Feeds

DSDM Atern goes beyond IT

Fast project principles extended to all business change

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

The DSDM Consortium has set itself the ambitious aim of covering all types of project management with its revamped development framework launched last week. The framework has been rebranded under the name DSDM Atern and replaces the existing DSDM version 4.2 - although the Consortium describes the change as an evolutionary upgrade. Current DSDM 4.2 users will be provided with appropriate migration guidelines.

DSDM - from Dynamic Systems Development Method - originated in the rapid application development (RAD) community in the early 1990s when it became apparent that existing project management methods were unsuited to RAD techniques. The framework evolved into its current form as a result of a sustained effort by consortium work groups.

But DSDM Atern marks a significant change of direction - taking DSDM principles beyond IT life-cycle projects into the wider business arena. The Consortium notes that the DSDM approach has already been used successfully in non-IT projects and the move is an acknowledgement of the trend. It also points to the emergence of more service-based development projects and suggests the incremental approach at the core of DSDM is ideally suited to this direction.

Among the changes included in DSDM Atern, the Consortium points to a clearer definition of the framework and a greater emphasis on communications through a project life cycle. Names of project phases have been changed to reflect the use of the framework in non-IT projects.

Roles and responsibilities have also been altered and the additional role of business analysts has been introduced. Project level role definitions in DSDM Atern have been re-aligned to match with those used in Prince2 definitions.

The Consortium says that enhanced tool support - often cited as a limitation of earlier DSDM frameworks - will become increasingly available as a result of closer ties between Atern and the Eclipse open source toolset developments. ®

Business security measures using SSL

More from The Register

next story
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.