SlideShare a Scribd company logo
1 of 6
Download to read offline
8/12/12




       !"#$%&'#()*#+,$-./0(/12#+,$
   34.54#6/#+$711.85("$!8$7++#++/06$
            76/2#$9#4"8:+$

      3"*#4"5$38;0:5.5.5'50,$<5=#+$>?$7.4";.$50:$%+=50$@52(/$
                 38AB5.#$C06/0##./06$D#+#5.("$E.8;1$
                      F8=1;4#.$3(/#0(#$G$H!$
                                 $
                            76/2#$IJKI$
                          7;6;+4$KL,$IJKI$




                                                                2


!"#$#%&'()%*+,-#.(/#*
M04.8:;(#$ 4"#$ %&'#()*#+,$ -./0(/12#+$ 50:$ 34.54#6/#+$
N%-3$O.5=#B8.PQ$R$7++#++=#04$9#4"8:8286S $$
   $
$$+0&12%#*
             $$
       !    98)*5)80$
       !    382;)80$511.85("$
       !    @#0#T4+$48$8.650/U5)80+$
       !    3;&+450)5)80$711.85("$$




                                                                         1
8/12/12




                                                                        V$


3)(/'()%*
     !"#$%&'#'(#%))"))#'*"#+,((-&")).#(/#%,01"#2"'*(-)#
!     CW/+)06$56/2#$5++#++=#04$511.85("#+$5.#$2/=/4#:$/0$+(81#$50:$
      5112/(5)80?$
      o  76/2#$7++#++=#04$O.5=#B8.P+$$
      o  F"#(P2/+4+$
      o  76/2#$7:81)80$O.5=#B8.P+$

!     F;+48=/U#:$56/2#$=#4"8:+$8A#0$25(P$4"#$511.81./54#$
      (8..#+180:#0(#$&#4B##0$8&'#()*#+,$1./0(/12#+$50:$+4.54#6/#+?$

!     M05:#X;54#$+;118.4$1.8*/:#:$&S$4"#$:#*#281=#04$#0*/.80=#04$48$
      #Y#()*#2S$/=12#=#04$4"#$5:814#:$56/2#$=#4"8:?$
$
                           !""#""$
             !%#&'()*+$,(-(./0/1*$(2%$34#)56#2#""$




                                                                       4

+!4*5"'6#7)"8*
                                                   Human-centric,
                                                   Value-driven, !.
                           Objectives



                                                   Frequent delivery of
                                                   working software,
                                                   Accommodate change, !
                           Principles




                                                  Incremental Development,
                             Strategies           Refactoring,
                                                  Continuous Feedback, !




                                                                                  2
8/12/12




                                                                                                     5

   +!4*5"'6#7)"8*9*:2%8';#$**
                                     Frequent delivery of    Iterative Progression
                                     working software
                                                             Incremental Development
<%=2/2=0'1$*'%=*                     Technical Excellence    Short Delivery Cycles

<%&#"'.()%$*       Human – centric
                                     Simplicity              Evolutionary Requirements

*                  Value – driven                            Continuous Feedback
                                     Empowering teams of
>)"82%;*                             Motivated Individuals   Refactoring
                   Minimal Waste
4)?7'"#*                             Constant development    Test First Development

*                  Maximal           Pace                    Self-Managing Teams
                   Adaptability
@#$A)%=2%;*&)*                       Accommodating           Continuous Integration
                                     Change
BC'%;#*            Continuous                                Constant Velocity
                   innovation and
*                  learning
                                     Continual stakeholder
                                     communication and
                                                             Minimal Documentation


B0$&)6#"*                            collaboration           High-bandwidth communication


B)11',)"'()%*                        Frequent Reflection
                                                             Retrospection

                                     and Improvement         Client-driven iterations


                                     Striving for Customer   Appropriate distribution of expertise

                                     Satisfaction
      D;21#*                                                 Configuration Management


     E'10#$*                                                 Adherence to Standards



                      Objectives           Principles               Strategies




                                                                                                     6

D$$#$$6#%&*DAA")'.C*9*D=#G0'.H*
                    !"#$%&'($)
                                         F0#$()%*
 2                                       E/*#0$50$56/2#$=#4"8:$50:$/4+$+454#:$
 3                                       8&'#()*#+,$:8#+$4"#$=#4"8:$"5*#$4"#$
 $                                       0#(#++5.S$1./0(/12#+$50:$+4.54#6/#+$48$
                                         5228B$;+$48$5("/#*#$4"8+#$8&'#()*#+Z$
 4                  *+',%'-.$)
                                         $
 5
 0
                                          DAA")'.C*
 %
 6                   /&+0&$1'$)
                                          M:#0)[S$%&'#()*#+,$50:$4"#$
                                          #W1#(4#:$-./0(/12#+,$34.54#6/#+$50:$
                                          /0P56#+$+;&+#4$[.8=$4"#$%-3$
                                          O.5=#B8.P$
                                          $
                                          -#.[8.=$481$:8B0$5++#++=#04$
                                          $




                                          $
                                                                                                              3
                                          $
8/12/12




                                                                                      7

    D$$#$$6#%&*DAA")'.C*9*B'A',212&H*
                  !"#$%&'($)
                                                  F0#$()%*
                                                  E/*#0$50$/0+450(#$8[$50$56/2#$=#4"8:,$
                                                  "8B$(515&2#$/+$4"#$8.650/U5)80$/0$
7
                   *+',%'-.$)                     /=12#=#0)06$4"54$=#4"8:Z$
0
-                                                 $
0                                                 $
                                                  DAA")'.C*
"                                                 $
                    /&+0&$1'$)
'                                                 ]+#$A#)A1#,$A").#$$$50:$A")-#.&$
.                                                 1.81#.)#+?$
'
&
                                                  $
8
                    *+2-$+&'$)                    -#.[8.=$&8^8=$;1$5++#++=#04$
         *$2-.$34*+2%$))34*+2#$%&340,54*+256%&
                                                  $




                                                                                      8

D$$#$$6#%&*DAA")'.C*9*JK#.(/#%#$$*
7
                    !"#$%&'($)                    F0#$()%*
8                                                 _8B$#Y#()*#$B5+$4"#$8.650/U5)80$
8                                                 /0$/=12#=#0)06$4"54$56/2#$
$                   *+',%'-.$)
                                                  =#4"8:Z$
%                                                 $
&                                                 DAA")'.C*
                                                  $
'
                                                  ]+#$1.81#.)#+$8[$4"#$A")=0.&$50:$
(
                      /&+0&$1'$)                  A").#$$*'"(I'.&$$
$
,                                                 $
$                                                 -#.[8.=$&8^8=$;1$5++#++=#04$
)                    *+2-$+&'$)
                                                  $
)
          *$2-.$34*+2%$))34*+2#$%&340,54*+256%&




                                                                                                4
8/12/12




                                                               9


<%&#%=#=*L#%#M&$*&)*+";'%2N'()%$*

!  7++#++=#04$8[$50$8.650/U5)80`+$56/2#$=#4"8:N+Q,$
$$$$$:#*#281=#04$1.8(#++$50:$$#0*/.80=#04+$
        o    $ CY#()*#$(8=180#04+$
        o    $ -8++/&2#$/05:#X;5(/#+$
        o    $ -84#0)52$#0"50(#=#04+$
        $
!  E;/:#+$50$8.650/U5)80$/0$:#T0/06$8.$.#T0/06$/4+$
        o     $76/2#$9#4"8:$
        o     $>#*#281=#04$#0*/.80=#04$$




                                                              10


40,$&'%('()%*
DO  40,$&'%('(%;*&C#*.)6A)%#%&$*)I*&C#*+!4*
    5"'6#7)"8*
#
    #3#%&'#()*#+,$1./0(/12#+,$+4.54#6/#+$50:$4"#$2/0P56#+?$
$
45#678)'%&9%9&,#'*"#%))"))2"&'#:;(<"))#
#
    $a$7:#X;5(S$5++#++=#04$8[$@5+/+$50:$M0+450(#$=#4"8:+$
$
$$$$$$a$789-9"#%b$c$9804"$/0a:#14"$+4;:S$54$50$8.650/U5)80$
$$$$$$$$/0$@25(P+&;.6,$H7$48$5++#++$4"#$7:#X;5(S$50:$$
$$$$$$$$F515&/2/4S$8[$4"#/.$5:814#:$56/2#$=#4"8:$
$




                                                                        5
8/12/12




             11




F0#$()%$P*




                       6

More Related Content

Viewers also liked

Top100summit 互联网发布与实验体系建设
Top100summit 互联网发布与实验体系建设 Top100summit 互联网发布与实验体系建设
Top100summit 互联网发布与实验体系建设 drewz lin
 
Scaling scrum-mega-framework
Scaling scrum-mega-frameworkScaling scrum-mega-framework
Scaling scrum-mega-frameworkdrewz lin
 
15 ma cs and signatures
15   ma cs and signatures15   ma cs and signatures
15 ma cs and signaturesdrewz lin
 
Buildinga teamthroughfeedback 0
Buildinga teamthroughfeedback 0Buildinga teamthroughfeedback 0
Buildinga teamthroughfeedback 0drewz lin
 
Agile and the nature of decision making
Agile and the nature of decision makingAgile and the nature of decision making
Agile and the nature of decision makingdrewz lin
 
Hands onagile2012shared
Hands onagile2012sharedHands onagile2012shared
Hands onagile2012shareddrewz lin
 
敏捷模式下的百度研发基础环境建设 1
敏捷模式下的百度研发基础环境建设 1敏捷模式下的百度研发基础环境建设 1
敏捷模式下的百度研发基础环境建设 1drewz lin
 
Athrun instrument driver
Athrun instrument driverAthrun instrument driver
Athrun instrument driverdrewz lin
 
4 exercises for part 1
4   exercises for part 14   exercises for part 1
4 exercises for part 1drewz lin
 
Djt22 justinliu djt.qq.com
Djt22 justinliu djt.qq.comDjt22 justinliu djt.qq.com
Djt22 justinliu djt.qq.comdrewz lin
 
Big datalittletests heintz
Big datalittletests heintzBig datalittletests heintz
Big datalittletests heintzdrewz lin
 
豆瓣I os自动化测试实践和经验
豆瓣I os自动化测试实践和经验豆瓣I os自动化测试实践和经验
豆瓣I os自动化测试实践和经验drewz lin
 
Test design problems investigation taixiaomei 20120807
Test design problems investigation taixiaomei 20120807Test design problems investigation taixiaomei 20120807
Test design problems investigation taixiaomei 20120807drewz lin
 
Tcpcopy 阿里技术沙龙
Tcpcopy 阿里技术沙龙Tcpcopy 阿里技术沙龙
Tcpcopy 阿里技术沙龙drewz lin
 
Simple methods for_reliable_user_involvement
Simple methods for_reliable_user_involvementSimple methods for_reliable_user_involvement
Simple methods for_reliable_user_involvementdrewz lin
 
9 password security
9   password security9   password security
9 password securitydrewz lin
 
大规模网站架构
大规模网站架构大规模网站架构
大规模网站架构drewz lin
 
Agile 2012 - leadership agility workshop slides -- final.pptx
Agile 2012  - leadership agility workshop slides -- final.pptxAgile 2012  - leadership agility workshop slides -- final.pptx
Agile 2012 - leadership agility workshop slides -- final.pptxdrewz lin
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 

Viewers also liked (19)

Top100summit 互联网发布与实验体系建设
Top100summit 互联网发布与实验体系建设 Top100summit 互联网发布与实验体系建设
Top100summit 互联网发布与实验体系建设
 
Scaling scrum-mega-framework
Scaling scrum-mega-frameworkScaling scrum-mega-framework
Scaling scrum-mega-framework
 
15 ma cs and signatures
15   ma cs and signatures15   ma cs and signatures
15 ma cs and signatures
 
Buildinga teamthroughfeedback 0
Buildinga teamthroughfeedback 0Buildinga teamthroughfeedback 0
Buildinga teamthroughfeedback 0
 
Agile and the nature of decision making
Agile and the nature of decision makingAgile and the nature of decision making
Agile and the nature of decision making
 
Hands onagile2012shared
Hands onagile2012sharedHands onagile2012shared
Hands onagile2012shared
 
敏捷模式下的百度研发基础环境建设 1
敏捷模式下的百度研发基础环境建设 1敏捷模式下的百度研发基础环境建设 1
敏捷模式下的百度研发基础环境建设 1
 
Athrun instrument driver
Athrun instrument driverAthrun instrument driver
Athrun instrument driver
 
4 exercises for part 1
4   exercises for part 14   exercises for part 1
4 exercises for part 1
 
Djt22 justinliu djt.qq.com
Djt22 justinliu djt.qq.comDjt22 justinliu djt.qq.com
Djt22 justinliu djt.qq.com
 
Big datalittletests heintz
Big datalittletests heintzBig datalittletests heintz
Big datalittletests heintz
 
豆瓣I os自动化测试实践和经验
豆瓣I os自动化测试实践和经验豆瓣I os自动化测试实践和经验
豆瓣I os自动化测试实践和经验
 
Test design problems investigation taixiaomei 20120807
Test design problems investigation taixiaomei 20120807Test design problems investigation taixiaomei 20120807
Test design problems investigation taixiaomei 20120807
 
Tcpcopy 阿里技术沙龙
Tcpcopy 阿里技术沙龙Tcpcopy 阿里技术沙龙
Tcpcopy 阿里技术沙龙
 
Simple methods for_reliable_user_involvement
Simple methods for_reliable_user_involvementSimple methods for_reliable_user_involvement
Simple methods for_reliable_user_involvement
 
9 password security
9   password security9   password security
9 password security
 
大规模网站架构
大规模网站架构大规模网站架构
大规模网站架构
 
Agile 2012 - leadership agility workshop slides -- final.pptx
Agile 2012  - leadership agility workshop slides -- final.pptxAgile 2012  - leadership agility workshop slides -- final.pptx
Agile 2012 - leadership agility workshop slides -- final.pptx
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 

Similar to Soundararajan arthurbalci agile2012_handout_v1_0

Kevin Alansky, Blackboard Inc
Kevin Alansky, Blackboard IncKevin Alansky, Blackboard Inc
Kevin Alansky, Blackboard IncTod Plotkin
 
Maria Schwarz: Hvordan skaber vi digital deltagelse
Maria Schwarz: Hvordan skaber vi digital deltagelseMaria Schwarz: Hvordan skaber vi digital deltagelse
Maria Schwarz: Hvordan skaber vi digital deltagelseSeismonaut
 
Blueprint+: Developing a Tool for Service Design
Blueprint+: Developing a Tool for Service DesignBlueprint+: Developing a Tool for Service Design
Blueprint+: Developing a Tool for Service DesignAndy Polaine
 
OSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerOSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerSkills Matter
 
Introducing Security Access Control Policies into Legacy Business Processes
Introducing Security Access Control Policies into Legacy Business ProcessesIntroducing Security Access Control Policies into Legacy Business Processes
Introducing Security Access Control Policies into Legacy Business ProcessesSébastien Mosser
 
Christian Bason, MindLab Denmark - MaRS Global Leadership Series
Christian Bason, MindLab Denmark - MaRS Global Leadership SeriesChristian Bason, MindLab Denmark - MaRS Global Leadership Series
Christian Bason, MindLab Denmark - MaRS Global Leadership SeriesMaRS Discovery District
 
March 2012-Marketing Roundtable- Dee Davey
March 2012-Marketing Roundtable- Dee DaveyMarch 2012-Marketing Roundtable- Dee Davey
March 2012-Marketing Roundtable- Dee DaveyAnnArborSPARK
 
Em and marketing nexus nscec
Em and marketing nexus nscecEm and marketing nexus nscec
Em and marketing nexus nscecJim Black
 
Brand & UX: Toward a New Interpretation (Version 2)
Brand & UX: Toward a New Interpretation (Version 2)Brand & UX: Toward a New Interpretation (Version 2)
Brand & UX: Toward a New Interpretation (Version 2)Mark Badger
 
The Lean Startup - simplified
The Lean Startup - simplifiedThe Lean Startup - simplified
The Lean Startup - simplifiedStefano Bernardi
 
How to Create Your Strategic Plan
How to Create Your Strategic PlanHow to Create Your Strategic Plan
How to Create Your Strategic PlanPJ McDermott
 
Analisis Forense Memoria RAM
Analisis Forense Memoria RAMAnalisis Forense Memoria RAM
Analisis Forense Memoria RAMConferencias FIST
 
2023 Speaking Brochure - Jo Saunders - optimsed.pdf
2023 Speaking Brochure - Jo Saunders - optimsed.pdf2023 Speaking Brochure - Jo Saunders - optimsed.pdf
2023 Speaking Brochure - Jo Saunders - optimsed.pdfJo Saunders
 
Science World Board Presentation
Science World Board PresentationScience World Board Presentation
Science World Board PresentationDanny Robinson
 
SEO - It Works Even if You Don’t Know How or Why
SEO - It Works Even if You Don’t Know How or Why SEO - It Works Even if You Don’t Know How or Why
SEO - It Works Even if You Don’t Know How or Why Wolfgang Weicht
 

Similar to Soundararajan arthurbalci agile2012_handout_v1_0 (20)

Kevin Alansky, Blackboard Inc
Kevin Alansky, Blackboard IncKevin Alansky, Blackboard Inc
Kevin Alansky, Blackboard Inc
 
Maria Schwarz: Hvordan skaber vi digital deltagelse
Maria Schwarz: Hvordan skaber vi digital deltagelseMaria Schwarz: Hvordan skaber vi digital deltagelse
Maria Schwarz: Hvordan skaber vi digital deltagelse
 
Blueprint+: Developing a Tool for Service Design
Blueprint+: Developing a Tool for Service DesignBlueprint+: Developing a Tool for Service Design
Blueprint+: Developing a Tool for Service Design
 
OSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerOSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle Manager
 
Introducing Security Access Control Policies into Legacy Business Processes
Introducing Security Access Control Policies into Legacy Business ProcessesIntroducing Security Access Control Policies into Legacy Business Processes
Introducing Security Access Control Policies into Legacy Business Processes
 
Christian Bason, MindLab Denmark - MaRS Global Leadership Series
Christian Bason, MindLab Denmark - MaRS Global Leadership SeriesChristian Bason, MindLab Denmark - MaRS Global Leadership Series
Christian Bason, MindLab Denmark - MaRS Global Leadership Series
 
March 2012-Marketing Roundtable- Dee Davey
March 2012-Marketing Roundtable- Dee DaveyMarch 2012-Marketing Roundtable- Dee Davey
March 2012-Marketing Roundtable- Dee Davey
 
Em and marketing nexus nscec
Em and marketing nexus nscecEm and marketing nexus nscec
Em and marketing nexus nscec
 
Brand & UX: Toward a New Interpretation (Version 2)
Brand & UX: Toward a New Interpretation (Version 2)Brand & UX: Toward a New Interpretation (Version 2)
Brand & UX: Toward a New Interpretation (Version 2)
 
The Lean Startup - simplified
The Lean Startup - simplifiedThe Lean Startup - simplified
The Lean Startup - simplified
 
How to Create Your Strategic Plan
How to Create Your Strategic PlanHow to Create Your Strategic Plan
How to Create Your Strategic Plan
 
Mv10 all oneslides-100408
Mv10 all oneslides-100408Mv10 all oneslides-100408
Mv10 all oneslides-100408
 
Analisis Forense Memoria RAM
Analisis Forense Memoria RAMAnalisis Forense Memoria RAM
Analisis Forense Memoria RAM
 
Aggregating capital
Aggregating capitalAggregating capital
Aggregating capital
 
2023 Speaking Brochure - Jo Saunders - optimsed.pdf
2023 Speaking Brochure - Jo Saunders - optimsed.pdf2023 Speaking Brochure - Jo Saunders - optimsed.pdf
2023 Speaking Brochure - Jo Saunders - optimsed.pdf
 
Volta BDC at Workshop Clinic on Evaluation Practices
Volta BDC at Workshop Clinic on Evaluation PracticesVolta BDC at Workshop Clinic on Evaluation Practices
Volta BDC at Workshop Clinic on Evaluation Practices
 
Science World Board Presentation
Science World Board PresentationScience World Board Presentation
Science World Board Presentation
 
BCIC Town hall may5th
BCIC Town hall may5thBCIC Town hall may5th
BCIC Town hall may5th
 
Science world
Science worldScience world
Science world
 
SEO - It Works Even if You Don’t Know How or Why
SEO - It Works Even if You Don’t Know How or Why SEO - It Works Even if You Don’t Know How or Why
SEO - It Works Even if You Don’t Know How or Why
 

More from drewz lin

Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearydrewz lin
 
Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013drewz lin
 
Phu appsec13
Phu appsec13Phu appsec13
Phu appsec13drewz lin
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrichdrewz lin
 
Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2drewz lin
 
I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2drewz lin
 
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolfDefeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolfdrewz lin
 
Csrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equalCsrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equaldrewz lin
 
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21drewz lin
 
Appsec usa roberthansen
Appsec usa roberthansenAppsec usa roberthansen
Appsec usa roberthansendrewz lin
 
Appsec usa2013 js_libinsecurity_stefanodipaola
Appsec usa2013 js_libinsecurity_stefanodipaolaAppsec usa2013 js_libinsecurity_stefanodipaola
Appsec usa2013 js_libinsecurity_stefanodipaoladrewz lin
 
Appsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_editsAppsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_editsdrewz lin
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentationdrewz lin
 
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsAppsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsdrewz lin
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martindrewz lin
 
Amol scadaowasp
Amol scadaowaspAmol scadaowasp
Amol scadaowaspdrewz lin
 
Agile sdlc-v1.1-owasp-app sec-usa
Agile sdlc-v1.1-owasp-app sec-usaAgile sdlc-v1.1-owasp-app sec-usa
Agile sdlc-v1.1-owasp-app sec-usadrewz lin
 
Vulnex app secusa2013
Vulnex app secusa2013Vulnex app secusa2013
Vulnex app secusa2013drewz lin
 
基于虚拟化技术的分布式软件测试框架
基于虚拟化技术的分布式软件测试框架基于虚拟化技术的分布式软件测试框架
基于虚拟化技术的分布式软件测试框架drewz lin
 
新浪微博稳定性经验谈
新浪微博稳定性经验谈新浪微博稳定性经验谈
新浪微博稳定性经验谈drewz lin
 

More from drewz lin (20)

Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
 
Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013
 
Phu appsec13
Phu appsec13Phu appsec13
Phu appsec13
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
 
Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2
 
I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2
 
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolfDefeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
 
Csrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equalCsrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equal
 
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
 
Appsec usa roberthansen
Appsec usa roberthansenAppsec usa roberthansen
Appsec usa roberthansen
 
Appsec usa2013 js_libinsecurity_stefanodipaola
Appsec usa2013 js_libinsecurity_stefanodipaolaAppsec usa2013 js_libinsecurity_stefanodipaola
Appsec usa2013 js_libinsecurity_stefanodipaola
 
Appsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_editsAppsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_edits
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentation
 
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsAppsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
 
Amol scadaowasp
Amol scadaowaspAmol scadaowasp
Amol scadaowasp
 
Agile sdlc-v1.1-owasp-app sec-usa
Agile sdlc-v1.1-owasp-app sec-usaAgile sdlc-v1.1-owasp-app sec-usa
Agile sdlc-v1.1-owasp-app sec-usa
 
Vulnex app secusa2013
Vulnex app secusa2013Vulnex app secusa2013
Vulnex app secusa2013
 
基于虚拟化技术的分布式软件测试框架
基于虚拟化技术的分布式软件测试框架基于虚拟化技术的分布式软件测试框架
基于虚拟化技术的分布式软件测试框架
 
新浪微博稳定性经验谈
新浪微博稳定性经验谈新浪微博稳定性经验谈
新浪微博稳定性经验谈
 

Soundararajan arthurbalci agile2012_handout_v1_0

  • 1. 8/12/12 !"#$%&'#()*#+,$-./0(/12#+,$ 34.54#6/#+$711.85("$!8$7++#++/06$ 76/2#$9#4"8:+$ 3"*#4"5$38;0:5.5.5'50,$<5=#+$>?$7.4";.$50:$%+=50$@52(/$ 38AB5.#$C06/0##./06$D#+#5.("$E.8;1$ F8=1;4#.$3(/#0(#$G$H!$ $ 76/2#$IJKI$ 7;6;+4$KL,$IJKI$ 2 !"#$#%&'()%*+,-#.(/#* M04.8:;(#$ 4"#$ %&'#()*#+,$ -./0(/12#+$ 50:$ 34.54#6/#+$ N%-3$O.5=#B8.PQ$R$7++#++=#04$9#4"8:8286S $$ $ $$+0&12%#* $$ !  98)*5)80$ !  382;)80$511.85("$ !  @#0#T4+$48$8.650/U5)80+$ !  3;&+450)5)80$711.85("$$ 1
  • 2. 8/12/12 V$ 3)(/'()%* !"#$%&'#'(#%))"))#'*"#+,((-&")).#(/#%,01"#2"'*(-)# !  CW/+)06$56/2#$5++#++=#04$511.85("#+$5.#$2/=/4#:$/0$+(81#$50:$ 5112/(5)80?$ o  76/2#$7++#++=#04$O.5=#B8.P+$$ o  F"#(P2/+4+$ o  76/2#$7:81)80$O.5=#B8.P+$ !  F;+48=/U#:$56/2#$=#4"8:+$8A#0$25(P$4"#$511.81./54#$ (8..#+180:#0(#$&#4B##0$8&'#()*#+,$1./0(/12#+$50:$+4.54#6/#+?$ !  M05:#X;54#$+;118.4$1.8*/:#:$&S$4"#$:#*#281=#04$#0*/.80=#04$48$ #Y#()*#2S$/=12#=#04$4"#$5:814#:$56/2#$=#4"8:?$ $ !""#""$ !%#&'()*+$,(-(./0/1*$(2%$34#)56#2#""$ 4 +!4*5"'6#7)"8* Human-centric, Value-driven, !. Objectives Frequent delivery of working software, Accommodate change, ! Principles Incremental Development, Strategies Refactoring, Continuous Feedback, ! 2
  • 3. 8/12/12 5 +!4*5"'6#7)"8*9*:2%8';#$** Frequent delivery of Iterative Progression working software Incremental Development <%=2/2=0'1$*'%=* Technical Excellence Short Delivery Cycles <%&#"'.()%$* Human – centric Simplicity Evolutionary Requirements * Value – driven Continuous Feedback Empowering teams of >)"82%;* Motivated Individuals Refactoring Minimal Waste 4)?7'"#* Constant development Test First Development * Maximal Pace Self-Managing Teams Adaptability @#$A)%=2%;*&)* Accommodating Continuous Integration Change BC'%;#* Continuous Constant Velocity innovation and * learning Continual stakeholder communication and Minimal Documentation B0$&)6#"* collaboration High-bandwidth communication B)11',)"'()%* Frequent Reflection Retrospection and Improvement Client-driven iterations Striving for Customer Appropriate distribution of expertise Satisfaction D;21#* Configuration Management E'10#$* Adherence to Standards Objectives Principles Strategies 6 D$$#$$6#%&*DAA")'.C*9*D=#G0'.H* !"#$%&'($) F0#$()%* 2 E/*#0$50$56/2#$=#4"8:$50:$/4+$+454#:$ 3 8&'#()*#+,$:8#+$4"#$=#4"8:$"5*#$4"#$ $ 0#(#++5.S$1./0(/12#+$50:$+4.54#6/#+$48$ 5228B$;+$48$5("/#*#$4"8+#$8&'#()*#+Z$ 4 *+',%'-.$) $ 5 0 DAA")'.C* % 6 /&+0&$1'$) M:#0)[S$%&'#()*#+,$50:$4"#$ #W1#(4#:$-./0(/12#+,$34.54#6/#+$50:$ /0P56#+$+;&+#4$[.8=$4"#$%-3$ O.5=#B8.P$ $ -#.[8.=$481$:8B0$5++#++=#04$ $ $ 3 $
  •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
  • 5. 8/12/12 9 <%&#%=#=*L#%#M&$*&)*+";'%2N'()%$* !  7++#++=#04$8[$50$8.650/U5)80`+$56/2#$=#4"8:N+Q,$ $$$$$:#*#281=#04$1.8(#++$50:$$#0*/.80=#04+$ o  $ CY#()*#$(8=180#04+$ o  $ -8++/&2#$/05:#X;5(/#+$ o  $ -84#0)52$#0"50(#=#04+$ $ !  E;/:#+$50$8.650/U5)80$/0$:#T0/06$8.$.#T0/06$/4+$ o  $76/2#$9#4"8:$ o  $>#*#281=#04$#0*/.80=#04$$ 10 40,$&'%('()%* DO  40,$&'%('(%;*&C#*.)6A)%#%&$*)I*&C#*+!4* 5"'6#7)"8* # #3#%&'#()*#+,$1./0(/12#+,$+4.54#6/#+$50:$4"#$2/0P56#+?$ $ 45#678)'%&9%9&,#'*"#%))"))2"&'#:;(<"))# # $a$7:#X;5(S$5++#++=#04$8[$@5+/+$50:$M0+450(#$=#4"8:+$ $ $$$$$$a$789-9"#%b$c$9804"$/0a:#14"$+4;:S$54$50$8.650/U5)80$ $$$$$$$$/0$@25(P+&;.6,$H7$48$5++#++$4"#$7:#X;5(S$50:$$ $$$$$$$$F515&/2/4S$8[$4"#/.$5:814#:$56/2#$=#4"8:$ $ 5
  • 6. 8/12/12 11 F0#$()%$P* 6