CONCURRENT S E S S I O N S
1 PDU per
Session
Wednesday, June 10, 2:45pm
BETTER SOFTWARE
BW9
PROJECTS & TEAMS
Innovation
for Existing
Software
Product: An R&D
Approach
Aaron Barrett,
Infusionsoft
In the world of
software, innovating
an existing product
often makes the
difference between
continued success and rapid
irrelevance and failure.
Although innovation can come
from many different sources, it
can be difficult to develop
breakthrough innovations while
simultaneously trying to
maintain an existing piece of
software. Aaron Barrett says
that a stand-alone R&D team,
freed from the constraints of
production software, is a great
answer to this dilemma. Join
Aaron as he shares some simple
guidelines to facilitate the
process of integrating R&D
efforts into an existing software
product while avoiding R&D
that does not lead to
production-ready systems.
Learn how and when to get
company buy-in, actively
engage your developers, and
develop with your go-to-market
strategy in mind to reap the
innovation benefits of a
dedicated R&D team.
BW10
BUSINESS ANALYSIS &
REQUIREMENTS
Requirements
Are Simply
Requirements—
or Maybe Not
Robin Goldsmith,
Go Pro Management, Inc.
People talk about
requirements, use
identical terms,
and think they
have a common
understanding. Yet, one says
user stories are requirements;
another claims user stories must
be combined with
requirements; and another has
a still different approach. These
“experts” seem unaware of the
critical inconsistencies of their
positions. No wonder getting
requirements right remains a
major challenge for many
projects. Robin Goldsmith
analyzes often conflicting, notso-shared-as-presumed
interpretations of what
requirements are, reveals likely
implications, and challenges
not-so-wise conventional
wisdom. Robin describes a
more appropriate model of
REAL business requirements—
whats that provide value when
combined with product/system/
software hows. He introduces
the powerful Problem
Pyramid™ systematic
disciplined guide to help you
more reliably get requirements
right. The structure makes it
easier to see where user stories
do or do not fit, identifies
pitfalls of the “as a ”
format, and reconciles some of
the conflicts between user
stories, features, use cases, and
requirements.
BW11
BW12
PERSONAL EXCELLENCE
GOING MOBILE
Conflict: To
Know It Is to
Love It
Tips and Tricks
for Building
Secure Mobile
Apps
Doc List, Doc List
Enterprises
We all talk about
conflict. We all
experience it. But
do we really
understand what
causes it and how we deal with
it? Do we have any idea what to
do about it? Much research and
study has been done, but that
doesn’t help when you’re in the
middle of conflict. You don’t
have time to pull out the
reference book or go to a
website. You need simple, clear
understanding. Learn the
categories of conflict and how
to recognize them, which
means having an understanding
of what generates them. Learn
the different strategies of
dealing with conflict, recognize
your own preferred strategies,
and understand where you may
choose to change your strategy.
Discover specific tools you can
use in any situation to
comfortably and confidently
deal with conflict. Doc List
introduces some ideas to
enhance your learning after you
leave the session, so you can
continue to expand your love
affair with conflict.
Jeffery Payne,
Coveros, Inc.
Mobile
application
development is
now a missioncritical
component of many IT
organizations. Due to the
security threats associated with
mobile devices, it is critical that
mobile applications are built—
from the ground up—to be
secure. However, many
application developers and
testers do not understand how
to build and test secure mobile
applications. Jeffery Payne
discusses the risks associated
with mobile platforms/
applications and describes best
practices for ensuring mobile
applications are secure. Jeffery
discusses the unique nuances of
mobile platforms and how these
differences impact the security
approach that must be taken
when building mobile
applications. Topics such as
session management, data
encryption, securing legacy
code, and platform security
models are presented. Learn
what to watch out for when
building mobile applications,
and leave with tips and tricks for
effectively securing your apps.
T O R E G I S T E R C A L L 8 8 8 . 2 6 8 . 8 7 7 0 O R 9 0 4 . 2 7 8 . 0 5 2 4 O R V I S I T A D C - B S C - W E S T.T E C H W E L L . C O M
25