Feeds

eXtreme methods

Different views...

Providing a secure and efficient Helpdesk

Kevlin Henney raised an interesting point (here) about the view of eXtreme Programming in the revision to Myers' Art of Software Testing.

I didn't pick up on this in my review, probably because it never occurs to me to adopt normative development processes without also applying common sense – methodology (and why not call it method) should be a guide, not a master. Departing from the standard method will have consequences; if all of these are adequately addressed and the overall results are "better" (which implies that this only really works in a mature organisation with metrics behind "better"), then the departure is going to be OK.

Besides, as far as I know, there is no definitive statement of what XP actually is (and can't be, as an XP precept is "if XP is broke you're allowed to fix it" AIUI).

Anyway, I simply can't see anyone completing an entire system test pack before they do any coding any more than I see them producing an entire corporate data model before building anything. The principle of requirements being testable and of producing some tests before you start coding is still valuable, however; as is the principle of modelling data structures and relationships before trying to write code.

When I talked to Kevlin about this, he mentioned that the people who revised Myers seem almost to be recommending a sort of "reverse waterfall". Well, I can defend Waterfall too. As I understand it, the waterfall is actually an iterative process and no one, in practice, ever sets the requirements in stone and delivers on them five years later without a change. Mainly because so doing would make no sense (and isn't what Royce asked for anyway).

Kevlin's comment on this makes interesting reading:

Well, that's not a defence of the Waterfall: it's a defence of what Royce said, which is subtly different. In his original paper, Royce outlined a number of process models. Two things are notable about this paper: (1) he never used the term "waterfall" and (2) the process model that has since been named the Waterfall is one he criticises. However, he still gets the infamy associated with the process!

There are a surprising number of projects and companies that are drawn to the Waterfall as the default process. Closer inspection reveals why there is this attraction -- I wrote about it in Objective View 10 [big pdf download necessary - Ed].

In the end, of course, talking about "methodologies" is going to go on for ever. I sometimes think that actually following any method, as long as you're prepared to depart from it in a controlled way when this makes sense, is better than the common practice of not following any particular method - while paying lip service to something or other fashionable. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.