM - Mateo CollinaPareto will tell you to stop using your ORM - Mateo Collina
Pareto will tell you to stop using your ORM - Mateo Collina
 
[코세나, kosena] Auto ML, H2O.ai의 제조분야 AI 활용 사례
[코세나, kosena] Auto ML, H2O.ai의 제조분야 AI 활용 사례[코세나, kosena] Auto ML, H2O.ai의 제조분야 AI 활용 사례
[코세나, kosena] Auto ML, H2O.ai의 제조분야 AI 활용 사례
 
My Resume (2016-06-25)
My Resume (2016-06-25)My Resume (2016-06-25)
My Resume (2016-06-25)
 
Continuous delivery in Pipedrive
Continuous delivery in PipedriveContinuous delivery in Pipedrive
Continuous delivery in Pipedrive
 
Nuts and bolts of IT agility
Nuts and bolts of IT agilityNuts and bolts of IT agility
Nuts and bolts of IT agility
 
IRJET- New Generation Multilevel based Atm Security System
IRJET- New Generation Multilevel based Atm Security SystemIRJET- New Generation Multilevel based Atm Security System
IRJET- New Generation Multilevel based Atm Security System
 
Making Use of a Knowledgeable Design by Design for Manufacturing
Making Use of a Knowledgeable Design by Design for ManufacturingMaking Use of a Knowledgeable Design by Design for Manufacturing
Making Use of a Knowledgeable Design by Design for Manufacturing
 
Procedure of Proactively Designing Products by Design for Manufacturability (...
Procedure of Proactively Designing Products by Design for Manufacturability (...Procedure of Proactively Designing Products by Design for Manufacturability (...
Procedure of Proactively Designing Products by Design for Manufacturability (...
 
Developer Experience
Developer ExperienceDeveloper Experience
Developer Experience
 
IRJET - New Generation Multilevel based Atm Security System
IRJET - New Generation Multilevel based Atm Security SystemIRJET - New Generation Multilevel based Atm Security System
IRJET - New Generation Multilevel based Atm Security System
 
From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018
 
Larson and toubro
Larson and toubroLarson and toubro
Larson and toubro
 
2014-10 DevOps NFi - Why it's a good idea to deploy 10 times per day v1.0
2014-10 DevOps NFi - Why it's a good idea to deploy 10 times per day v1.02014-10 DevOps NFi - Why it's a good idea to deploy 10 times per day v1.0
2014-10 DevOps NFi - Why it's a good idea to deploy 10 times per day v1.0
 
DesiradhaRam Gadde - Testers & Testing in ChatGPT-AI world.pptx
DesiradhaRam Gadde - Testers & Testing in ChatGPT-AI world.pptxDesiradhaRam Gadde - Testers & Testing in ChatGPT-AI world.pptx
DesiradhaRam Gadde - Testers & Testing in ChatGPT-AI world.pptx
 
DesiradhaRam Gadde - Testers & Testing in ChatGPT-AI world.pptx
DesiradhaRam Gadde - Testers & Testing in ChatGPT-AI world.pptxDesiradhaRam Gadde - Testers & Testing in ChatGPT-AI world.pptx
DesiradhaRam Gadde - Testers & Testing in ChatGPT-AI world.pptx
 
DesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptx
DesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptxDesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptx
DesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptx
 
Resume_PankajTaneja_Infosystem
Resume_PankajTaneja_InfosystemResume_PankajTaneja_Infosystem
Resume_PankajTaneja_Infosystem
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

Bulletproof Development

  • 1. Robert R. Betcher PMP, CSM, ACP, CSPO & CSP www.agileagile.com © Copyright 2015
  • 2. 1) Workflow iT 2) Draw iT/ Wireframe iT 3) Research iT 4) Screen iT 5) Code iT (10% at a Time) 6) Approve iT 7) Deploy iT We are visual creatures, who need to see it Spike to Research if the technology will work Build the Forms and Report Facades Code a Small Chunk (10%) or less – reusable dynamic 2 tier code Demo the 10% to the Customer Deploy it to Production Business must know the “end to end” goal
  • 3. 1) Workflow iT 2) Draw iT/ Wireframe iT 3) Research iT 4) Screen iT 5) Code iT – 10% 6) Approve iT 7) Deploy iT Business must know the “end to end” goal Before the first line of code, Business must know the Process or “end to end” goal. YOU NEED A MAP! Will it make money? Will it save money?
  • 4. 1) Workflow iT 2) Draw iT/ Wireframe iT 3) Research iT 4) Screen iT 5) Code iT – 10% 6) Approve iT 7) Deploy iT We are visual creatures, who need to see it Spike to Research if the technology will work Build the Forms and Report Facades Code a Small Chunk (10%) or less – reusable dynamic 2 tier code Demo the 10% to the Customer Deploy it to Production Business must know the “end to end” goal Our Minds are designed to think in pictures, not words. A PICTURE IS WORTH A THOUSAND WORDS! No long drawn out requirements (Use a UX expert)
  • 5. 1) Workflow iT 2) Draw iT/ Wireframe iT 3) Research iT 4) Screen iT 5) Code iT – 10% 6) Approve iT 7) Deploy iT We are visual creatures, who need to see it Spike to Research if the technology will work Build the Forms and Report Facades Code a Small Chunk (10%) or less – reusable dynamic 2 tier code Demo the 10% to the Customer Deploy it to Production Business must know the “end to end” goal Is the current technology available for a cost effective solution? CAN IT BE DONE?
  • 6. 1) Workflow iT 2) Draw iT/ Wireframe iT 3) Research iT 4) Screen iT 5) Code iT – 10% 6) Approve iT 7) Deploy iT We are visual creatures, who need to see it Spike to Research if the technology will work Build the Forms and Report Facades Code a Small Chunk (10%) or less – reusable dynamic 2 tier code Demo the 10% to the Customer Deploy it to Production Business must know the “end to end” goal Build all the faces or facades for review. Give them a Proof of Concept. PAINT SOME SCREENS!
  • 7. 1) Workflow iT 2) Draw iT/ Wireframe iT 3) Research iT 4) Screen iT 5) Code iT (10% at a Time) 6) Approve iT 7) Deploy iT We are visual creatures, who need to see it Spike to Research if the technology will work Build the Forms and Report Facades Code a Small Chunk (10%) or less – reusable dynamic 2 tier code Demo the 10% to the Customer Deploy it to Production Business must know the “end to end” goal 1) No or Limited 3rd Party Controls 2) 2 – Tier Architecture to Start (let’s make sure it works for 1 person before building for 10,000 users) 3) Inline SQL or Stored Proc. to Start 4) Less than .1 defects per 1K Line of Code (Clean Coding Standards w/ a 0 defect tolerance policy) 5) No TDD – Clean Code with visible Defect Boards 6) Code delivered in 10% chunks w/ thorough code reviews 7) Don’t Hard Code! If it can’t be changed quickly then it wasn’t written correctly. 8) Refactor! Name of the game: “less is more” which equals “fewer points of failure” KIS! Keep it Simple!
  • 8. 1) Workflow iT 2) Draw iT/ Wireframe iT 3) Research iT 4) Screen iT 5) Code iT (10% at a Time) 6) Approve iT 7) Deploy iT We are visual creatures, who need to see it Spike to Research if the technology will work Build the Forms and Report Facades Code a Small Chunk (10%) or less – reusable dynamic 2 tier code Demo the 10% to the Customer Deploy it to Production Business must know the “end to end” goal KIS! Keep it Simple! There was a time where quality code was developed for massive enterprise systems that did not require multiple tiers, countless requirements documents or massive testing teams. There was a time when code worked the first time because developers were diligent. Fact: Test Driven Development (TDD) was created and abandoned by NASA in the 60’s. NASA is an organization where each line of code Costs approximately $800. Fact: 1 Developer can produce 1000 lines of code using Visible Defect Boards with less than .1 defects in almost 1/3 of the time for TDD. Fact: TDD does not fix the root cause of the problem: Careless Development and Unengaged Product Management
  • 9. 1) Workflow iT 2) Draw iT/ Wireframe iT 3) Research iT 4) Screen iT 5) Code iT (10% at a Time) 6) Approve iT 7) Deploy iT We are visual creatures, who need to see it Spike to Research if the technology will work Build the Forms and Report Facades Code a Small Chunk (10%) or less – reusable dynamic 2 tier code Demo the 10% to the Customer Deploy it to Production Business must know the “end to end” goal Show it to the Business! Get immediate Feedback
  • 10. 1) Workflow iT 2) Draw iT/ Wireframe iT 3) Research iT 4) Screen iT 5) Code iT (10% at a Time) 6) Approve iT 7) Deploy iT We are visual creatures, who need to see it Spike to Research if the technology will work Build the Forms and Report Facades Code a Small Chunk (10%) or less – reusable dynamic 2 tier code Demo the 10% to the Customer Deploy it to Production Business must know the “end to end” goal Continuous Delivery
  • 11. 1) Workflow iT 2) Draw iT/ Wireframe iT 3) Research iT 4) Screen iT 5) Code iT (10% at a Time) 6) Approve iT 7) Deploy iT We are visual creatures, who need to see it Spike to Research if the technology will work Build the Forms and Report Facades Code a Small Chunk (10%) or less – reusable dynamic 2 tier code Demo the 10% to the Customer Deploy it to Production Business must know the “end to end” goal WASH, RINSE & REPEAT! (and refactor)
  • 12. Robert R. Betcher PMP, CSM, ACP, CSPO & CSP www.agileagile.com © Copyright 2015