SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
Pair Programmingtakes out Frustration,[object Object],Presented by:,[object Object],ProsunjitBiswas,[object Object],Teaching Assitant,[object Object],Dept of Computer Science,[object Object],University of Texas at San Antonio,[object Object],Email: prosun.csedu@gmail.com,[object Object]
 			Outline … ,[object Object], Solo Programming,[object Object], Problems with Solo Programming,[object Object], Introduction to Pair Programming,[object Object], Elements of Pair Programming,[object Object], Advantages of Pair Programming,[object Object], Problems with Pair Programming,[object Object], Comparison between Solo & Pair Programming,[object Object],4/26/2011,[object Object],2 of 10,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object]
Before we get to know Pair Programming we will define Solo Programming,[object Object],4/26/2011,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],3,[object Object]
Solo Programming is programming just by one person taking every responsibility of design, analysis and implementation by himself/herself.,[object Object],4/26/2011,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],4,[object Object]
But the risks of Solo Programming are,[object Object],4/26/2011,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],5,[object Object]
I. High Error Rate,[object Object],4/26/2011,[object Object],6 of 10,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object]
4/26/2011,[object Object],7 of 10,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],II. Low Productivity,[object Object]
III. Frustration,[object Object],4/26/2011,[object Object],8 of 10,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object]
Here comes Pair Programming.,[object Object],4/26/2011,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],9,[object Object]
In pair programming two persons are doing all programming tasks ( Design, analysis and implementation) sitting on one computer , sharing one keyboard– one doing the task and the other assisting the former.,[object Object],4/26/2011,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],10,[object Object]
       1. Navigator   2. Driver,[object Object],4/26/2011,[object Object],11 of 10,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],Elements of Pair Programming,[object Object]
       Driver & Navigator in Action,[object Object],4/26/2011,[object Object],12 of 10,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object]
                 I. Learn from each other,[object Object],4/26/2011,[object Object],13 of 10,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],Advantages of Pair Programming ,[object Object]
 II. Improved Quality,[object Object],4/26/2011,[object Object],14 of 10,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],Advantages of Pair Programming …,[object Object]
 III. Fast & Accurate,[object Object],4/26/2011,[object Object],15 of 10,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],Advantages of Pair Programming …,[object Object]
            IV. Happy Programming,[object Object],4/26/2011,[object Object],16 of 10,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],Advantages of Pair Programming …,[object Object]
				But …,[object Object],Some People cannot make it (1).,[object Object],4/26/2011,[object Object],17 of 10,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object]
Some People cannot make it (2).,[object Object],4/26/2011,[object Object],18 of 10,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object]
Pair Programming Vs Solo Programming,[object Object],Pair Programming	Solo Programming,[object Object],1. Two person particip-	  1. One person,[object Object],ating in programming 	 programming.,[object Object],	same time.,[object Object],2. Improved productivity   2. Less productive,[object Object],    reliability.			     & error prone,[object Object],4/26/2011,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],19,[object Object]
Any Question?,[object Object],4/26/2011,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],20,[object Object]
…Thank you …,[object Object],4/26/2011,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object],21,[object Object]
	Photo Credit :,[object Object],        Google Images,[object Object],       PairCoatching.net,[object Object],4/26/2011,[object Object],22 of 22,[object Object],Presented @ UTSA,  MS Building  2.08B ,[object Object]

Mais conteúdo relacionado

Semelhante a Pair programming

Designing for Performance: Database Related Worst Practices
Designing for Performance: Database Related Worst PracticesDesigning for Performance: Database Related Worst Practices
Designing for Performance: Database Related Worst PracticesChristian Antognini
 
Heuristic Evaluation of Bentley.edu
Heuristic Evaluation of Bentley.eduHeuristic Evaluation of Bentley.edu
Heuristic Evaluation of Bentley.eduJessica Holt-Carr
 
Designing for performance: Database Related Worst Practices
Designing for performance: Database Related Worst PracticesDesigning for performance: Database Related Worst Practices
Designing for performance: Database Related Worst PracticesTrivadis
 
Enrollment System High School
Enrollment System High SchoolEnrollment System High School
Enrollment System High SchoolLisa Fields
 
Tutorial for the EAWG: Solution Architecture for 2010
Tutorial for the EAWG: Solution Architecture for 2010Tutorial for the EAWG: Solution Architecture for 2010
Tutorial for the EAWG: Solution Architecture for 2010guest8c518a8
 
Determining The Barriers Faced By Novice Programmers
Determining The Barriers Faced By Novice ProgrammersDetermining The Barriers Faced By Novice Programmers
Determining The Barriers Faced By Novice ProgrammersWaqas Tariq
 
CSC426 - Software Engineering Lecture Note
CSC426   - Software Engineering Lecture NoteCSC426   - Software Engineering Lecture Note
CSC426 - Software Engineering Lecture NoteBro Shola Ajayi
 
The Times They Are a-Changin’: A Data-Driven Portrait of New Trends in How We...
The Times They Are a-Changin’: A Data-Driven Portrait of New Trends in How We...The Times They Are a-Changin’: A Data-Driven Portrait of New Trends in How We...
The Times They Are a-Changin’: A Data-Driven Portrait of New Trends in How We...Heather Miller
 
Challenges and approaches to automating testing of software
Challenges and approaches to automating testing of softwareChallenges and approaches to automating testing of software
Challenges and approaches to automating testing of softwareDavid Montero
 
Computer based online written test system "Tao Software"
Computer based online written test system "Tao Software"Computer based online written test system "Tao Software"
Computer based online written test system "Tao Software"Awais Chaudhary
 
Demat account 1
Demat account 1Demat account 1
Demat account 1kammy virk
 
SW Engineering Management
SW Engineering ManagementSW Engineering Management
SW Engineering ManagementRobert Sayegh
 
Adaptation of the technology of the static code analyzer for developing paral...
Adaptation of the technology of the static code analyzer for developing paral...Adaptation of the technology of the static code analyzer for developing paral...
Adaptation of the technology of the static code analyzer for developing paral...PVS-Studio
 
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMA RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMijseajournal
 
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMA RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMijseajournal
 
Transformation of WSDL files using ETL in the E-orientation domain
Transformation of WSDL files using ETL in the E-orientation domain Transformation of WSDL files using ETL in the E-orientation domain
Transformation of WSDL files using ETL in the E-orientation domain IJECEIAES
 

Semelhante a Pair programming (20)

Pair programming
Pair programmingPair programming
Pair programming
 
CV2015
CV2015CV2015
CV2015
 
Newleaks
NewleaksNewleaks
Newleaks
 
Designing for Performance: Database Related Worst Practices
Designing for Performance: Database Related Worst PracticesDesigning for Performance: Database Related Worst Practices
Designing for Performance: Database Related Worst Practices
 
Heuristic Evaluation of Bentley.edu
Heuristic Evaluation of Bentley.eduHeuristic Evaluation of Bentley.edu
Heuristic Evaluation of Bentley.edu
 
Designing for performance: Database Related Worst Practices
Designing for performance: Database Related Worst PracticesDesigning for performance: Database Related Worst Practices
Designing for performance: Database Related Worst Practices
 
CV Coral
CV CoralCV Coral
CV Coral
 
Enrollment System High School
Enrollment System High SchoolEnrollment System High School
Enrollment System High School
 
Tutorial for the EAWG: Solution Architecture for 2010
Tutorial for the EAWG: Solution Architecture for 2010Tutorial for the EAWG: Solution Architecture for 2010
Tutorial for the EAWG: Solution Architecture for 2010
 
Determining The Barriers Faced By Novice Programmers
Determining The Barriers Faced By Novice ProgrammersDetermining The Barriers Faced By Novice Programmers
Determining The Barriers Faced By Novice Programmers
 
CSC426 - Software Engineering Lecture Note
CSC426   - Software Engineering Lecture NoteCSC426   - Software Engineering Lecture Note
CSC426 - Software Engineering Lecture Note
 
The Times They Are a-Changin’: A Data-Driven Portrait of New Trends in How We...
The Times They Are a-Changin’: A Data-Driven Portrait of New Trends in How We...The Times They Are a-Changin’: A Data-Driven Portrait of New Trends in How We...
The Times They Are a-Changin’: A Data-Driven Portrait of New Trends in How We...
 
Challenges and approaches to automating testing of software
Challenges and approaches to automating testing of softwareChallenges and approaches to automating testing of software
Challenges and approaches to automating testing of software
 
Computer based online written test system "Tao Software"
Computer based online written test system "Tao Software"Computer based online written test system "Tao Software"
Computer based online written test system "Tao Software"
 
Demat account 1
Demat account 1Demat account 1
Demat account 1
 
SW Engineering Management
SW Engineering ManagementSW Engineering Management
SW Engineering Management
 
Adaptation of the technology of the static code analyzer for developing paral...
Adaptation of the technology of the static code analyzer for developing paral...Adaptation of the technology of the static code analyzer for developing paral...
Adaptation of the technology of the static code analyzer for developing paral...
 
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMA RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
 
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMA RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
 
Transformation of WSDL files using ETL in the E-orientation domain
Transformation of WSDL files using ETL in the E-orientation domain Transformation of WSDL files using ETL in the E-orientation domain
Transformation of WSDL files using ETL in the E-orientation domain
 

Mais de UT, San Antonio

digital certificate - types and formats
digital certificate - types and formatsdigital certificate - types and formats
digital certificate - types and formatsUT, San Antonio
 
Static Analysis with Sonarlint
Static Analysis with SonarlintStatic Analysis with Sonarlint
Static Analysis with SonarlintUT, San Antonio
 
Shellshock- from bug towards vulnerability
Shellshock- from bug towards vulnerabilityShellshock- from bug towards vulnerability
Shellshock- from bug towards vulnerabilityUT, San Antonio
 
Big Data Processing: Performance Gain Through In-Memory Computation
Big Data Processing: Performance Gain Through In-Memory ComputationBig Data Processing: Performance Gain Through In-Memory Computation
Big Data Processing: Performance Gain Through In-Memory ComputationUT, San Antonio
 
Enumerated authorization policy ABAC (EP-ABAC) model
Enumerated authorization policy ABAC (EP-ABAC) modelEnumerated authorization policy ABAC (EP-ABAC) model
Enumerated authorization policy ABAC (EP-ABAC) modelUT, San Antonio
 
Where is my Privacy presentation slideshow (one page only)
Where is my Privacy presentation slideshow (one page only)Where is my Privacy presentation slideshow (one page only)
Where is my Privacy presentation slideshow (one page only)UT, San Antonio
 
Security_of_openstack_keystone
Security_of_openstack_keystoneSecurity_of_openstack_keystone
Security_of_openstack_keystoneUT, San Antonio
 
Research seminar group_1_prosunjit
Research seminar group_1_prosunjitResearch seminar group_1_prosunjit
Research seminar group_1_prosunjitUT, San Antonio
 
Attribute Based Encryption
Attribute Based EncryptionAttribute Based Encryption
Attribute Based EncryptionUT, San Antonio
 
Final Project Transciption Factor DNA binding Prediction
Final Project Transciption Factor DNA binding Prediction Final Project Transciption Factor DNA binding Prediction
Final Project Transciption Factor DNA binding Prediction UT, San Antonio
 
Transcription Factor DNA Binding Prediction
Transcription Factor DNA Binding PredictionTranscription Factor DNA Binding Prediction
Transcription Factor DNA Binding PredictionUT, San Antonio
 

Mais de UT, San Antonio (20)

digital certificate - types and formats
digital certificate - types and formatsdigital certificate - types and formats
digital certificate - types and formats
 
Saml metadata
Saml metadataSaml metadata
Saml metadata
 
Static Analysis with Sonarlint
Static Analysis with SonarlintStatic Analysis with Sonarlint
Static Analysis with Sonarlint
 
Shellshock- from bug towards vulnerability
Shellshock- from bug towards vulnerabilityShellshock- from bug towards vulnerability
Shellshock- from bug towards vulnerability
 
Abac17 prosun-slides
Abac17 prosun-slidesAbac17 prosun-slides
Abac17 prosun-slides
 
Abac17 prosun-slides
Abac17 prosun-slidesAbac17 prosun-slides
Abac17 prosun-slides
 
Recitation
RecitationRecitation
Recitation
 
Recitation
RecitationRecitation
Recitation
 
Big Data Processing: Performance Gain Through In-Memory Computation
Big Data Processing: Performance Gain Through In-Memory ComputationBig Data Processing: Performance Gain Through In-Memory Computation
Big Data Processing: Performance Gain Through In-Memory Computation
 
Enumerated authorization policy ABAC (EP-ABAC) model
Enumerated authorization policy ABAC (EP-ABAC) modelEnumerated authorization policy ABAC (EP-ABAC) model
Enumerated authorization policy ABAC (EP-ABAC) model
 
Where is my Privacy presentation slideshow (one page only)
Where is my Privacy presentation slideshow (one page only)Where is my Privacy presentation slideshow (one page only)
Where is my Privacy presentation slideshow (one page only)
 
Three month course
Three month courseThree month course
Three month course
 
One month-syllabus
One month-syllabusOne month-syllabus
One month-syllabus
 
Security_of_openstack_keystone
Security_of_openstack_keystoneSecurity_of_openstack_keystone
Security_of_openstack_keystone
 
Research seminar group_1_prosunjit
Research seminar group_1_prosunjitResearch seminar group_1_prosunjit
Research seminar group_1_prosunjit
 
Ksi
KsiKsi
Ksi
 
Attribute Based Encryption
Attribute Based EncryptionAttribute Based Encryption
Attribute Based Encryption
 
Final Project Transciption Factor DNA binding Prediction
Final Project Transciption Factor DNA binding Prediction Final Project Transciption Factor DNA binding Prediction
Final Project Transciption Factor DNA binding Prediction
 
Cyber Security Exam 2
Cyber Security Exam 2Cyber Security Exam 2
Cyber Security Exam 2
 
Transcription Factor DNA Binding Prediction
Transcription Factor DNA Binding PredictionTranscription Factor DNA Binding Prediction
Transcription Factor DNA Binding Prediction
 

Pair programming

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.