Feeds

Grappling with eels - first wriggle

The Slippery World of Agile Planning

3 Big data security analytics techniques

Column Harry the Rottweiler Harry the Rottweiler - aka small black poodle called Patsyputs down his corporate-branded coffee cup next to his spiral-bound Book of Names and cheap plastic retractable (which also doubles as a sacrificial weapon in extreme management meetings).

The stench of stale coffee wafts from beneath his snarling upper lip. Out of all the people in the room, he’s staring at you, and he wants to know why your plan said Feature X would be delivered last week, yet Feature X is still nowhere in sight. You know in advance that mere facts, like “The scope changed but the plan was already set” will impress this man about as much as handing him a bottle of Listerine.

Despite the brave attempts of agile developers to de-emphasize the importance of project plans, they're still with us and are still the primary measure of progress at the management level. In fact, it might seem that agile software development and project planning are mutually exclusive: how can you plan future release dates if the one certainty is that those dates (and the scope) are going to change?

However, planning is actually an integral part of agile development. It isn’t even all that different from "normal" project planning, when you get down to the fundamentals. The main difference is that with agile planning (also known variously as adaptive planning and rolling wave planning), you plan ahead in broad brush strokes – release milestones – and only plan in detail for the next iteration. The length of the next iteration depends on your agile methodology/religion: it could be a week, it could be a month. But the main point is that beyond some realistic horizon, events get too blurry, too speculative, to predict accurately.

Agile die-hards call detailed future planning “predictive planning”, to highlight the fact that managers who plan in detail far ahead are attempting to prophesize the distant future. “Right, so on Tuesday 5th in the year 40,000 we'll deploy a lead shield around the Earth to prevent neutrinos from introducing random bugs into our trading system. And Johnny, aka Resource 36, will devote 75 per cent of his time to this eight-hour task. It's in the plan, so we can tell the customer it’s as good as done.”

In Agile and Iterative Development, Craig Larman writes:

“In contrast [to adaptive planning], a predictive plan is suboptimal. In fact, it could be close to the worst or most risky possible path to the milestone goal because it is created with the least amount of information, speculating far into the future… It is not wise or useful to believe that five iterations in the future, 17 weeks from today, the best thing we should do is implement requirement R15.”

Unfortunately there’s another side to the coin. Real-world constraints often put a stopper in the idealism of agile planning. (This idealism isn’t in itself a bad thing, by the way: sometimes it’s good to take a step back and say “The age-old approach isn’t ideal; wouldn’t it be better if…”). Managers – and customers, for that matter – like deadlines, baselines, and all sorts of other lines. In fact they don’t just like them, they often rely on predictive plans to manage the project in the greater scheme of things: several different projects may need to deliver all at once, or two of your developers might be lined up to work on a different project in a month’s time.

So, that means we have a problem: predictive plans are suboptimal and likely to represent the riskiest path to the milestone goal; but the business world depends on these plans. No wonder IT has such a bad reputation, if it’s basically incompatible with business!

In Part II, I’ll explore this problem further, and look at how agile planning deals with the problem. ®

Top three mobile application threats

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.