SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Agile and Lean Software Development
                                                           An Introduction to Kanban

                                                              Sreekanth Tadipatri
                                                                 Cisco Systems


© 2010 Cisco and/or its affiliates. All rights reserved.                               Cisco Confidential   1
• Why are you here?
             • Who are you?
             • Who am I?
             • What do we want to achieve in the
                    next 90 minutes?



© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   2
• What is Agile and Lean?
• Some causes of software failure
• Principles of Lean Software
      Development
• Introduction to Kanban – group exercise
• Summary


© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   3
A light weight
             framework for software
                 development


© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   4
Reduce the waste in a
system and produce a
higher value for the final
customer

© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   5
• Eliminate Waste
             • Amplify Learning
             • Decide as Late as Possible
             • Deliver as Fast as Possible
             • Empower the Team
             • Build Integrity In
             • See the Whole


© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   6
• Frequently and Rapidly Changing
                          Customer Requirements
                                   ▫ They can not be fulfilled by a rigid design

                        • Decision Making away from ground
                          realities
                                   ▫ Commitment made by folks who don’t do the
                                     actual implementation.




© 2010 Cisco and/or its affiliates. All rights reserved.                           Cisco Confidential   7
• The iron triangle
                                   ▫ Scope/ time/ cost fixed

                        • Traditional batch/queue (phase
                          gated approach)
                                   ▫ Quality is an afterthought




© 2010 Cisco and/or its affiliates. All rights reserved.          Cisco Confidential   8
• Volunteers please!
             • Two teams of eight people.
             • Observers around the tables
             • Arrange how you will do the work.
                         • Plan 5 minutes
                         • First round 5 minutes
                         • Count
                           - how much was delivered
                           - how much was wasted
                         • Feedback from observers – 5 minutes

© 2010 Cisco and/or its affiliates. All rights reserved.         Cisco Confidential   9
• Volunteers please!
             • Two teams of eight people.
             • Observers around the tables
             • Arrange how you will do the work.
                         • Plan 5 minutes
                         • First round 5 minutes
                         • Count
                           - how much was delivered
                           - how much was wasted
                         • Feedback from observers – 5 minutes

© 2010 Cisco and/or its affiliates. All rights reserved.         Cisco Confidential   10
The Seven Wastes of                         The Seven Wastes of
                   Manufacturing                            Software Development
                                   Overproduction                Extra Features
                                              Inventory           Requirements
                       Extra Processing Steps                      Extra Steps
                                                   Motion      Finding Information
                                                  Defects    Bugs Not Caught by Tests
                                                  Waiting     Waiting for Decisions
                                     Transportation                 Handoffs
© 2010 Cisco and/or its affiliates. All rights reserved.                          Cisco Confidential   11
• Map the value stream
             • Visualize the work
             • Pull work – not push
             • Identify bottlenecks and eliminate waste
             • Focus on flow
             • Limit work in progress
             • Find better ways of doing things – continuous
               improvement
             • Empower people

© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   12
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   13
• Questions?

             • Comments?

             • Feedback?




             • Contact me:

             • sreekantht@gmail.com




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   14

Contenu connexe

Similaire à Agile goa kanban presentation sreekanth tadipatri

Praktische handvatten voor een private cloud implementatie
Praktische handvatten voor een private cloud implementatiePraktische handvatten voor een private cloud implementatie
Praktische handvatten voor een private cloud implementatieProact Netherlands B.V.
 
Portfolio Management and Organization Flow
Portfolio Management and Organization FlowPortfolio Management and Organization Flow
Portfolio Management and Organization FlowKen Power
 
David Suzuki Foundation The Road to TelePresence
David Suzuki Foundation The Road to TelePresenceDavid Suzuki Foundation The Road to TelePresence
David Suzuki Foundation The Road to TelePresenceCisco Canada
 
How To Think Like A Programmer
How To Think Like A ProgrammerHow To Think Like A Programmer
How To Think Like A ProgrammerKassandra Keeton
 
Amit Monovitch RSA Case Study - Agile SCRUM - The good, the bad and the ugly
Amit Monovitch RSA Case Study - Agile SCRUM - The good, the bad and the uglyAmit Monovitch RSA Case Study - Agile SCRUM - The good, the bad and the ugly
Amit Monovitch RSA Case Study - Agile SCRUM - The good, the bad and the uglyAgileSparks
 
Michael Furminger
Michael  FurmingerMichael  Furminger
Michael Furmingerkatero4ok
 
Enabling the Borderless Organization
Enabling the Borderless OrganizationEnabling the Borderless Organization
Enabling the Borderless OrganizationCisco Canada
 
Cisco small business_communicate_by_leah_davis
Cisco small business_communicate_by_leah_davisCisco small business_communicate_by_leah_davis
Cisco small business_communicate_by_leah_davisgkmurase
 
Considerations for Operating An OpenStack Cloud
Considerations for Operating An OpenStack CloudConsiderations for Operating An OpenStack Cloud
Considerations for Operating An OpenStack CloudMark Voelker
 
From Outlawed to Outstanding
From Outlawed to OutstandingFrom Outlawed to Outstanding
From Outlawed to OutstandingLewandog, Inc,
 
MySQL Performance Tuning: Top 10 Tips
MySQL Performance Tuning: Top 10 TipsMySQL Performance Tuning: Top 10 Tips
MySQL Performance Tuning: Top 10 TipsOSSCube
 
Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011bluechipper
 
The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryThe Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryOpSource
 
2014 incheon asian game smart sustainable mega sport event
2014 incheon asian game smart sustainable mega sport event2014 incheon asian game smart sustainable mega sport event
2014 incheon asian game smart sustainable mega sport eventCisco Systems
 
Heden, verleden en toekomst van video conferencing
Heden, verleden en toekomst van video conferencingHeden, verleden en toekomst van video conferencing
Heden, verleden en toekomst van video conferencingrobert blaas
 
Michelle Ragusa Cisco Communities 9 26-2012
Michelle Ragusa  Cisco Communities 9 26-2012Michelle Ragusa  Cisco Communities 9 26-2012
Michelle Ragusa Cisco Communities 9 26-2012Michelle Ragusa
 

Similaire à Agile goa kanban presentation sreekanth tadipatri (20)

Shtsuchi ipv6
Shtsuchi ipv6Shtsuchi ipv6
Shtsuchi ipv6
 
Praktische handvatten voor een private cloud implementatie
Praktische handvatten voor een private cloud implementatiePraktische handvatten voor een private cloud implementatie
Praktische handvatten voor een private cloud implementatie
 
Portfolio Management and Organization Flow
Portfolio Management and Organization FlowPortfolio Management and Organization Flow
Portfolio Management and Organization Flow
 
David Suzuki Foundation The Road to TelePresence
David Suzuki Foundation The Road to TelePresenceDavid Suzuki Foundation The Road to TelePresence
David Suzuki Foundation The Road to TelePresence
 
How To Think Like A Programmer
How To Think Like A ProgrammerHow To Think Like A Programmer
How To Think Like A Programmer
 
Amit Monovitch RSA Case Study - Agile SCRUM - The good, the bad and the ugly
Amit Monovitch RSA Case Study - Agile SCRUM - The good, the bad and the uglyAmit Monovitch RSA Case Study - Agile SCRUM - The good, the bad and the ugly
Amit Monovitch RSA Case Study - Agile SCRUM - The good, the bad and the ugly
 
Michael Furminger
Michael  FurmingerMichael  Furminger
Michael Furminger
 
AgileCamp Silicon Valley 2015: An Agile Journey
AgileCamp Silicon Valley 2015: An Agile JourneyAgileCamp Silicon Valley 2015: An Agile Journey
AgileCamp Silicon Valley 2015: An Agile Journey
 
Enabling the Borderless Organization
Enabling the Borderless OrganizationEnabling the Borderless Organization
Enabling the Borderless Organization
 
Cisco small business_communicate_by_leah_davis
Cisco small business_communicate_by_leah_davisCisco small business_communicate_by_leah_davis
Cisco small business_communicate_by_leah_davis
 
Considerations for Operating An OpenStack Cloud
Considerations for Operating An OpenStack CloudConsiderations for Operating An OpenStack Cloud
Considerations for Operating An OpenStack Cloud
 
From Outlawed to Outstanding
From Outlawed to OutstandingFrom Outlawed to Outstanding
From Outlawed to Outstanding
 
MySQL Performance Tuning: Top 10 Tips
MySQL Performance Tuning: Top 10 TipsMySQL Performance Tuning: Top 10 Tips
MySQL Performance Tuning: Top 10 Tips
 
Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011
 
The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryThe Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS Delivery
 
2014 incheon asian game smart sustainable mega sport event
2014 incheon asian game smart sustainable mega sport event2014 incheon asian game smart sustainable mega sport event
2014 incheon asian game smart sustainable mega sport event
 
Heden, verleden en toekomst van video conferencing
Heden, verleden en toekomst van video conferencingHeden, verleden en toekomst van video conferencing
Heden, verleden en toekomst van video conferencing
 
Business Video
Business VideoBusiness Video
Business Video
 
01
0101
01
 
Michelle Ragusa Cisco Communities 9 26-2012
Michelle Ragusa  Cisco Communities 9 26-2012Michelle Ragusa  Cisco Communities 9 26-2012
Michelle Ragusa Cisco Communities 9 26-2012
 

Dernier

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 

Dernier (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 

Agile goa kanban presentation sreekanth tadipatri

  • 1. Agile and Lean Software Development An Introduction to Kanban Sreekanth Tadipatri Cisco Systems © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2. • Why are you here? • Who are you? • Who am I? • What do we want to achieve in the next 90 minutes? © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. • What is Agile and Lean? • Some causes of software failure • Principles of Lean Software Development • Introduction to Kanban – group exercise • Summary © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. A light weight framework for software development © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. Reduce the waste in a system and produce a higher value for the final customer © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. • Eliminate Waste • Amplify Learning • Decide as Late as Possible • Deliver as Fast as Possible • Empower the Team • Build Integrity In • See the Whole © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. • Frequently and Rapidly Changing Customer Requirements ▫ They can not be fulfilled by a rigid design • Decision Making away from ground realities ▫ Commitment made by folks who don’t do the actual implementation. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. • The iron triangle ▫ Scope/ time/ cost fixed • Traditional batch/queue (phase gated approach) ▫ Quality is an afterthought © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. • Volunteers please! • Two teams of eight people. • Observers around the tables • Arrange how you will do the work. • Plan 5 minutes • First round 5 minutes • Count - how much was delivered - how much was wasted • Feedback from observers – 5 minutes © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. • Volunteers please! • Two teams of eight people. • Observers around the tables • Arrange how you will do the work. • Plan 5 minutes • First round 5 minutes • Count - how much was delivered - how much was wasted • Feedback from observers – 5 minutes © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. The Seven Wastes of The Seven Wastes of Manufacturing Software Development Overproduction Extra Features Inventory Requirements Extra Processing Steps Extra Steps Motion Finding Information Defects Bugs Not Caught by Tests Waiting Waiting for Decisions Transportation Handoffs © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. • Map the value stream • Visualize the work • Pull work – not push • Identify bottlenecks and eliminate waste • Focus on flow • Limit work in progress • Find better ways of doing things – continuous improvement • Empower people © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. • Questions? • Comments? • Feedback? • Contact me: • sreekantht@gmail.com © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14