Feeds

State of the ALM art

Xeau's Barry Gilbert speaks with David Norfolk

3 Big data security analytics techniques

Interview I've been an enthusiast for ALM (Application Lifecycle Management) since the days of AD Cycle in the 1980s – but I can't help noticing that universal adoption still seems to be some way off. Perhaps it's the "hero culture" we have in IT: the ALM promises of "getting it right first time, good alignment with the business and no surprises" don't offer much scope for a hero to save the day, riding in on a white charger when the brown stuff hits the fan.

Perhaps no one really wants what ALM promises...

But I may be out of touch these days, so I welcomed a chance to interview Barry Gilbert, a current ALM practitioner with the consultant Xeau.

David Norfolk for Reg Dev: You are an experienced ALM expert and a consultant with Xeau , which also resells the Contour requirements management tool. What is your background in this space?

Barry Gilbert from Xeau: I first started work as a systems analyst for an operations and management consultancy, moving up the ranks to become one of those who told the 50 year old guy "look upon redundancy as a new start". At which point, I setup a development shop producing turnkey applications back in the late 80s and early 90s.

More recently, stints at Atria-Rational and Starbase-Borland gave me insights into the SCM [Software Configuration Management], ALM and requirements management areas of the whole software lifecycle.

Today, I'm co-founder of Xeau, setup in 2002, specialising in requirements management and all that it touches within the ALM space. We help organisations of all sizes and types to select effective Requirements Management solutions. We also help other organisations re-evaluate their use of requirements management tools.

Reg Dev: I'm interested in your view of the state of the art in RM. For instance, I suspect both of us think that RM is a 'no brainer' and could argue about market shares in this space – but isn't the real "market leader" the large group of developers who don't do formal RM at all?

Gilbert: Despite what the tool vendors would like to tell us, MS-Office is still the leading requirements management tool. The fact is, everyone uses a requirements management solution of sorts – for some organisations, documents, spreadsheets, and email work well.

Typically, these organisations will spend more time doing requirements management and, therefore, incur invisible overhead costs in it, but if it works for them, then who can criticise? However, with the increasing pace of software development the tolerance for delivering the wrong functionality, and delivering it late, is ever-diminishing.

Reg Dev: Given that many effective developers don't use formal RM tools, why might this make sense to them?

Gilbert: When I was directly involved in development, many years ago, end users were grateful for what they were given. Today, end users are more astute, more aware of what software can do, and simply demand more. Tie this together with easier and faster communications channels (email, etc) and users will fire off new design ideas, change requests and bug fix requests incessantly, to business analysts, designers, and developers. Little wonder end users shout and scream at deployment teams when a crucial change has been omitted from a release, simply because an email went astray or was simply forgotten.

Perhaps the 10cc lyric should have been "disorganised and unstructured communication is the problem to the answer". That's what requirements management tools provide – structure and method to the capture and management of requirements; and a subsequent flow of crucial information for the ALM cycle.

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.