The document provides an agenda and overview of an introduction to agile methodology presented by Damon Poole. It covers topics such as an overview of agile, cross-functional self-organized teams, user stories, agile planning, agile flow, and includes a Q&A section.
Mr. Tanaka is an expert of the “Oobeya” method used to visually manage complex, transversal projects. At the European Lean IT Summit 2012, he presented his latest innovation: the “digital oobeya”, or how to combine technology and this state-of-the-art project management method in a distributed team context.
We usually think of agility for software development — agility allows a small team to produce valuable software.
However, this is not the only place for agility. In this talk Dan discusses the «layering» of agility in a software- focused organization.
This layering starts at the bottom, with Agile Software Development (the writing of quality code), and ends at the top, with Agile Portfolio Management (the management of Projects, Programs, and Products for the good of the Organization).
In this (non-technical, yet entertaining) talk Dan develops a big picture showing how all the pieces fit together in a logical model.
"The myth of Certainty - Is implementation a naughty word?" by Steve BellOperae Partners
This document discusses challenges facing traditional approaches to enterprise IT management. It notes that enterprise IT has become fast, complex, competitive and disruptive. New technologies like mobile devices, social networking and cloud computing are driving more change. The traditional IT model focuses too much on keeping the lights on rather than innovation. It argues that doing new things is risky but necessary for transformation. Effective leadership is needed to guide IT through these challenges with competence rather than overconfidence.
Agile 2012 Conference briefing deck for Analyst and Press Laszlo Szalvay
This is the CollabNet briefing deck that was used at the Agile 2012 tradeshow. It features updates from our thought leaders books, our Products (ScrumWorks Pro 7.0 release) and our new messaging around Enterprise Cloud Development (ECD).
Globallogic (Formerly Cubika), es líder a nivel mundial en Servicios de I+D, Consultoría y Desarrollo de Software. GlobalLogic cuenta con más de 10 años en el mercado, más de 150 clientes, 3300 empleados y presencia en Estados Unidos, India, Ukrania, Israel, China y Argentina.
Contamos con una amplia trayectoria en proyectos de desarrollo de aplicaciones basados en nuevas tecnologías en las empresas líderes de la región de las principales industrias (Finanzas, Telecomunicaciones, Manufactura, Utilities, Gobierno, Medios y Entretenimiento).
Nuestro liderazgo en I+D nos permite estar a la vanguardia en IT anticipando los cambios en las distintas tecnologías. Así, protegemos la inversión y logramos ventajas competitivas para nuestros clientes.
"Information needs for the lean organization" by Jean CunninghamOperae Partners
The traditional cost statements and metrics will derail a lean transformation. Standard cost systems drive production to capacity rather than customer demand. Providing simple, easy, Jean Cunningham's presentation at the 1st European Lean IT Summit held in Paris in October 2011.
The document outlines an iterative methodology for deploying Aras Innovator. It discusses dividing projects into manageable phases like inception, elaboration, construction, and transition. Each phase has objectives and milestones. The methodology emphasizes iterative design, managing requirements, continuous verification, and controlling changes. It provides tips for implementation like using visual prototypes, breaking work into components, and ensuring quality through user testing.
Faurecia is a manufacturer of car parts with 90 Just-In-Time production sites that rely on critical IT systems. They developed their Manufacturing Execution System (MES) called fJiT using Agile methods but found they needed to improve collaboration across teams. Tieto coaches helped implement Scrum and define roles. A Kaizen workshop mapped the value stream, found issues, and brainstormed solutions. Participants developed a release plan and better understood each other's roles, improving synchronization. While Agile was a start, adopting more Lean principles across the full value chain was needed for continuous improvement.
Mr. Tanaka is an expert of the “Oobeya” method used to visually manage complex, transversal projects. At the European Lean IT Summit 2012, he presented his latest innovation: the “digital oobeya”, or how to combine technology and this state-of-the-art project management method in a distributed team context.
We usually think of agility for software development — agility allows a small team to produce valuable software.
However, this is not the only place for agility. In this talk Dan discusses the «layering» of agility in a software- focused organization.
This layering starts at the bottom, with Agile Software Development (the writing of quality code), and ends at the top, with Agile Portfolio Management (the management of Projects, Programs, and Products for the good of the Organization).
In this (non-technical, yet entertaining) talk Dan develops a big picture showing how all the pieces fit together in a logical model.
"The myth of Certainty - Is implementation a naughty word?" by Steve BellOperae Partners
This document discusses challenges facing traditional approaches to enterprise IT management. It notes that enterprise IT has become fast, complex, competitive and disruptive. New technologies like mobile devices, social networking and cloud computing are driving more change. The traditional IT model focuses too much on keeping the lights on rather than innovation. It argues that doing new things is risky but necessary for transformation. Effective leadership is needed to guide IT through these challenges with competence rather than overconfidence.
Agile 2012 Conference briefing deck for Analyst and Press Laszlo Szalvay
This is the CollabNet briefing deck that was used at the Agile 2012 tradeshow. It features updates from our thought leaders books, our Products (ScrumWorks Pro 7.0 release) and our new messaging around Enterprise Cloud Development (ECD).
Globallogic (Formerly Cubika), es líder a nivel mundial en Servicios de I+D, Consultoría y Desarrollo de Software. GlobalLogic cuenta con más de 10 años en el mercado, más de 150 clientes, 3300 empleados y presencia en Estados Unidos, India, Ukrania, Israel, China y Argentina.
Contamos con una amplia trayectoria en proyectos de desarrollo de aplicaciones basados en nuevas tecnologías en las empresas líderes de la región de las principales industrias (Finanzas, Telecomunicaciones, Manufactura, Utilities, Gobierno, Medios y Entretenimiento).
Nuestro liderazgo en I+D nos permite estar a la vanguardia en IT anticipando los cambios en las distintas tecnologías. Así, protegemos la inversión y logramos ventajas competitivas para nuestros clientes.
"Information needs for the lean organization" by Jean CunninghamOperae Partners
The traditional cost statements and metrics will derail a lean transformation. Standard cost systems drive production to capacity rather than customer demand. Providing simple, easy, Jean Cunningham's presentation at the 1st European Lean IT Summit held in Paris in October 2011.
The document outlines an iterative methodology for deploying Aras Innovator. It discusses dividing projects into manageable phases like inception, elaboration, construction, and transition. Each phase has objectives and milestones. The methodology emphasizes iterative design, managing requirements, continuous verification, and controlling changes. It provides tips for implementation like using visual prototypes, breaking work into components, and ensuring quality through user testing.
Faurecia is a manufacturer of car parts with 90 Just-In-Time production sites that rely on critical IT systems. They developed their Manufacturing Execution System (MES) called fJiT using Agile methods but found they needed to improve collaboration across teams. Tieto coaches helped implement Scrum and define roles. A Kaizen workshop mapped the value stream, found issues, and brainstormed solutions. Participants developed a release plan and better understood each other's roles, improving synchronization. While Agile was a start, adopting more Lean principles across the full value chain was needed for continuous improvement.
"Lean IT practices, from theory to application" by Mike OrzenOperae Partners
The document discusses applying lean principles to IT. It begins by explaining that value in IT comes from information, not functionality alone. It then describes how IT work can be visualized through multiple interconnected value streams. The document advocates understanding real work, streamlining communication, simplifying processes, and using hypothesis-driven problem solving. It provides an example of applying these principles to processing client records. Finally, it discusses challenges of continuous process improvement in IT and offers examples of areas where lean has been applied successfully.
The document discusses using Kanban principles and lean thinking to improve operations beyond just using a Kanban board. It provides examples of how a telecommunications company improved customer communication, delivery times, work hours and motivation by applying Kanban and lean principles. Additional benefits included identifying deficiencies, improving contractor services, increasing consultant skills and gaining new customers and projects. The conclusion emphasizes thinking holistically about workflow, constraints and culture when using Kanban for continuous improvement.
The document provides an overview of Fusion Applications, including:
1) Fusion Applications is a new generation of business applications built using Fusion Middleware that combines and optimizes existing Oracle applications like EBS along with improved usability and business processes.
2) It features a process-centric and intuitive user interface aligned with real-life business processes, embedded analytical dashboards, and integrated collaboration features.
3) Fusion Applications are built on a service-oriented architecture using ADF, SDO, BPEL, and other Fusion Middleware components to provide a flexible and customizable platform.
Scrum Day 2012 Keynote: Combining Design and DevelopmentTobias Schimmer
1) Traditionally, design and development were separate processes but agile methodologies aim to combine them through practices like user story mapping and prototyping.
2) Design thinking focuses on understanding problems from the user perspective through techniques like personas and user research to create the right solutions.
3) At SAP, design and development teams work collaboratively using shared principles and practices like product vision, product backlog, and iterative development to better meet user needs.
Product management as a discipline is undergoing a transition towards data-driven decision making. As the cost of testing product feature ideas falls, the role of a product manager becomes one based on testing many feature ideas, and rolling out proven features. In this presentation we touch on some of the trends behind this paradigm shift, and consider some tools the product manager can use.
The document discusses the role of a business analyst in an agile project. It begins with an overview of agile software development and the agile manifesto. It then discusses the agile project management framework Scrum and key roles in Scrum including the product owner and scrum master. The document argues that the business analyst can play a valuable role in agile projects by partnering with the product owner to help define requirements, refine user stories, and ensure solutions deliver business value.
The document discusses challenges faced when integrating two telecommunications companies, Orange and T-Mobile. It describes how the integration required a large number of short timeline projects that competed for resources with existing business projects. To manage both portfolios, the company established a program management office to coordinate the integration projects and ensure they were prioritized alongside existing business needs. Key activities included aligning senior leadership, establishing common processes, tracking progress, and change management communications. The solution helped integrate the new projects while minimizing delays to existing business operations.
Jams are online discussions that elicit participation from thousands to spur innovation. They are guided by subject-matter experts and moderators to build on ideas. IBM has used jams for collaboration and innovation, discussing strategies and validating values across the company. Customers use jams to develop ideas and make a difference.
Developing and Delivering Products in an Agile World (.75 PMI PDU)DCsteve
Customers expect delivery of your new products quicker and easier than ever before. Whether your customers are internal or external, they expect you to develop new products with increased frequency and to put those products in their hands seamlessly and automatically.
Learn how you can take advantage of Agile development methods to develop and ship quicker while maintaining the project and financial management your business requires. And, learn ways to automate your product delivery to get these products to your customers immediately upon completion. Bring automation and Agile development together to deliver new products to your customers more often and easier than ever before.
All attendees are eligible for .75 PDU Credit from the Project Management Institute (PMI).
Get the Transformational Story of Going Agile @ http://digitalcelerity.com/Pages.aspx/Agile-PPM
This document discusses how Agile principles and practices can support ITIL frameworks. It advocates that development adopt Agile methods fully through automation, customer involvement, and focus on quality. It also stresses the importance of operations participating in development and allowing frequent changes. Adopting these approaches can improve service quality, reduce risks, and foster collaboration between teams. The document provides advice such as implementing process changes incrementally and ensuring both process owners and managers are involved.
The document discusses visual experience design and user interface design. It advocates designing the data model first before designing the user interface. It also recommends modifying the typical design process to incorporate more contextual insights, rapid prototyping, and iterative design. The presentation provides examples of visualizing data and interactions as well as a timeline of the presenter's career in design and visualization.
Michael kennedy set-based decision making taming system complexityAGILEMinds
The document discusses challenges with traditional "phase-gate" product development approaches and describes an alternative set-based decision making approach used by Toyota. Specifically, it notes that phase-gate approaches often result in project delays and cost overruns due to decisions made early in development before critical knowledge is known. In contrast, Toyota focuses on developing knowledge through rapid cycles of learning and convergence across projects, delaying design decisions as long as possible and doing more validation testing upfront to learn before designing. This set-based approach manages knowledge growth into products through cadences of learning pulled into successive launches.
The document discusses testing in an Agile context. It presents an agenda on finding issues earlier using Agile methods, the effects of quality debt, definitions of done, quality dashboards, and Agile test and integration strategies like acceptance test-driven development. It also covers managing configuration debt and questions.
Creative Labs India is an interactive digital agency based in Bangalore, India. We put together creative thinking, digital strategy, user experience, interface design, and web development services to IT, healthcare, hospitality, entertainment and retail industries worldwide.
Agilität ist in aller Munde – von den einen abgöttisch geliebt und es soll noch andere geben, die sie nicht so gerne mögen. Jedem das Seine. Doch wie sieht die agile Landschaft in der Schweizer IT Community aus? Laden Sie die Agile Trends & Benchmarks 2012 herunter ziehen Sie Ihre eigenen Schlüsse daraus.
Customers often tell us they are unhappy with their current ITSM tool solution. Some go so far as to say “we really didn’t like the previous tool either, but it is much better than the one we just implemented”. The root cause of this dissatisfaction is (usually) not the functionality of the tool itself, but in how the tool was rolled out and how expectations were communicated. Join us, as we will share insight on considerations and attributes associated with successes and failures of ITSM tool implementations….going from Strategy to Execution.
This document discusses scaling product ownership across multiple teams working on a large, complex Department of Defense program. It outlines several key steps taken: 1) Establishing a unified vision and goals for the overall product; 2) Managing overwhelming requirements requests from stakeholders by focusing on core needs; 3) Creating a checklist for scaling product ownership that includes establishing the product name and benefits. The goal is to thoughtfully scale product ownership while optimizing teams to deliver the highest priority capabilities for stakeholders.
A talk by Alan Shalloway at the European Lean IT Summit 2012. This talk provides 2 essential meta-patterns of Lean: focus on value and eliminating delays. These can be used to guide the creation of an effective and efficient workflow. It presents four case studies, each building on the concepts of the other, to provide actionable advice for your own implementations.
More Lean IT presentations and videos on www.lean-it-summit.com
This is a presentation I gave at the Central Indiana MPUG September 2012 meeting.
Abstract:
There are many commonly held myths about agile. Two of these myths are that agile projects don’t do any planning and that you can’t do agile on a fixed date project. In this presentation we will disprove these two myths by exploring just how agile planning is accomplished and how you can not only use agile on fixed date projects but also improve your accuracy and consistency in hitting those dates with agile.
This document discusses how to make enterprise architecture (EA) more agile using agile methods. It defines agility and outlines an "agility chain" with agile EA process, agile architecture, agile development, and agile enterprise as links. Various agile patterns are presented that can be applied to EA, such as subset, reuse, parallel, and hypothesis-driven approaches. Iterations and focusing on meta-models instead of customers are also discussed.
The Empowering Agile Teams Presentation has been presented at numerous Agile Conferences and has been VERY well received. Many teams get frustrated due to the lack of understanding of what they are expected to deliver vs what has been perceived. Gone are the days of opacity. Teams are better equipped to handle the day to day workload and are less fearful of commitment in an environment where healthy team relationships are valued.
"Lean IT practices, from theory to application" by Mike OrzenOperae Partners
The document discusses applying lean principles to IT. It begins by explaining that value in IT comes from information, not functionality alone. It then describes how IT work can be visualized through multiple interconnected value streams. The document advocates understanding real work, streamlining communication, simplifying processes, and using hypothesis-driven problem solving. It provides an example of applying these principles to processing client records. Finally, it discusses challenges of continuous process improvement in IT and offers examples of areas where lean has been applied successfully.
The document discusses using Kanban principles and lean thinking to improve operations beyond just using a Kanban board. It provides examples of how a telecommunications company improved customer communication, delivery times, work hours and motivation by applying Kanban and lean principles. Additional benefits included identifying deficiencies, improving contractor services, increasing consultant skills and gaining new customers and projects. The conclusion emphasizes thinking holistically about workflow, constraints and culture when using Kanban for continuous improvement.
The document provides an overview of Fusion Applications, including:
1) Fusion Applications is a new generation of business applications built using Fusion Middleware that combines and optimizes existing Oracle applications like EBS along with improved usability and business processes.
2) It features a process-centric and intuitive user interface aligned with real-life business processes, embedded analytical dashboards, and integrated collaboration features.
3) Fusion Applications are built on a service-oriented architecture using ADF, SDO, BPEL, and other Fusion Middleware components to provide a flexible and customizable platform.
Scrum Day 2012 Keynote: Combining Design and DevelopmentTobias Schimmer
1) Traditionally, design and development were separate processes but agile methodologies aim to combine them through practices like user story mapping and prototyping.
2) Design thinking focuses on understanding problems from the user perspective through techniques like personas and user research to create the right solutions.
3) At SAP, design and development teams work collaboratively using shared principles and practices like product vision, product backlog, and iterative development to better meet user needs.
Product management as a discipline is undergoing a transition towards data-driven decision making. As the cost of testing product feature ideas falls, the role of a product manager becomes one based on testing many feature ideas, and rolling out proven features. In this presentation we touch on some of the trends behind this paradigm shift, and consider some tools the product manager can use.
The document discusses the role of a business analyst in an agile project. It begins with an overview of agile software development and the agile manifesto. It then discusses the agile project management framework Scrum and key roles in Scrum including the product owner and scrum master. The document argues that the business analyst can play a valuable role in agile projects by partnering with the product owner to help define requirements, refine user stories, and ensure solutions deliver business value.
The document discusses challenges faced when integrating two telecommunications companies, Orange and T-Mobile. It describes how the integration required a large number of short timeline projects that competed for resources with existing business projects. To manage both portfolios, the company established a program management office to coordinate the integration projects and ensure they were prioritized alongside existing business needs. Key activities included aligning senior leadership, establishing common processes, tracking progress, and change management communications. The solution helped integrate the new projects while minimizing delays to existing business operations.
Jams are online discussions that elicit participation from thousands to spur innovation. They are guided by subject-matter experts and moderators to build on ideas. IBM has used jams for collaboration and innovation, discussing strategies and validating values across the company. Customers use jams to develop ideas and make a difference.
Developing and Delivering Products in an Agile World (.75 PMI PDU)DCsteve
Customers expect delivery of your new products quicker and easier than ever before. Whether your customers are internal or external, they expect you to develop new products with increased frequency and to put those products in their hands seamlessly and automatically.
Learn how you can take advantage of Agile development methods to develop and ship quicker while maintaining the project and financial management your business requires. And, learn ways to automate your product delivery to get these products to your customers immediately upon completion. Bring automation and Agile development together to deliver new products to your customers more often and easier than ever before.
All attendees are eligible for .75 PDU Credit from the Project Management Institute (PMI).
Get the Transformational Story of Going Agile @ http://digitalcelerity.com/Pages.aspx/Agile-PPM
This document discusses how Agile principles and practices can support ITIL frameworks. It advocates that development adopt Agile methods fully through automation, customer involvement, and focus on quality. It also stresses the importance of operations participating in development and allowing frequent changes. Adopting these approaches can improve service quality, reduce risks, and foster collaboration between teams. The document provides advice such as implementing process changes incrementally and ensuring both process owners and managers are involved.
The document discusses visual experience design and user interface design. It advocates designing the data model first before designing the user interface. It also recommends modifying the typical design process to incorporate more contextual insights, rapid prototyping, and iterative design. The presentation provides examples of visualizing data and interactions as well as a timeline of the presenter's career in design and visualization.
Michael kennedy set-based decision making taming system complexityAGILEMinds
The document discusses challenges with traditional "phase-gate" product development approaches and describes an alternative set-based decision making approach used by Toyota. Specifically, it notes that phase-gate approaches often result in project delays and cost overruns due to decisions made early in development before critical knowledge is known. In contrast, Toyota focuses on developing knowledge through rapid cycles of learning and convergence across projects, delaying design decisions as long as possible and doing more validation testing upfront to learn before designing. This set-based approach manages knowledge growth into products through cadences of learning pulled into successive launches.
The document discusses testing in an Agile context. It presents an agenda on finding issues earlier using Agile methods, the effects of quality debt, definitions of done, quality dashboards, and Agile test and integration strategies like acceptance test-driven development. It also covers managing configuration debt and questions.
Creative Labs India is an interactive digital agency based in Bangalore, India. We put together creative thinking, digital strategy, user experience, interface design, and web development services to IT, healthcare, hospitality, entertainment and retail industries worldwide.
Agilität ist in aller Munde – von den einen abgöttisch geliebt und es soll noch andere geben, die sie nicht so gerne mögen. Jedem das Seine. Doch wie sieht die agile Landschaft in der Schweizer IT Community aus? Laden Sie die Agile Trends & Benchmarks 2012 herunter ziehen Sie Ihre eigenen Schlüsse daraus.
Customers often tell us they are unhappy with their current ITSM tool solution. Some go so far as to say “we really didn’t like the previous tool either, but it is much better than the one we just implemented”. The root cause of this dissatisfaction is (usually) not the functionality of the tool itself, but in how the tool was rolled out and how expectations were communicated. Join us, as we will share insight on considerations and attributes associated with successes and failures of ITSM tool implementations….going from Strategy to Execution.
This document discusses scaling product ownership across multiple teams working on a large, complex Department of Defense program. It outlines several key steps taken: 1) Establishing a unified vision and goals for the overall product; 2) Managing overwhelming requirements requests from stakeholders by focusing on core needs; 3) Creating a checklist for scaling product ownership that includes establishing the product name and benefits. The goal is to thoughtfully scale product ownership while optimizing teams to deliver the highest priority capabilities for stakeholders.
A talk by Alan Shalloway at the European Lean IT Summit 2012. This talk provides 2 essential meta-patterns of Lean: focus on value and eliminating delays. These can be used to guide the creation of an effective and efficient workflow. It presents four case studies, each building on the concepts of the other, to provide actionable advice for your own implementations.
More Lean IT presentations and videos on www.lean-it-summit.com
This is a presentation I gave at the Central Indiana MPUG September 2012 meeting.
Abstract:
There are many commonly held myths about agile. Two of these myths are that agile projects don’t do any planning and that you can’t do agile on a fixed date project. In this presentation we will disprove these two myths by exploring just how agile planning is accomplished and how you can not only use agile on fixed date projects but also improve your accuracy and consistency in hitting those dates with agile.
This document discusses how to make enterprise architecture (EA) more agile using agile methods. It defines agility and outlines an "agility chain" with agile EA process, agile architecture, agile development, and agile enterprise as links. Various agile patterns are presented that can be applied to EA, such as subset, reuse, parallel, and hypothesis-driven approaches. Iterations and focusing on meta-models instead of customers are also discussed.
The Empowering Agile Teams Presentation has been presented at numerous Agile Conferences and has been VERY well received. Many teams get frustrated due to the lack of understanding of what they are expected to deliver vs what has been perceived. Gone are the days of opacity. Teams are better equipped to handle the day to day workload and are less fearful of commitment in an environment where healthy team relationships are valued.
HP Discover Session BB2160: Agile DevOps Continuous DeliveryCapgemini
This document discusses how businesses need faster time-to-market and time-to-value for new functionality. It outlines challenges with traditional waterfall development approaches and notes that Agile development helps but that releasing software still takes too long. HP Software solutions for continuous delivery, DevOps, and automation are presented to help bridge the gaps between development and operations for faster software releases while maintaining quality. These include solutions for lab management, application release acceleration, and enterprise collaboration.
The document discusses combining design and development approaches to drive innovation and efficiency. It describes how Jochen Gürtler of SAP advocates bringing design and development teams together through practices like user research, storytelling, prototyping and developing a shared product vision. The document provides examples of how SAP has applied these practices in developing products like SAP Sail, an app for sailors.
Agile Marketing for SEO - SMX West 2013 - Dave Lloyd, AdobeDave Lloyd
Slides from SMX West presentation. Covers in-house SEO, project management, Agile methodology, maturity model for Agile adoption, and how to execute on Agile internally. Follow me at @davelloyd1
Making Scrum Stick Inside Heavy Regulated Industries (2012) Laszlo Szalvay
Laszlo Szalvay is a VP at CollabNet who oversees their global Scrum business. He has extensive experience helping organizations adopt and scale agile practices. Prior to CollabNet, he co-founded Danube, a leader in Scrum tools and training, which was later acquired by CollabNet. He is a recognized expert in implementing distributed agile environments and addressing cultural challenges.
"What If" Analysis: How to Develop Corporate Muscle Memory with IBPSteelwedge
The document discusses agility in business planning and Steelwedge's Sales and Operations Planning (S&OP) software solution. It notes that while agility is crucial for 90% of businesses, only 27% report being good at agility. Steelwedge provides an S&OP solution to help close this agility gap. Their software offers integrated workflow, data management, collaboration tools, and scenario planning capabilities to help companies plan, perform and profit with more agility.
The Agile Gap: Closing it with User Experiencekalebwalton
Agile is missing something. Stories and epics are focused on self-contained iterations but its not always clear how everything is supposed to fit together - what does the final user experience look and feel like? This gap in Agile is significant because the final user experience is how the customer determines value - is it efficient, effective, and satisfactory? Consider filling the gap with scenarios. Scenarios blend well with Agile by allowing the generation of iteration-level user stories but also make it very clear what is the desired user experience and value proposition. This session describes how UX professionals not only have the expertise but are uniquely positioned to develop and drive these scenarios, in turn making themselves an essential part of the Agile process.
Communicating agile project status to executive managersAgileDad
The document discusses communicating agile project status to executive managers. It provides tips for establishing trust between management and agile teams. It also outlines appropriate roles for executives, managers, and teams in an agile environment. The document recommends focusing reporting on working software demonstrations and metrics like burn down charts and velocity, rather than intensive intra-sprint reporting.
This half-day tutorial provides an overview of Kanban and an eight step approach to transitioning to Kanban. The presentation is given by Alan Shalloway, founder and CEO of Net Objectives, who has over 40 years of experience in lean, kanban, agile and software development. The agenda includes discussions of lean thinking and agility, value stream mapping, Kanban workflows, policies for transitioning to Kanban. The goal is to explain the essence of lean thinking and how to use Kanban to manage projects and workflows in a lean manner.
Learn the basics of the agile way-of-life that has helped many companies realize their potential in the market. The agile secret sauce was once a thing that was only enjoyed by software organizations on the East and West coasts, but is now invading Indianapolis -- increasing productivity, making teams empowered (and happier!), and helping managers focus less on the taskmaster role and more on the important stuff.
This document summarizes a presentation on structured agile project management processes. The presentation introduces the speaker and their experience in agile coaching. It then covers traditional software development methodology versus agile principles and frameworks like Scrum. A case study is presented on transitioning a 150+ person team to agile. The presentation addresses barriers to agile adoption and techniques employed, drawing on a survey of agile practices.
SAFe (Scaled Agile Framework) 5 mins overview - Roni TamariAgileSparks
Why Scale? When choose each scaling approach? SAFe? LeSS? Enterprise Kanban? Other? Scaling experts will compare the different approaches, share from their experience and answer questions from the audience
This is the SAFe section presented by Roni Tamari
It's not surprising that an effective change management approach is an important predictor of long-term PPM & PMO success. Yet too many organizations shortchange the process, underestimate cultural resistance and settle for PPM software that is unable to support their business goals.
View this excerpt of a live webinar by Jay Hoskins, PowerSteering Business PPM Consultant, and David Boghossian, Founder of PowerSteering Software, as they walk through how to achieve sustained change, ensure executive support and avoid internal politics that can impede success.
David and Jay address these issues head on and share practical solutions that they've employed at dozens of global organizations including:
-Achieving change management goals more rapidly
-Gaining support from executive management, functional and project teams
-Overcoming adoption challenges with a phased implementation plan
-Choosing software that supports business users and adapts to changing needs
Casos de Estudio Barclays y Sony (Personalización y Social Media con las solu...Elisa Group
En este documento se presentan 2 casos de estudio con las soluciones de inteligencia digital de Adobe que fueron presentados en el Seminario "Métricas, no Mitos", organizado por Webanalytics.es junto con Adobe.
Los casos de estudio son:
-Caso Barclays: hazlo personal, cada interacción cuenta
-Caso Sony: Los likes y los Fans son rentables
The document outlines steps for optimizing product management. It discusses assessing people skills and roles, establishing lightweight processes tailored to context, using appropriate tools, and maintaining changes over time. The overall goal is to clarify responsibilities, communicate expectations, eliminate inefficiencies, and continuously improve product management practices. Additional resources from 280 Group are provided for templates, white papers, blogs, and networking.
Web security-–-everything-we-know-is-wrong-eoin-kearydrewz lin
1) Web application security is often approached incorrectly, focusing too much on annual penetration tests and compliance, rather than ongoing monitoring and prevention through the development process.
2) Many vulnerabilities are introduced through third party libraries and dependencies, which are not properly tested or managed. Continuous testing across the full software supply chain is needed.
3) Not all vulnerabilities are equal - context is important. A risk-based approach should prioritize the most critical issues based on factors like impact, likelihood, and the development environment. Compliance alone does not ensure real security.
This document summarizes a presentation about the mobile security Linux distribution Santoku Linux. It discusses how Santoku Linux was created by modifying Lubuntu to include mobile forensic and security tools from the company viaForensics. Some key tools discussed include AFLogical OSE for Android logical acquisitions, iPhone Backup Analyzer, and utilities for analyzing mobile malware samples. Real-world examples of analyzing the Any.DO task manager app and Korean banking malware are also provided.
This document discusses sandboxing untrusted JavaScript from third parties to improve security. It proposes a two-tier sandbox architecture that uses JavaScript libraries and wrappers, without requiring browser modifications. Untrusted code is executed in an isolated environment defined by policy code, and can only access approved APIs. This approach aims to mediate access between code and the browser securely and efficiently while maintaining compatibility with existing third-party scripts.
This document discusses how HTML5 features can be used for authentication purposes and addresses some security challenges. It describes APIs like local storage, canvas, geolocation, and notifications that could be leveraged for authentication factors like passwords, patterns, and one-time passwords. However, it also notes risks like storing sensitive data on devices, spoofing locations, and notifications not being reliable. The document advocates using HTML5 responsibly and understanding privacy and user behavior when designing authentication solutions.
Owasp advanced mobile-application-code-review-techniques-v0.2drewz lin
The document discusses code review techniques for advanced mobile applications. It begins with an overview of why mobile security is important given the rise in mobile usage. It then discusses different mobile application types and architectures that can be code reviewed, including native, hybrid, and HTML5 applications. The document outlines the goals of mobile application code reviews, such as understanding the application and finding security vulnerabilities. It provides the methodology for conducting code reviews, which includes gaining access to source code, understanding the technology, threat modeling, analyzing the code, and creating automation scripts. Finally, it discusses specific vulnerabilities that may be found in Windows Phone, hybrid, Android, and iOS applications.
The document discusses research conducted by Gregg Ganley and Gavin Black at MITRE in FY13-14 on iOS mobile application security. It describes their work on a tool called iMAS (iOS Mobile Application Security) which aims to provide additional security controls and containment for native iOS applications. iMAS addresses vulnerabilities related to runtime access, device access, application access, data at rest, and threats from app stores/malware. It utilizes techniques like encrypted code modules, forced inlining, secure MDM and more to raise security levels above standard iOS but below a fully customized/rooted mobile device environment. The document outlines the motivation, capabilities and future research directions for the iMAS project.
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolfdrewz lin
This document discusses how to defeat cross-site scripting (XSS) and cross-site request forgery (XSRF) when using JavaServer Faces (JSF) frameworks. It covers validating user input, encoding output, and protecting view states to prevent XSS, as well as configuring JSF implementations to protect against XSRF by encrypting view states and adding tokens to URLs. The presentation emphasizes testing validation, encoding, and protection in specific JSF implementations since behaviors can differ.
This document summarizes a presentation on defending against CSRF (cross-site request forgery) attacks. It discusses four main design patterns for CSRF defenses: the synchronizer token pattern, double submit cookies, challenge-response systems, and checking the referrer header. It then provides details on implementing these patterns, specifically looking at libraries and features in .NET, .NET MVC, Anticsrf, CSRFGuard, and HDIV that can help implement CSRF tokens and validation. The document covers the tradeoffs of different approaches and considerations for using them effectively on the code and server level.
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21drewz lin
This document provides an overview of the OWASP Broken Web Applications (OWASP BWA) project. It discusses the background and motivation for the project, describes the current status including what applications are included in the virtual machine, outlines future plans, and solicits feedback to help guide and expand the project. The goal of OWASP BWA is to provide a free, open-source virtual machine containing a variety of intentionally vulnerable web applications to aid in testing tools and techniques for finding and addressing security issues.
This document provides a summary of a presentation by Robert Hansen on the future of browser security. Hansen argues that while browser developers want to improve security and privacy, their companies' business models focused on advertising revenue prohibit them from doing so. He outlines various techniques used by advertisers and browser companies to track users against their preferences. Hansen advocates for technical controls that allow users to opt out of tracking through a "can not track" approach, rather than relying on ineffective "do not track" policies. He concludes by discussing WhiteHat Security's focus on privacy and their plans to add more security and privacy features to their Aviator browser.
Appsec usa2013 js_libinsecurity_stefanodipaoladrewz lin
This document summarizes Stefano di Paola's talk on security issues with JavaScript libraries. It discusses how jQuery's $() method can be considered a "sink" that executes HTML passed to it, including examples of XSS via jQuery selectors and AJAX calls. It also covers problems with JSON parsing regular expressions, AngularJS expression injection, and credentials exposed in URLs. Solutions proposed include validating all input, auditing third-party libraries, and moving away from approaches like eval() that execute untrusted code.
Appsec2013 presentation-dickson final-with_all_final_editsdrewz lin
(1) A study surveyed 600 software developers and found that most did not have a basic understanding of software security concepts, with 73% failing an initial survey and the average score being 59% before training. (2) However, after training, developers' understanding of key concepts increased, with some areas like cross-site scripting seeing a 20 percentage point gain. (3) The study concluded that targeted security training can improve developers' knowledge in the short-term, though retention of this knowledge may require refresher training over time.
This document summarizes Bruno Gonçalves de Oliveira's talk on hacking web file servers for iOS. It introduces Bruno and his background in offensive security and discusses how iOS devices store a lot of information and mobile applications are often poorly designed and vulnerable. It provides examples of vulnerable file storage apps, outlines features and vulnerabilities like lack of encryption, authentication, XSS issues, and path traversal flaws. The document demonstrates exploits like unauthorized access to file systems on jailbroken devices and how to find vulnerable systems through mDNS queries. It concludes that mobile apps are the future but designers still do not prioritize security and there are too many apps for users to vet carefully.
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsdrewz lin
This document discusses forensic investigations of web exploitations. It presents a scenario where a web server in a DMZ zone was exploited but logs are unavailable, so network traffic must be analyzed. Wireshark will be used to analyze a PCAP file of recorded traffic to determine what happened and find any traces of commands or malware. The document also provides information on the costs of different types of cyber attacks, how to decode HTTP requests, and discusses tools that can be used for network forensics investigations like Wireshark, tcpdump, and Xplico.
Appsec2013 assurance tagging-robert martindrewz lin
The document discusses engineering software systems to be more secure against attacks. It notes that reducing a system's attack surface alone is not enough, as software and networks are too complex and it is impossible to know all vulnerabilities. It then discusses characteristics of advanced persistent threats, including that the initial attack may go unnoticed and adversaries cannot be fully kept out. Finally, it argues that taking a threat-driven perspective beyond just operational defense can help balance mitigation with detection and response.
The document summarizes a presentation on vulnerabilities found in SCADA systems between 2009-2013. It analyzed vulnerabilities by component, with the majority (66%) found in communication components like Modbus and DNP3 protocols. Examples of vulnerabilities are described for several devices. Real-world issues with SCADA systems are discussed like lack of authentication and patching. Recommendations are provided like auditing SCADA networks, implementing secure protocols and password policies, and keeping systems updated.
This 3-page document discusses the real-world challenges of implementing an agile software development lifecycle (SDLC) approach from the perspectives of Chris Eng and Ryan O'Boyle. It was presented at the OWASP AppSec USA conference on November 20, 2013 and focuses on practical lessons learned and best practices for incorporating security throughout an agile SDLC.
This document outlines a presentation given by Simón Roses Femerling on software security verification tools. It discusses BinSecSweeper, an open source tool created by VulnEx to scan binaries and check that security best practices were followed in development. The presentation covers using BinSecSweeper to verify in-house software, assess a company's software security posture, and compare the security of popular browsers. Examples of plugin checks and reports generated by BinSecSweeper are also provided.