Learn how to be successful in adopting Agile and see good and bad examples of how Agile can be adopted. Broken Agile, Second Edition contains stories from years of real world experience on Agile teams and projects. The stories in each chapter are both educational and entertaining. Each chapter focuses on specific Agile values and principles. The stories in each chapter are used to illustrate how Agile values and principles are sometimes misunderstood or misapplied on Agile teams and projects. You will read how Agile is used in the real world and the consequences of poor adaptations of the Agile software development methodology. These stories will help you in your journey to adopt Agile software development.
What You'll Learn
What are good and bad examples of how Agile can be adopted
What are some specific Agile values and principles
How some of these are misunderstood or misapplied
How Agile is used in the real world
What are the consequences of poor adoption of the Agile software methodology
How some companies have been successful in adopting Agile
This book is for experienced software developers in their journey to adopt Agile Software development. It is very useful for those considering implementation of Agile processes.
Behind every programming language lies a vision of how programs should be built. The vision behind Clojure is of a radically simple language framework holding together a sophisticated collection of programming features. Learning Clojure involves much more than just learning the mechanics of the language. To really get...
ggplot2 is an R package for producing statistical, or data, graphics, but
it is unlike most other graphics packages because it has a deep underlying
grammar. This grammar, based on the Grammar of Graphics (Wilkinson,
2005), is composed of a set of independent components that can be composed
in many different...
Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...
This is the first book where mathematics and computer science are directly confronted and joined to tackle intricate problems in computer science with deep mathematical approaches. It contains a collection of refereed papers presented at the Colloquium on Mathematics and Computer Science held at the University of Versailles-St-Quentin on...
Optimizing compilers have a fundamental problem. No matter how powerful their optimizations are, they are no substitute for good application algorithms. Consider the case of sorting. For sufficiently large data sets, a merge sort algorithm compiled with a less powerful optimizer will always out-perform a selection sort algorithm...