SlideShare une entreprise Scribd logo
1  sur  12
Knowledge Transformation in Software
          Development Processes
                      Ilia Bider - IbisSoft/DSV SU




                                 Vs.




        Presentation at GSTE 2012: http://semat.org/?page_id=561
                   Pre-proceedings: http://bit.ly/PGSfNG

                                                         DSV SU/IbisSoft
1
Positioning
                        Software Engineering


                Products         Tools          Processes



    Goal: Framework for representing knowledge transformation in
    software development processes


    Utility: Analyzing and mitigating risks inherent to particular
    software development process




                                                             DSV SU/IbisSoft
2
Background
    • Nonaka theory of knowledge transformation - SECI




     • Good regulator theorem of Conant and Ashby
     “Every Good Regulator of a system must be a model of that system”
     • Own practical experience
                                                              DSV SU/IbisSoft
3
Plan of presentation

    I.   Adapting SECI to traditional Software
         Development and analyzing risks inherent to it

    II. Adapting SECI to Agile Software Development and
        analyzing risks inherent to it

    III. Mitigating risks




                                                   DSV SU/IbisSoft
4
I.a Traditional approach - ECEA




    • A good regulator is a model of the
      system it regulates
                          Conant and Ashby
    • A good solution is a model of the
      problem it solves

    • A good key is a model of the lock it
      opens
                                   Scholten




                                              DSV SU/IbisSoft
5
I.b Risk inherent to ECEA

    1. Requirements does not catch the needs
       properly
    2. Requirements are not converted into a
       proper design
    3. Coding does not follow the design
       exactly
    4. The new software is not properly
       understood by its users, and it is rejected
       or used in the wrong fashion
    5. While a new system is under
       development, the problems/needs are
       continuing to evolve. As the result, a
       wrong/outdated system is delivered to
       the stakeholders.



                                                     DSV SU/IbisSoft
6
II.a Agile approach - SEA




    • A good regulator is a model of the
      system it regulates
                          Conant and Ashby
    • A good solution is a model of the
      problem it solves

    • A good key is a model of the lock it
      opens
                                   Scholten




                                              DSV SU/IbisSoft
7
II.b Risk inherent to SEA

    1. Weak or insufficient architecture
    2. Unmaintainable code
    3. Lost of knowledge when developers
       disappears
    4. …..




                                           DSV SU/IbisSoft
8
III.a Mitigating risks with ECEA –
    cross-functional teams




    Traditional organization




                               Cross-functional organization

                                                DSV SU/IbisSoft
9
III.b Mitigating risks with SEA –
     creating a development platform
 1. Code libraries – functions/object classes
    etc.
 2. High-level domain specific languages and
    tools
 3. …..




                                                DSV SU/IbisSoft
10
III.c Verification: BS thesis project

     Description: Agile software development is under transformation from
     being an "ugly duck" to becoming the mainstream of the software
     development. The agile methodology puts focus on implementation
     (programming, test, operation) and tacit knowledge transformation
     easing requirements on the design documents, in the ideal case not
     requiring them at all. The question arises on how this type of
     development can produce maintainable software, were the knowledge
     acquired during agile cycles is stored, and how it can be reused in the
     next cycle, or in the next projects. The project aims at investigating the
     practice of Swedish software organizations that have adopted agile
     methodology to find answers to these questions. The project includes
     developing a framework for conducting the investigation, planning and
     conducting interviews, processing results.




                                                                    DSV SU/IbisSoft
11
Thank you for your attention!



         Ilia Bider, DSV SU/IbisSoft
             Email: ilia@dsv.su.se
                ilia@ibissoft.se




                                       DSV SU/IbisSoft
12

Contenu connexe

En vedette

Lecture 02 Software Process Model
Lecture 02 Software Process ModelLecture 02 Software Process Model
Lecture 02 Software Process ModelAchmad Solichin
 
Digital Transformation: a model to master disruption
Digital Transformation: a model to master disruptionDigital Transformation: a model to master disruption
Digital Transformation: a model to master disruptionScopernia
 
Knowledge management at accenture
Knowledge management at accentureKnowledge management at accenture
Knowledge management at accentureRohit Dobaria
 
Knowledge management at accenture
Knowledge management at accentureKnowledge management at accenture
Knowledge management at accenturesekretnay
 
Knowledge Management Tools & Techniques
Knowledge Management Tools & TechniquesKnowledge Management Tools & Techniques
Knowledge Management Tools & TechniquesMichael Norton
 
A Model for Process Transformation
A Model for Process TransformationA Model for Process Transformation
A Model for Process TransformationNathaniel Palmer
 

En vedette (6)

Lecture 02 Software Process Model
Lecture 02 Software Process ModelLecture 02 Software Process Model
Lecture 02 Software Process Model
 
Digital Transformation: a model to master disruption
Digital Transformation: a model to master disruptionDigital Transformation: a model to master disruption
Digital Transformation: a model to master disruption
 
Knowledge management at accenture
Knowledge management at accentureKnowledge management at accenture
Knowledge management at accenture
 
Knowledge management at accenture
Knowledge management at accentureKnowledge management at accenture
Knowledge management at accenture
 
Knowledge Management Tools & Techniques
Knowledge Management Tools & TechniquesKnowledge Management Tools & Techniques
Knowledge Management Tools & Techniques
 
A Model for Process Transformation
A Model for Process TransformationA Model for Process Transformation
A Model for Process Transformation
 

Similaire à Knowledge Transformation in Software Development Processes

Agile Business Process Development: Why, When and How
Agile Business Process Development: Why, When and HowAgile Business Process Development: Why, When and How
Agile Business Process Development: Why, When and HowIlia Bider
 
Requirements on No Requirements - When using agile is justified?
Requirements on No Requirements - When using agile is justified?Requirements on No Requirements - When using agile is justified?
Requirements on No Requirements - When using agile is justified?Ilia Bider
 
Do Workflow-Based Systems Satisfy the Demands of the Agile Enterprise of the ...
Do Workflow-Based Systems Satisfy the Demands of the Agile Enterprise of the ...Do Workflow-Based Systems Satisfy the Demands of the Agile Enterprise of the ...
Do Workflow-Based Systems Satisfy the Demands of the Agile Enterprise of the ...Ilia Bider
 
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24 webinar - application security in a dev ops world-08-2018Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24 webinar - application security in a dev ops world-08-2018Outpost24
 
Shift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD PipelineShift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD PipelineCloudZenix LLC
 
DevSecOps for the DoD
DevSecOps for the DoDDevSecOps for the DoD
DevSecOps for the DoDJamesHarmison
 
sdlc- introduction.pptx
sdlc- introduction.pptxsdlc- introduction.pptx
sdlc- introduction.pptxBhavsarAnsh
 
Comp8 unit5 lecture_slides
Comp8 unit5 lecture_slidesComp8 unit5 lecture_slides
Comp8 unit5 lecture_slidesCMDLMS
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24
 
The Coming OSS Sustainability Crisis
The Coming OSS Sustainability CrisisThe Coming OSS Sustainability Crisis
The Coming OSS Sustainability CrisisAaron Stannard
 
Case Study: Practical tools and strategies for tackling legacy practices and ...
Case Study: Practical tools and strategies for tackling legacy practices and ...Case Study: Practical tools and strategies for tackling legacy practices and ...
Case Study: Practical tools and strategies for tackling legacy practices and ...Alejandro S.
 
CSE_2014 SE MODULE 1 V.10.pptx
CSE_2014 SE MODULE 1 V.10.pptxCSE_2014 SE MODULE 1 V.10.pptx
CSE_2014 SE MODULE 1 V.10.pptxAbdulMateen516672
 
The Product and Process(1).pdf
The Product and Process(1).pdfThe Product and Process(1).pdf
The Product and Process(1).pdfShivareddyGangam
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
Chapter1 conventional softwaremanagement (1)
Chapter1 conventional softwaremanagement (1)Chapter1 conventional softwaremanagement (1)
Chapter1 conventional softwaremanagement (1)Jkumararaja
 
Knoldus SDLC Standard Practices
Knoldus SDLC Standard PracticesKnoldus SDLC Standard Practices
Knoldus SDLC Standard PracticesKnoldus Inc.
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life CycleSoumyadipDas17
 

Similaire à Knowledge Transformation in Software Development Processes (20)

Agile Business Process Development: Why, When and How
Agile Business Process Development: Why, When and HowAgile Business Process Development: Why, When and How
Agile Business Process Development: Why, When and How
 
Requirements on No Requirements - When using agile is justified?
Requirements on No Requirements - When using agile is justified?Requirements on No Requirements - When using agile is justified?
Requirements on No Requirements - When using agile is justified?
 
Do Workflow-Based Systems Satisfy the Demands of the Agile Enterprise of the ...
Do Workflow-Based Systems Satisfy the Demands of the Agile Enterprise of the ...Do Workflow-Based Systems Satisfy the Demands of the Agile Enterprise of the ...
Do Workflow-Based Systems Satisfy the Demands of the Agile Enterprise of the ...
 
Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24 webinar - application security in a dev ops world-08-2018Outpost24 webinar - application security in a dev ops world-08-2018
Outpost24 webinar - application security in a dev ops world-08-2018
 
Shift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD PipelineShift Left Save Resources DevSecOps and the CICD Pipeline
Shift Left Save Resources DevSecOps and the CICD Pipeline
 
DevSecOps for the DoD
DevSecOps for the DoDDevSecOps for the DoD
DevSecOps for the DoD
 
KiWi - Knowledge in a Wiki
KiWi - Knowledge in a WikiKiWi - Knowledge in a Wiki
KiWi - Knowledge in a Wiki
 
sdlc- introduction.pptx
sdlc- introduction.pptxsdlc- introduction.pptx
sdlc- introduction.pptx
 
What is Agile Development?
What is Agile Development?What is Agile Development?
What is Agile Development?
 
Comp8 unit5 lecture_slides
Comp8 unit5 lecture_slidesComp8 unit5 lecture_slides
Comp8 unit5 lecture_slides
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
 
The Coming OSS Sustainability Crisis
The Coming OSS Sustainability CrisisThe Coming OSS Sustainability Crisis
The Coming OSS Sustainability Crisis
 
Case Study: Practical tools and strategies for tackling legacy practices and ...
Case Study: Practical tools and strategies for tackling legacy practices and ...Case Study: Practical tools and strategies for tackling legacy practices and ...
Case Study: Practical tools and strategies for tackling legacy practices and ...
 
CSE_2014 SE MODULE 1 V.10.pptx
CSE_2014 SE MODULE 1 V.10.pptxCSE_2014 SE MODULE 1 V.10.pptx
CSE_2014 SE MODULE 1 V.10.pptx
 
The Product and Process(1).pdf
The Product and Process(1).pdfThe Product and Process(1).pdf
The Product and Process(1).pdf
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
Chapter1 conventional softwaremanagement (1)
Chapter1 conventional softwaremanagement (1)Chapter1 conventional softwaremanagement (1)
Chapter1 conventional softwaremanagement (1)
 
Knoldus SDLC Standard Practices
Knoldus SDLC Standard PracticesKnoldus SDLC Standard Practices
Knoldus SDLC Standard Practices
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Fc25949950
Fc25949950Fc25949950
Fc25949950
 

Plus de Ilia Bider

Can an Enterprise Model Help in Mapping Capabilities?
Can an Enterprise Model Help in Mapping Capabilities?Can an Enterprise Model Help in Mapping Capabilities?
Can an Enterprise Model Help in Mapping Capabilities?Ilia Bider
 
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...Ilia Bider
 
ICEIS tutorial 2019: BUSINESS PROCESS CANVAS AND ITS USAGE IN IS TEACHING AND...
ICEIS tutorial 2019: BUSINESS PROCESS CANVAS AND ITS USAGE IN IS TEACHING AND...ICEIS tutorial 2019: BUSINESS PROCESS CANVAS AND ITS USAGE IN IS TEACHING AND...
ICEIS tutorial 2019: BUSINESS PROCESS CANVAS AND ITS USAGE IN IS TEACHING AND...Ilia Bider
 
Linking Autopoiesis to Homeostasis in Socio-Technical Systems
Linking Autopoiesis to Homeostasis in Socio-Technical SystemsLinking Autopoiesis to Homeostasis in Socio-Technical Systems
Linking Autopoiesis to Homeostasis in Socio-Technical SystemsIlia Bider
 
Value delivered - is it the same or different?
Value delivered - is it the same or different?Value delivered - is it the same or different?
Value delivered - is it the same or different?Ilia Bider
 
Defining Transformational Patterns for Business Model Innovation
Defining Transformational Patterns for Business Model InnovationDefining Transformational Patterns for Business Model Innovation
Defining Transformational Patterns for Business Model InnovationIlia Bider
 
Using Fractal Enterprise Model to Assist Complexity Management
Using Fractal Enterprise Model to Assist Complexity ManagementUsing Fractal Enterprise Model to Assist Complexity Management
Using Fractal Enterprise Model to Assist Complexity ManagementIlia Bider
 
Using a Socio-Technical Systems Approach for a Sales Process Improvement
Using a Socio-Technical Systems Approach for a Sales Process ImprovementUsing a Socio-Technical Systems Approach for a Sales Process Improvement
Using a Socio-Technical Systems Approach for a Sales Process ImprovementIlia Bider
 
Business Process Canvas and its Usage in IS Teaching and Learning
Business Process Canvas and its Usage in IS Teaching and LearningBusiness Process Canvas and its Usage in IS Teaching and Learning
Business Process Canvas and its Usage in IS Teaching and LearningIlia Bider
 
Research-Oriented Practical Problem Solving as a Learning Goal for Thesis Cou...
Research-Oriented Practical Problem Solving as a Learning Goal for Thesis Cou...Research-Oriented Practical Problem Solving as a Learning Goal for Thesis Cou...
Research-Oriented Practical Problem Solving as a Learning Goal for Thesis Cou...Ilia Bider
 
Using the Structure of Tacit Knowing for Acquiring a Holistic View on IS Field
Using the Structure of Tacit Knowing for Acquiring a Holistic View on IS FieldUsing the Structure of Tacit Knowing for Acquiring a Holistic View on IS Field
Using the Structure of Tacit Knowing for Acquiring a Holistic View on IS FieldIlia Bider
 
Fractal Enterpise Model (FEM) - a tutorial
Fractal Enterpise Model (FEM) - a tutorialFractal Enterpise Model (FEM) - a tutorial
Fractal Enterpise Model (FEM) - a tutorialIlia Bider
 
Business Process Canvas as a Process Model in a Nutshell http://bit.ly/2NseOFu
Business Process Canvas as a Process Model in a Nutshell http://bit.ly/2NseOFuBusiness Process Canvas as a Process Model in a Nutshell http://bit.ly/2NseOFu
Business Process Canvas as a Process Model in a Nutshell http://bit.ly/2NseOFuIlia Bider
 
Using Structural Coupling Approach for Defining and Maintaining Identity of a...
Using Structural Coupling Approach for Defining and Maintaining Identity of a...Using Structural Coupling Approach for Defining and Maintaining Identity of a...
Using Structural Coupling Approach for Defining and Maintaining Identity of a...Ilia Bider
 
Using the Process-Assets Framework for Creating a Holistic View over Process ...
Using the Process-Assets Framework for Creating a Holistic View over Process ...Using the Process-Assets Framework for Creating a Holistic View over Process ...
Using the Process-Assets Framework for Creating a Holistic View over Process ...Ilia Bider
 
Using a Fractal Enterprise Model for Business Model Innovation
Using a Fractal Enterprise Model for Business Model InnovationUsing a Fractal Enterprise Model for Business Model Innovation
Using a Fractal Enterprise Model for Business Model InnovationIlia Bider
 
Is People-Structure-Tasks-Technology Matrix Outdated?
Is People-Structure-Tasks-Technology Matrix Outdated?Is People-Structure-Tasks-Technology Matrix Outdated?
Is People-Structure-Tasks-Technology Matrix Outdated?Ilia Bider
 
Stray lamb - misalignment in a socio-technical structure of an enterprise whe...
Stray lamb - misalignment in a socio-technical structure of an enterprise whe...Stray lamb - misalignment in a socio-technical structure of an enterprise whe...
Stray lamb - misalignment in a socio-technical structure of an enterprise whe...Ilia Bider
 
YASQLT – Yet Another SQL Tutor. A Pragmatic Approach
YASQLT – Yet Another SQL Tutor. A Pragmatic ApproachYASQLT – Yet Another SQL Tutor. A Pragmatic Approach
YASQLT – Yet Another SQL Tutor. A Pragmatic ApproachIlia Bider
 
Becoming Agile in a Non-Disruptive Way: Is it Possible?
Becoming Agile in a Non-Disruptive Way:  Is it Possible?Becoming Agile in a Non-Disruptive Way:  Is it Possible?
Becoming Agile in a Non-Disruptive Way: Is it Possible?Ilia Bider
 

Plus de Ilia Bider (20)

Can an Enterprise Model Help in Mapping Capabilities?
Can an Enterprise Model Help in Mapping Capabilities?Can an Enterprise Model Help in Mapping Capabilities?
Can an Enterprise Model Help in Mapping Capabilities?
 
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...
 
ICEIS tutorial 2019: BUSINESS PROCESS CANVAS AND ITS USAGE IN IS TEACHING AND...
ICEIS tutorial 2019: BUSINESS PROCESS CANVAS AND ITS USAGE IN IS TEACHING AND...ICEIS tutorial 2019: BUSINESS PROCESS CANVAS AND ITS USAGE IN IS TEACHING AND...
ICEIS tutorial 2019: BUSINESS PROCESS CANVAS AND ITS USAGE IN IS TEACHING AND...
 
Linking Autopoiesis to Homeostasis in Socio-Technical Systems
Linking Autopoiesis to Homeostasis in Socio-Technical SystemsLinking Autopoiesis to Homeostasis in Socio-Technical Systems
Linking Autopoiesis to Homeostasis in Socio-Technical Systems
 
Value delivered - is it the same or different?
Value delivered - is it the same or different?Value delivered - is it the same or different?
Value delivered - is it the same or different?
 
Defining Transformational Patterns for Business Model Innovation
Defining Transformational Patterns for Business Model InnovationDefining Transformational Patterns for Business Model Innovation
Defining Transformational Patterns for Business Model Innovation
 
Using Fractal Enterprise Model to Assist Complexity Management
Using Fractal Enterprise Model to Assist Complexity ManagementUsing Fractal Enterprise Model to Assist Complexity Management
Using Fractal Enterprise Model to Assist Complexity Management
 
Using a Socio-Technical Systems Approach for a Sales Process Improvement
Using a Socio-Technical Systems Approach for a Sales Process ImprovementUsing a Socio-Technical Systems Approach for a Sales Process Improvement
Using a Socio-Technical Systems Approach for a Sales Process Improvement
 
Business Process Canvas and its Usage in IS Teaching and Learning
Business Process Canvas and its Usage in IS Teaching and LearningBusiness Process Canvas and its Usage in IS Teaching and Learning
Business Process Canvas and its Usage in IS Teaching and Learning
 
Research-Oriented Practical Problem Solving as a Learning Goal for Thesis Cou...
Research-Oriented Practical Problem Solving as a Learning Goal for Thesis Cou...Research-Oriented Practical Problem Solving as a Learning Goal for Thesis Cou...
Research-Oriented Practical Problem Solving as a Learning Goal for Thesis Cou...
 
Using the Structure of Tacit Knowing for Acquiring a Holistic View on IS Field
Using the Structure of Tacit Knowing for Acquiring a Holistic View on IS FieldUsing the Structure of Tacit Knowing for Acquiring a Holistic View on IS Field
Using the Structure of Tacit Knowing for Acquiring a Holistic View on IS Field
 
Fractal Enterpise Model (FEM) - a tutorial
Fractal Enterpise Model (FEM) - a tutorialFractal Enterpise Model (FEM) - a tutorial
Fractal Enterpise Model (FEM) - a tutorial
 
Business Process Canvas as a Process Model in a Nutshell http://bit.ly/2NseOFu
Business Process Canvas as a Process Model in a Nutshell http://bit.ly/2NseOFuBusiness Process Canvas as a Process Model in a Nutshell http://bit.ly/2NseOFu
Business Process Canvas as a Process Model in a Nutshell http://bit.ly/2NseOFu
 
Using Structural Coupling Approach for Defining and Maintaining Identity of a...
Using Structural Coupling Approach for Defining and Maintaining Identity of a...Using Structural Coupling Approach for Defining and Maintaining Identity of a...
Using Structural Coupling Approach for Defining and Maintaining Identity of a...
 
Using the Process-Assets Framework for Creating a Holistic View over Process ...
Using the Process-Assets Framework for Creating a Holistic View over Process ...Using the Process-Assets Framework for Creating a Holistic View over Process ...
Using the Process-Assets Framework for Creating a Holistic View over Process ...
 
Using a Fractal Enterprise Model for Business Model Innovation
Using a Fractal Enterprise Model for Business Model InnovationUsing a Fractal Enterprise Model for Business Model Innovation
Using a Fractal Enterprise Model for Business Model Innovation
 
Is People-Structure-Tasks-Technology Matrix Outdated?
Is People-Structure-Tasks-Technology Matrix Outdated?Is People-Structure-Tasks-Technology Matrix Outdated?
Is People-Structure-Tasks-Technology Matrix Outdated?
 
Stray lamb - misalignment in a socio-technical structure of an enterprise whe...
Stray lamb - misalignment in a socio-technical structure of an enterprise whe...Stray lamb - misalignment in a socio-technical structure of an enterprise whe...
Stray lamb - misalignment in a socio-technical structure of an enterprise whe...
 
YASQLT – Yet Another SQL Tutor. A Pragmatic Approach
YASQLT – Yet Another SQL Tutor. A Pragmatic ApproachYASQLT – Yet Another SQL Tutor. A Pragmatic Approach
YASQLT – Yet Another SQL Tutor. A Pragmatic Approach
 
Becoming Agile in a Non-Disruptive Way: Is it Possible?
Becoming Agile in a Non-Disruptive Way:  Is it Possible?Becoming Agile in a Non-Disruptive Way:  Is it Possible?
Becoming Agile in a Non-Disruptive Way: Is it Possible?
 

Knowledge Transformation in Software Development Processes

  • 1. Knowledge Transformation in Software Development Processes Ilia Bider - IbisSoft/DSV SU Vs. Presentation at GSTE 2012: http://semat.org/?page_id=561 Pre-proceedings: http://bit.ly/PGSfNG DSV SU/IbisSoft 1
  • 2. Positioning Software Engineering Products Tools Processes Goal: Framework for representing knowledge transformation in software development processes Utility: Analyzing and mitigating risks inherent to particular software development process DSV SU/IbisSoft 2
  • 3. Background • Nonaka theory of knowledge transformation - SECI • Good regulator theorem of Conant and Ashby “Every Good Regulator of a system must be a model of that system” • Own practical experience DSV SU/IbisSoft 3
  • 4. Plan of presentation I. Adapting SECI to traditional Software Development and analyzing risks inherent to it II. Adapting SECI to Agile Software Development and analyzing risks inherent to it III. Mitigating risks DSV SU/IbisSoft 4
  • 5. I.a Traditional approach - ECEA • A good regulator is a model of the system it regulates Conant and Ashby • A good solution is a model of the problem it solves • A good key is a model of the lock it opens Scholten DSV SU/IbisSoft 5
  • 6. I.b Risk inherent to ECEA 1. Requirements does not catch the needs properly 2. Requirements are not converted into a proper design 3. Coding does not follow the design exactly 4. The new software is not properly understood by its users, and it is rejected or used in the wrong fashion 5. While a new system is under development, the problems/needs are continuing to evolve. As the result, a wrong/outdated system is delivered to the stakeholders. DSV SU/IbisSoft 6
  • 7. II.a Agile approach - SEA • A good regulator is a model of the system it regulates Conant and Ashby • A good solution is a model of the problem it solves • A good key is a model of the lock it opens Scholten DSV SU/IbisSoft 7
  • 8. II.b Risk inherent to SEA 1. Weak or insufficient architecture 2. Unmaintainable code 3. Lost of knowledge when developers disappears 4. ….. DSV SU/IbisSoft 8
  • 9. III.a Mitigating risks with ECEA – cross-functional teams Traditional organization Cross-functional organization DSV SU/IbisSoft 9
  • 10. III.b Mitigating risks with SEA – creating a development platform 1. Code libraries – functions/object classes etc. 2. High-level domain specific languages and tools 3. ….. DSV SU/IbisSoft 10
  • 11. III.c Verification: BS thesis project Description: Agile software development is under transformation from being an "ugly duck" to becoming the mainstream of the software development. The agile methodology puts focus on implementation (programming, test, operation) and tacit knowledge transformation easing requirements on the design documents, in the ideal case not requiring them at all. The question arises on how this type of development can produce maintainable software, were the knowledge acquired during agile cycles is stored, and how it can be reused in the next cycle, or in the next projects. The project aims at investigating the practice of Swedish software organizations that have adopted agile methodology to find answers to these questions. The project includes developing a framework for conducting the investigation, planning and conducting interviews, processing results. DSV SU/IbisSoft 11
  • 12. Thank you for your attention! Ilia Bider, DSV SU/IbisSoft Email: ilia@dsv.su.se ilia@ibissoft.se DSV SU/IbisSoft 12