Feeds

Reg readers: Distributed software development is hard

But is there hope?

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

This leads to the question of which parts of the development process are safe to distribute out to satellite or outsourced teams without running into trouble. The general consensus is to keep the critical early part of the life cycle (specification, analysis and design) in-house along with overall project management, putting the focus of remote activity on coding, testing and, to a lesser degree, integration work. (Figure 5)

Figure 5

Looking a bit more closely at this, we can get some insight into why the peer-to-peer model is attractive to some, despite the associated challenges our poll suggests. With a more even distribution of skill sets and experience between teams, those taking the peer-to-peer approach are more comfortable distributing some of the critical up-front specification, analysis and design, as well as integration and overall project management (Figure 6).

Figure 6

Going down the peer to peer route can therefore equate to better overall flexibility from a resourcing perspective, which in turn will have benefits in terms of overall delivery and responsiveness to the business. It’s not the only option or indeed the easiest, but it certainly merits consideration.

Beginner's guide to SSL certificates

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
Was ist das? Eine neue Suse Linux Enterprise? Ausgezeichnet!
Version 12 first major-number Suse release since 2009
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.