She will talk about the characteristics to look for in team members who will make Agile practices work, as well as those characteristics that aren’t so helpful. Given the collaborative nature of Agile, people who are flexible, who like to work with others and who have varied skillsets, for example, are often better suited to this type of team. Often team members need to work closely together as in pair programming. Her presentation will also discuss Agile terminology and how to redefine it in sectors outside of development, how to establish guidelines and how to get started with Agile methods.
[kml_flashembed movie="http://www.youtube.com/v/2jTu0oHKNCo" width="425" height="350" wmode="transparent" /]
One question he will address is, “Where does project management fit in a self-organizing team?” Project managers may feel that their role is at odds with the Agile process, but Mike has advice on how to redefine team members’ roles so that organizations can take advantage of Agile values and principles. He says, “Management offers guidance and a container within which the team operates,” and he believes Agile concepts can be adapted to nearly any type of project.
The presentation will offer a thorough examination of Agile principles and goals, and the roles of various team members, as well as a comprehensive explanation of story mapping with a breakdown of epics, features and user stories.
In addition, Mike Cottmeyer and Dennis Stevens, an Agile coach with Synaptus, will be co-presenting on “Exploring Enterprise Agile Transformation Strategies.” This presentation digs deeper into the difference between Agile adoption and full Agile transformation. Mike said that “the goal is never to adopt Agile,” as leaders care about achieving tangible goals. They will demonstrate how Agile contributes to meeting organizational goals and will look at specific case studies to show practical application of Agile concepts.]]>
Performance testing and monitoring in the cloud has becoming a popular choice for organizations, because it means they no longer have to invest in very expensive tools and resources which may be sitting on the shelf for most of the year. However, when outsourcing your APM out to a cloud vendor, there are considerations you may need to take into account.
In The cloud: APM ownership challenges, Kay Diller gives helpful tips if you’re transitioning your APM to a cloud vendor. She follows that up with an informative tip on creating a Service Level Agreement with your APM cloud vendor in How to create a strong cloud SLA for APM.
This month SSQ’s focus is on APM. Stay tuned as we bring you more in the next week from experts who will look at how performance testing is changing with Agile development and development on mobile devices.]]>
The world has changed and these days everyone uses the Web and mobile devices continually. “People are far less tolerant of the status quo,” Barber said of users who won’t tolerate slow performance. “The bar to entry [for performance test] in terms of financial investment has been so high that people were willing to accept a lot of risk,” he said, but “now that financial bar has been lowered to almost nothing.”
Barber, who participated in the SOASTA Early Access Program for CloudTest Lite, is impressed with the usability of the product and the fact that the low cost has now made performance testing feasible.
Barber said that while he likes open source solutions, they have their limitations. None of them can do everything, and they have limited support and training.
Barber said of the SOASTA announcement, “As a trainer, they’ve given me a platform where I can train people without them having to own some very expensive tool in order to try it out during a training class.” He went on to explain that using CloudTest Lite allows teams to do performance testing and debugging throughout the software development lifecycle for free without having to share licenses, controllers or other resources. Once they’ve gotten the tests fine-tuned, if they need more concurrent users, they can easily get the on-demand upgraded version of CloudTest for the time they need to run their tests. He explained:
You pay for what you need instead of having a million dollar tool sitting on the shelf nine months of the year.
I asked Lounibos whether or not a Service Level Agreement (SLA) was needed when performance testing was done in the cloud. He answered:
SLAs don’t come into play, nor does data security. We’re using test data versus live data, for example.
When asked whether CloudTest was ever used for post-production performance monitoring, Lounibos said that while they didn’t provide monitoring, they extracted data from monitoring tools. He pointed out, as he did when we talked last year about the uTest and SOASTA partnership, that the OLAP data engine was a key differentiator that SOASTA offers over competitors:
When we say enterprise-class, it’s really at the data level that you get a very sophisticated, multi-dimensional view of performance metrics unlike any other technology out there because we extract from multiple sources and aggregate and correlate them in memory.
SOASTA CloudTest Lite is immediately available as a beta version, with general availability on Sept. 1, 2011.
For more information or to download CloudTest Lite, please go to www.soasta.com/cloudtest/lite or contact SOASTA at 866-344-8766.]]>
Developers, group managers, designers, architects and testers can learn techniques for proactively building security into the core and preventing many of the common issues that crop up later in the development process.
The schedule of courses is as follows:
For more information or to register, check out www.securityinnovation.com.
SearchSoftwareQuality.com has several recent articles related to application security, including:
Application security: Testing for insecure file references Insecure file references are considered a significant security risk of Web applications. Security security expert John Overbaugh explains this attack and gives instructions on how you can test for and detect this vulnerability.
Application security: Testing for injection vulnerabilities A top security vulnerability in Web applications is an injection attack — one in which the Web application is tricked into treating input as if it were code, allowing a hacker to gain control of an application. Learn key techniques for how to effectively test for injection vulnerabilities.
In part one of the three-part interview, I ask Sydor to explain more about this. He says:
Everybody plans for an APM deployment, but very little consideration is given to how the technology will actually be used. The goal is often to “stand up” very much like the system management technology that it augments. APM can generate alerts, just like other monitoring tools but the real capabilities diverge sharply from that point.
In part two of the APM series, Sydor addresses APM staffing issues, another area which he feels is risky with APM initiatives “because frequently, all of the expertise ends up in a single individual.”
In the series, Sydor addresses several other questions about APM including questions relating to ROI and APM in the cloud. Part three includes a discussion of what is required of the APM specialist and where performance monitoring fits organizationally.
Check out the interview and his book for an informative look at how to implement an APM initiative within your organization.]]>