The document discusses myths, legends, and monsters that may arise when scaling agile practices in an organization. Myths are used to justify the status quo and involve heroic figures, while legends spread rumors and lessons learned. Monsters represent resistance and require confronting objections. The document provides examples of each and suggests approaches like communication, negotiation, and aligning on values to address concerns raised by myths, legends, and monsters.
Originally given at MIGS2012, this presentation describes the high standard that should be applied to leaders in the video games industry. It also gives examples of how to improve and a description of what you can expect in an organization that focuses on quality leadership.
Email me for the full deck with notes, additional research results, and links to all of the studies backing up the statements made herein.
http://www.fullergameproduction.com
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/3.0/.
Originally given at MIGS2012, this presentation describes the high standard that should be applied to leaders in the video games industry. It also gives examples of how to improve and a description of what you can expect in an organization that focuses on quality leadership.
Email me for the full deck with notes, additional research results, and links to all of the studies backing up the statements made herein.
http://www.fullergameproduction.com
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/3.0/.
Myths, legends and monsters: The Quest for the Grail of Enterprise AgilityFrançois Bachmann
A different view of the obstacles facing the Agile Warrior trying to spread the good news to more than his team (eg. the department, the division, the company). Includes advice on how to deal with obstacles and how to use existing Company Culture.
Why do communication strategies often not work? How is a vision different than a mission statement? How can marketing materials, websites, and social media interactions reflect this vision? How can you tap into deeper emotion and motivation for donors, stakeholders, employees, and volunteers? This webinar will explore what is beneath and beyond strategy – how to become more digitally and operationally aligned with what matters.
An arduous pilgrimage towards Agile Learning Organisations of the Future and the vital role of HR. Considerations from Digital HR Innovation Week 2020. Full transcript on Linkedin.
- From Profit to Purpose
- From Efficiency to Learning
- From Control to Co-creation
- From Pyramids to Self-organizing Networks
- From Fear to Love
- From Hero to Alchemist
- From Machines to Living Organisms
Worksheet for 'mini-workshop' on insights from current developments and practice in enterprise-architecture (BCS-EA conference, London, October 2012)
This worksheet should be used in parallel with the associated presentation. The main part of the presentation is split into eight 'chunks', each tackling a single 'lesson-learnt' from trying to explain EA themes to others in real-world EA practice. Each 'chunk' is timed as around two minutes of background and overview (the bulk of the slides, between the respective 'Challenge' and 'Practice'), and then four minutes pair-discussion around the questions summarised on the respective 'Practice' slide. With two minutes at the start for overall lead-in, and ten minutes at the end for general discussion about what came up for participants during the Practice sections, this fits exactly into a one-hour time-slot. This worked very well for that conference, but do feel free to adapt the timings for your own needs as appropriate.
Use this worksheet to document the respective Practice sections. The large symbol in the middle of the open space below item #3 ("It depends...") represents a single service - of any kind, anywhere in the enterprise, and at any level, from business-service right down to low-level web-service - that you can use as a base from which to model relationships and interdependencies between services.
(See http://www.slideshare.net/tetradian/lessonslearnt-in-ea-articulation for the associated presentation.)
Talk first delivered on october 2023 at Agile Slovenia.
The key to great results in complex environments is to develop self-organizing and empowered teams. This has been described since the 1940's, and companies are still struggling to let go of the command and control paradigm or the classic silo-based, hierarchical organization. In this talk we explore some of the sources behind the idea of empowered, self-organizing teams and the main factors to grow this kind of team in your organization.
Myths, legends and monsters: The Quest for the Grail of Enterprise AgilityFrançois Bachmann
A different view of the obstacles facing the Agile Warrior trying to spread the good news to more than his team (eg. the department, the division, the company). Includes advice on how to deal with obstacles and how to use existing Company Culture.
Why do communication strategies often not work? How is a vision different than a mission statement? How can marketing materials, websites, and social media interactions reflect this vision? How can you tap into deeper emotion and motivation for donors, stakeholders, employees, and volunteers? This webinar will explore what is beneath and beyond strategy – how to become more digitally and operationally aligned with what matters.
An arduous pilgrimage towards Agile Learning Organisations of the Future and the vital role of HR. Considerations from Digital HR Innovation Week 2020. Full transcript on Linkedin.
- From Profit to Purpose
- From Efficiency to Learning
- From Control to Co-creation
- From Pyramids to Self-organizing Networks
- From Fear to Love
- From Hero to Alchemist
- From Machines to Living Organisms
Worksheet for 'mini-workshop' on insights from current developments and practice in enterprise-architecture (BCS-EA conference, London, October 2012)
This worksheet should be used in parallel with the associated presentation. The main part of the presentation is split into eight 'chunks', each tackling a single 'lesson-learnt' from trying to explain EA themes to others in real-world EA practice. Each 'chunk' is timed as around two minutes of background and overview (the bulk of the slides, between the respective 'Challenge' and 'Practice'), and then four minutes pair-discussion around the questions summarised on the respective 'Practice' slide. With two minutes at the start for overall lead-in, and ten minutes at the end for general discussion about what came up for participants during the Practice sections, this fits exactly into a one-hour time-slot. This worked very well for that conference, but do feel free to adapt the timings for your own needs as appropriate.
Use this worksheet to document the respective Practice sections. The large symbol in the middle of the open space below item #3 ("It depends...") represents a single service - of any kind, anywhere in the enterprise, and at any level, from business-service right down to low-level web-service - that you can use as a base from which to model relationships and interdependencies between services.
(See http://www.slideshare.net/tetradian/lessonslearnt-in-ea-articulation for the associated presentation.)
Talk first delivered on october 2023 at Agile Slovenia.
The key to great results in complex environments is to develop self-organizing and empowered teams. This has been described since the 1940's, and companies are still struggling to let go of the command and control paradigm or the classic silo-based, hierarchical organization. In this talk we explore some of the sources behind the idea of empowered, self-organizing teams and the main factors to grow this kind of team in your organization.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Myths, Legends and Monsters of Enterprise Agility
1. Myths,
Legends &
Monsters
The Quest for the
Grail of Enterprise Agility
François Bachmann, SPRiNT iT
2. Who’s talking
François Bachmann
• « The Urban Traffic Parable »
• « The Art of the Retrospective »
(Agile-Alchemist.com)
• Organisational Development Coach since 2004
• Interests:
Systemic Thinking, Complex Adaptive Systems
(like a Jam Session @AgileEE )
4. Your initial situation
• Pilot project « success »
• Request/need to scale this success
• Existing company
]Out of Scope[
• Introduction to Agile, Lean, Scrum, XP, …
• Growing an agile company
6. Warnings (2)
Agile is a mindset, an attitude
plan lots of time for full-fledged adoption
7. Starter: A customer myth
« Normal Change » at a Swiss bank
Source: http://itsm.certification.info/normalchg.html
8. Myth
A traditional or legendary story
that can contain a moral lesson
Built on Archetypes
Gods, animals, angels, demons, other worlds
Used to justify a social institution
and its way of viewing the world
Source: dictionary.reference.com
Told at ceremonies
(start, transformation, end)
Principal purpose: federate
9. Myths: project choice / dimension
« Let’s do Agile within a fixed-price contract »
« We apply Agile but only to Development »
« We do ALL our projects with Agile»
10. Myths: Roles
ScrumMaster: Thor / Superman /
James Bond / Chuck Norris
« Three Roles is enough for any
company »
Scrumdamentalism (H.Kniberg)
« In our company, we’re all like a big family»
11. Myths: transition
« Just use Scrum of Scrums
and everything will be fine»
« Trust me, in this company we know
what change management is! »
« To really become Agile,
you have to destroy & rebuild from scratch»
12. Summary: Myths
• Main purpose:
federate
• Used for
justification
of status quo
• Usually involve
superhumans
• Reveal values of the company
13. Legend
(lat. legenda = to be read)
• Official shape of the rumour
spread during coffee breaks
• « I know someone who… »
• Urban Legend
• Can end both ways
• Finishes with a lesson to learn
Principal purpose: education
14. Legend: Company Culture
« My cousin tried to introduce Agile in his
company: it didn’t work at all!
Now I agree that they have a very special
company culture….»
« Actually, our company culture
has always been agile; let’s just change the
terminology and we’ll be fine»
15. Customer Legends: Company Culture
• Mediterranean: mix of nationalities
• Web company: resource allocation > flow
16. Legends: Organisation
« It seems that this won’t work
in an outsourcing context… »
« Another team in our division used it during
a few months, their productivity dropped…
and they switched back afterwards»
« What about my career plan? »
17. Legends: Transition
« A well-planned transition is the cornerstone
of success: plan the work, work the plan»
« Let’s just establish a matrix between the
old and the new roles»
18. Legend: Tool
« Company X bought tool Y when
they moved to Agile and the whole
enterprise is now using it.
But how can I convince my
management? »
20. Monster
(lat. monstrum:
wild beast)
• Impersonates
resistance
• Gatekeeper
• Requires the
hero to go
beyond the
normal plan
21. Monsters: Middle Management
« I’ll be the Scrum Master for all teams »
« I can replace the Product Owner, if needed »
« Well, someone has to assign the developers to
projects, no?! »
Strengths: network, relationships
Weaknesses: conflicting priorities,
overestimates his potential influence
Fights for: his position and his « power »
Approach: give him a catalyst role,
actively include in information exchange
22. Monster: Project/Process Office
Distinguishing marks: once they understand Agile is not
going away, they will try to govern it and create rules
Strength: power to standardize
Weakness: mechanistic world view
Fights for: being the process master
and force their rules on developers
Approach:
1) produce their artefacts and
2) when the right time comes: question the value of
these artefacts (not of the Project Office!)
23. Monster: Saboteur
Definition:
Person who is involved
but has a hidden agenda
(subversion, obstruction,
disruption, or destruction)
Strength: internal knowledge
Weakness: bottleneck
Fights for: « unofficial » priorities
Approach: make responsibilities explicit,
confront one-on-one if necessary
24. Monster: AgileGuru
Pretends to sell the One And Only Agile
Distinguishing marks:
elitist, likes to fight
(he/she usually wins)
Strength: *very* convinced by his Agile flavor
Weakness: exclusive, tends to work alone
Fights for: his Truth (destroying others)
Approach: recall Agile values, let him show
how his flavor brings them forward
25. Summary: Monsters
• Strongholds, Gatekeepers
• Have power & reputation
• Often easier to « turn around »
than to overpower
• Advice: don’t play on their territory!