SlideShare une entreprise Scribd logo
1  sur  23
Information Security Level 2 – Sensitive © 2009 – Proprietary and Confidential Information of Amdocs
Complex Agile Backlog Management




Dr. Ronen Bar-Nahor
Director of Agile Development
Amdocs Product Group


Information Security Level 2 – Sensitive © 2009 – Proprietary and Confidential Information of Amdocs
The Agile Manifesto

                       Individuals and
                        Individuals and                                                                Process and
                                                                                                        Process and
                                                                                over
                         interactions
                          interactions                                                                     tools
                                                                                                            tools
                                                                                                      Comprehensive
                                                                                                      Comprehensive
                  Working software over
                  Working software                                                                    documentation
                                                                                                      documentation
                          Customer
                           Customer                                                                      Contract
                                                                                                          Contract
                                                                                over
                        collaboration
                         collaboration                                                                  negotiation
                                                                                                        negotiation
                        Responding to
                        Responding to                                                                    Following
                                                                                                         Following
                                                                               over
                            change
                            change                                                                         a plan
                                                                                                           a plan
While there is value in the terms on the right, we value the items on the left more
                                                                   (http://www.agilemanifesto.org)




3   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Agile is not just a development gig…
    It’s mainly breaking paradigms and changing the mind-set
        Customers cannot conceptualize all requirements and
        do not understand specs

        The business can’t freeze scope for a long time

        System analysts cannot document solution in an
        unambiguous form

        Developers do not know how to estimate complex
        requirements and can’t commit on what they do not
        fully understand
4    Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
User Stories Summary
                                                                                                As a [user role] I want to [goal]
                                                                                                   so I can [reason]
    > Independent
    > Negotiable –
              > Placeholder for farther discussion
              > Detail just enough information and no more
              > Details captured through collaboration just in time for
                development
    > Valuable
    > Estimate
    > Sizing - right size for planning and development.
    > Testable
5   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Backlog Management
     Priority &
     Level of
     Confidence
                                    Sprints
                                                                                                                  Done
             Internal releases                                                                                    (POR)
             (Iteration)




                                                                                                                Value ?
      Tentativ
      e
      External                                                                                                    Packaging
      release                                                                                                       Sprint

    Future
    release

                 updated yearly following Portfolio                                                            SP, Release
                 Planning Process
6    Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
User Stories




7   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Enterprise Scaling Complexity
                                        Project                                                                     Project




                        Project                                                                                                    Project



                                                                       Integrated Portfolio

                              Line Of Business                        Line Of Business                        Line Of Business         Line Of Business




                       Product Product Product                 Product Product Product                  Product Product Product    Product Product Product



                      Component Component Component Component Component Component Component Component Component Component Component Component


                      Component Component Component Component Component Component Component Component Component Component Component Component


                      Component Component Component Component Component Component Component Component Component Component Component Component




                                                                            Portfolio Foundations


                       Release Release Release                  Release Release Release                  Release Release Release   Release Release Release


8   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Planning Onion
                                                                               Strategy

                                                                               Portfolio

                                                                               Product
                                                                               Release

                                                                               [Iteration]

                                                                               Sprint
                                                                               Day




9   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Portfolio Planning - Process Definition
> Operates once a year in a 3 months time                                                                              PMI
  frame following Company strategy                                                                                    Activity
                                                                                                                             Vertical
  sessions                                                                                                      Geographic Requirements
                                                                                                               Requirements
                                                                                                                                 Customer
                                                                                                                    Analyst    Requirements
> Main process for identifying and qualifying                                                                     Feedback

  the strategic initiatives
                                                                                                                      Product
> Consist of 4 phases:                                                                                                Planning

     > “Kick-off”

     > “Idea gathering”
                                                                                                                                   Roadmap
                                                                                                                                   Roadmap
     > “Plan”
     > “Validate”
                                                                                                                                    Release
                                                                                                                                    Release
     > “Portfolio Planning”

10   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Portfolio Planning Tool

     > Portfolio Planning Tool
             > Includes all relevant information to support
               R&D investment decisions
             > Monitor actual development vs. planning
             > Re-plan and re-allocate R&D investments due
               to major budget changes or major risks




1
11   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
The Tree

     > Strategic Directions (e.g. TCO Reduction)
              > Themes (e.g. Operability)
                       > Initiatives (e.g. Common Installer) - roadmap
                         > Projects (e.g. Installer adoption in …) – release


     • Budget buckets pre-allocated to Strategic Directions and
       Themes
     • All ideas map as initiatives & projects (with their estimates
       and categories)




1
12   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Priorioritizing Initiatives (Portfolio and
     Product initiatives)




     Note: See criteria legend in next slide
1
13     Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Backlog Management Process
Portfolio/
Product
Planning




Strategy           Release Plan


                  Managing Release Backlog                                                                                                       Opportunity/customer
                        (Requirements, Solution Overview, HLD)
                                                                                                                                                       Teams




                                                                                                                                                          Iteration Development
                                                                Top Priority
                                                                                                                                                        Product/System Integration
                                                              Iteration Items
                                                                                                                                                     Enough Value
                                                               Planning




                                                                                      Planning




                                                                                                                                     Planning
                                                                                                            Planning
                                                                                                                                                                 Product
                                                                          Iter - 1               Iter - 2              Iter - 3                 Iter - #        Packaging
                                                                          S1   S2    S3          S1   S2   S3          S1   S2   S3             S1    S2   S3


             Scrum teams


                                                                                                                                                       Portfolio/Solution Integration
       Independent Integration Team
                                                                                                                                                                               Port
                                                                                                 Test Iter 1           Test Iter 2              Test Iter 3      Test Iter #
                                                                                                                                                                               Pack
14     Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Product/Architectur                                                  Backlog Entities                          Release Vehicle
        e                                               Strategic
                                                        Themes




                                                    Solution Overview




                                                    HL Functional Design




15   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Product/Architectur                                                  Backlog Entities                          Release Vehicle
        e                                               Strategic
                                                        Themes




     When scaling to enterprise
      the main challenge is to                      Solution Overview




       handle dependencies                          HL Functional Design




16   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Product/Architectur                                                    Backlog Entities                          Release Vehicle
        e                                                                                       Project View
                                                                                                                        Release View
     Product View




                                                      Solution Overview




                                          System View Design
                                                HL Functional




Teams
 View




17     Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Product/Architectur                                                    Backlog Entities                          Release Vehicle
        e                                                                                       Project View
                                                                                                                        Release View
     Product View




     When Scaling to enterprise
     there are many ways to see                       Solution Overview




             the backlog                  System View Design
                                                HL Functional




Teams
 View




18     Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Release
     Project
                                                                                                                  Manager
     Manager




     Product                                                                                                     Agile
     Manager                                                                                                    Manager
19    Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Thank you




Information Security Level 2 – Sensitive © 2009 – Proprietary and Confidential Information of Amdocs
Product Owner Certification




     • The course is delivered by AgileSparks, a company
       specializing in Agile, and provides a formal certification
       by the ScrumAlliance.
     • Next course: 30 September 2009.

21   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Scaling Agile Main Practices
     > Small potential “shippable” iterations/internal releases (3
       months)
         > Contains 3-4 sprints (2-4 weeks) produces high quality working SW
         > Schedule based cadence
     > Cross-functional teams
         > Self managed motivated teams, face-to-face communication
     > Customer (PdM) involvement during development
     > Feature/Business Driven (and not a composite design)

     > Continuous Integration
     > Technical excellence
     > JIT Planning model

22
     > Visibility into the process
      Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
23   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs

Contenu connexe

Similaire à Agile Backlog Management

The Digital Age: How to get the most out of mobile devices in the legal envir...
The Digital Age: How to get the most out of mobile devices in the legal envir...The Digital Age: How to get the most out of mobile devices in the legal envir...
The Digital Age: How to get the most out of mobile devices in the legal envir...e-ternity
 
Infosys - Global Product Development White Paper | Stewardship Solutions
Infosys - Global Product Development White Paper | Stewardship SolutionsInfosys - Global Product Development White Paper | Stewardship Solutions
Infosys - Global Product Development White Paper | Stewardship SolutionsInfosys
 
Agile Analysis on an Enterprise Scale
Agile Analysis on an Enterprise ScaleAgile Analysis on an Enterprise Scale
Agile Analysis on an Enterprise ScaleIIBA UK Chapter
 
Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...
Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...
Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...Philipp Schroeder
 
DNetZone Corporate profile
DNetZone Corporate profileDNetZone Corporate profile
DNetZone Corporate profileDhawal Damania
 
Globalization product-development-part2
Globalization product-development-part2Globalization product-development-part2
Globalization product-development-part2rahuo
 
A balanced metrics set for software business
A balanced metrics set for software businessA balanced metrics set for software business
A balanced metrics set for software businessTowo Toivola
 
From Waterfall to Agile - from predictive to adaptive methods
From Waterfall to Agile - from predictive to adaptive methodsFrom Waterfall to Agile - from predictive to adaptive methods
From Waterfall to Agile - from predictive to adaptive methodsBjörn Jónsson
 
Pmbok 4th edition chapter 12 - Project Procurement Management
Pmbok 4th edition   chapter 12 - Project Procurement ManagementPmbok 4th edition   chapter 12 - Project Procurement Management
Pmbok 4th edition chapter 12 - Project Procurement ManagementAhmad Maharma, PMP,RMP
 
Primavera Project Management
Primavera Project ManagementPrimavera Project Management
Primavera Project ManagementTotalSoft
 
Primavera Project Management
Primavera Project ManagementPrimavera Project Management
Primavera Project ManagementTotalSoft
 
SharePoint 2010 overview
SharePoint 2010 overviewSharePoint 2010 overview
SharePoint 2010 overviewSentri
 
High Performance Project Management - A Holistic Approach
High Performance Project Management - A Holistic ApproachHigh Performance Project Management - A Holistic Approach
High Performance Project Management - A Holistic ApproachIT Weekend
 
Mobi hub - Mobile Application Development Practice @ Kahuna Systems
Mobi hub - Mobile Application Development Practice @ Kahuna SystemsMobi hub - Mobile Application Development Practice @ Kahuna Systems
Mobi hub - Mobile Application Development Practice @ Kahuna Systemskahunasystems
 
Success mgt client april 12 (2)
Success mgt client april 12 (2)Success mgt client april 12 (2)
Success mgt client april 12 (2)Roy Dunster
 

Similaire à Agile Backlog Management (20)

The Digital Age: How to get the most out of mobile devices in the legal envir...
The Digital Age: How to get the most out of mobile devices in the legal envir...The Digital Age: How to get the most out of mobile devices in the legal envir...
The Digital Age: How to get the most out of mobile devices in the legal envir...
 
Infosys - Global Product Development White Paper | Stewardship Solutions
Infosys - Global Product Development White Paper | Stewardship SolutionsInfosys - Global Product Development White Paper | Stewardship Solutions
Infosys - Global Product Development White Paper | Stewardship Solutions
 
Agile Analysis on an Enterprise Scale
Agile Analysis on an Enterprise ScaleAgile Analysis on an Enterprise Scale
Agile Analysis on an Enterprise Scale
 
4epcm
4epcm4epcm
4epcm
 
Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...
Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...
Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...
 
DNetZone Corporate profile
DNetZone Corporate profileDNetZone Corporate profile
DNetZone Corporate profile
 
Globalization product-development-part2
Globalization product-development-part2Globalization product-development-part2
Globalization product-development-part2
 
Guy Hindley: My life in planning, hints & tips
Guy Hindley: My life in planning, hints & tips Guy Hindley: My life in planning, hints & tips
Guy Hindley: My life in planning, hints & tips
 
A balanced metrics set for software business
A balanced metrics set for software businessA balanced metrics set for software business
A balanced metrics set for software business
 
From Waterfall to Agile - from predictive to adaptive methods
From Waterfall to Agile - from predictive to adaptive methodsFrom Waterfall to Agile - from predictive to adaptive methods
From Waterfall to Agile - from predictive to adaptive methods
 
Pmbok 4th edition chapter 12 - Project Procurement Management
Pmbok 4th edition   chapter 12 - Project Procurement ManagementPmbok 4th edition   chapter 12 - Project Procurement Management
Pmbok 4th edition chapter 12 - Project Procurement Management
 
Primavera Project Management
Primavera Project ManagementPrimavera Project Management
Primavera Project Management
 
Primavera Project Management
Primavera Project ManagementPrimavera Project Management
Primavera Project Management
 
SharePoint 2010 overview
SharePoint 2010 overviewSharePoint 2010 overview
SharePoint 2010 overview
 
Riege corporate and Scope Brochure EN
Riege corporate and Scope Brochure ENRiege corporate and Scope Brochure EN
Riege corporate and Scope Brochure EN
 
3 C's of ECM
3 C's of ECM3 C's of ECM
3 C's of ECM
 
Icon ecpma09
Icon ecpma09Icon ecpma09
Icon ecpma09
 
High Performance Project Management - A Holistic Approach
High Performance Project Management - A Holistic ApproachHigh Performance Project Management - A Holistic Approach
High Performance Project Management - A Holistic Approach
 
Mobi hub - Mobile Application Development Practice @ Kahuna Systems
Mobi hub - Mobile Application Development Practice @ Kahuna SystemsMobi hub - Mobile Application Development Practice @ Kahuna Systems
Mobi hub - Mobile Application Development Practice @ Kahuna Systems
 
Success mgt client april 12 (2)
Success mgt client april 12 (2)Success mgt client april 12 (2)
Success mgt client april 12 (2)
 

Plus de Manageware

Product families
Product familiesProduct families
Product familiesManageware
 
IBM Rational Change special control types
IBM Rational Change special control typesIBM Rational Change special control types
IBM Rational Change special control typesManageware
 
Rm saa s for share 2
Rm saa s for share 2Rm saa s for share 2
Rm saa s for share 2Manageware
 
Rm saa s for share 2
Rm saa s for share 2Rm saa s for share 2
Rm saa s for share 2Manageware
 
Rm saa s for share
Rm saa s for shareRm saa s for share
Rm saa s for shareManageware
 
Rm saa s for share
Rm saa s for shareRm saa s for share
Rm saa s for shareManageware
 
Four principles seminar manageware seminar
Four principles seminar   manageware seminarFour principles seminar   manageware seminar
Four principles seminar manageware seminarManageware
 
Sailing in Requirements Management Cross Currents - www.manageware.co.il Seminar
Sailing in Requirements Management Cross Currents - www.manageware.co.il SeminarSailing in Requirements Management Cross Currents - www.manageware.co.il Seminar
Sailing in Requirements Management Cross Currents - www.manageware.co.il SeminarManageware
 
DOORS Power Tools
DOORS Power ToolsDOORS Power Tools
DOORS Power ToolsManageware
 
DOORS Rhapsody integration via Gateway
DOORS Rhapsody integration via GatewayDOORS Rhapsody integration via Gateway
DOORS Rhapsody integration via GatewayManageware
 
DOORS Tips and Tricks
DOORS Tips and TricksDOORS Tips and Tricks
DOORS Tips and TricksManageware
 
DOORS RIF Capability
DOORS RIF CapabilityDOORS RIF Capability
DOORS RIF CapabilityManageware
 
Synergy Database Cleaning
Synergy Database CleaningSynergy Database Cleaning
Synergy Database CleaningManageware
 
Rational Doors Hp Quality Center Integration
Rational Doors Hp Quality Center IntegrationRational Doors Hp Quality Center Integration
Rational Doors Hp Quality Center IntegrationManageware
 
EA Doing The Right Things Right V1 Manageware
EA   Doing The Right Things Right V1 ManagewareEA   Doing The Right Things Right V1 Manageware
EA Doing The Right Things Right V1 ManagewareManageware
 
Spec template and mapping to derivatives of a product
Spec template and mapping to derivatives of a product Spec template and mapping to derivatives of a product
Spec template and mapping to derivatives of a product Manageware
 
Requirements Review Process
Requirements Review ProcessRequirements Review Process
Requirements Review ProcessManageware
 
Optimizing DOORS Implementation
Optimizing DOORS ImplementationOptimizing DOORS Implementation
Optimizing DOORS ImplementationManageware
 
CR based development in Synergy
CR based development in SynergyCR based development in Synergy
CR based development in SynergyManageware
 

Plus de Manageware (20)

Product families
Product familiesProduct families
Product families
 
IBM Rational Change special control types
IBM Rational Change special control typesIBM Rational Change special control types
IBM Rational Change special control types
 
Rm saa s for share 2
Rm saa s for share 2Rm saa s for share 2
Rm saa s for share 2
 
Rm saa s for share 2
Rm saa s for share 2Rm saa s for share 2
Rm saa s for share 2
 
Rm saa s for share
Rm saa s for shareRm saa s for share
Rm saa s for share
 
Rm saa s for share
Rm saa s for shareRm saa s for share
Rm saa s for share
 
Four principles seminar manageware seminar
Four principles seminar   manageware seminarFour principles seminar   manageware seminar
Four principles seminar manageware seminar
 
Sailing in Requirements Management Cross Currents - www.manageware.co.il Seminar
Sailing in Requirements Management Cross Currents - www.manageware.co.il SeminarSailing in Requirements Management Cross Currents - www.manageware.co.il Seminar
Sailing in Requirements Management Cross Currents - www.manageware.co.il Seminar
 
DOORS Power Tools
DOORS Power ToolsDOORS Power Tools
DOORS Power Tools
 
DOORS Rhapsody integration via Gateway
DOORS Rhapsody integration via GatewayDOORS Rhapsody integration via Gateway
DOORS Rhapsody integration via Gateway
 
DOORS Tips and Tricks
DOORS Tips and TricksDOORS Tips and Tricks
DOORS Tips and Tricks
 
DOORS RIF Capability
DOORS RIF CapabilityDOORS RIF Capability
DOORS RIF Capability
 
Synergy CLI
Synergy CLISynergy CLI
Synergy CLI
 
Synergy Database Cleaning
Synergy Database CleaningSynergy Database Cleaning
Synergy Database Cleaning
 
Rational Doors Hp Quality Center Integration
Rational Doors Hp Quality Center IntegrationRational Doors Hp Quality Center Integration
Rational Doors Hp Quality Center Integration
 
EA Doing The Right Things Right V1 Manageware
EA   Doing The Right Things Right V1 ManagewareEA   Doing The Right Things Right V1 Manageware
EA Doing The Right Things Right V1 Manageware
 
Spec template and mapping to derivatives of a product
Spec template and mapping to derivatives of a product Spec template and mapping to derivatives of a product
Spec template and mapping to derivatives of a product
 
Requirements Review Process
Requirements Review ProcessRequirements Review Process
Requirements Review Process
 
Optimizing DOORS Implementation
Optimizing DOORS ImplementationOptimizing DOORS Implementation
Optimizing DOORS Implementation
 
CR based development in Synergy
CR based development in SynergyCR based development in Synergy
CR based development in Synergy
 

Dernier

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Dernier (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Agile Backlog Management

  • 1. Information Security Level 2 – Sensitive © 2009 – Proprietary and Confidential Information of Amdocs
  • 2. Complex Agile Backlog Management Dr. Ronen Bar-Nahor Director of Agile Development Amdocs Product Group Information Security Level 2 – Sensitive © 2009 – Proprietary and Confidential Information of Amdocs
  • 3. The Agile Manifesto Individuals and Individuals and Process and Process and over interactions interactions tools tools Comprehensive Comprehensive Working software over Working software documentation documentation Customer Customer Contract Contract over collaboration collaboration negotiation negotiation Responding to Responding to Following Following over change change a plan a plan While there is value in the terms on the right, we value the items on the left more (http://www.agilemanifesto.org) 3 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 4. Agile is not just a development gig… It’s mainly breaking paradigms and changing the mind-set Customers cannot conceptualize all requirements and do not understand specs The business can’t freeze scope for a long time System analysts cannot document solution in an unambiguous form Developers do not know how to estimate complex requirements and can’t commit on what they do not fully understand 4 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 5. User Stories Summary As a [user role] I want to [goal] so I can [reason] > Independent > Negotiable – > Placeholder for farther discussion > Detail just enough information and no more > Details captured through collaboration just in time for development > Valuable > Estimate > Sizing - right size for planning and development. > Testable 5 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 6. Backlog Management Priority & Level of Confidence Sprints Done Internal releases (POR) (Iteration) Value ? Tentativ e External Packaging release Sprint Future release updated yearly following Portfolio SP, Release Planning Process 6 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 7. User Stories 7 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 8. Enterprise Scaling Complexity Project Project Project Project Integrated Portfolio Line Of Business Line Of Business Line Of Business Line Of Business Product Product Product Product Product Product Product Product Product Product Product Product Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Portfolio Foundations Release Release Release Release Release Release Release Release Release Release Release Release 8 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 9. Planning Onion Strategy Portfolio Product Release [Iteration] Sprint Day 9 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 10. Portfolio Planning - Process Definition > Operates once a year in a 3 months time PMI frame following Company strategy Activity Vertical sessions Geographic Requirements Requirements Customer Analyst Requirements > Main process for identifying and qualifying Feedback the strategic initiatives Product > Consist of 4 phases: Planning > “Kick-off” > “Idea gathering” Roadmap Roadmap > “Plan” > “Validate” Release Release > “Portfolio Planning” 10 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 11. Portfolio Planning Tool > Portfolio Planning Tool > Includes all relevant information to support R&D investment decisions > Monitor actual development vs. planning > Re-plan and re-allocate R&D investments due to major budget changes or major risks 1 11 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 12. The Tree > Strategic Directions (e.g. TCO Reduction) > Themes (e.g. Operability) > Initiatives (e.g. Common Installer) - roadmap > Projects (e.g. Installer adoption in …) – release • Budget buckets pre-allocated to Strategic Directions and Themes • All ideas map as initiatives & projects (with their estimates and categories) 1 12 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 13. Priorioritizing Initiatives (Portfolio and Product initiatives) Note: See criteria legend in next slide 1 13 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 14. Backlog Management Process Portfolio/ Product Planning Strategy Release Plan Managing Release Backlog Opportunity/customer (Requirements, Solution Overview, HLD) Teams Iteration Development Top Priority Product/System Integration Iteration Items Enough Value Planning Planning Planning Planning Product Iter - 1 Iter - 2 Iter - 3 Iter - # Packaging S1 S2 S3 S1 S2 S3 S1 S2 S3 S1 S2 S3 Scrum teams Portfolio/Solution Integration Independent Integration Team Port Test Iter 1 Test Iter 2 Test Iter 3 Test Iter # Pack 14 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 15. Product/Architectur Backlog Entities Release Vehicle e Strategic Themes Solution Overview HL Functional Design 15 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 16. Product/Architectur Backlog Entities Release Vehicle e Strategic Themes When scaling to enterprise the main challenge is to Solution Overview handle dependencies HL Functional Design 16 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 17. Product/Architectur Backlog Entities Release Vehicle e Project View Release View Product View Solution Overview System View Design HL Functional Teams View 17 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 18. Product/Architectur Backlog Entities Release Vehicle e Project View Release View Product View When Scaling to enterprise there are many ways to see Solution Overview the backlog System View Design HL Functional Teams View 18 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 19. Release Project Manager Manager Product Agile Manager Manager 19 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 20. Thank you Information Security Level 2 – Sensitive © 2009 – Proprietary and Confidential Information of Amdocs
  • 21. Product Owner Certification • The course is delivered by AgileSparks, a company specializing in Agile, and provides a formal certification by the ScrumAlliance. • Next course: 30 September 2009. 21 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 22. Scaling Agile Main Practices > Small potential “shippable” iterations/internal releases (3 months) > Contains 3-4 sprints (2-4 weeks) produces high quality working SW > Schedule based cadence > Cross-functional teams > Self managed motivated teams, face-to-face communication > Customer (PdM) involvement during development > Feature/Business Driven (and not a composite design) > Continuous Integration > Technical excellence > JIT Planning model 22 > Visibility into the process Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 23. 23 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs