SlideShare a Scribd company logo
1 of 42
Download to read offline
HOW BEST TO
SABOTAGE YOUR
PRODUCT
Gojko Adzic
@gojkoadzic
http://gojko.net
Sabotage product
Sabotage product
Sabotage product
Sabotage product
Sabotage product
Sabotage product
Tip #1: commit to a
massive backlog at the
start
Sabotage product
Walking
skeleton
Find
book I
want
Collect
books
Commit
order
Wait for
book
Receive
book
time
browse
best
sellers
enter
address
receive
delivery
slip
pay with
credit
card
search
book by
title
create
wish list
inquiry
order
status
put into
basket
receive
delivery
notificat.
necessity
manual
workaroun
d
omitted
steps
Does the deliverable
achieve the impact?
Does the deliverable
achieve the impact?
Order books online
Does the impact
help the business goal?
Does the impact
help the business goal?
Receive books quicker
Compulsive book buyerStory Maps
Sabotage product
impactmapping.org
Tip #2: stop at
“potentially”
Sabotage product
Sabotage product
In order to log in
As a user user
I want to register
Sabotage product
Sabotage product
Tip #3: mask tasks as
user stories
As a User, I want a database table...
As a System, I want a database table...
Sabotage product
In order to plan
collaboratively
As a user
I want to register
In order to plan
collaboratively
As a user
I want to ???
In order to harvest e-
mail addresses
As an e-mail marketer
I want users to give us
personal info when
registering
Sabotage product
Tip #3: unmeasurable
user stories
In order monitor sales
As a sales manager
I want a daily
transaction report
In order monitor sales
In order monitor sales
faster
BDD
B///CDD
B/// tip #4:
Confusion
Driven
Development
Sabotage product
● Given a user with no
previous orders
● When the user buys
more than three books
● Then he should receive a
special delivery offer
● Given I open '/home.aspx'
● And I register as 'newuser'
● When I open '/books.aspx'
● And I click on a book
● And I click on a book
● And I click on a book
● And I click on 'checkout'
CONVERT TO STEPS:
● Given I open '/home.aspx'
● And I enter 'newuser' into username
● And I enter 'newpwd' into password
● And I enter 'Tom' into name
● And I enter 'Nowhere' into address1
● And I enter 'Nowhere' into address2
● When I open '/books.aspx'
● And I click on a book
ADD IRRELEVANT INFO:
● Given I open '/home.aspx'
● And I enter 'newuser' into
'/div[id=#reg]/form[1]/input[title='user']
● And I enter 'newpwd' into
'/div[id=#reg]/form[1]/input[type='pass
word']
● And I enter 'Tom' into
'/div[id=#reg]/form/input[3]
ADD XPATH:
Great results happen when
● People know why they are doing their
work
● Organisations focus on delivering
outcomes and impacts rather than
features
● Teams decide what to do next based
on immediate and direct feedback
from the use of their work
● Everyone cares
● FAST FEEDBACK ON ASSUMPTIONS
● FIX GOALS, FLEX DELIVERABLES
● MAP TASKS TO BUSINESS GOALS
● STORIES WITH CLEAR USER PERSONAS
● STORIES WITH BEHAVIOUR CHANGES
● SPECS WITH NO IMPLEMENTATION INFO
Bonus tip
Sabotage product

More Related Content

Viewers also liked

5 key challenges
5 key challenges5 key challenges
5 key challengesgojkoadzic
 
Death to the testing phase
Death to the testing phaseDeath to the testing phase
Death to the testing phasegojkoadzic
 
Effective specifications for agile teams
Effective specifications for agile teamsEffective specifications for agile teams
Effective specifications for agile teamsgojkoadzic
 
How I learned to stop worrying and love flexible scope - at JFokus 2014
How I learned to stop worrying and love flexible scope - at JFokus 2014How I learned to stop worrying and love flexible scope - at JFokus 2014
How I learned to stop worrying and love flexible scope - at JFokus 2014gojkoadzic
 
Test Automation Without the Headache: Agile Tour Vienna 2015
Test Automation Without the Headache: Agile Tour Vienna 2015 Test Automation Without the Headache: Agile Tour Vienna 2015
Test Automation Without the Headache: Agile Tour Vienna 2015 gojkoadzic
 
Serverless JavaScript
Serverless JavaScriptServerless JavaScript
Serverless JavaScriptgojkoadzic
 
Challenging Requirements/Oredev
Challenging Requirements/OredevChallenging Requirements/Oredev
Challenging Requirements/Oredevgojkoadzic
 
From Grid to Cloud
From Grid to CloudFrom Grid to Cloud
From Grid to Cloudgojkoadzic
 
Specification by Example
Specification by ExampleSpecification by Example
Specification by ExampleDeclan Whelan
 
Time to Bet on the Cloud?
Time to Bet on the Cloud?Time to Bet on the Cloud?
Time to Bet on the Cloud?gojkoadzic
 
Reinventing Software Quality, Agile Days Moscow 2013
Reinventing Software Quality, Agile Days Moscow 2013Reinventing Software Quality, Agile Days Moscow 2013
Reinventing Software Quality, Agile Days Moscow 2013gojkoadzic
 
Agile Testers: Becoming a key asset for your team
Agile Testers: Becoming a key asset for your teamAgile Testers: Becoming a key asset for your team
Agile Testers: Becoming a key asset for your teamgojkoadzic
 
Specification by example and agile acceptance testing
Specification by example and agile acceptance testingSpecification by example and agile acceptance testing
Specification by example and agile acceptance testinggojkoadzic
 

Viewers also liked (13)

5 key challenges
5 key challenges5 key challenges
5 key challenges
 
Death to the testing phase
Death to the testing phaseDeath to the testing phase
Death to the testing phase
 
Effective specifications for agile teams
Effective specifications for agile teamsEffective specifications for agile teams
Effective specifications for agile teams
 
How I learned to stop worrying and love flexible scope - at JFokus 2014
How I learned to stop worrying and love flexible scope - at JFokus 2014How I learned to stop worrying and love flexible scope - at JFokus 2014
How I learned to stop worrying and love flexible scope - at JFokus 2014
 
Test Automation Without the Headache: Agile Tour Vienna 2015
Test Automation Without the Headache: Agile Tour Vienna 2015 Test Automation Without the Headache: Agile Tour Vienna 2015
Test Automation Without the Headache: Agile Tour Vienna 2015
 
Serverless JavaScript
Serverless JavaScriptServerless JavaScript
Serverless JavaScript
 
Challenging Requirements/Oredev
Challenging Requirements/OredevChallenging Requirements/Oredev
Challenging Requirements/Oredev
 
From Grid to Cloud
From Grid to CloudFrom Grid to Cloud
From Grid to Cloud
 
Specification by Example
Specification by ExampleSpecification by Example
Specification by Example
 
Time to Bet on the Cloud?
Time to Bet on the Cloud?Time to Bet on the Cloud?
Time to Bet on the Cloud?
 
Reinventing Software Quality, Agile Days Moscow 2013
Reinventing Software Quality, Agile Days Moscow 2013Reinventing Software Quality, Agile Days Moscow 2013
Reinventing Software Quality, Agile Days Moscow 2013
 
Agile Testers: Becoming a key asset for your team
Agile Testers: Becoming a key asset for your teamAgile Testers: Becoming a key asset for your team
Agile Testers: Becoming a key asset for your team
 
Specification by example and agile acceptance testing
Specification by example and agile acceptance testingSpecification by example and agile acceptance testing
Specification by example and agile acceptance testing
 

Similar to Sabotage product

How getting your hands dirty with code makes you a better business leader @ V...
How getting your hands dirty with code makes you a better business leader @ V...How getting your hands dirty with code makes you a better business leader @ V...
How getting your hands dirty with code makes you a better business leader @ V...Hifluence
 
How getting your hands dirty with code makes you a better business leader @ V...
How getting your hands dirty with code makes you a better business leader @ V...How getting your hands dirty with code makes you a better business leader @ V...
How getting your hands dirty with code makes you a better business leader @ V...Linde Vloeberghs
 
User Story Splitting
User Story SplittingUser Story Splitting
User Story Splittingtrishly
 
Link Building in 2020 :: Use this Walk-through to Acquire & Earn Links that w...
Link Building in 2020 :: Use this Walk-through to Acquire & Earn Links that w...Link Building in 2020 :: Use this Walk-through to Acquire & Earn Links that w...
Link Building in 2020 :: Use this Walk-through to Acquire & Earn Links that w...Boni Satani
 
Ict workshop 2018 urkund
Ict workshop 2018 urkundIct workshop 2018 urkund
Ict workshop 2018 urkunddharma gohel
 
Comprendre le cold emailing - Julien Le Coupanec, Growth Hacker chez TheFamily
Comprendre le cold emailing - Julien Le Coupanec, Growth Hacker chez TheFamilyComprendre le cold emailing - Julien Le Coupanec, Growth Hacker chez TheFamily
Comprendre le cold emailing - Julien Le Coupanec, Growth Hacker chez TheFamilyTheFamily
 
How to monetize your podcast without selling your soul...
How to monetize your podcast without selling your soul...How to monetize your podcast without selling your soul...
How to monetize your podcast without selling your soul...Tom Tate
 
Cracking the Product Manager Interview with Gayle McDowell
Cracking the Product Manager Interview with Gayle McDowellCracking the Product Manager Interview with Gayle McDowell
Cracking the Product Manager Interview with Gayle McDowellProduct School
 
How to Start a Blog The Beginner’s Guide to Creating a Successful Blog.pdf
How to Start a Blog The Beginner’s Guide to Creating a Successful Blog.pdfHow to Start a Blog The Beginner’s Guide to Creating a Successful Blog.pdf
How to Start a Blog The Beginner’s Guide to Creating a Successful Blog.pdfMd Monir Uddin
 
How to get started with freelancing
How to get started with freelancingHow to get started with freelancing
How to get started with freelancingLoc Nguyen
 
Writing About WordPress: Helping Yourself, by Helping Others -- WordCamp Orl...
Writing About WordPress: Helping Yourself, by Helping Others -- WordCamp Orl...Writing About WordPress: Helping Yourself, by Helping Others -- WordCamp Orl...
Writing About WordPress: Helping Yourself, by Helping Others -- WordCamp Orl...Caldera Labs
 
Working with Brands as a Serious Influencer
Working with Brands as a Serious InfluencerWorking with Brands as a Serious Influencer
Working with Brands as a Serious InfluencerFLBlogCon
 
Retaining your signups while your product... kind of sucks
Retaining your signups while your product... kind of sucksRetaining your signups while your product... kind of sucks
Retaining your signups while your product... kind of sucksKair Kasper
 
Personal Branding in a Job Search by Greg David of Gregory Laka and Company
Personal Branding in a Job Search by Greg David of Gregory Laka and CompanyPersonal Branding in a Job Search by Greg David of Gregory Laka and Company
Personal Branding in a Job Search by Greg David of Gregory Laka and CompanyGreg David
 
User Story Splitting.pptx
User Story Splitting.pptxUser Story Splitting.pptx
User Story Splitting.pptxPaul Boos
 
Blogging School - Getting Started as a Blogger for B2B
Blogging School - Getting Started as a Blogger for B2BBlogging School - Getting Started as a Blogger for B2B
Blogging School - Getting Started as a Blogger for B2BKrista Kauppinen
 

Similar to Sabotage product (20)

How getting your hands dirty with code makes you a better business leader @ V...
How getting your hands dirty with code makes you a better business leader @ V...How getting your hands dirty with code makes you a better business leader @ V...
How getting your hands dirty with code makes you a better business leader @ V...
 
How getting your hands dirty with code makes you a better business leader @ V...
How getting your hands dirty with code makes you a better business leader @ V...How getting your hands dirty with code makes you a better business leader @ V...
How getting your hands dirty with code makes you a better business leader @ V...
 
User Story Splitting
User Story SplittingUser Story Splitting
User Story Splitting
 
Olf2011
Olf2011Olf2011
Olf2011
 
Link Building in 2020 :: Use this Walk-through to Acquire & Earn Links that w...
Link Building in 2020 :: Use this Walk-through to Acquire & Earn Links that w...Link Building in 2020 :: Use this Walk-through to Acquire & Earn Links that w...
Link Building in 2020 :: Use this Walk-through to Acquire & Earn Links that w...
 
Ict workshop 2018 urkund
Ict workshop 2018 urkundIct workshop 2018 urkund
Ict workshop 2018 urkund
 
How to Create Great Conent
How to Create Great ConentHow to Create Great Conent
How to Create Great Conent
 
Comprendre le cold emailing - Julien Le Coupanec, Growth Hacker chez TheFamily
Comprendre le cold emailing - Julien Le Coupanec, Growth Hacker chez TheFamilyComprendre le cold emailing - Julien Le Coupanec, Growth Hacker chez TheFamily
Comprendre le cold emailing - Julien Le Coupanec, Growth Hacker chez TheFamily
 
How to monetize your podcast without selling your soul...
How to monetize your podcast without selling your soul...How to monetize your podcast without selling your soul...
How to monetize your podcast without selling your soul...
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Cracking the Product Manager Interview with Gayle McDowell
Cracking the Product Manager Interview with Gayle McDowellCracking the Product Manager Interview with Gayle McDowell
Cracking the Product Manager Interview with Gayle McDowell
 
How to Start a Blog The Beginner’s Guide to Creating a Successful Blog.pdf
How to Start a Blog The Beginner’s Guide to Creating a Successful Blog.pdfHow to Start a Blog The Beginner’s Guide to Creating a Successful Blog.pdf
How to Start a Blog The Beginner’s Guide to Creating a Successful Blog.pdf
 
How to get started with freelancing
How to get started with freelancingHow to get started with freelancing
How to get started with freelancing
 
Writing About WordPress: Helping Yourself, by Helping Others -- WordCamp Orl...
Writing About WordPress: Helping Yourself, by Helping Others -- WordCamp Orl...Writing About WordPress: Helping Yourself, by Helping Others -- WordCamp Orl...
Writing About WordPress: Helping Yourself, by Helping Others -- WordCamp Orl...
 
Week 2 setting up your own business
Week 2 setting up your own businessWeek 2 setting up your own business
Week 2 setting up your own business
 
Working with Brands as a Serious Influencer
Working with Brands as a Serious InfluencerWorking with Brands as a Serious Influencer
Working with Brands as a Serious Influencer
 
Retaining your signups while your product... kind of sucks
Retaining your signups while your product... kind of sucksRetaining your signups while your product... kind of sucks
Retaining your signups while your product... kind of sucks
 
Personal Branding in a Job Search by Greg David of Gregory Laka and Company
Personal Branding in a Job Search by Greg David of Gregory Laka and CompanyPersonal Branding in a Job Search by Greg David of Gregory Laka and Company
Personal Branding in a Job Search by Greg David of Gregory Laka and Company
 
User Story Splitting.pptx
User Story Splitting.pptxUser Story Splitting.pptx
User Story Splitting.pptx
 
Blogging School - Getting Started as a Blogger for B2B
Blogging School - Getting Started as a Blogger for B2BBlogging School - Getting Started as a Blogger for B2B
Blogging School - Getting Started as a Blogger for B2B
 

More from gojkoadzic

Descaling Agile (Agile Tour Vienna 2019)
Descaling Agile (Agile Tour Vienna 2019)Descaling Agile (Agile Tour Vienna 2019)
Descaling Agile (Agile Tour Vienna 2019)gojkoadzic
 
Maximum Impact, Minimum Effort
Maximum Impact, Minimum EffortMaximum Impact, Minimum Effort
Maximum Impact, Minimum Effortgojkoadzic
 
Painless visual testing
Painless visual testingPainless visual testing
Painless visual testinggojkoadzic
 
From dedicated to cloud infrastructure
From dedicated to cloud infrastructureFrom dedicated to cloud infrastructure
From dedicated to cloud infrastructuregojkoadzic
 
Specification Workshops - The Missing Link
Specification Workshops - The Missing LinkSpecification Workshops - The Missing Link
Specification Workshops - The Missing Linkgojkoadzic
 
Space Based Programming
Space Based ProgrammingSpace Based Programming
Space Based Programminggojkoadzic
 
Getting business people and developers to listen to testers
Getting business people and developers to listen to testersGetting business people and developers to listen to testers
Getting business people and developers to listen to testersgojkoadzic
 
Is the cloud a gamble
Is the cloud a gambleIs the cloud a gamble
Is the cloud a gamblegojkoadzic
 
Casino In The Clouds
Casino In The CloudsCasino In The Clouds
Casino In The Cloudsgojkoadzic
 
Going the extra mile
Going the extra mileGoing the extra mile
Going the extra milegojkoadzic
 
As fast as a grid, as safe as a database
As fast as a grid, as safe as a databaseAs fast as a grid, as safe as a database
As fast as a grid, as safe as a databasegojkoadzic
 
Betting On Data Grids
Betting On Data GridsBetting On Data Grids
Betting On Data Gridsgojkoadzic
 
Achieving Scale With Messaging And The Cloud
Achieving Scale With Messaging And The CloudAchieving Scale With Messaging And The Cloud
Achieving Scale With Messaging And The Cloudgojkoadzic
 
How an Enterprise Data Fabric (EDF) can improve resiliency and performance
How an Enterprise Data Fabric (EDF) can improve resiliency and performanceHow an Enterprise Data Fabric (EDF) can improve resiliency and performance
How an Enterprise Data Fabric (EDF) can improve resiliency and performancegojkoadzic
 

More from gojkoadzic (14)

Descaling Agile (Agile Tour Vienna 2019)
Descaling Agile (Agile Tour Vienna 2019)Descaling Agile (Agile Tour Vienna 2019)
Descaling Agile (Agile Tour Vienna 2019)
 
Maximum Impact, Minimum Effort
Maximum Impact, Minimum EffortMaximum Impact, Minimum Effort
Maximum Impact, Minimum Effort
 
Painless visual testing
Painless visual testingPainless visual testing
Painless visual testing
 
From dedicated to cloud infrastructure
From dedicated to cloud infrastructureFrom dedicated to cloud infrastructure
From dedicated to cloud infrastructure
 
Specification Workshops - The Missing Link
Specification Workshops - The Missing LinkSpecification Workshops - The Missing Link
Specification Workshops - The Missing Link
 
Space Based Programming
Space Based ProgrammingSpace Based Programming
Space Based Programming
 
Getting business people and developers to listen to testers
Getting business people and developers to listen to testersGetting business people and developers to listen to testers
Getting business people and developers to listen to testers
 
Is the cloud a gamble
Is the cloud a gambleIs the cloud a gamble
Is the cloud a gamble
 
Casino In The Clouds
Casino In The CloudsCasino In The Clouds
Casino In The Clouds
 
Going the extra mile
Going the extra mileGoing the extra mile
Going the extra mile
 
As fast as a grid, as safe as a database
As fast as a grid, as safe as a databaseAs fast as a grid, as safe as a database
As fast as a grid, as safe as a database
 
Betting On Data Grids
Betting On Data GridsBetting On Data Grids
Betting On Data Grids
 
Achieving Scale With Messaging And The Cloud
Achieving Scale With Messaging And The CloudAchieving Scale With Messaging And The Cloud
Achieving Scale With Messaging And The Cloud
 
How an Enterprise Data Fabric (EDF) can improve resiliency and performance
How an Enterprise Data Fabric (EDF) can improve resiliency and performanceHow an Enterprise Data Fabric (EDF) can improve resiliency and performance
How an Enterprise Data Fabric (EDF) can improve resiliency and performance
 

Recently uploaded

UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 

Recently uploaded (20)

UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 

Sabotage product

  • 1. HOW BEST TO SABOTAGE YOUR PRODUCT Gojko Adzic @gojkoadzic http://gojko.net
  • 8. Tip #1: commit to a massive backlog at the start
  • 10. Walking skeleton Find book I want Collect books Commit order Wait for book Receive book time browse best sellers enter address receive delivery slip pay with credit card search book by title create wish list inquiry order status put into basket receive delivery notificat. necessity manual workaroun d omitted steps Does the deliverable achieve the impact? Does the deliverable achieve the impact? Order books online Does the impact help the business goal? Does the impact help the business goal? Receive books quicker Compulsive book buyerStory Maps
  • 13. Tip #2: stop at “potentially”
  • 16. In order to log in As a user user I want to register
  • 19. Tip #3: mask tasks as user stories
  • 20. As a User, I want a database table...
  • 21. As a System, I want a database table...
  • 23. In order to plan collaboratively As a user I want to register
  • 24. In order to plan collaboratively As a user I want to ???
  • 25. In order to harvest e- mail addresses As an e-mail marketer I want users to give us personal info when registering
  • 28. In order monitor sales As a sales manager I want a daily transaction report
  • 30. In order monitor sales faster
  • 31. BDD
  • 35. ● Given a user with no previous orders ● When the user buys more than three books ● Then he should receive a special delivery offer
  • 36. ● Given I open '/home.aspx' ● And I register as 'newuser' ● When I open '/books.aspx' ● And I click on a book ● And I click on a book ● And I click on a book ● And I click on 'checkout' CONVERT TO STEPS:
  • 37. ● Given I open '/home.aspx' ● And I enter 'newuser' into username ● And I enter 'newpwd' into password ● And I enter 'Tom' into name ● And I enter 'Nowhere' into address1 ● And I enter 'Nowhere' into address2 ● When I open '/books.aspx' ● And I click on a book ADD IRRELEVANT INFO:
  • 38. ● Given I open '/home.aspx' ● And I enter 'newuser' into '/div[id=#reg]/form[1]/input[title='user'] ● And I enter 'newpwd' into '/div[id=#reg]/form[1]/input[type='pass word'] ● And I enter 'Tom' into '/div[id=#reg]/form/input[3] ADD XPATH:
  • 39. Great results happen when ● People know why they are doing their work ● Organisations focus on delivering outcomes and impacts rather than features ● Teams decide what to do next based on immediate and direct feedback from the use of their work ● Everyone cares
  • 40. ● FAST FEEDBACK ON ASSUMPTIONS ● FIX GOALS, FLEX DELIVERABLES ● MAP TASKS TO BUSINESS GOALS ● STORIES WITH CLEAR USER PERSONAS ● STORIES WITH BEHAVIOUR CHANGES ● SPECS WITH NO IMPLEMENTATION INFO