2007 International Conference on Information and Communication Technologies and Development, 2007
Resource limitations present several challenges to diffusion of ICT skills in developing (non-OEC... more Resource limitations present several challenges to diffusion of ICT skills in developing (non-OECD) countries. Trainee teachers join colleges of teacher education with little or no prior exposure to technologies such as mobile phones or computers. Distinctive models are a required to help understanding of basic ICT skills learning in this context. A developmental model of basic ICT skills acquisition is
ABSTRACT Software development teams in large scale offshore enterprise development programmes are... more ABSTRACT Software development teams in large scale offshore enterprise development programmes are often under intense pressure to deliver high quality software within challenging time contraints. Project failures can attract adverse publicity and damage corporate reputations. Agile methods have been advocated to reduce project risks, improving both productivity and product quality. This article uses practitioner descriptions of agile method tailoring to explore large scale offshore enterprise development programmes with a focus on product owner role tailoring, where the product owner identifies and prioritises customer requirements. In globalised projects, the product owner must reconcile competing business interests, whilst generating and then prioritising large numbers of requirements for numerous development teams. The study comprises eight international companies, based in London, Bangalore and Delhi. Interviews with 46 practitioners were conducted between February 2010 and May 2012. Grounded theory was used to identify that product owners form into teams. The main contribution of this research is to describe the nine product owner team functions identified: groom, prioritiser, release master, technical architect, governor, communicator, traveller, intermediary and risk assessor. These product owner functions arbitrate between conflicting customer requirements, approve release schedules, disseminate architectural design decisions, provide technical governance and propogate information across teams. The functions identified in this research are mapped to a scrum of scrums process, and a taxonomy of the functions shows how focusing on either decision-making or information dissemination in each helps to tailor agile methods to large scale offshore enterprise development programmes.
... driven programming, the spread of graphical user interfaces (GUIs), modular software, life cy... more ... driven programming, the spread of graphical user interfaces (GUIs), modular software, life cycle problems, model ... its emphasis is on a particular phase in the development lifecycle'best fitted ... SystemBuild models are usually provided to these tools to improve performance or for ...
... Ali, M. and S. Bailur, (2007) The Challenge of Sustainability in ICT4D Is Bricolage the ... more ... Ali, M. and S. Bailur, (2007) The Challenge of Sustainability in ICT4D Is Bricolage the Answer? Proc of the 9th Int ... Assefa, K., (2009) The Unfolding Trends and Consequences of Expanding Higher Education in Ethiopia: Massive Universities, Massive Challenges, Higher ...
Voting algorithms are used to mask erroneous results from redundant subsystems (variants) in faul... more Voting algorithms are used to mask erroneous results from redundant subsystems (variants) in fault tolerant systems. While voting algorithms are well known and widely used, the authors are not aware of any detailed investigation of voter behaviour in the presence of multiple errors. The results of an experimental evaluation of seven voting algorithms in a variety of simulated error scenarios
Voting algorithms have been widely used in the realisation of fault-tolerant systems. We propose ... more Voting algorithms have been widely used in the realisation of fault-tolerant systems. We propose a new software voting algorithm which uses the history record of redundant modules to compute the final output. Two versions for the novel algorithm are introduced In the first version any module result is assigned to a weighting value such that module results with higher history
AbstractSummary & ConclusionsVoting algorithms are used to provide an error masking cap... more AbstractSummary & ConclusionsVoting algorithms are used to provide an error masking capability in a wide range of highly de-pendable commercial & research applications. These applications include N-Modular Redundant hardware systems and diversely designed ...
... evident from a comment by one of the company C developers. I find the free-for-all task allo... more ... evident from a comment by one of the company C developers. I find the free-for-all task allocation reminiscent of MacDonalds and thus stressing because of uncertainty. Mark, Developer, Company C, Questionnaire, April 01. ...
2007 International Conference on Information and Communication Technologies and Development, 2007
Resource limitations present several challenges to diffusion of ICT skills in developing (non-OEC... more Resource limitations present several challenges to diffusion of ICT skills in developing (non-OECD) countries. Trainee teachers join colleges of teacher education with little or no prior exposure to technologies such as mobile phones or computers. Distinctive models are a required to help understanding of basic ICT skills learning in this context. A developmental model of basic ICT skills acquisition is
ABSTRACT Software development teams in large scale offshore enterprise development programmes are... more ABSTRACT Software development teams in large scale offshore enterprise development programmes are often under intense pressure to deliver high quality software within challenging time contraints. Project failures can attract adverse publicity and damage corporate reputations. Agile methods have been advocated to reduce project risks, improving both productivity and product quality. This article uses practitioner descriptions of agile method tailoring to explore large scale offshore enterprise development programmes with a focus on product owner role tailoring, where the product owner identifies and prioritises customer requirements. In globalised projects, the product owner must reconcile competing business interests, whilst generating and then prioritising large numbers of requirements for numerous development teams. The study comprises eight international companies, based in London, Bangalore and Delhi. Interviews with 46 practitioners were conducted between February 2010 and May 2012. Grounded theory was used to identify that product owners form into teams. The main contribution of this research is to describe the nine product owner team functions identified: groom, prioritiser, release master, technical architect, governor, communicator, traveller, intermediary and risk assessor. These product owner functions arbitrate between conflicting customer requirements, approve release schedules, disseminate architectural design decisions, provide technical governance and propogate information across teams. The functions identified in this research are mapped to a scrum of scrums process, and a taxonomy of the functions shows how focusing on either decision-making or information dissemination in each helps to tailor agile methods to large scale offshore enterprise development programmes.
... driven programming, the spread of graphical user interfaces (GUIs), modular software, life cy... more ... driven programming, the spread of graphical user interfaces (GUIs), modular software, life cycle problems, model ... its emphasis is on a particular phase in the development lifecycle'best fitted ... SystemBuild models are usually provided to these tools to improve performance or for ...
... Ali, M. and S. Bailur, (2007) The Challenge of Sustainability in ICT4D Is Bricolage the ... more ... Ali, M. and S. Bailur, (2007) The Challenge of Sustainability in ICT4D Is Bricolage the Answer? Proc of the 9th Int ... Assefa, K., (2009) The Unfolding Trends and Consequences of Expanding Higher Education in Ethiopia: Massive Universities, Massive Challenges, Higher ...
Voting algorithms are used to mask erroneous results from redundant subsystems (variants) in faul... more Voting algorithms are used to mask erroneous results from redundant subsystems (variants) in fault tolerant systems. While voting algorithms are well known and widely used, the authors are not aware of any detailed investigation of voter behaviour in the presence of multiple errors. The results of an experimental evaluation of seven voting algorithms in a variety of simulated error scenarios
Voting algorithms have been widely used in the realisation of fault-tolerant systems. We propose ... more Voting algorithms have been widely used in the realisation of fault-tolerant systems. We propose a new software voting algorithm which uses the history record of redundant modules to compute the final output. Two versions for the novel algorithm are introduced In the first version any module result is assigned to a weighting value such that module results with higher history
AbstractSummary & ConclusionsVoting algorithms are used to provide an error masking cap... more AbstractSummary & ConclusionsVoting algorithms are used to provide an error masking capability in a wide range of highly de-pendable commercial & research applications. These applications include N-Modular Redundant hardware systems and diversely designed ...
... evident from a comment by one of the company C developers. I find the free-for-all task allo... more ... evident from a comment by one of the company C developers. I find the free-for-all task allocation reminiscent of MacDonalds and thus stressing because of uncertainty. Mark, Developer, Company C, Questionnaire, April 01. ...
Uploads
Papers by Julian Bass