COLLW | Page 25

CONCURRENT S E S S I O N S 1 PDU per Session Wednesday, June 10, 2:45pm BETTER SOFTWARE BW9 PROJECTS & TEAMS Innovation for Existing Software Product: An R&D Approach Aaron Barrett, Infusionsoft In the world of software, innovating an existing product often makes the difference between continued success and rapid irrelevance and failure. Although innovation can come from many different sources, it can be difficult to develop breakthrough innovations while simultaneously trying to maintain an existing piece of software. Aaron Barrett says that a stand-alone R&D team, freed from the constraints of production software, is a great answer to this dilemma. Join Aaron as he shares some simple guidelines to facilitate the process of integrating R&D efforts into an existing software product while avoiding R&D that does not lead to production-ready systems. Learn how and when to get company buy-in, actively engage your developers, and develop with your go-to-market strategy in mind to reap the innovation benefits of a dedicated R&D team. BW10 BUSINESS ANALYSIS & REQUIREMENTS Requirements Are Simply Requirements— or Maybe Not Robin Goldsmith, Go Pro Management, Inc. People talk about requirements, use identical terms, and think they have a common understanding. Yet, one says user stories are requirements; another claims user stories must be combined with requirements; and another has a still different approach. These “experts” seem unaware of the critical inconsistencies of their positions. No wonder getting requirements right remains a major challenge for many projects. Robin Goldsmith analyzes often conflicting, notso-shared-as-presumed interpretations of what requirements are, reveals likely implications, and challenges not-so-wise conventional wisdom. Robin describes a more appropriate model of REAL business requirements— whats that provide value when combined with product/system/ software hows. He introduces the powerful Problem Pyramid™ systematic disciplined guide to help you more reliably get requirements right. The structure makes it easier to see where user stories do or do not fit, identifies pitfalls of the “as a ” format, and reconciles some of the conflicts between user stories, features, use cases, and requirements. BW11 BW12 PERSONAL EXCELLENCE GOING MOBILE Conflict: To Know It Is to Love It Tips and Tricks for Building Secure Mobile Apps Doc List, Doc List Enterprises We all talk about conflict. We all experience it. But do we really understand what causes it and how we deal with it? Do we have any idea what to do about it? Much research and study has been done, but that doesn’t help when you’re in the middle of conflict. You don’t have time to pull out the reference book or go to a website. You need simple, clear understanding. Learn the categories of conflict and how to recognize them, which means having an understanding of what generates them. Learn the different strategies of dealing with conflict, recognize your own preferred strategies, and understand where you may choose to change your strategy. Discover specific tools you can use in any situation to comfortably and confidently deal with conflict. Doc List introduces some ideas to enhance your learning after you leave the session, so you can continue to expand your love affair with conflict. Jeffery Payne, Coveros, Inc. Mobile application development is now a missioncritical component of many IT organizations. Due to the security threats associated with mobile devices, it is critical that mobile applications are built— from the ground up—to be secure. However, many application developers and testers do not understand how to build and test secure mobile applications. Jeffery Payne discusses the risks associated with mobile platforms/ applications and describes best practices for ensuring mobile applications are secure. Jeffery discusses the unique nuances of mobile platforms and how these differences impact the security approach that must be taken when building mobile applications. Topics such as session management, data encryption, securing legacy code, and platform security models are presented. Learn what to watch out for when building mobile applications, and leave with tips and tricks for effectively securing your apps. T O R E G I S T E R C A L L 8 8 8 . 2 6 8 . 8 7 7 0 O R 9 0 4 . 2 7 8 . 0 5 2 4 O R V I S I T A D C - B S C - W E S T.T E C H W E L L . C O M 25