Feeds

eXtreme methods

Different views...

Internet Security Threat Report 2014

Kevlin Henney raised an interesting point (here) about the view of eXtreme Programming in the revision to Myers' Art of Software Testing.

I didn't pick up on this in my review, probably because it never occurs to me to adopt normative development processes without also applying common sense – methodology (and why not call it method) should be a guide, not a master. Departing from the standard method will have consequences; if all of these are adequately addressed and the overall results are "better" (which implies that this only really works in a mature organisation with metrics behind "better"), then the departure is going to be OK.

Besides, as far as I know, there is no definitive statement of what XP actually is (and can't be, as an XP precept is "if XP is broke you're allowed to fix it" AIUI).

Anyway, I simply can't see anyone completing an entire system test pack before they do any coding any more than I see them producing an entire corporate data model before building anything. The principle of requirements being testable and of producing some tests before you start coding is still valuable, however; as is the principle of modelling data structures and relationships before trying to write code.

When I talked to Kevlin about this, he mentioned that the people who revised Myers seem almost to be recommending a sort of "reverse waterfall". Well, I can defend Waterfall too. As I understand it, the waterfall is actually an iterative process and no one, in practice, ever sets the requirements in stone and delivers on them five years later without a change. Mainly because so doing would make no sense (and isn't what Royce asked for anyway).

Kevlin's comment on this makes interesting reading:

Well, that's not a defence of the Waterfall: it's a defence of what Royce said, which is subtly different. In his original paper, Royce outlined a number of process models. Two things are notable about this paper: (1) he never used the term "waterfall" and (2) the process model that has since been named the Waterfall is one he criticises. However, he still gets the infamy associated with the process!

There are a surprising number of projects and companies that are drawn to the Waterfall as the default process. Closer inspection reveals why there is this attraction -- I wrote about it in Objective View 10 [big pdf download necessary - Ed].

In the end, of course, talking about "methodologies" is going to go on for ever. I sometimes think that actually following any method, as long as you're prepared to depart from it in a controlled way when this makes sense, is better than the common practice of not following any particular method - while paying lip service to something or other fashionable. ®

Security for virtualized datacentres

More from The Register

next story
Microsoft WINDOWS 10: Seven ATE Nine. Or Eight did really
Windows NEIN skipped, tech preview due out on Wednesday
Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9
Forget touchscreen millennials, Microsoft goes for mouse crowd
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
'Google is NOT the gatekeeper to the web, as some claim'
Plus: 'Pretty sure iOS 8.0.2 will just turn the iPhone into a fax machine'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.