SlideShare a Scribd company logo
1 of 30
1CONFIDENTIAL
Bringing enterprise in
Mobile development
July 14, 2017
2CONFIDENTIAL
APPLICATION
Front-End
Mobile Apps
Application backend. Microservices
Product Catalog Care API’s Device Management External Database
Profile Data Billing Data Usage Data Service Data
MOBILE APPLICATIONS ENVIRONMENT
APPLICATION
Back-End
Aurora
Mobile Application
VIPER. Reactive
3CONFIDENTIAL
Я интегратор
4CONFIDENTIAL
Content management
CORE
SYSTEMS
SERVICE
DELIVERY
APPLICATION
Front-End
Backend Data Services
Mobile Apps
Second
Application
Mobile Reusable Components Components
Login
Analytics
FAQ
Onboarding
Feedback
Payment
Chat
Upsell
Campaigns Content &
UX Service
Service Delivery Platform
Product Catalog Care API’s Device Management External Database
Profile Data Billing Data Usage Data Service Data
MOBILE APPLICATIONS ENVIRONMENT
Assets
Notifications/
push messages
In-flight
preview
Content
Updates
Application
API
Analytics
First
Application
Application
API
APPLICATION
Back-End
External Global
Services
(e.g. The Platform)
Contact service
Legacy
Application
5CONFIDENTIAL
MOBILE APPLICATIONS ENVIRONMENT
• 2 mobile platforms
• Quick rump-up up to 12 mobile developers per
platform
• 4 external vendors
• Up to 300 people overall
• Up to 50 delivery units overall
• ~3-4 generations of redesign
• First release is always in a month
6CONFIDENTIAL
DISCLAIMER
• No silver bullets here
• Only lessons learned
• If you’re developer who looking who possibilities to grow
• If you’re afraid that you project will grow too fast at some
moment
• If you’re working on non-product companies and deals with
existing businesses
7CONFIDENTIAL
FIGHTING WITH COMPLEXITY
• Process insights
• Development insights
• Personal insights
8CONFIDENTIAL
FIGHTING WITH COMPLEXITY
• Process insights
• Development insights
• Personal insights
9CONFIDENTIAL
DEPENDENCY MANAGEMENT
Statement:
• All the dependencies should be explicit
Cost of ignoring:
• Broken timelines
• Dependencies will manage you (in Soviet Russia of
course)
• Verbal communication (L/L/H)
• Email communication (L/M/H)
• Separate Jira to track dependencies (M/M/M)
• Dependency reports (H/H/L)
Key:
L/M/H
Low resources
to Implement
Medium positive
results
High risks of fail
10CONFIDENTIAL
COMMUNICATION MANAGEMENT
Statement:
• Your email will not be read
• Your email will not be answered
Reasons:
• Your team is tired
• Too much of emails
• He did not read emails
Cost of ignoring:
• Someone ruined the timelines
• Tasks will be ignored until fuckup
• Push response time levels (L/L/H)
• Manage outgoing messages (M/M/H)
• Managing multiple channels is OK(M/M/M)
– Respect communication timeslots
– Always do an MFU (be a scripter)
Key:
L/M/H
Low resources
to Implement
Medium positive
results
High risks of fail
11CONFIDENTIAL
DELIVERY MANAGEMENT
Statement:
• When we release v1.3 for USA?
• What is the scope of the version?
Cost of ignoring:
• Not clear delivery timelines
• Unhappy stakeholders
• Unsatisfied dependencies
• Clear ownership management (H/M/M)
• Regular reporting (M/M/M)
• DevOps culture (M/H/L)
Key:
L/M/H
Low resources
to Implement
Medium positive
results
High risks of fail
12CONFIDENTIAL
OWNERSHIP MANAGEMENT
Statement:
• Your email will not be answered
• Who are these guys?!
Reasons:
• Stakeholders list are impressive
• Simultaneously projects management
Cost of ignoring:
• Major stakeholder still hidden
• Things still undone
• I need to schedule that cup of coffee
• Manage stakeholders list (L/M/M)
• Sheriffs (M/H/H)
• Provide of communication platforms(M/H/M)
Key:
L/M/H
Low resources
to Implement
Medium positive
results
High risks of fail
13CONFIDENTIAL
OWNERSHIP MANAGEMENT (TBD)
• Коммуникационные платформы
14CONFIDENTIAL
DOCUMENTATION MANAGEMENT
Statement:
• Nobody read your perfect documentation
• Nobody write it
Cost of ignoring:
• Prototype-implementation gap
• Long-term maintenance gap
• Approve checklists (L/M/L)
• Updates history (L/M/L)
• Single source of truth (H/H/M)
• Glossary, Onboarding, etc..
• Nobody still write it :-)
Key:
L/M/H
Low resources
to Implement
Medium positive
results
High risks of fail
15CONFIDENTIAL
FIGHTING WITH COMPLEXITY
• Process insights
• Development insights
• Personal insights
16CONFIDENTIAL
TECHNOLOGY STACK SELECTION
• You may use cutting edge technologies stack
– Swift is mature enough
– Kotlin is mature enough
– React Native is mature enough
• You may target 2 latest major OS release
• Consider cross-platform technology stack
• Client Architecture cult is overestimated
– Consistency over complexity
– Cross-cutting are priority from start
– YAGNI
17CONFIDENTIAL
TECHNOLOGY STACK SELECTION
• You may use cutting edge technologies stack
– Swift is mature enough
– Kotlin is mature enough
– React Native is mature enough
• You may target 2 latest major OS release
• Consider cross-platform technology stack
• Client Architecture cult is overestimated
– Consistency over complexity
– Cross-cutting are priority from start
– YAGNI
You will regret it.
- Stuffing is pain
- Learning is pain
- Young languages are painful
And it. Native still better
Yes, this one is also will cause regrets
- time for refactoring reducing risks
- you have no enough time
18CONFIDENTIAL
SINGLE SOURCE OF TRUTH
Statement:
• You’re driving development of multi-platform solution
• Sharing is caring!
Cost of ignoring:
• Inconsistent implementation
• Inconsistent issues
• API management (M/H/M)
• Configuration management (M/M/M)
• Cross-cutting management (M/H/M)
• Assets management (M/H/M)
• Sharing of logic (H/H/M)
Key:
L/M/H
Low resources
to Implement
Medium positive
results
High risks of fail
19CONFIDENTIAL
SINGLE SOURCE OF TRUTH
• API management
• Configuration management
• Cross-cutting management
• Assets management
• Sharing of logic
20CONFIDENTIAL
PLATFORM SYNCHRONIZATION
Statement:
• Platform development caused different speed and
different issues
Cost of ignoring:
• Increasing of maintenance cost.
• Increasing of risk of major misunderstanding on
platforms
• Cross-functional sub-teams (M/H/L)
• Cross-platform review&testing (L/M/M)
• Reverse documenting with checklists (M/M/M)
• Code-generation & shared code (H/H/L)
• Brown-bag sessions (M/M/M)
Key:
L/M/H
Low resources
to Implement
Medium positive
results
High risks of fail
21CONFIDENTIAL
PRODUCTIVITY
Statement:
• Delivery speed decreasing over time
Cost of ignoring:
• Constant velocity drop
• Team demotivation
• Modular architecture (H/H/M)
• Mocking culture (M/M/M)
• DevOps culture (M/H/M)
• Auto Unit tests (H/M/M)
• Auto E2E tests (H/M/M)
Key:
L/M/H
Low resources
to Implement
Medium positive
results
High risks of fail
22CONFIDENTIAL
FIGHTING WITH COMPLEXITY
• Process insights
• Development insights
• Personal insights
23CONFIDENTIAL
TIME MANAGEMENT
Statement:
• Time is matters
Cost of ignoring:
• Became a no-lifer
• Drop delivery
• Limiting of working day (H/H/H)
• Scheduling is matters (M/H/M)
– Predictive booking
– Skip meetings
– Discipline over motivation
– You’re human after all
• Do it once (H/H/M)
• There is no silver bullet in GTD
Key:
L/M/H
Low resources
to Implement
Medium positive
results
High risks of fail
24CONFIDENTIAL
TIME MANAGEMENT
• They need all your time
• Delegating of tasks is not enough
– Delegating of contacts
– Delegating of responsibilities
– Delegation of pain
• You’re not the only who fill unsatisfied by evening
• Everything is matters
25CONFIDENTIAL
CONTACTS MANAGEMENT
Statement:
• You don’t know who is all that people
• You don’t know who will help you today
Cost of ignoring:
• You’re not able to involve right person in a right
conversation
• Contacts list (L/M/L)
• Process diagrams/graphs (L/M/L)
Key:
L/M/H
Low resources
to Implement
Medium positive
results
High risks of fail
26CONFIDENTIAL
CONTACTS MANAGEMENT
Имя Контакт Projects
involved
Role Comments
Вася Пупкин vpupkin@enterprise.com
Viber: +37500000000
URBiz CTO Accountable for project
• Which areas are interesting for?
• Which relations are matter?
• What impact could he has?
• Explicit RACI matrix could be great
27CONFIDENTIAL
INFORMATION MANAGEMENT
Statement:
• There are too much of information
Cost of ignoring:
• Missing of major details
• Constantly unsatisfied
• Be a scriber, create an agenda (M/H/M)
• Find your own KB format (H/H/M)
– Index is matters
– Ritual is matters
• Zero inbox rule (M/M/M)
Key:
L/M/H
Low resources
to Implement
Medium positive
results
High risks of fail
28CONFIDENTIAL
SUMMARY
• App was released
• Agile with year-wise roadmap
29CONFIDENTIAL
30CONFIDENTIAL
Questions?

More Related Content

Similar to Mo2017

IWMW 2004: It Always Takes Longer Than You Think (Even If You Think It Will T...
IWMW 2004: It Always Takes Longer Than You Think (Even If You Think It Will T...IWMW 2004: It Always Takes Longer Than You Think (Even If You Think It Will T...
IWMW 2004: It Always Takes Longer Than You Think (Even If You Think It Will T...IWMW
 
Howard Holben - Resume
Howard Holben - ResumeHoward Holben - Resume
Howard Holben - ResumeHoward Holben
 
Renee w foland_resume_09_2012b
Renee w foland_resume_09_2012bRenee w foland_resume_09_2012b
Renee w foland_resume_09_2012bRenee_Foland
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and managementIvo Andreev
 
Beyond Projects/#NoProjects
Beyond Projects/#NoProjectsBeyond Projects/#NoProjects
Beyond Projects/#NoProjectsallan kelly
 
Accelerate Your Time to a Successful Deployment with DevOps
Accelerate Your Time to a Successful Deployment with DevOpsAccelerate Your Time to a Successful Deployment with DevOps
Accelerate Your Time to a Successful Deployment with DevOpsPerficient, Inc.
 
Software development process for outsourcing team
Software development process for outsourcing teamSoftware development process for outsourcing team
Software development process for outsourcing teamMykhail Galushko
 
itec513 fall20172018 COCOMO model estimation.ppt
itec513 fall20172018 COCOMO model estimation.pptitec513 fall20172018 COCOMO model estimation.ppt
itec513 fall20172018 COCOMO model estimation.pptinaamulh77
 
#NoProjects - Beyond Projects
#NoProjects - Beyond Projects#NoProjects - Beyond Projects
#NoProjects - Beyond Projectsallan kelly
 
Good Risk Software and Why a Spreadsheet will not DO IT!
Good Risk Software and Why a Spreadsheet will not DO IT!Good Risk Software and Why a Spreadsheet will not DO IT!
Good Risk Software and Why a Spreadsheet will not DO IT!Andrew Ferguson
 
Jan-Erik Sandberg - Succeeding with Large Scale Agile
Jan-Erik Sandberg - Succeeding with Large Scale AgileJan-Erik Sandberg - Succeeding with Large Scale Agile
Jan-Erik Sandberg - Succeeding with Large Scale AgileAgile Lietuva
 
Continuous Delivery: why ? where to start ? how to scale ?
Continuous Delivery: why ? where to start ? how to scale ?Continuous Delivery: why ? where to start ? how to scale ?
Continuous Delivery: why ? where to start ? how to scale ?Jean-Philippe Briend
 
Cleaning Code - Tools and Techniques for Large Legacy Projects
Cleaning Code - Tools and Techniques for Large Legacy ProjectsCleaning Code - Tools and Techniques for Large Legacy Projects
Cleaning Code - Tools and Techniques for Large Legacy ProjectsMike Long
 
«Організація процесу розробки мобільного застосунку для аутсорсингової команд...
«Організація процесу розробки мобільного застосунку для аутсорсингової команд...«Організація процесу розробки мобільного застосунку для аутсорсингової команд...
«Організація процесу розробки мобільного застосунку для аутсорсингової команд...IT Weekend
 
Bridging the Gap: from Data Science to Production
Bridging the Gap: from Data Science to ProductionBridging the Gap: from Data Science to Production
Bridging the Gap: from Data Science to ProductionFlorian Wilhelm
 

Similar to Mo2017 (20)

IWMW 2004: It Always Takes Longer Than You Think (Even If You Think It Will T...
IWMW 2004: It Always Takes Longer Than You Think (Even If You Think It Will T...IWMW 2004: It Always Takes Longer Than You Think (Even If You Think It Will T...
IWMW 2004: It Always Takes Longer Than You Think (Even If You Think It Will T...
 
Howard Holben - Resume
Howard Holben - ResumeHoward Holben - Resume
Howard Holben - Resume
 
Renee w foland_resume_09_2012b
Renee w foland_resume_09_2012bRenee w foland_resume_09_2012b
Renee w foland_resume_09_2012b
 
Venkat_Resume_Updated
Venkat_Resume_UpdatedVenkat_Resume_Updated
Venkat_Resume_Updated
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
 
Beyond Projects/#NoProjects
Beyond Projects/#NoProjectsBeyond Projects/#NoProjects
Beyond Projects/#NoProjects
 
Agile pgm
Agile pgmAgile pgm
Agile pgm
 
Accelerate Your Time to a Successful Deployment with DevOps
Accelerate Your Time to a Successful Deployment with DevOpsAccelerate Your Time to a Successful Deployment with DevOps
Accelerate Your Time to a Successful Deployment with DevOps
 
Resume_Madhu Akkasali
Resume_Madhu AkkasaliResume_Madhu Akkasali
Resume_Madhu Akkasali
 
Agile method
Agile methodAgile method
Agile method
 
Software development process for outsourcing team
Software development process for outsourcing teamSoftware development process for outsourcing team
Software development process for outsourcing team
 
itec513 fall20172018 COCOMO model estimation.ppt
itec513 fall20172018 COCOMO model estimation.pptitec513 fall20172018 COCOMO model estimation.ppt
itec513 fall20172018 COCOMO model estimation.ppt
 
Venkat_Resume_Updated
Venkat_Resume_UpdatedVenkat_Resume_Updated
Venkat_Resume_Updated
 
#NoProjects - Beyond Projects
#NoProjects - Beyond Projects#NoProjects - Beyond Projects
#NoProjects - Beyond Projects
 
Good Risk Software and Why a Spreadsheet will not DO IT!
Good Risk Software and Why a Spreadsheet will not DO IT!Good Risk Software and Why a Spreadsheet will not DO IT!
Good Risk Software and Why a Spreadsheet will not DO IT!
 
Jan-Erik Sandberg - Succeeding with Large Scale Agile
Jan-Erik Sandberg - Succeeding with Large Scale AgileJan-Erik Sandberg - Succeeding with Large Scale Agile
Jan-Erik Sandberg - Succeeding with Large Scale Agile
 
Continuous Delivery: why ? where to start ? how to scale ?
Continuous Delivery: why ? where to start ? how to scale ?Continuous Delivery: why ? where to start ? how to scale ?
Continuous Delivery: why ? where to start ? how to scale ?
 
Cleaning Code - Tools and Techniques for Large Legacy Projects
Cleaning Code - Tools and Techniques for Large Legacy ProjectsCleaning Code - Tools and Techniques for Large Legacy Projects
Cleaning Code - Tools and Techniques for Large Legacy Projects
 
«Організація процесу розробки мобільного застосунку для аутсорсингової команд...
«Організація процесу розробки мобільного застосунку для аутсорсингової команд...«Організація процесу розробки мобільного застосунку для аутсорсингової команд...
«Організація процесу розробки мобільного застосунку для аутсорсингової команд...
 
Bridging the Gap: from Data Science to Production
Bridging the Gap: from Data Science to ProductionBridging the Gap: from Data Science to Production
Bridging the Gap: from Data Science to Production
 

Recently uploaded

Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 

Recently uploaded (20)

Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 

Mo2017

  • 2. 2CONFIDENTIAL APPLICATION Front-End Mobile Apps Application backend. Microservices Product Catalog Care API’s Device Management External Database Profile Data Billing Data Usage Data Service Data MOBILE APPLICATIONS ENVIRONMENT APPLICATION Back-End Aurora Mobile Application VIPER. Reactive
  • 4. 4CONFIDENTIAL Content management CORE SYSTEMS SERVICE DELIVERY APPLICATION Front-End Backend Data Services Mobile Apps Second Application Mobile Reusable Components Components Login Analytics FAQ Onboarding Feedback Payment Chat Upsell Campaigns Content & UX Service Service Delivery Platform Product Catalog Care API’s Device Management External Database Profile Data Billing Data Usage Data Service Data MOBILE APPLICATIONS ENVIRONMENT Assets Notifications/ push messages In-flight preview Content Updates Application API Analytics First Application Application API APPLICATION Back-End External Global Services (e.g. The Platform) Contact service Legacy Application
  • 5. 5CONFIDENTIAL MOBILE APPLICATIONS ENVIRONMENT • 2 mobile platforms • Quick rump-up up to 12 mobile developers per platform • 4 external vendors • Up to 300 people overall • Up to 50 delivery units overall • ~3-4 generations of redesign • First release is always in a month
  • 6. 6CONFIDENTIAL DISCLAIMER • No silver bullets here • Only lessons learned • If you’re developer who looking who possibilities to grow • If you’re afraid that you project will grow too fast at some moment • If you’re working on non-product companies and deals with existing businesses
  • 7. 7CONFIDENTIAL FIGHTING WITH COMPLEXITY • Process insights • Development insights • Personal insights
  • 8. 8CONFIDENTIAL FIGHTING WITH COMPLEXITY • Process insights • Development insights • Personal insights
  • 9. 9CONFIDENTIAL DEPENDENCY MANAGEMENT Statement: • All the dependencies should be explicit Cost of ignoring: • Broken timelines • Dependencies will manage you (in Soviet Russia of course) • Verbal communication (L/L/H) • Email communication (L/M/H) • Separate Jira to track dependencies (M/M/M) • Dependency reports (H/H/L) Key: L/M/H Low resources to Implement Medium positive results High risks of fail
  • 10. 10CONFIDENTIAL COMMUNICATION MANAGEMENT Statement: • Your email will not be read • Your email will not be answered Reasons: • Your team is tired • Too much of emails • He did not read emails Cost of ignoring: • Someone ruined the timelines • Tasks will be ignored until fuckup • Push response time levels (L/L/H) • Manage outgoing messages (M/M/H) • Managing multiple channels is OK(M/M/M) – Respect communication timeslots – Always do an MFU (be a scripter) Key: L/M/H Low resources to Implement Medium positive results High risks of fail
  • 11. 11CONFIDENTIAL DELIVERY MANAGEMENT Statement: • When we release v1.3 for USA? • What is the scope of the version? Cost of ignoring: • Not clear delivery timelines • Unhappy stakeholders • Unsatisfied dependencies • Clear ownership management (H/M/M) • Regular reporting (M/M/M) • DevOps culture (M/H/L) Key: L/M/H Low resources to Implement Medium positive results High risks of fail
  • 12. 12CONFIDENTIAL OWNERSHIP MANAGEMENT Statement: • Your email will not be answered • Who are these guys?! Reasons: • Stakeholders list are impressive • Simultaneously projects management Cost of ignoring: • Major stakeholder still hidden • Things still undone • I need to schedule that cup of coffee • Manage stakeholders list (L/M/M) • Sheriffs (M/H/H) • Provide of communication platforms(M/H/M) Key: L/M/H Low resources to Implement Medium positive results High risks of fail
  • 13. 13CONFIDENTIAL OWNERSHIP MANAGEMENT (TBD) • Коммуникационные платформы
  • 14. 14CONFIDENTIAL DOCUMENTATION MANAGEMENT Statement: • Nobody read your perfect documentation • Nobody write it Cost of ignoring: • Prototype-implementation gap • Long-term maintenance gap • Approve checklists (L/M/L) • Updates history (L/M/L) • Single source of truth (H/H/M) • Glossary, Onboarding, etc.. • Nobody still write it :-) Key: L/M/H Low resources to Implement Medium positive results High risks of fail
  • 15. 15CONFIDENTIAL FIGHTING WITH COMPLEXITY • Process insights • Development insights • Personal insights
  • 16. 16CONFIDENTIAL TECHNOLOGY STACK SELECTION • You may use cutting edge technologies stack – Swift is mature enough – Kotlin is mature enough – React Native is mature enough • You may target 2 latest major OS release • Consider cross-platform technology stack • Client Architecture cult is overestimated – Consistency over complexity – Cross-cutting are priority from start – YAGNI
  • 17. 17CONFIDENTIAL TECHNOLOGY STACK SELECTION • You may use cutting edge technologies stack – Swift is mature enough – Kotlin is mature enough – React Native is mature enough • You may target 2 latest major OS release • Consider cross-platform technology stack • Client Architecture cult is overestimated – Consistency over complexity – Cross-cutting are priority from start – YAGNI You will regret it. - Stuffing is pain - Learning is pain - Young languages are painful And it. Native still better Yes, this one is also will cause regrets - time for refactoring reducing risks - you have no enough time
  • 18. 18CONFIDENTIAL SINGLE SOURCE OF TRUTH Statement: • You’re driving development of multi-platform solution • Sharing is caring! Cost of ignoring: • Inconsistent implementation • Inconsistent issues • API management (M/H/M) • Configuration management (M/M/M) • Cross-cutting management (M/H/M) • Assets management (M/H/M) • Sharing of logic (H/H/M) Key: L/M/H Low resources to Implement Medium positive results High risks of fail
  • 19. 19CONFIDENTIAL SINGLE SOURCE OF TRUTH • API management • Configuration management • Cross-cutting management • Assets management • Sharing of logic
  • 20. 20CONFIDENTIAL PLATFORM SYNCHRONIZATION Statement: • Platform development caused different speed and different issues Cost of ignoring: • Increasing of maintenance cost. • Increasing of risk of major misunderstanding on platforms • Cross-functional sub-teams (M/H/L) • Cross-platform review&testing (L/M/M) • Reverse documenting with checklists (M/M/M) • Code-generation & shared code (H/H/L) • Brown-bag sessions (M/M/M) Key: L/M/H Low resources to Implement Medium positive results High risks of fail
  • 21. 21CONFIDENTIAL PRODUCTIVITY Statement: • Delivery speed decreasing over time Cost of ignoring: • Constant velocity drop • Team demotivation • Modular architecture (H/H/M) • Mocking culture (M/M/M) • DevOps culture (M/H/M) • Auto Unit tests (H/M/M) • Auto E2E tests (H/M/M) Key: L/M/H Low resources to Implement Medium positive results High risks of fail
  • 22. 22CONFIDENTIAL FIGHTING WITH COMPLEXITY • Process insights • Development insights • Personal insights
  • 23. 23CONFIDENTIAL TIME MANAGEMENT Statement: • Time is matters Cost of ignoring: • Became a no-lifer • Drop delivery • Limiting of working day (H/H/H) • Scheduling is matters (M/H/M) – Predictive booking – Skip meetings – Discipline over motivation – You’re human after all • Do it once (H/H/M) • There is no silver bullet in GTD Key: L/M/H Low resources to Implement Medium positive results High risks of fail
  • 24. 24CONFIDENTIAL TIME MANAGEMENT • They need all your time • Delegating of tasks is not enough – Delegating of contacts – Delegating of responsibilities – Delegation of pain • You’re not the only who fill unsatisfied by evening • Everything is matters
  • 25. 25CONFIDENTIAL CONTACTS MANAGEMENT Statement: • You don’t know who is all that people • You don’t know who will help you today Cost of ignoring: • You’re not able to involve right person in a right conversation • Contacts list (L/M/L) • Process diagrams/graphs (L/M/L) Key: L/M/H Low resources to Implement Medium positive results High risks of fail
  • 26. 26CONFIDENTIAL CONTACTS MANAGEMENT Имя Контакт Projects involved Role Comments Вася Пупкин vpupkin@enterprise.com Viber: +37500000000 URBiz CTO Accountable for project • Which areas are interesting for? • Which relations are matter? • What impact could he has? • Explicit RACI matrix could be great
  • 27. 27CONFIDENTIAL INFORMATION MANAGEMENT Statement: • There are too much of information Cost of ignoring: • Missing of major details • Constantly unsatisfied • Be a scriber, create an agenda (M/H/M) • Find your own KB format (H/H/M) – Index is matters – Ritual is matters • Zero inbox rule (M/M/M) Key: L/M/H Low resources to Implement Medium positive results High risks of fail
  • 28. 28CONFIDENTIAL SUMMARY • App was released • Agile with year-wise roadmap

Editor's Notes

  1. ToDos: To Show visually that top only top layer is in scope Make Web components the same way as Native but without “App-specific” Add Legend showing that dotted line boxes need “Feasibility investigation”
  2. ToDos: To Show visually that top only top layer is in scope Make Web components the same way as Native but without “App-specific” Add Legend showing that dotted line boxes need “Feasibility investigation”
  3. Multiple technologies Всегда есть запрос на автоматизацию – запрос на повторяющиеся действия, информацию
  4. Помните самолет из передачи каламбур
  5. Spring Boot for setup and auto configuration Spring Cloud Feign for zero-time Service Clients implementation Ribbon provides a client side load balancing via Eureka Zuul acts as a API Gateway and routes calls to services Eureka acts as a Discovery Service Hystrix is a Circuit Breaker implementation that adds fault tolerance to service-service calls Spring Cloud Security is used for a Security Service Spring Cloud Config is specified for Centralized Configuration Service Spring Cloud Sleuth acts as a Monitoring Service Spring framework is used for REST API implementation
  6. Spring Boot for setup and auto configuration Spring Cloud Feign for zero-time Service Clients implementation Ribbon provides a client side load balancing via Eureka Zuul acts as a API Gateway and routes calls to services Eureka acts as a Discovery Service Hystrix is a Circuit Breaker implementation that adds fault tolerance to service-service calls Spring Cloud Security is used for a Security Service Spring Cloud Config is specified for Centralized Configuration Service Spring Cloud Sleuth acts as a Monitoring Service Spring framework is used for REST API implementation