SlideShare uma empresa Scribd logo
1 de 23
Information Security Level 2 – Sensitive © 2009 – Proprietary and Confidential Information of Amdocs
Complex Agile Backlog Management




Dr. Ronen Bar-Nahor
Director of Agile Development
Amdocs Product Group


Information Security Level 2 – Sensitive © 2009 – Proprietary and Confidential Information of Amdocs
The Agile Manifesto

                       Individuals and
                        Individuals and                                                                Process and
                                                                                                        Process and
                                                                                over
                         interactions
                          interactions                                                                     tools
                                                                                                            tools
                                                                                                      Comprehensive
                                                                                                      Comprehensive
                  Working software over
                  Working software                                                                    documentation
                                                                                                      documentation
                          Customer
                           Customer                                                                      Contract
                                                                                                          Contract
                                                                                over
                        collaboration
                         collaboration                                                                  negotiation
                                                                                                        negotiation
                        Responding to
                        Responding to                                                                    Following
                                                                                                         Following
                                                                               over
                            change
                            change                                                                         a plan
                                                                                                           a plan
While there is value in the terms on the right, we value the items on the left more
                                                                   (http://www.agilemanifesto.org)




3   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Agile is not just a development gig…
    It’s mainly breaking paradigms and changing the mind-set
        Customers cannot conceptualize all requirements and
        do not understand specs

        The business can’t freeze scope for a long time

        System analysts cannot document solution in an
        unambiguous form

        Developers do not know how to estimate complex
        requirements and can’t commit on what they do not
        fully understand
4    Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
User Stories Summary
                                                                                                As a [user role] I want to [goal]
                                                                                                   so I can [reason]
    > Independent
    > Negotiable –
              > Placeholder for farther discussion
              > Detail just enough information and no more
              > Details captured through collaboration just in time for
                development
    > Valuable
    > Estimate
    > Sizing - right size for planning and development.
    > Testable
5   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Backlog Management
     Priority &
     Level of
     Confidence
                                    Sprints
                                                                                                                  Done
             Internal releases                                                                                    (POR)
             (Iteration)




                                                                                                                Value ?
      Tentativ
      e
      External                                                                                                    Packaging
      release                                                                                                       Sprint

    Future
    release

                 updated yearly following Portfolio                                                            SP, Release
                 Planning Process
6    Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
User Stories




7   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Enterprise Scaling Complexity
                                        Project                                                                     Project




                        Project                                                                                                    Project



                                                                       Integrated Portfolio

                              Line Of Business                        Line Of Business                        Line Of Business         Line Of Business




                       Product Product Product                 Product Product Product                  Product Product Product    Product Product Product



                      Component Component Component Component Component Component Component Component Component Component Component Component


                      Component Component Component Component Component Component Component Component Component Component Component Component


                      Component Component Component Component Component Component Component Component Component Component Component Component




                                                                            Portfolio Foundations


                       Release Release Release                  Release Release Release                  Release Release Release   Release Release Release


8   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Planning Onion
                                                                               Strategy

                                                                               Portfolio

                                                                               Product
                                                                               Release

                                                                               [Iteration]

                                                                               Sprint
                                                                               Day




9   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Portfolio Planning - Process Definition
> Operates once a year in a 3 months time                                                                              PMI
  frame following Company strategy                                                                                    Activity
                                                                                                                             Vertical
  sessions                                                                                                      Geographic Requirements
                                                                                                               Requirements
                                                                                                                                 Customer
                                                                                                                    Analyst    Requirements
> Main process for identifying and qualifying                                                                     Feedback

  the strategic initiatives
                                                                                                                      Product
> Consist of 4 phases:                                                                                                Planning

     > “Kick-off”

     > “Idea gathering”
                                                                                                                                   Roadmap
                                                                                                                                   Roadmap
     > “Plan”
     > “Validate”
                                                                                                                                    Release
                                                                                                                                    Release
     > “Portfolio Planning”

10   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Portfolio Planning Tool

     > Portfolio Planning Tool
             > Includes all relevant information to support
               R&D investment decisions
             > Monitor actual development vs. planning
             > Re-plan and re-allocate R&D investments due
               to major budget changes or major risks




1
11   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
The Tree

     > Strategic Directions (e.g. TCO Reduction)
              > Themes (e.g. Operability)
                       > Initiatives (e.g. Common Installer) - roadmap
                         > Projects (e.g. Installer adoption in …) – release


     • Budget buckets pre-allocated to Strategic Directions and
       Themes
     • All ideas map as initiatives & projects (with their estimates
       and categories)




1
12   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Priorioritizing Initiatives (Portfolio and
     Product initiatives)




     Note: See criteria legend in next slide
1
13     Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Backlog Management Process
Portfolio/
Product
Planning




Strategy           Release Plan


                  Managing Release Backlog                                                                                                       Opportunity/customer
                        (Requirements, Solution Overview, HLD)
                                                                                                                                                       Teams




                                                                                                                                                          Iteration Development
                                                                Top Priority
                                                                                                                                                        Product/System Integration
                                                              Iteration Items
                                                                                                                                                     Enough Value
                                                               Planning




                                                                                      Planning




                                                                                                                                     Planning
                                                                                                            Planning
                                                                                                                                                                 Product
                                                                          Iter - 1               Iter - 2              Iter - 3                 Iter - #        Packaging
                                                                          S1   S2    S3          S1   S2   S3          S1   S2   S3             S1    S2   S3


             Scrum teams


                                                                                                                                                       Portfolio/Solution Integration
       Independent Integration Team
                                                                                                                                                                               Port
                                                                                                 Test Iter 1           Test Iter 2              Test Iter 3      Test Iter #
                                                                                                                                                                               Pack
14     Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Product/Architectur                                                  Backlog Entities                          Release Vehicle
        e                                               Strategic
                                                        Themes




                                                    Solution Overview




                                                    HL Functional Design




15   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Product/Architectur                                                  Backlog Entities                          Release Vehicle
        e                                               Strategic
                                                        Themes




     When scaling to enterprise
      the main challenge is to                      Solution Overview




       handle dependencies                          HL Functional Design




16   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Product/Architectur                                                    Backlog Entities                          Release Vehicle
        e                                                                                       Project View
                                                                                                                        Release View
     Product View




                                                      Solution Overview




                                          System View Design
                                                HL Functional




Teams
 View




17     Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Product/Architectur                                                    Backlog Entities                          Release Vehicle
        e                                                                                       Project View
                                                                                                                        Release View
     Product View




     When Scaling to enterprise
     there are many ways to see                       Solution Overview




             the backlog                  System View Design
                                                HL Functional




Teams
 View




18     Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Release
     Project
                                                                                                                  Manager
     Manager




     Product                                                                                                     Agile
     Manager                                                                                                    Manager
19    Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Thank you




Information Security Level 2 – Sensitive © 2009 – Proprietary and Confidential Information of Amdocs
Product Owner Certification




     • The course is delivered by AgileSparks, a company
       specializing in Agile, and provides a formal certification
       by the ScrumAlliance.
     • Next course: 30 September 2009.

21   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
Scaling Agile Main Practices
     > Small potential “shippable” iterations/internal releases (3
       months)
         > Contains 3-4 sprints (2-4 weeks) produces high quality working SW
         > Schedule based cadence
     > Cross-functional teams
         > Self managed motivated teams, face-to-face communication
     > Customer (PdM) involvement during development
     > Feature/Business Driven (and not a composite design)

     > Continuous Integration
     > Technical excellence
     > JIT Planning model

22
     > Visibility into the process
      Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
23   Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs

Mais conteúdo relacionado

Semelhante a Complex Agile Backlog Management

Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...
Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...
Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...
Philipp Schroeder
 
Globalization product-development-part2
Globalization product-development-part2Globalization product-development-part2
Globalization product-development-part2
rahuo
 
SharePoint 2010 overview
SharePoint 2010 overviewSharePoint 2010 overview
SharePoint 2010 overview
Sentri
 
High Performance Project Management - A Holistic Approach
High Performance Project Management - A Holistic ApproachHigh Performance Project Management - A Holistic Approach
High Performance Project Management - A Holistic Approach
IT Weekend
 

Semelhante a Complex Agile Backlog Management (20)

The Digital Age: How to get the most out of mobile devices in the legal envir...
The Digital Age: How to get the most out of mobile devices in the legal envir...The Digital Age: How to get the most out of mobile devices in the legal envir...
The Digital Age: How to get the most out of mobile devices in the legal envir...
 
Infosys - Global Product Development White Paper | Stewardship Solutions
Infosys - Global Product Development White Paper | Stewardship SolutionsInfosys - Global Product Development White Paper | Stewardship Solutions
Infosys - Global Product Development White Paper | Stewardship Solutions
 
Agile Analysis on an Enterprise Scale
Agile Analysis on an Enterprise ScaleAgile Analysis on an Enterprise Scale
Agile Analysis on an Enterprise Scale
 
4epcm
4epcm4epcm
4epcm
 
Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...
Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...
Sketching, Wireframing, Prototyping - How to Be Agile and Avoid Half-Baked Us...
 
DNetZone Corporate profile
DNetZone Corporate profileDNetZone Corporate profile
DNetZone Corporate profile
 
Globalization product-development-part2
Globalization product-development-part2Globalization product-development-part2
Globalization product-development-part2
 
Guy Hindley: My life in planning, hints & tips
Guy Hindley: My life in planning, hints & tips Guy Hindley: My life in planning, hints & tips
Guy Hindley: My life in planning, hints & tips
 
A balanced metrics set for software business
A balanced metrics set for software businessA balanced metrics set for software business
A balanced metrics set for software business
 
From Waterfall to Agile - from predictive to adaptive methods
From Waterfall to Agile - from predictive to adaptive methodsFrom Waterfall to Agile - from predictive to adaptive methods
From Waterfall to Agile - from predictive to adaptive methods
 
Pmbok 4th edition chapter 12 - Project Procurement Management
Pmbok 4th edition   chapter 12 - Project Procurement ManagementPmbok 4th edition   chapter 12 - Project Procurement Management
Pmbok 4th edition chapter 12 - Project Procurement Management
 
Primavera Project Management
Primavera Project ManagementPrimavera Project Management
Primavera Project Management
 
Primavera Project Management
Primavera Project ManagementPrimavera Project Management
Primavera Project Management
 
SharePoint 2010 overview
SharePoint 2010 overviewSharePoint 2010 overview
SharePoint 2010 overview
 
Riege corporate and Scope Brochure EN
Riege corporate and Scope Brochure ENRiege corporate and Scope Brochure EN
Riege corporate and Scope Brochure EN
 
3 C's of ECM
3 C's of ECM3 C's of ECM
3 C's of ECM
 
Icon ecpma09
Icon ecpma09Icon ecpma09
Icon ecpma09
 
High Performance Project Management - A Holistic Approach
High Performance Project Management - A Holistic ApproachHigh Performance Project Management - A Holistic Approach
High Performance Project Management - A Holistic Approach
 
Mobi hub - Mobile Application Development Practice @ Kahuna Systems
Mobi hub - Mobile Application Development Practice @ Kahuna SystemsMobi hub - Mobile Application Development Practice @ Kahuna Systems
Mobi hub - Mobile Application Development Practice @ Kahuna Systems
 
Success mgt client april 12 (2)
Success mgt client april 12 (2)Success mgt client april 12 (2)
Success mgt client april 12 (2)
 

Mais de Manageware

Rm saa s for share 2
Rm saa s for share 2Rm saa s for share 2
Rm saa s for share 2
Manageware
 
Rm saa s for share 2
Rm saa s for share 2Rm saa s for share 2
Rm saa s for share 2
Manageware
 
Rm saa s for share
Rm saa s for shareRm saa s for share
Rm saa s for share
Manageware
 
Four principles seminar manageware seminar
Four principles seminar   manageware seminarFour principles seminar   manageware seminar
Four principles seminar manageware seminar
Manageware
 
Sailing in Requirements Management Cross Currents - www.manageware.co.il Seminar
Sailing in Requirements Management Cross Currents - www.manageware.co.il SeminarSailing in Requirements Management Cross Currents - www.manageware.co.il Seminar
Sailing in Requirements Management Cross Currents - www.manageware.co.il Seminar
Manageware
 
DOORS Power Tools
DOORS Power ToolsDOORS Power Tools
DOORS Power Tools
Manageware
 
DOORS Rhapsody integration via Gateway
DOORS Rhapsody integration via GatewayDOORS Rhapsody integration via Gateway
DOORS Rhapsody integration via Gateway
Manageware
 
DOORS Tips and Tricks
DOORS Tips and TricksDOORS Tips and Tricks
DOORS Tips and Tricks
Manageware
 
DOORS RIF Capability
DOORS RIF CapabilityDOORS RIF Capability
DOORS RIF Capability
Manageware
 
Requirements Review Process
Requirements Review ProcessRequirements Review Process
Requirements Review Process
Manageware
 
CR based development in Synergy
CR based development in SynergyCR based development in Synergy
CR based development in Synergy
Manageware
 

Mais de Manageware (20)

Product families
Product familiesProduct families
Product families
 
IBM Rational Change special control types
IBM Rational Change special control typesIBM Rational Change special control types
IBM Rational Change special control types
 
Rm saa s for share 2
Rm saa s for share 2Rm saa s for share 2
Rm saa s for share 2
 
Rm saa s for share 2
Rm saa s for share 2Rm saa s for share 2
Rm saa s for share 2
 
Rm saa s for share
Rm saa s for shareRm saa s for share
Rm saa s for share
 
Rm saa s for share
Rm saa s for shareRm saa s for share
Rm saa s for share
 
Four principles seminar manageware seminar
Four principles seminar   manageware seminarFour principles seminar   manageware seminar
Four principles seminar manageware seminar
 
Sailing in Requirements Management Cross Currents - www.manageware.co.il Seminar
Sailing in Requirements Management Cross Currents - www.manageware.co.il SeminarSailing in Requirements Management Cross Currents - www.manageware.co.il Seminar
Sailing in Requirements Management Cross Currents - www.manageware.co.il Seminar
 
DOORS Power Tools
DOORS Power ToolsDOORS Power Tools
DOORS Power Tools
 
DOORS Rhapsody integration via Gateway
DOORS Rhapsody integration via GatewayDOORS Rhapsody integration via Gateway
DOORS Rhapsody integration via Gateway
 
DOORS Tips and Tricks
DOORS Tips and TricksDOORS Tips and Tricks
DOORS Tips and Tricks
 
DOORS RIF Capability
DOORS RIF CapabilityDOORS RIF Capability
DOORS RIF Capability
 
Synergy CLI
Synergy CLISynergy CLI
Synergy CLI
 
Synergy Database Cleaning
Synergy Database CleaningSynergy Database Cleaning
Synergy Database Cleaning
 
Rational Doors Hp Quality Center Integration
Rational Doors Hp Quality Center IntegrationRational Doors Hp Quality Center Integration
Rational Doors Hp Quality Center Integration
 
EA Doing The Right Things Right V1 Manageware
EA   Doing The Right Things Right V1 ManagewareEA   Doing The Right Things Right V1 Manageware
EA Doing The Right Things Right V1 Manageware
 
Spec template and mapping to derivatives of a product
Spec template and mapping to derivatives of a product Spec template and mapping to derivatives of a product
Spec template and mapping to derivatives of a product
 
Requirements Review Process
Requirements Review ProcessRequirements Review Process
Requirements Review Process
 
Optimizing DOORS Implementation
Optimizing DOORS ImplementationOptimizing DOORS Implementation
Optimizing DOORS Implementation
 
CR based development in Synergy
CR based development in SynergyCR based development in Synergy
CR based development in Synergy
 

Último

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Complex Agile Backlog Management

  • 1. Information Security Level 2 – Sensitive © 2009 – Proprietary and Confidential Information of Amdocs
  • 2. Complex Agile Backlog Management Dr. Ronen Bar-Nahor Director of Agile Development Amdocs Product Group Information Security Level 2 – Sensitive © 2009 – Proprietary and Confidential Information of Amdocs
  • 3. The Agile Manifesto Individuals and Individuals and Process and Process and over interactions interactions tools tools Comprehensive Comprehensive Working software over Working software documentation documentation Customer Customer Contract Contract over collaboration collaboration negotiation negotiation Responding to Responding to Following Following over change change a plan a plan While there is value in the terms on the right, we value the items on the left more (http://www.agilemanifesto.org) 3 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 4. Agile is not just a development gig… It’s mainly breaking paradigms and changing the mind-set Customers cannot conceptualize all requirements and do not understand specs The business can’t freeze scope for a long time System analysts cannot document solution in an unambiguous form Developers do not know how to estimate complex requirements and can’t commit on what they do not fully understand 4 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 5. User Stories Summary As a [user role] I want to [goal] so I can [reason] > Independent > Negotiable – > Placeholder for farther discussion > Detail just enough information and no more > Details captured through collaboration just in time for development > Valuable > Estimate > Sizing - right size for planning and development. > Testable 5 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 6. Backlog Management Priority & Level of Confidence Sprints Done Internal releases (POR) (Iteration) Value ? Tentativ e External Packaging release Sprint Future release updated yearly following Portfolio SP, Release Planning Process 6 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 7. User Stories 7 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 8. Enterprise Scaling Complexity Project Project Project Project Integrated Portfolio Line Of Business Line Of Business Line Of Business Line Of Business Product Product Product Product Product Product Product Product Product Product Product Product Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Component Portfolio Foundations Release Release Release Release Release Release Release Release Release Release Release Release 8 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 9. Planning Onion Strategy Portfolio Product Release [Iteration] Sprint Day 9 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 10. Portfolio Planning - Process Definition > Operates once a year in a 3 months time PMI frame following Company strategy Activity Vertical sessions Geographic Requirements Requirements Customer Analyst Requirements > Main process for identifying and qualifying Feedback the strategic initiatives Product > Consist of 4 phases: Planning > “Kick-off” > “Idea gathering” Roadmap Roadmap > “Plan” > “Validate” Release Release > “Portfolio Planning” 10 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 11. Portfolio Planning Tool > Portfolio Planning Tool > Includes all relevant information to support R&D investment decisions > Monitor actual development vs. planning > Re-plan and re-allocate R&D investments due to major budget changes or major risks 1 11 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 12. The Tree > Strategic Directions (e.g. TCO Reduction) > Themes (e.g. Operability) > Initiatives (e.g. Common Installer) - roadmap > Projects (e.g. Installer adoption in …) – release • Budget buckets pre-allocated to Strategic Directions and Themes • All ideas map as initiatives & projects (with their estimates and categories) 1 12 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 13. Priorioritizing Initiatives (Portfolio and Product initiatives) Note: See criteria legend in next slide 1 13 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 14. Backlog Management Process Portfolio/ Product Planning Strategy Release Plan Managing Release Backlog Opportunity/customer (Requirements, Solution Overview, HLD) Teams Iteration Development Top Priority Product/System Integration Iteration Items Enough Value Planning Planning Planning Planning Product Iter - 1 Iter - 2 Iter - 3 Iter - # Packaging S1 S2 S3 S1 S2 S3 S1 S2 S3 S1 S2 S3 Scrum teams Portfolio/Solution Integration Independent Integration Team Port Test Iter 1 Test Iter 2 Test Iter 3 Test Iter # Pack 14 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 15. Product/Architectur Backlog Entities Release Vehicle e Strategic Themes Solution Overview HL Functional Design 15 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 16. Product/Architectur Backlog Entities Release Vehicle e Strategic Themes When scaling to enterprise the main challenge is to Solution Overview handle dependencies HL Functional Design 16 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 17. Product/Architectur Backlog Entities Release Vehicle e Project View Release View Product View Solution Overview System View Design HL Functional Teams View 17 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 18. Product/Architectur Backlog Entities Release Vehicle e Project View Release View Product View When Scaling to enterprise there are many ways to see Solution Overview the backlog System View Design HL Functional Teams View 18 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 19. Release Project Manager Manager Product Agile Manager Manager 19 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 20. Thank you Information Security Level 2 – Sensitive © 2009 – Proprietary and Confidential Information of Amdocs
  • 21. Product Owner Certification • The course is delivered by AgileSparks, a company specializing in Agile, and provides a formal certification by the ScrumAlliance. • Next course: 30 September 2009. 21 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 22. Scaling Agile Main Practices > Small potential “shippable” iterations/internal releases (3 months) > Contains 3-4 sprints (2-4 weeks) produces high quality working SW > Schedule based cadence > Cross-functional teams > Self managed motivated teams, face-to-face communication > Customer (PdM) involvement during development > Feature/Business Driven (and not a composite design) > Continuous Integration > Technical excellence > JIT Planning model 22 > Visibility into the process Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs
  • 23. 23 Information Security Level 1 – Confidential © 2009 – Proprietary and Confidential Information of Amdocs